A

  • Adversarial Machine Learning Bypassing Web Application Firewalls Using Deep Reinforcement Learning [Volume 14, Issue 2, 2022, Pages 131-145]

  • AES Secure and Low-Area Implementation of the AES Using FPGA [Volume 14, Issue 3, 2022, Pages 93-99]

  • Android Lightweight Identification of Android Malware with Knowledge Distillation and Deep Learning Approach [Volume 14, Issue 3, 2022, Pages 81-92]

  • Android Malware Detection Android Malware Detection Using One-Class Graph Neural Networks [Volume 14, Issue 3, 2022, Pages 51-60]

  • Android Security SANT: Static Analysis of Native Threads for Security Vetting of Android Applications [Volume 14, Issue 1, 2022, Pages 13-25]

  • Android Security Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System [Volume 14, Issue 3, 2022, Pages 61-69]

  • Applied Cryptography An Electronic Voting Scheme Based on Blockchain Technology and Zero-Knowledge Proofs [Volume 14, Issue 3, 2022, Pages 123-133]

  • Attribute-Based Authentication Attribute-Based Remote Data Auditing and User Authentication for Cloud Storage Systems [Volume 14, Issue 3, 2022, Pages 43-49]

  • Attribute-Based Cryptography Attribute-Based Remote Data Auditing and User Authentication for Cloud Storage Systems [Volume 14, Issue 3, 2022, Pages 43-49]

  • Attribute-Based Encryption Attribute-Based Encryption with Efficient Attribute Revocation, Decryption Outsourcing, and Multi-Keyword Searching in Cloud Storage [Volume 14, Issue 3, 2022, Pages 135-149]

  • Attributed Function Call Graph Android Malware Detection Using One-Class Graph Neural Networks [Volume 14, Issue 3, 2022, Pages 51-60]

  • Attribute Revocation Attribute-Based Encryption with Efficient Attribute Revocation, Decryption Outsourcing, and Multi-Keyword Searching in Cloud Storage [Volume 14, Issue 3, 2022, Pages 135-149]

  • Authentication A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems [Volume 14, Issue 1, 2022, Pages 57-68]

  • Authentication Code Perfect Recovery of Small Tampers Using a Novel Fragile Watermarking Technique Based on Distributed Hamming Code [Volume 14, Issue 2, 2022, Pages 147-156]

  • AV-Net Mask Light-Weight Privacy-Preserving Data Aggregation Protocols in Smart Grid Metering Networks [Volume 14, Issue 3, 2022, Pages 101-112]

B

  • Battery Consumption On the Suitability of Improved TrustChain for Smartphones [Volume 14, Issue 3, 2022, Pages 33-42]

  • Binary Relevance A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis [Volume 14, Issue 1, 2022, Pages 105-113]

  • Blockchain On the Suitability of Improved TrustChain for Smartphones [Volume 14, Issue 3, 2022, Pages 33-42]

  • Blockchain Privacy An Electronic Voting Scheme Based on Blockchain Technology and Zero-Knowledge Proofs [Volume 14, Issue 3, 2022, Pages 123-133]

  • Blockchain Voting An Electronic Voting Scheme Based on Blockchain Technology and Zero-Knowledge Proofs [Volume 14, Issue 3, 2022, Pages 123-133]

  • Business Process Business-Layer Session Puzzling Racer: Dynamic Security Testing Against Session Puzzling Race Conditions in Business Layer [Volume 14, Issue 1, 2022, Pages 83-104]

C

  • Certificateless Signcryption An Efficient Pairing-Free Identity-Based Certificateless Signcryption [Volume 14, Issue 1, 2022, Pages 69-82]

  • Certificateless Signcryption Attacks to Some Recently Proposed CL-SC Schemes and Presenting a Secure Scheme with KSSTIS [Volume 14, Issue 2, 2022, Pages 193-213]

  • Classification A Graph-based Online Feature Selection to Improve Detection of New Attacks [Volume 14, Issue 2, 2022, Pages 115-130]

  • Clustering A Graph-based Online Feature Selection to Improve Detection of New Attacks [Volume 14, Issue 2, 2022, Pages 115-130]

  • Confidentiality SecureKV: Secure Searchable Outsourcing of Key-Value Databases to the Public Cloud [Volume 14, Issue 3, 2022, Pages 113-121]

  • CRAFT Practical Differential Fault Analysis on CRAFT, a Lightweight Block Cipher [Volume 14, Issue 3, 2022, Pages 21-31]

D

  • Data Auditing Attribute-Based Remote Data Auditing and User Authentication for Cloud Storage Systems [Volume 14, Issue 3, 2022, Pages 43-49]

  • Database-Driven CRN Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network [Volume 14, Issue 2, 2022, Pages 215-227]

  • Data Integrity Attribute-Based Remote Data Auditing and User Authentication for Cloud Storage Systems [Volume 14, Issue 3, 2022, Pages 43-49]

  • Data Outsourcing SecureKV: Secure Searchable Outsourcing of Key-Value Databases to the Public Cloud [Volume 14, Issue 3, 2022, Pages 113-121]

  • Deep Learning Lightweight Identification of Android Malware with Knowledge Distillation and Deep Learning Approach [Volume 14, Issue 3, 2022, Pages 81-92]

  • Differential Fault Analysis Practical Differential Fault Analysis on SKINNY [Volume 14, Issue 3, 2022, Pages 9-19]

  • Differential Fault Analysis Practical Differential Fault Analysis on CRAFT, a Lightweight Block Cipher [Volume 14, Issue 3, 2022, Pages 21-31]

  • Digital Signature Revisiting the Security and Efficiency of SP2DAS, 3PDA, and EPPA Smart Grid Security Protocols [Volume 14, Issue 2, 2022, Pages 157-165]

  • Digital Steganography Secure and Imperceptible Image Steganography in Discrete Wavelet Transform Using the XOR Logical Function and Genetic Algorithm [Volume 14, Issue 2, 2022, Pages 167-179]

  • Discrete Wavelet transform Secure and Imperceptible Image Steganography in Discrete Wavelet Transform Using the XOR Logical Function and Genetic Algorithm [Volume 14, Issue 2, 2022, Pages 167-179]

  • Distributed Cloud On the Suitability of Improved TrustChain for Smartphones [Volume 14, Issue 3, 2022, Pages 33-42]

  • Distributed Systems On the Suitability of Improved TrustChain for Smartphones [Volume 14, Issue 3, 2022, Pages 33-42]

  • Dynamic testing Business-Layer Session Puzzling Racer: Dynamic Security Testing Against Session Puzzling Race Conditions in Business Layer [Volume 14, Issue 1, 2022, Pages 83-104]

E

  • Efficiency An Efficient Pairing-Free Identity-Based Certificateless Signcryption [Volume 14, Issue 1, 2022, Pages 69-82]

  • Electronic Voting An Electronic Voting Scheme Based on Blockchain Technology and Zero-Knowledge Proofs [Volume 14, Issue 3, 2022, Pages 123-133]

  • Elliptic Curve Cryptography Light-Weight Privacy-Preserving Data Aggregation Protocols in Smart Grid Metering Networks [Volume 14, Issue 3, 2022, Pages 101-112]

  • Ensemble A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis [Volume 14, Issue 1, 2022, Pages 105-113]

  • Ensemble Clustering A Graph-based Online Feature Selection to Improve Detection of New Attacks [Volume 14, Issue 2, 2022, Pages 115-130]

  • Ensemble Learning Lightweight Identification of Android Malware with Knowledge Distillation and Deep Learning Approach [Volume 14, Issue 3, 2022, Pages 81-92]

F

  • FLD A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis [Volume 14, Issue 1, 2022, Pages 105-113]

  • Forgery Attack Revisiting the Security and Efficiency of SP2DAS, 3PDA, and EPPA Smart Grid Security Protocols [Volume 14, Issue 2, 2022, Pages 157-165]

  • Formal Methods Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System [Volume 14, Issue 3, 2022, Pages 61-69]

  • FPGA Secure and Low-Area Implementation of the AES Using FPGA [Volume 14, Issue 3, 2022, Pages 93-99]

  • Fragile Watermarking Perfect Recovery of Small Tampers Using a Novel Fragile Watermarking Technique Based on Distributed Hamming Code [Volume 14, Issue 2, 2022, Pages 147-156]

G

  • Genetic Algorithm Secure and Imperceptible Image Steganography in Discrete Wavelet Transform Using the XOR Logical Function and Genetic Algorithm [Volume 14, Issue 2, 2022, Pages 167-179]

  • Glitch Frequency Practical Differential Fault Analysis on SKINNY [Volume 14, Issue 3, 2022, Pages 9-19]

  • Glitch Frequency Practical Differential Fault Analysis on CRAFT, a Lightweight Block Cipher [Volume 14, Issue 3, 2022, Pages 21-31]

  • Graded Discrete-Logarithm Problem A New Variant of the Winternitz One Time Signature Based on Graded Encoding Schemes [Volume 14, Issue 1, 2022, Pages 1-11]

  • Graph Convolutional Layer Android Malware Detection Using One-Class Graph Neural Networks [Volume 14, Issue 3, 2022, Pages 51-60]

H

  • Hamming Code Perfect Recovery of Small Tampers Using a Novel Fragile Watermarking Technique Based on Distributed Hamming Code [Volume 14, Issue 2, 2022, Pages 147-156]

  • Homomorphic Encryption Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network [Volume 14, Issue 2, 2022, Pages 215-227]

  • Hyperelliptic Curve An Efficient Pairing-Free Identity-Based Certificateless Signcryption [Volume 14, Issue 1, 2022, Pages 69-82]

I

  • Implementation of Fault Attack Practical Differential Fault Analysis on CRAFT, a Lightweight Block Cipher [Volume 14, Issue 3, 2022, Pages 21-31]

  • Internet of Things A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems [Volume 14, Issue 1, 2022, Pages 57-68]

  • Intrusion Detection System A Graph-based Online Feature Selection to Improve Detection of New Attacks [Volume 14, Issue 2, 2022, Pages 115-130]

  • IoT Mutual Lightweight PUF-Based Authentication Scheme Using Random Key Management Mechanism for Resource-Constrained IoT Devices [Volume 14, Issue 3, 2022, Pages 1-8]

J

  • JavaScript A Study of Timing Side-Channel Attacks and Countermeasures on JavaScript and WebAssembly [Volume 14, Issue 1, 2022, Pages 27-46]

K

  • Key-Value Database SecureKV: Secure Searchable Outsourcing of Key-Value Databases to the Public Cloud [Volume 14, Issue 3, 2022, Pages 113-121]

  • Knowledge Distillation Lightweight Identification of Android Malware with Knowledge Distillation and Deep Learning Approach [Volume 14, Issue 3, 2022, Pages 81-92]

  • KSSTIS Attacks to Some Recently Proposed CL-SC Schemes and Presenting a Secure Scheme with KSSTIS [Volume 14, Issue 2, 2022, Pages 193-213]

L

  • Lightning Lightweight Identification of Android Malware with Knowledge Distillation and Deep Learning Approach [Volume 14, Issue 3, 2022, Pages 81-92]

  • Location Privacy Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network [Volume 14, Issue 2, 2022, Pages 215-227]

M

  • Malicious Code Detection A Study of Timing Side-Channel Attacks and Countermeasures on JavaScript and WebAssembly [Volume 14, Issue 1, 2022, Pages 27-46]

  • Malware Detection Lightweight Identification of Android Malware with Knowledge Distillation and Deep Learning Approach [Volume 14, Issue 3, 2022, Pages 81-92]

  • Medical System A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems [Volume 14, Issue 1, 2022, Pages 57-68]

  • Mobile Security SANT: Static Analysis of Native Threads for Security Vetting of Android Applications [Volume 14, Issue 1, 2022, Pages 13-25]

  • Model-Selection A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis [Volume 14, Issue 1, 2022, Pages 105-113]

  • Multi-Cloud SecureKV: Secure Searchable Outsourcing of Key-Value Databases to the Public Cloud [Volume 14, Issue 3, 2022, Pages 113-121]

  • Multi-Keyword Searching Attribute-Based Encryption with Efficient Attribute Revocation, Decryption Outsourcing, and Multi-Keyword Searching in Cloud Storage [Volume 14, Issue 3, 2022, Pages 135-149]

  • Multiple Access Channel One-Shot Achievable Secrecy Rate Regions for Quantum Interference Wiretap Channel [Volume 14, Issue 3, 2022, Pages 71-80]

  • Mutual Information One-Shot Achievable Secrecy Rate Regions for Quantum Interference Wiretap Channel [Volume 14, Issue 3, 2022, Pages 71-80]

N

  • Network Security Mutual Lightweight PUF-Based Authentication Scheme Using Random Key Management Mechanism for Resource-Constrained IoT Devices [Volume 14, Issue 3, 2022, Pages 1-8]

  • Nibble Fault Injection Practical Differential Fault Analysis on SKINNY [Volume 14, Issue 3, 2022, Pages 9-19]

  • NoSQL SecureKV: Secure Searchable Outsourcing of Key-Value Databases to the Public Cloud [Volume 14, Issue 3, 2022, Pages 113-121]

O

  • One-Class Classification Android Malware Detection Using One-Class Graph Neural Networks [Volume 14, Issue 3, 2022, Pages 51-60]

  • Online Feature Selection A Graph-based Online Feature Selection to Improve Detection of New Attacks [Volume 14, Issue 2, 2022, Pages 115-130]

P

  • Physical Layer Security Mutual Lightweight PUF-Based Authentication Scheme Using Random Key Management Mechanism for Resource-Constrained IoT Devices [Volume 14, Issue 3, 2022, Pages 1-8]

  • Point Factorization problem An Efficient Pairing-Free Identity-Based Certificateless Signcryption [Volume 14, Issue 1, 2022, Pages 69-82]

  • Privacy Revisiting the Security and Efficiency of SP2DAS, 3PDA, and EPPA Smart Grid Security Protocols [Volume 14, Issue 2, 2022, Pages 157-165]

  • Privacy Preserving A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems [Volume 14, Issue 1, 2022, Pages 57-68]

  • Privacy-Preserving Light-Weight Privacy-Preserving Data Aggregation Protocols in Smart Grid Metering Networks [Volume 14, Issue 3, 2022, Pages 101-112]

  • Profiled attacks A Time Randomization-Based Countermeasure Against the Template Side-Channel Attack [Volume 14, Issue 1, 2022, Pages 47-55]

  • ProVerif A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems [Volume 14, Issue 1, 2022, Pages 57-68]

Q

  • Quantum Channel One-Shot Achievable Secrecy Rate Regions for Quantum Interference Wiretap Channel [Volume 14, Issue 3, 2022, Pages 71-80]

  • Query Processing SecureKV: Secure Searchable Outsourcing of Key-Value Databases to the Public Cloud [Volume 14, Issue 3, 2022, Pages 113-121]

R

  • Race Condition Business-Layer Session Puzzling Racer: Dynamic Security Testing Against Session Puzzling Race Conditions in Business Layer [Volume 14, Issue 1, 2022, Pages 83-104]

  • Radio frequency identification Mutual Lightweight PUF-Based Authentication Scheme Using Random Key Management Mechanism for Resource-Constrained IoT Devices [Volume 14, Issue 3, 2022, Pages 1-8]

  • Random Oracle An Efficient Pairing-Free Identity-Based Certificateless Signcryption [Volume 14, Issue 1, 2022, Pages 69-82]

  • Random Oracle Model Attacks to Some Recently Proposed CL-SC Schemes and Presenting a Secure Scheme with KSSTIS [Volume 14, Issue 2, 2022, Pages 193-213]

  • Ransomware Ransomware Detection Based on PE Header Using Convolutional Neural Networks [Volume 14, Issue 2, 2022, Pages 181-192]

  • Reinforcement Learning Bypassing Web Application Firewalls Using Deep Reinforcement Learning [Volume 14, Issue 2, 2022, Pages 131-145]

S

  • Secrecy Capacity One-Shot Achievable Secrecy Rate Regions for Quantum Interference Wiretap Channel [Volume 14, Issue 3, 2022, Pages 71-80]

  • Secure Cloud Storage Attribute-Based Encryption with Efficient Attribute Revocation, Decryption Outsourcing, and Multi-Keyword Searching in Cloud Storage [Volume 14, Issue 3, 2022, Pages 135-149]

  • Security A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems [Volume 14, Issue 1, 2022, Pages 57-68]

  • Security SecureKV: Secure Searchable Outsourcing of Key-Value Databases to the Public Cloud [Volume 14, Issue 3, 2022, Pages 113-121]

  • Semi-Supervised Deep Learning Android Malware Detection Using One-Class Graph Neural Networks [Volume 14, Issue 3, 2022, Pages 51-60]

  • Side-channel attacks A Time Randomization-Based Countermeasure Against the Template Side-Channel Attack [Volume 14, Issue 1, 2022, Pages 47-55]

  • Side-channel attacks Secure and Low-Area Implementation of the AES Using FPGA [Volume 14, Issue 3, 2022, Pages 93-99]

  • SKINNY Practical Differential Fault Analysis on SKINNY [Volume 14, Issue 3, 2022, Pages 9-19]

  • Smart Meter Light-Weight Privacy-Preserving Data Aggregation Protocols in Smart Grid Metering Networks [Volume 14, Issue 3, 2022, Pages 101-112]

  • Sql Injection Bypassing Web Application Firewalls Using Deep Reinforcement Learning [Volume 14, Issue 2, 2022, Pages 131-145]

  • Stacked Graph Autoencoder Android Malware Detection Using One-Class Graph Neural Networks [Volume 14, Issue 3, 2022, Pages 51-60]

  • Standard Model Attacks to Some Recently Proposed CL-SC Schemes and Presenting a Secure Scheme with KSSTIS [Volume 14, Issue 2, 2022, Pages 193-213]

  • Static analysis SANT: Static Analysis of Native Threads for Security Vetting of Android Applications [Volume 14, Issue 1, 2022, Pages 13-25]

  • Steganalysis A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis [Volume 14, Issue 1, 2022, Pages 105-113]

  • Steganalysis Secure and Imperceptible Image Steganography in Discrete Wavelet Transform Using the XOR Logical Function and Genetic Algorithm [Volume 14, Issue 2, 2022, Pages 167-179]

T

  • Tamper Detection and Recovery Perfect Recovery of Small Tampers Using a Novel Fragile Watermarking Technique Based on Distributed Hamming Code [Volume 14, Issue 2, 2022, Pages 147-156]

  • Template attack A Time Randomization-Based Countermeasure Against the Template Side-Channel Attack [Volume 14, Issue 1, 2022, Pages 47-55]

  • Threshold Implementation Secure and Low-Area Implementation of the AES Using FPGA [Volume 14, Issue 3, 2022, Pages 93-99]

  • Timers A Study of Timing Side-Channel Attacks and Countermeasures on JavaScript and WebAssembly [Volume 14, Issue 1, 2022, Pages 27-46]

  • Time shuffling countermeasure A Time Randomization-Based Countermeasure Against the Template Side-Channel Attack [Volume 14, Issue 1, 2022, Pages 47-55]

  • Timing Side-Channel Attacks A Study of Timing Side-Channel Attacks and Countermeasures on JavaScript and WebAssembly [Volume 14, Issue 1, 2022, Pages 27-46]

  • TrustChain On the Suitability of Improved TrustChain for Smartphones [Volume 14, Issue 3, 2022, Pages 33-42]

V

  • Verification Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System [Volume 14, Issue 3, 2022, Pages 61-69]

  • Vulnerability Analysis Business-Layer Session Puzzling Racer: Dynamic Security Testing Against Session Puzzling Race Conditions in Business Layer [Volume 14, Issue 1, 2022, Pages 83-104]

W

  • Web Application Firewall (WAF) Bypassing Web Application Firewalls Using Deep Reinforcement Learning [Volume 14, Issue 2, 2022, Pages 131-145]

  • WebAssembly A Study of Timing Side-Channel Attacks and Countermeasures on JavaScript and WebAssembly [Volume 14, Issue 1, 2022, Pages 27-46]

  • Whitewashing On the Suitability of Improved TrustChain for Smartphones [Volume 14, Issue 3, 2022, Pages 33-42]

Z

  • ZK-SNARKs An Electronic Voting Scheme Based on Blockchain Technology and Zero-Knowledge Proofs [Volume 14, Issue 3, 2022, Pages 123-133]