A
-
Authentication
Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions [Volume 1, Issue 1, 2009, Pages 55-67]
-
Authorization
CAMAC: a context-aware mandatory access control model [Volume 1, Issue 1, 2009, Pages 35-54]
B
-
Bilateral Authentication
A TESLA-based mutual authentication protocol for GSM networks [Volume 1, Issue 1, 2009, Pages 3-15]
-
Biometric Encryption
A collusion attack on the fuzzy vault scheme [Volume 1, Issue 1, 2009, Pages 27-34]
-
Blindness
An efficient blind signature scheme based on the elliptic curve discrete logarithm problem [Volume 1, Issue 2, 2009, Pages 125-131]
-
Blind Signature
An efficient blind signature scheme based on the elliptic curve discrete logarithm problem [Volume 1, Issue 2, 2009, Pages 125-131]
-
Botnet
Image flip CAPTCHA [Volume 1, Issue 2, 2009, Pages 105-123]
C
-
CAPTCHA
Image flip CAPTCHA [Volume 1, Issue 2, 2009, Pages 105-123]
-
CAPTCHA Security
Image flip CAPTCHA [Volume 1, Issue 2, 2009, Pages 105-123]
-
CAPTCHA Usability
Image flip CAPTCHA [Volume 1, Issue 2, 2009, Pages 105-123]
-
Clickable CAPTCHA
Image flip CAPTCHA [Volume 1, Issue 2, 2009, Pages 105-123]
-
Concentration measure
Moving dispersion method for statistical anomaly detection in intrusion detection systems [Volume 1, Issue 2, 2009, Pages 71-90]
-
Context Awareness
CAMAC: a context-aware mandatory access control model [Volume 1, Issue 1, 2009, Pages 35-54]
D
-
Dispersion measure
Moving dispersion method for statistical anomaly detection in intrusion detection systems [Volume 1, Issue 2, 2009, Pages 71-90]
E
-
Elliptic Curves Cryptosystems
An efficient blind signature scheme based on the elliptic curve discrete logarithm problem [Volume 1, Issue 2, 2009, Pages 125-131]
-
Entity Authentication
A TESLA-based mutual authentication protocol for GSM networks [Volume 1, Issue 1, 2009, Pages 3-15]
-
EWMA techniques
Moving dispersion method for statistical anomaly detection in intrusion detection systems [Volume 1, Issue 2, 2009, Pages 71-90]
F
-
Fuzzy Vault
A collusion attack on the fuzzy vault scheme [Volume 1, Issue 1, 2009, Pages 27-34]
G
-
GSM
A TESLA-based mutual authentication protocol for GSM networks [Volume 1, Issue 1, 2009, Pages 3-15]
H
-
HIP
Image flip CAPTCHA [Volume 1, Issue 2, 2009, Pages 105-123]
I
-
Image CAPTCHA
Image flip CAPTCHA [Volume 1, Issue 2, 2009, Pages 105-123]
-
Information Flow Control
CAMAC: a context-aware mandatory access control model [Volume 1, Issue 1, 2009, Pages 35-54]
-
Intrusion Detection
Moving dispersion method for statistical anomaly detection in intrusion detection systems [Volume 1, Issue 2, 2009, Pages 71-90]
M
-
Mandatory Access Control
CAMAC: a context-aware mandatory access control model [Volume 1, Issue 1, 2009, Pages 35-54]
-
Man-in-the-Middle Attack
A TESLA-based mutual authentication protocol for GSM networks [Volume 1, Issue 1, 2009, Pages 3-15]
-
Multilevel Security
CAMAC: a context-aware mandatory access control model [Volume 1, Issue 1, 2009, Pages 35-54]
N
-
Neural Net
Steganalysis of embedding in difference of image pixel pairs by neural network [Volume 1, Issue 1, 2009, Pages 17-26]
P
-
Parallel Sessions
Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions [Volume 1, Issue 1, 2009, Pages 55-67]
-
Perceptrons
Steganalysis of embedding in difference of image pixel pairs by neural network [Volume 1, Issue 1, 2009, Pages 17-26]
-
Pixel-Value Differencing
Steganalysis of embedding in difference of image pixel pairs by neural network [Volume 1, Issue 1, 2009, Pages 17-26]
-
Process Algebra
Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions [Volume 1, Issue 1, 2009, Pages 55-67]
-
Protocol Fuzzing
Security testing of session initiation protocol implementations [Volume 1, Issue 2, 2009, Pages 91-103]
S
-
Security
Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions [Volume 1, Issue 1, 2009, Pages 55-67]
-
Software Security
Security testing of session initiation protocol implementations [Volume 1, Issue 2, 2009, Pages 91-103]
-
Statistical anomaly detection
Moving dispersion method for statistical anomaly detection in intrusion detection systems [Volume 1, Issue 2, 2009, Pages 71-90]
-
Steganalysis
Steganalysis of embedding in difference of image pixel pairs by neural network [Volume 1, Issue 1, 2009, Pages 17-26]
-
Steganography
Steganalysis of embedding in difference of image pixel pairs by neural network [Volume 1, Issue 1, 2009, Pages 17-26]
T
-
TESLA Protocol
A TESLA-based mutual authentication protocol for GSM networks [Volume 1, Issue 1, 2009, Pages 3-15]
U
-
Unilateral Authentication
A TESLA-based mutual authentication protocol for GSM networks [Volume 1, Issue 1, 2009, Pages 3-15]
-
Untraceability
An efficient blind signature scheme based on the elliptic curve discrete logarithm problem [Volume 1, Issue 2, 2009, Pages 125-131]
V
-
Variance
Moving dispersion method for statistical anomaly detection in intrusion detection systems [Volume 1, Issue 2, 2009, Pages 71-90]
-
Voice Over IP
Security testing of session initiation protocol implementations [Volume 1, Issue 2, 2009, Pages 91-103]