A

  • Access Control Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks [Volume 15, Issue 3, 2023, Pages 35-42]

  • Active S-box 4n × 4n Diffusion Layers Based on Multiple 4 × 4 MDS Matrices [Volume 15, Issue 1, 2023, Pages 111-124]

  • Active S-box New Directions in the Design of Binary Matrices for SPN Block Ciphers [Volume 15, Issue 3, 2023, Pages 129-138]

  • Advanced Persistent Threat Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks [Volume 15, Issue 2, 2023, Pages 178-215]

  • Artificial Intelligence-based Code Review Using ChatGPT as a Static Application Security Testing Tool [Volume 15, Issue 3, 2023, Pages 51-58]

  • ASIC Lightweight Cryptographic S-Boxes Based on Efficient Hardware Structures for Block Ciphers [Volume 15, Issue 1, 2023, Pages 137-151]

  • Attribute-Based Encryption Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]

  • Autoencoder A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach [Volume 15, Issue 3, 2023, Pages 43-50]

B

  • Batch authentication A Lightweight Mutual Authentication Scheme for VANETs Between Vehicles and RSUs [Volume 15, Issue 3, 2023, Pages 77-89]

  • Bilinear Pairing New Variations of Discrete Logarithm Problem [Volume 15, Issue 3, 2023, Pages 91-100]

  • Binary Matrix New Directions in the Design of Binary Matrices for SPN Block Ciphers [Volume 15, Issue 3, 2023, Pages 129-138]

  • Blockchain Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]

  • Blockchain Analysis of IOTA Tangle Stability in High Transaction Rates [Volume 15, Issue 2, 2023, Pages 152-162]

  • Broadcast Channel Quantum Multiple Access Wiretap Channel: On the One-Shot Achievable Secrecy Rate Regions [Volume 15, Issue 3, 2023, Pages 19-34]

  • Byzantine-resilience Private Federated Learning: An Adversarial Sanitizing Perspective [Volume 15, Issue 3, 2023, Pages 67-76]

C

  • ChatGPT Model Using ChatGPT as a Static Application Security Testing Tool [Volume 15, Issue 3, 2023, Pages 51-58]

  • Checkability Secure Outsourcing of Two Standard Identity-Based Cryptosystems [Volume 15, Issue 2, 2023, Pages 216-229]

  • Cloud Computing Latest Threats Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art [Volume 15, Issue 1, 2023, Pages 1-58]

  • Cloud Computing Security Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art [Volume 15, Issue 1, 2023, Pages 1-58]

  • Cloud Computing Threats Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art [Volume 15, Issue 1, 2023, Pages 1-58]

  • Cloud Security Countermeasures Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art [Volume 15, Issue 1, 2023, Pages 1-58]

  • Cloud Security State-of-the-Art Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art [Volume 15, Issue 1, 2023, Pages 1-58]

  • Cloud Security Taxonomy Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art [Volume 15, Issue 1, 2023, Pages 1-58]

  • Code-Based Cryptosystem Post Quantum Digital Signature Based on the McEliece Cryptosystems with Dual Inverse Matrix [Volume 15, Issue 3, 2023, Pages 101-108]

  • Coding Theory Post Quantum Digital Signature Based on the McEliece Cryptosystems with Dual Inverse Matrix [Volume 15, Issue 3, 2023, Pages 101-108]

  • Common Weakness Enumeration Using ChatGPT as a Static Application Security Testing Tool [Volume 15, Issue 3, 2023, Pages 51-58]

  • Consensus Algorithm Analysis of IOTA Tangle Stability in High Transaction Rates [Volume 15, Issue 2, 2023, Pages 152-162]

  • Constant Number of Pairings Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]

  • Contactless Smart Card Reverse Engineering of Authentication Protocol in DesFire [Volume 15, Issue 2, 2023, Pages 254-259]

  • Cross-Device Cross-Device Deep Learning Side-Channel Attacks using Filter and Autoencoder [Volume 15, Issue 3, 2023, Pages 149-158]

  • Cryptography Post Quantum Digital Signature Based on the McEliece Cryptosystems with Dual Inverse Matrix [Volume 15, Issue 3, 2023, Pages 101-108]

  • Cyber-attack A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach [Volume 15, Issue 3, 2023, Pages 43-50]

D

  • Deep Learning A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach [Volume 15, Issue 3, 2023, Pages 43-50]

  • Deep Learning Cross-Device Deep Learning Side-Channel Attacks using Filter and Autoencoder [Volume 15, Issue 3, 2023, Pages 149-158]

  • Department of Motor Vehicles(DMV) A Lightweight Mutual Authentication Scheme for VANETs Between Vehicles and RSUs [Volume 15, Issue 3, 2023, Pages 77-89]

  • Differential Privacy Private Federated Learning: An Adversarial Sanitizing Perspective [Volume 15, Issue 3, 2023, Pages 67-76]

  • Diffie-Hellman problem New Variations of Discrete Logarithm Problem [Volume 15, Issue 3, 2023, Pages 91-100]

  • Diffusion layer 4n × 4n Diffusion Layers Based on Multiple 4 × 4 MDS Matrices [Volume 15, Issue 1, 2023, Pages 111-124]

  • Diffusion layer New Directions in the Design of Binary Matrices for SPN Block Ciphers [Volume 15, Issue 3, 2023, Pages 129-138]

  • Digital Signature Post Quantum Digital Signature Based on the McEliece Cryptosystems with Dual Inverse Matrix [Volume 15, Issue 3, 2023, Pages 101-108]

  • Discrete Logarithm New Variations of Discrete Logarithm Problem [Volume 15, Issue 3, 2023, Pages 91-100]

  • Distributed Pixel A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers [Volume 15, Issue 2, 2023, Pages 230-239]

  • Division Property Integral Cryptanalysis of Reduced-Round SAND-64 Based on Bit-Based Division Property [Volume 15, Issue 3, 2023, Pages 139-147]

  • Dynamic analysis A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]

E

  • E-Health An Efficient Scheme for Secure Medical Data Sharing in the Cloud [Volume 15, Issue 3, 2023, Pages 59-66]

  • Elliptic Curve Cryptography An Efficient Scheme for Secure Medical Data Sharing in the Cloud [Volume 15, Issue 3, 2023, Pages 59-66]

  • Elliptic Curves New Variations of Discrete Logarithm Problem [Volume 15, Issue 3, 2023, Pages 91-100]

  • Ethereum Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]

  • EV1 Reverse Engineering of Authentication Protocol in DesFire [Volume 15, Issue 2, 2023, Pages 254-259]

  • Ev2 Reverse Engineering of Authentication Protocol in DesFire [Volume 15, Issue 2, 2023, Pages 254-259]

  • EV3 Reverse Engineering of Authentication Protocol in DesFire [Volume 15, Issue 2, 2023, Pages 254-259]

  • Evasion methods A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]

  • Event Aggregation Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks [Volume 15, Issue 2, 2023, Pages 178-215]

F

  • Federated Learning Private Federated Learning: An Adversarial Sanitizing Perspective [Volume 15, Issue 3, 2023, Pages 67-76]

  • Forward Secrecy A Lightweight RFID Grouping Proof Protocol With Forward Secrecy and Resistant to Reader Compromised Attack [Volume 15, Issue 3, 2023, Pages 117-128]

  • Fragile Watermarking A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers [Volume 15, Issue 2, 2023, Pages 230-239]

G

  • Garbled Circuits MISC: Multi-Input Secure Two-Party Computation [Volume 15, Issue 2, 2023, Pages 163-177]

  • Generalized Jacobians Oblivious Transfer Using Generalized Jacobian of Elliptic Curves [Volume 15, Issue 2, 2023, Pages 260-273]

  • Generative adversarial network An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network [Volume 15, Issue 2, 2023, Pages 240-253]

  • GMW Protocol MISC: Multi-Input Secure Two-Party Computation [Volume 15, Issue 2, 2023, Pages 163-177]

  • Grouping Proof A Lightweight RFID Grouping Proof Protocol With Forward Secrecy and Resistant to Reader Compromised Attack [Volume 15, Issue 3, 2023, Pages 117-128]

H

  • Hamming Code A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers [Volume 15, Issue 2, 2023, Pages 230-239]

  • Hard Problems New Variations of Discrete Logarithm Problem [Volume 15, Issue 3, 2023, Pages 91-100]

  • Hardware Security HyLock: Hybrid Logic Locking Based on Structural Fuzzing for Resisting Learning-based Attacks [Volume 15, Issue 3, 2023, Pages 109-115]

  • Hardware Security Cross-Device Deep Learning Side-Channel Attacks using Filter and Autoencoder [Volume 15, Issue 3, 2023, Pages 149-158]

  • Heterogeneous Event Logs Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks [Volume 15, Issue 2, 2023, Pages 178-215]

  • Hierarchical Deterministic Wallets Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]

  • Hierarchical Identity-Based Searchable Encryption Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting [Volume 15, Issue 3, 2023, Pages 1-17]

  • Hierarchical Threshold Access Structure A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]

  • High-throughput Lightweight Cryptographic S-Boxes Based on Efficient Hardware Structures for Block Ciphers [Volume 15, Issue 1, 2023, Pages 137-151]

  • Homomorphic Encryption Private Federated Learning: An Adversarial Sanitizing Perspective [Volume 15, Issue 3, 2023, Pages 67-76]

  • Homomorphic hash function A Lightweight Mutual Authentication Scheme for VANETs Between Vehicles and RSUs [Volume 15, Issue 3, 2023, Pages 77-89]

I

  • Identity-Based Encryption Secure Outsourcing of Two Standard Identity-Based Cryptosystems [Volume 15, Issue 2, 2023, Pages 216-229]

  • Identity-Based Encryption Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting [Volume 15, Issue 3, 2023, Pages 1-17]

  • IMAGE RECONSTRUCTION A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers [Volume 15, Issue 2, 2023, Pages 230-239]

  • Industrial Control Systems A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach [Volume 15, Issue 3, 2023, Pages 43-50]

  • Integral Distinguisher Integral Cryptanalysis of Reduced-Round SAND-64 Based on Bit-Based Division Property [Volume 15, Issue 3, 2023, Pages 139-147]

  • Internet of Medical Things An Efficient Scheme for Secure Medical Data Sharing in the Cloud [Volume 15, Issue 3, 2023, Pages 59-66]

  • Internet of Things Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]

  • Intrusion Detection System A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach [Volume 15, Issue 3, 2023, Pages 43-50]

  • Intrusion Kill Chain Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks [Volume 15, Issue 2, 2023, Pages 178-215]

  • IoT Analysis of IOTA Tangle Stability in High Transaction Rates [Volume 15, Issue 2, 2023, Pages 152-162]

  • IP Protection HyLock: Hybrid Logic Locking Based on Structural Fuzzing for Resisting Learning-based Attacks [Volume 15, Issue 3, 2023, Pages 109-115]

L

  • Learning Resilience HyLock: Hybrid Logic Locking Based on Structural Fuzzing for Resisting Learning-based Attacks [Volume 15, Issue 3, 2023, Pages 109-115]

M

  • Machine Learning A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]

  • MDS matrix 4n × 4n Diffusion Layers Based on Multiple 4 × 4 MDS Matrices [Volume 15, Issue 1, 2023, Pages 111-124]

  • Membership Inference Attack An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network [Volume 15, Issue 2, 2023, Pages 240-253]

  • MIFARE DESFire Reverse Engineering of Authentication Protocol in DesFire [Volume 15, Issue 2, 2023, Pages 254-259]

  • MILP Integral Cryptanalysis of Reduced-Round SAND-64 Based on Bit-Based Division Property [Volume 15, Issue 3, 2023, Pages 139-147]

  • Modes of Operation Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]

  • Multiple Access Channel Quantum Multiple Access Wiretap Channel: On the One-Shot Achievable Secrecy Rate Regions [Volume 15, Issue 3, 2023, Pages 19-34]

  • Multi-Secret Sharing A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]

  • Multi-Stage Secret Sharing A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]

  • Mutual Information Quantum Multiple Access Wiretap Channel: On the One-Shot Achievable Secrecy Rate Regions [Volume 15, Issue 3, 2023, Pages 19-34]

O

  • Oblivious Transfer MISC: Multi-Input Secure Two-Party Computation [Volume 15, Issue 2, 2023, Pages 163-177]

  • Oblivious Transfer Oblivious Transfer Using Generalized Jacobian of Elliptic Curves [Volume 15, Issue 2, 2023, Pages 260-273]

  • Open Source Hardware HyLock: Hybrid Logic Locking Based on Structural Fuzzing for Resisting Learning-based Attacks [Volume 15, Issue 3, 2023, Pages 109-115]

  • Outsourced Decryption Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]

  • Outsourcing Secure Outsourcing of Two Standard Identity-Based Cryptosystems [Volume 15, Issue 2, 2023, Pages 216-229]

P

  • Payload methods A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]

  • Privacy An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network [Volume 15, Issue 2, 2023, Pages 240-253]

  • Privacy-Preserving Applications MISC: Multi-Input Secure Two-Party Computation [Volume 15, Issue 2, 2023, Pages 163-177]

  • Proxy Re-encryption An Efficient Scheme for Secure Medical Data Sharing in the Cloud [Volume 15, Issue 3, 2023, Pages 59-66]

  • Public Key Cryptography (PKC) Post Quantum Digital Signature Based on the McEliece Cryptosystems with Dual Inverse Matrix [Volume 15, Issue 3, 2023, Pages 101-108]

Q

  • Quantum Channel Quantum Multiple Access Wiretap Channel: On the One-Shot Achievable Secrecy Rate Regions [Volume 15, Issue 3, 2023, Pages 19-34]

  • Quantum Cryptanalysis Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]

  • Quantum Distinguishers Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]

  • Quantum Key Recovery Attack Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]

  • Quantum Related Key Attack Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]

  • Quantum Slide Attack Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]

R

  • Reader Compromised Attack A Lightweight RFID Grouping Proof Protocol With Forward Secrecy and Resistant to Reader Compromised Attack [Volume 15, Issue 3, 2023, Pages 117-128]

  • Reverse Engineering Reverse Engineering of Authentication Protocol in DesFire [Volume 15, Issue 2, 2023, Pages 254-259]

  • Revocation Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]

  • RFID Tags A Lightweight RFID Grouping Proof Protocol With Forward Secrecy and Resistant to Reader Compromised Attack [Volume 15, Issue 3, 2023, Pages 117-128]

  • Road-Side Unit(RSU) A Lightweight Mutual Authentication Scheme for VANETs Between Vehicles and RSUs [Volume 15, Issue 3, 2023, Pages 77-89]

  • ROM Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks [Volume 15, Issue 3, 2023, Pages 35-42]

S

  • SAND Block Cipher Integral Cryptanalysis of Reduced-Round SAND-64 Based on Bit-Based Division Property [Volume 15, Issue 3, 2023, Pages 139-147]

  • Scalability Analysis of IOTA Tangle Stability in High Transaction Rates [Volume 15, Issue 2, 2023, Pages 152-162]

  • Searchable Encryption Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting [Volume 15, Issue 3, 2023, Pages 1-17]

  • Secrecy Capacity Quantum Multiple Access Wiretap Channel: On the One-Shot Achievable Secrecy Rate Regions [Volume 15, Issue 3, 2023, Pages 19-34]

  • Secure Function Evaluation MISC: Multi-Input Secure Two-Party Computation [Volume 15, Issue 2, 2023, Pages 163-177]

  • Secure Messaging Authentication Protocol Reverse Engineering of Authentication Protocol in DesFire [Volume 15, Issue 2, 2023, Pages 254-259]

  • Secure Sharing An Efficient Scheme for Secure Medical Data Sharing in the Cloud [Volume 15, Issue 3, 2023, Pages 59-66]

  • Security Secure Outsourcing of Two Standard Identity-Based Cryptosystems [Volume 15, Issue 2, 2023, Pages 216-229]

  • Security A Lightweight RFID Grouping Proof Protocol With Forward Secrecy and Resistant to Reader Compromised Attack [Volume 15, Issue 3, 2023, Pages 117-128]

  • Security Event Management Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks [Volume 15, Issue 2, 2023, Pages 178-215]

  • Sensitive methods A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]

  • Side-Channel Attack Cross-Device Deep Learning Side-Channel Attacks using Filter and Autoencoder [Volume 15, Issue 3, 2023, Pages 149-158]

  • Signcryption Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks [Volume 15, Issue 3, 2023, Pages 35-42]

  • Social Secret Sharing A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]

  • Stability Analysis of IOTA Tangle Stability in High Transaction Rates [Volume 15, Issue 2, 2023, Pages 152-162]

  • Static Application Security Testing Using ChatGPT as a Static Application Security Testing Tool [Volume 15, Issue 3, 2023, Pages 51-58]

  • Steganography Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]

  • Substitution box (S-box) Lightweight Cryptographic S-Boxes Based on Efficient Hardware Structures for Block Ciphers [Volume 15, Issue 1, 2023, Pages 137-151]

  • Sybil attack A Lightweight Mutual Authentication Scheme for VANETs Between Vehicles and RSUs [Volume 15, Issue 3, 2023, Pages 77-89]

  • Symmetric Cipher Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]

T

  • Tamper Detection A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers [Volume 15, Issue 2, 2023, Pages 230-239]

  • Transaction Address Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]

  • Trusted Authority(TA) A Lightweight Mutual Authentication Scheme for VANETs Between Vehicles and RSUs [Volume 15, Issue 3, 2023, Pages 77-89]

V

  • Vulnerability Detection Using ChatGPT as a Static Application Security Testing Tool [Volume 15, Issue 3, 2023, Pages 51-58]

W

  • WBANs Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks [Volume 15, Issue 3, 2023, Pages 35-42]

  • White-Box An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network [Volume 15, Issue 2, 2023, Pages 240-253]