A

  • Access Control A semantic-aware role-based access control model for pervasive computing environments [Volume 5, Issue 2, 2013, Pages 119-140]

  • Agent-based modeling A computational model and convergence theorem for rumor dissemination in social networks [Volume 5, Issue 2, 2013, Pages 141-154]

  • Anomaly Detection STLR: a novel danger theory based structural TLR algorithm [Volume 5, Issue 2, 2013, Pages 209-225]

  • API Call DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers [Volume 5, Issue 1, 2013, Pages 71-82]

  • Applied pi Calculus Design and formal verification of DZMBE+ [Volume 5, Issue 1, 2013, Pages 37-53]

  • Artificial Immune Systems STLR: a novel danger theory based structural TLR algorithm [Volume 5, Issue 2, 2013, Pages 209-225]

B

  • Bilinear Pairing Convertible limited (multi-) verifier signature: new constructions and applications [Volume 5, Issue 2, 2013, Pages 189-208]

  • Broadcast Encryption Design and formal verification of DZMBE+ [Volume 5, Issue 1, 2013, Pages 37-53]

C

  • Capacity A Survey on Digital Data Hiding Schemes: Principals, Algorithms, and Applications [Volume 5, Issue 1, 2013, Pages 5-36]

  • Chaotic Tent Map Image encryption based on chaotic tent map in time and frequency domains [Volume 5, Issue 1, 2013, Pages 97-110]

  • Context-Aware A semantic-aware role-based access control model for pervasive computing environments [Volume 5, Issue 2, 2013, Pages 119-140]

  • Convertible Limited (Multi-) Verifier Signature Convertible limited (multi-) verifier signature: new constructions and applications [Volume 5, Issue 2, 2013, Pages 189-208]

  • CPU Register Values DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers [Volume 5, Issue 1, 2013, Pages 71-82]

D

  • Danger Theory STLR: a novel danger theory based structural TLR algorithm [Volume 5, Issue 2, 2013, Pages 209-225]

  • Data hiding A Survey on Digital Data Hiding Schemes: Principals, Algorithms, and Applications [Volume 5, Issue 1, 2013, Pages 5-36]

  • Deniable Authentication Convertible limited (multi-) verifier signature: new constructions and applications [Volume 5, Issue 2, 2013, Pages 189-208]

  • Dynamic analysis DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers [Volume 5, Issue 1, 2013, Pages 71-82]

E

  • Electronic Voting Convertible limited (multi-) verifier signature: new constructions and applications [Volume 5, Issue 2, 2013, Pages 189-208]

  • Elliptic Curve Cryptography Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC [Volume 5, Issue 1, 2013, Pages 55-70]

F

  • Formal Methods Design and formal verification of DZMBE+ [Volume 5, Issue 1, 2013, Pages 37-53]

  • Frequency Domain Image encryption based on chaotic tent map in time and frequency domains [Volume 5, Issue 1, 2013, Pages 97-110]

G

  • Group GTrust: a group based trust model [Volume 5, Issue 2, 2013, Pages 155-170]

  • GTrust GTrust: a group based trust model [Volume 5, Issue 2, 2013, Pages 155-170]

I

  • Identity-Based Cryptography Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC [Volume 5, Issue 1, 2013, Pages 55-70]

  • Image Encryption Image encryption based on chaotic tent map in time and frequency domains [Volume 5, Issue 1, 2013, Pages 97-110]

  • Information Propagation A computational model and convergence theorem for rumor dissemination in social networks [Volume 5, Issue 2, 2013, Pages 141-154]

K

  • Key Agreement Protocol Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC [Volume 5, Issue 1, 2013, Pages 55-70]

  • Key Image Image encryption based on chaotic tent map in time and frequency domains [Volume 5, Issue 1, 2013, Pages 97-110]

M

  • Malware Detection DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers [Volume 5, Issue 1, 2013, Pages 71-82]

  • Maximum Likelihood Decoding Robust multiplicative video watermarking using statistical modeling [Volume 5, Issue 1, 2013, Pages 83-95]

  • Metagraph GTrust: a group based trust model [Volume 5, Issue 2, 2013, Pages 155-170]

  • Multiplicative Video Watermarking Robust multiplicative video watermarking using statistical modeling [Volume 5, Issue 1, 2013, Pages 83-95]

N

  • Non-Monotonic Logic A semantic-aware role-based access control model for pervasive computing environments [Volume 5, Issue 2, 2013, Pages 119-140]

P

  • Pervasive Computing Environment A semantic-aware role-based access control model for pervasive computing environments [Volume 5, Issue 2, 2013, Pages 119-140]

R

  • Random Oracle Model Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC [Volume 5, Issue 1, 2013, Pages 55-70]

  • Reputation Prediction of user's trustworthiness in web-based social networks via text mining [Volume 5, Issue 2, 2013, Pages 171-187]

S

  • Secure Multiparty Computation Design and formal verification of DZMBE+ [Volume 5, Issue 1, 2013, Pages 37-53]

  • Security A Survey on Digital Data Hiding Schemes: Principals, Algorithms, and Applications [Volume 5, Issue 1, 2013, Pages 5-36]

  • Social Networks Prediction of user's trustworthiness in web-based social networks via text mining [Volume 5, Issue 2, 2013, Pages 171-187]

  • Social Simulation A computational model and convergence theorem for rumor dissemination in social networks [Volume 5, Issue 2, 2013, Pages 141-154]

  • Steganalysis A Survey on Digital Data Hiding Schemes: Principals, Algorithms, and Applications [Volume 5, Issue 1, 2013, Pages 5-36]

  • STLR algorithm STLR: a novel danger theory based structural TLR algorithm [Volume 5, Issue 2, 2013, Pages 209-225]

T

  • Text Mining Prediction of user's trustworthiness in web-based social networks via text mining [Volume 5, Issue 2, 2013, Pages 171-187]

  • Threshold Secret Sharing Design and formal verification of DZMBE+ [Volume 5, Issue 1, 2013, Pages 37-53]

  • Time Domain Image encryption based on chaotic tent map in time and frequency domains [Volume 5, Issue 1, 2013, Pages 97-110]

  • TLR algorithm STLR: a novel danger theory based structural TLR algorithm [Volume 5, Issue 2, 2013, Pages 209-225]

  • Trust GTrust: a group based trust model [Volume 5, Issue 2, 2013, Pages 155-170]

  • Trust Prediction of user's trustworthiness in web-based social networks via text mining [Volume 5, Issue 2, 2013, Pages 171-187]

U