A

  • Authentication Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions [Volume 1, Issue 1, 2009, Pages 55-67]

  • Authorization CAMAC: a context-aware mandatory access control model [Volume 1, Issue 1, 2009, Pages 35-54]

B

  • Bilateral Authentication A TESLA-based mutual authentication protocol for GSM networks [Volume 1, Issue 1, 2009, Pages 3-15]

  • Biometric Encryption A collusion attack on the fuzzy vault scheme [Volume 1, Issue 1, 2009, Pages 27-34]

  • Blindness An efficient blind signature scheme based on the elliptic curve discrete logarithm problem [Volume 1, Issue 2, 2009, Pages 125-131]

  • Blind Signature An efficient blind signature scheme based on the elliptic curve discrete logarithm problem [Volume 1, Issue 2, 2009, Pages 125-131]

  • Botnet Image flip CAPTCHA [Volume 1, Issue 2, 2009, Pages 105-123]

C

  • CAPTCHA Image flip CAPTCHA [Volume 1, Issue 2, 2009, Pages 105-123]

  • CAPTCHA Security Image flip CAPTCHA [Volume 1, Issue 2, 2009, Pages 105-123]

  • CAPTCHA Usability Image flip CAPTCHA [Volume 1, Issue 2, 2009, Pages 105-123]

  • Clickable CAPTCHA Image flip CAPTCHA [Volume 1, Issue 2, 2009, Pages 105-123]

  • Concentration measure Moving dispersion method for statistical anomaly detection in intrusion detection systems [Volume 1, Issue 2, 2009, Pages 71-90]

  • Context Awareness CAMAC: a context-aware mandatory access control model [Volume 1, Issue 1, 2009, Pages 35-54]

D

  • Dispersion measure Moving dispersion method for statistical anomaly detection in intrusion detection systems [Volume 1, Issue 2, 2009, Pages 71-90]

E

  • Elliptic Curves Cryptosystems An efficient blind signature scheme based on the elliptic curve discrete logarithm problem [Volume 1, Issue 2, 2009, Pages 125-131]

  • Entity Authentication A TESLA-based mutual authentication protocol for GSM networks [Volume 1, Issue 1, 2009, Pages 3-15]

  • EWMA techniques Moving dispersion method for statistical anomaly detection in intrusion detection systems [Volume 1, Issue 2, 2009, Pages 71-90]

F

  • Fuzzy Vault A collusion attack on the fuzzy vault scheme [Volume 1, Issue 1, 2009, Pages 27-34]

G

  • GSM A TESLA-based mutual authentication protocol for GSM networks [Volume 1, Issue 1, 2009, Pages 3-15]

H

  • HIP Image flip CAPTCHA [Volume 1, Issue 2, 2009, Pages 105-123]

I

  • Image CAPTCHA Image flip CAPTCHA [Volume 1, Issue 2, 2009, Pages 105-123]

  • Information Flow Control CAMAC: a context-aware mandatory access control model [Volume 1, Issue 1, 2009, Pages 35-54]

  • Intrusion Detection Moving dispersion method for statistical anomaly detection in intrusion detection systems [Volume 1, Issue 2, 2009, Pages 71-90]

M

  • Mandatory Access Control CAMAC: a context-aware mandatory access control model [Volume 1, Issue 1, 2009, Pages 35-54]

  • Man-in-the-Middle Attack A TESLA-based mutual authentication protocol for GSM networks [Volume 1, Issue 1, 2009, Pages 3-15]

  • Multilevel Security CAMAC: a context-aware mandatory access control model [Volume 1, Issue 1, 2009, Pages 35-54]

N

  • Neural Net Steganalysis of embedding in difference of image pixel pairs by neural network [Volume 1, Issue 1, 2009, Pages 17-26]

P

  • Parallel Sessions Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions [Volume 1, Issue 1, 2009, Pages 55-67]

  • Perceptrons Steganalysis of embedding in difference of image pixel pairs by neural network [Volume 1, Issue 1, 2009, Pages 17-26]

  • Pixel-Value Differencing Steganalysis of embedding in difference of image pixel pairs by neural network [Volume 1, Issue 1, 2009, Pages 17-26]

  • Process Algebra Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions [Volume 1, Issue 1, 2009, Pages 55-67]

  • Protocol Fuzzing Security testing of session initiation protocol implementations [Volume 1, Issue 2, 2009, Pages 91-103]

S

  • Security Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions [Volume 1, Issue 1, 2009, Pages 55-67]

  • Software Security Security testing of session initiation protocol implementations [Volume 1, Issue 2, 2009, Pages 91-103]

  • Statistical anomaly detection Moving dispersion method for statistical anomaly detection in intrusion detection systems [Volume 1, Issue 2, 2009, Pages 71-90]

  • Steganalysis Steganalysis of embedding in difference of image pixel pairs by neural network [Volume 1, Issue 1, 2009, Pages 17-26]

  • Steganography Steganalysis of embedding in difference of image pixel pairs by neural network [Volume 1, Issue 1, 2009, Pages 17-26]

T

  • TESLA Protocol A TESLA-based mutual authentication protocol for GSM networks [Volume 1, Issue 1, 2009, Pages 3-15]

U

  • Unilateral Authentication A TESLA-based mutual authentication protocol for GSM networks [Volume 1, Issue 1, 2009, Pages 3-15]

  • Untraceability An efficient blind signature scheme based on the elliptic curve discrete logarithm problem [Volume 1, Issue 2, 2009, Pages 125-131]

V

  • Variance Moving dispersion method for statistical anomaly detection in intrusion detection systems [Volume 1, Issue 2, 2009, Pages 71-90]

  • Voice Over IP Security testing of session initiation protocol implementations [Volume 1, Issue 2, 2009, Pages 91-103]