A
-
Access Control
Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks [Volume 15, Issue 3, 2023, Pages 35-42]
-
Active S-box
4n × 4n Diffusion Layers Based on Multiple 4 × 4 MDS Matrices [Volume 15, Issue 1, 2023, Pages 111-124]
-
Active S-box
New Directions in the Design of Binary Matrices for SPN Block Ciphers [Volume 15, Issue 3, 2023, Pages 129-138]
-
Advanced Persistent Threat
Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks [Volume 15, Issue 2, 2023, Pages 178-215]
-
Artificial Intelligence-based Code Review
Using ChatGPT as a Static Application Security Testing Tool [Volume 15, Issue 3, 2023, Pages 51-58]
-
ASIC
Lightweight Cryptographic S-Boxes Based on Efficient Hardware Structures for Block Ciphers [Volume 15, Issue 1, 2023, Pages 137-151]
-
Attribute-Based Encryption
Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]
-
Autoencoder
A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach [Volume 15, Issue 3, 2023, Pages 43-50]
B
-
Batch authentication
A Lightweight Mutual Authentication Scheme for VANETs Between Vehicles and RSUs [Volume 15, Issue 3, 2023, Pages 77-89]
-
Bilinear Pairing
New Variations of Discrete Logarithm Problem [Volume 15, Issue 3, 2023, Pages 91-100]
-
Binary Matrix
New Directions in the Design of Binary Matrices for SPN Block Ciphers [Volume 15, Issue 3, 2023, Pages 129-138]
-
Blockchain
Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]
-
Blockchain
Analysis of IOTA Tangle Stability in High Transaction Rates [Volume 15, Issue 2, 2023, Pages 152-162]
-
Broadcast Channel
Quantum Multiple Access Wiretap Channel: On the One-Shot Achievable Secrecy Rate Regions [Volume 15, Issue 3, 2023, Pages 19-34]
-
Byzantine-resilience
Private Federated Learning: An Adversarial Sanitizing Perspective [Volume 15, Issue 3, 2023, Pages 67-76]
C
-
ChatGPT Model
Using ChatGPT as a Static Application Security Testing Tool [Volume 15, Issue 3, 2023, Pages 51-58]
-
Checkability
Secure Outsourcing of Two Standard Identity-Based Cryptosystems [Volume 15, Issue 2, 2023, Pages 216-229]
-
Cloud Computing Latest Threats
Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art [Volume 15, Issue 1, 2023, Pages 1-58]
-
Cloud Computing Security
Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art [Volume 15, Issue 1, 2023, Pages 1-58]
-
Cloud Computing Threats
Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art [Volume 15, Issue 1, 2023, Pages 1-58]
-
Cloud Security Countermeasures
Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art [Volume 15, Issue 1, 2023, Pages 1-58]
-
Cloud Security State-of-the-Art
Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art [Volume 15, Issue 1, 2023, Pages 1-58]
-
Cloud Security Taxonomy
Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art [Volume 15, Issue 1, 2023, Pages 1-58]
-
Code-Based Cryptosystem
Post Quantum Digital Signature Based on the McEliece Cryptosystems with Dual Inverse Matrix [Volume 15, Issue 3, 2023, Pages 101-108]
-
Coding Theory
Post Quantum Digital Signature Based on the McEliece Cryptosystems with Dual Inverse Matrix [Volume 15, Issue 3, 2023, Pages 101-108]
-
Common Weakness Enumeration
Using ChatGPT as a Static Application Security Testing Tool [Volume 15, Issue 3, 2023, Pages 51-58]
-
Consensus Algorithm
Analysis of IOTA Tangle Stability in High Transaction Rates [Volume 15, Issue 2, 2023, Pages 152-162]
-
Constant Number of Pairings
Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]
-
Contactless Smart Card
Reverse Engineering of Authentication Protocol in DesFire [Volume 15, Issue 2, 2023, Pages 254-259]
-
Cross-Device
Cross-Device Deep Learning Side-Channel Attacks using Filter and Autoencoder [Volume 15, Issue 3, 2023, Pages 149-158]
-
Cryptography
Post Quantum Digital Signature Based on the McEliece Cryptosystems with Dual Inverse Matrix [Volume 15, Issue 3, 2023, Pages 101-108]
-
Cyber-attack
A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach [Volume 15, Issue 3, 2023, Pages 43-50]
D
-
Deep Learning
A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach [Volume 15, Issue 3, 2023, Pages 43-50]
-
Deep Learning
Cross-Device Deep Learning Side-Channel Attacks using Filter and Autoencoder [Volume 15, Issue 3, 2023, Pages 149-158]
-
Department of Motor Vehicles(DMV)
A Lightweight Mutual Authentication Scheme for VANETs Between Vehicles and RSUs [Volume 15, Issue 3, 2023, Pages 77-89]
-
Differential Privacy
Private Federated Learning: An Adversarial Sanitizing Perspective [Volume 15, Issue 3, 2023, Pages 67-76]
-
Diffie-Hellman problem
New Variations of Discrete Logarithm Problem [Volume 15, Issue 3, 2023, Pages 91-100]
-
Diffusion layer
4n × 4n Diffusion Layers Based on Multiple 4 × 4 MDS Matrices [Volume 15, Issue 1, 2023, Pages 111-124]
-
Diffusion layer
New Directions in the Design of Binary Matrices for SPN Block Ciphers [Volume 15, Issue 3, 2023, Pages 129-138]
-
Digital Signature
Post Quantum Digital Signature Based on the McEliece Cryptosystems with Dual Inverse Matrix [Volume 15, Issue 3, 2023, Pages 101-108]
-
Discrete Logarithm
New Variations of Discrete Logarithm Problem [Volume 15, Issue 3, 2023, Pages 91-100]
-
Distributed Pixel
A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers [Volume 15, Issue 2, 2023, Pages 230-239]
-
Division Property
Integral Cryptanalysis of Reduced-Round SAND-64 Based on Bit-Based Division Property [Volume 15, Issue 3, 2023, Pages 139-147]
-
Dynamic analysis
A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]
E
-
E-Health
An Efficient Scheme for Secure Medical Data Sharing in the Cloud [Volume 15, Issue 3, 2023, Pages 59-66]
-
Elliptic Curve Cryptography
An Efficient Scheme for Secure Medical Data Sharing in the Cloud [Volume 15, Issue 3, 2023, Pages 59-66]
-
Elliptic Curves
New Variations of Discrete Logarithm Problem [Volume 15, Issue 3, 2023, Pages 91-100]
-
Ethereum
Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]
-
EV1
Reverse Engineering of Authentication Protocol in DesFire [Volume 15, Issue 2, 2023, Pages 254-259]
-
Ev2
Reverse Engineering of Authentication Protocol in DesFire [Volume 15, Issue 2, 2023, Pages 254-259]
-
EV3
Reverse Engineering of Authentication Protocol in DesFire [Volume 15, Issue 2, 2023, Pages 254-259]
-
Evasion methods
A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]
-
Event Aggregation
Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks [Volume 15, Issue 2, 2023, Pages 178-215]
F
-
Federated Learning
Private Federated Learning: An Adversarial Sanitizing Perspective [Volume 15, Issue 3, 2023, Pages 67-76]
-
Forward Secrecy
A Lightweight RFID Grouping Proof Protocol With Forward Secrecy and Resistant to Reader Compromised Attack [Volume 15, Issue 3, 2023, Pages 117-128]
-
Fragile Watermarking
A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers [Volume 15, Issue 2, 2023, Pages 230-239]
G
-
Garbled Circuits
MISC: Multi-Input Secure Two-Party Computation [Volume 15, Issue 2, 2023, Pages 163-177]
-
Generalized Jacobians
Oblivious Transfer Using Generalized Jacobian of Elliptic Curves [Volume 15, Issue 2, 2023, Pages 260-273]
-
Generative adversarial network
An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network [Volume 15, Issue 2, 2023, Pages 240-253]
-
GMW Protocol
MISC: Multi-Input Secure Two-Party Computation [Volume 15, Issue 2, 2023, Pages 163-177]
-
Grouping Proof
A Lightweight RFID Grouping Proof Protocol With Forward Secrecy and Resistant to Reader Compromised Attack [Volume 15, Issue 3, 2023, Pages 117-128]
H
-
Hamming Code
A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers [Volume 15, Issue 2, 2023, Pages 230-239]
-
Hard Problems
New Variations of Discrete Logarithm Problem [Volume 15, Issue 3, 2023, Pages 91-100]
-
Hardware Security
HyLock: Hybrid Logic Locking Based on Structural Fuzzing for Resisting Learning-based Attacks [Volume 15, Issue 3, 2023, Pages 109-115]
-
Hardware Security
Cross-Device Deep Learning Side-Channel Attacks using Filter and Autoencoder [Volume 15, Issue 3, 2023, Pages 149-158]
-
Heterogeneous Event Logs
Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks [Volume 15, Issue 2, 2023, Pages 178-215]
-
Hierarchical Deterministic Wallets
Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]
-
Hierarchical Identity-Based Searchable Encryption
Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting [Volume 15, Issue 3, 2023, Pages 1-17]
-
Hierarchical Threshold Access Structure
A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]
-
High-throughput
Lightweight Cryptographic S-Boxes Based on Efficient Hardware Structures for Block Ciphers [Volume 15, Issue 1, 2023, Pages 137-151]
-
Homomorphic Encryption
Private Federated Learning: An Adversarial Sanitizing Perspective [Volume 15, Issue 3, 2023, Pages 67-76]
-
Homomorphic hash function
A Lightweight Mutual Authentication Scheme for VANETs Between Vehicles and RSUs [Volume 15, Issue 3, 2023, Pages 77-89]
I
-
Identity-Based Encryption
Secure Outsourcing of Two Standard Identity-Based Cryptosystems [Volume 15, Issue 2, 2023, Pages 216-229]
-
Identity-Based Encryption
Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting [Volume 15, Issue 3, 2023, Pages 1-17]
-
IMAGE RECONSTRUCTION
A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers [Volume 15, Issue 2, 2023, Pages 230-239]
-
Industrial Control Systems
A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach [Volume 15, Issue 3, 2023, Pages 43-50]
-
Integral Distinguisher
Integral Cryptanalysis of Reduced-Round SAND-64 Based on Bit-Based Division Property [Volume 15, Issue 3, 2023, Pages 139-147]
-
Internet of Medical Things
An Efficient Scheme for Secure Medical Data Sharing in the Cloud [Volume 15, Issue 3, 2023, Pages 59-66]
-
Internet of Things
Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]
-
Intrusion Detection System
A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach [Volume 15, Issue 3, 2023, Pages 43-50]
-
Intrusion Kill Chain
Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks [Volume 15, Issue 2, 2023, Pages 178-215]
-
IoT
Analysis of IOTA Tangle Stability in High Transaction Rates [Volume 15, Issue 2, 2023, Pages 152-162]
-
IP Protection
HyLock: Hybrid Logic Locking Based on Structural Fuzzing for Resisting Learning-based Attacks [Volume 15, Issue 3, 2023, Pages 109-115]
L
-
Learning Resilience
HyLock: Hybrid Logic Locking Based on Structural Fuzzing for Resisting Learning-based Attacks [Volume 15, Issue 3, 2023, Pages 109-115]
M
-
Machine Learning
A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]
-
MDS matrix
4n × 4n Diffusion Layers Based on Multiple 4 × 4 MDS Matrices [Volume 15, Issue 1, 2023, Pages 111-124]
-
Membership Inference Attack
An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network [Volume 15, Issue 2, 2023, Pages 240-253]
-
MIFARE DESFire
Reverse Engineering of Authentication Protocol in DesFire [Volume 15, Issue 2, 2023, Pages 254-259]
-
MILP
Integral Cryptanalysis of Reduced-Round SAND-64 Based on Bit-Based Division Property [Volume 15, Issue 3, 2023, Pages 139-147]
-
Modes of Operation
Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]
-
Multiple Access Channel
Quantum Multiple Access Wiretap Channel: On the One-Shot Achievable Secrecy Rate Regions [Volume 15, Issue 3, 2023, Pages 19-34]
-
Multi-Secret Sharing
A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]
-
Multi-Stage Secret Sharing
A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]
-
Mutual Information
Quantum Multiple Access Wiretap Channel: On the One-Shot Achievable Secrecy Rate Regions [Volume 15, Issue 3, 2023, Pages 19-34]
O
-
Oblivious Transfer
MISC: Multi-Input Secure Two-Party Computation [Volume 15, Issue 2, 2023, Pages 163-177]
-
Oblivious Transfer
Oblivious Transfer Using Generalized Jacobian of Elliptic Curves [Volume 15, Issue 2, 2023, Pages 260-273]
-
Open Source Hardware
HyLock: Hybrid Logic Locking Based on Structural Fuzzing for Resisting Learning-based Attacks [Volume 15, Issue 3, 2023, Pages 109-115]
-
Outsourced Decryption
Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]
-
Outsourcing
Secure Outsourcing of Two Standard Identity-Based Cryptosystems [Volume 15, Issue 2, 2023, Pages 216-229]
P
-
Payload methods
A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]
-
Privacy
An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network [Volume 15, Issue 2, 2023, Pages 240-253]
-
Privacy-Preserving Applications
MISC: Multi-Input Secure Two-Party Computation [Volume 15, Issue 2, 2023, Pages 163-177]
-
Proxy Re-encryption
An Efficient Scheme for Secure Medical Data Sharing in the Cloud [Volume 15, Issue 3, 2023, Pages 59-66]
-
Public Key Cryptography (PKC)
Post Quantum Digital Signature Based on the McEliece Cryptosystems with Dual Inverse Matrix [Volume 15, Issue 3, 2023, Pages 101-108]
Q
-
Quantum Channel
Quantum Multiple Access Wiretap Channel: On the One-Shot Achievable Secrecy Rate Regions [Volume 15, Issue 3, 2023, Pages 19-34]
-
Quantum Cryptanalysis
Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]
-
Quantum Distinguishers
Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]
-
Quantum Key Recovery Attack
Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]
-
Quantum Related Key Attack
Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]
-
Quantum Slide Attack
Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]
R
-
Reader Compromised Attack
A Lightweight RFID Grouping Proof Protocol With Forward Secrecy and Resistant to Reader Compromised Attack [Volume 15, Issue 3, 2023, Pages 117-128]
-
Reverse Engineering
Reverse Engineering of Authentication Protocol in DesFire [Volume 15, Issue 2, 2023, Pages 254-259]
-
Revocation
Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]
-
RFID Tags
A Lightweight RFID Grouping Proof Protocol With Forward Secrecy and Resistant to Reader Compromised Attack [Volume 15, Issue 3, 2023, Pages 117-128]
-
Road-Side Unit(RSU)
A Lightweight Mutual Authentication Scheme for VANETs Between Vehicles and RSUs [Volume 15, Issue 3, 2023, Pages 77-89]
-
ROM
Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks [Volume 15, Issue 3, 2023, Pages 35-42]
S
-
SAND Block Cipher
Integral Cryptanalysis of Reduced-Round SAND-64 Based on Bit-Based Division Property [Volume 15, Issue 3, 2023, Pages 139-147]
-
Scalability
Analysis of IOTA Tangle Stability in High Transaction Rates [Volume 15, Issue 2, 2023, Pages 152-162]
-
Searchable Encryption
Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting [Volume 15, Issue 3, 2023, Pages 1-17]
-
Secrecy Capacity
Quantum Multiple Access Wiretap Channel: On the One-Shot Achievable Secrecy Rate Regions [Volume 15, Issue 3, 2023, Pages 19-34]
-
Secure Function Evaluation
MISC: Multi-Input Secure Two-Party Computation [Volume 15, Issue 2, 2023, Pages 163-177]
-
Secure Messaging Authentication Protocol
Reverse Engineering of Authentication Protocol in DesFire [Volume 15, Issue 2, 2023, Pages 254-259]
-
Secure Sharing
An Efficient Scheme for Secure Medical Data Sharing in the Cloud [Volume 15, Issue 3, 2023, Pages 59-66]
-
Security
Secure Outsourcing of Two Standard Identity-Based Cryptosystems [Volume 15, Issue 2, 2023, Pages 216-229]
-
Security
A Lightweight RFID Grouping Proof Protocol With Forward Secrecy and Resistant to Reader Compromised Attack [Volume 15, Issue 3, 2023, Pages 117-128]
-
Security Event Management
Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks [Volume 15, Issue 2, 2023, Pages 178-215]
-
Sensitive methods
A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]
-
Side-Channel Attack
Cross-Device Deep Learning Side-Channel Attacks using Filter and Autoencoder [Volume 15, Issue 3, 2023, Pages 149-158]
-
Signcryption
Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks [Volume 15, Issue 3, 2023, Pages 35-42]
-
Social Secret Sharing
A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]
-
Stability
Analysis of IOTA Tangle Stability in High Transaction Rates [Volume 15, Issue 2, 2023, Pages 152-162]
-
Static Application Security Testing
Using ChatGPT as a Static Application Security Testing Tool [Volume 15, Issue 3, 2023, Pages 51-58]
-
Steganography
Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]
-
Substitution box (S-box)
Lightweight Cryptographic S-Boxes Based on Efficient Hardware Structures for Block Ciphers [Volume 15, Issue 1, 2023, Pages 137-151]
-
Sybil attack
A Lightweight Mutual Authentication Scheme for VANETs Between Vehicles and RSUs [Volume 15, Issue 3, 2023, Pages 77-89]
-
Symmetric Cipher
Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]
T
-
Tamper Detection
A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers [Volume 15, Issue 2, 2023, Pages 230-239]
-
Transaction Address
Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]
-
Trusted Authority(TA)
A Lightweight Mutual Authentication Scheme for VANETs Between Vehicles and RSUs [Volume 15, Issue 3, 2023, Pages 77-89]
V
-
Vulnerability Detection
Using ChatGPT as a Static Application Security Testing Tool [Volume 15, Issue 3, 2023, Pages 51-58]