A
-
Access Control Policies
An automatic test case generator for evaluating implementation of access control policies [Volume 9, Issue 1, 2017, Pages 73-91]
-
Alternating Cycle Free Matching
On the computational complexity of finding a minimal basis for the guess and determine attack [Volume 9, Issue 2, 2017, Pages 101-110]
-
Attacker
Analyzing new features of infected web content in detection of malicious web pages [Volume 9, Issue 2, 2017, Pages 161-181]
-
Audio scrambling system
Cipher text only attack on speech time scrambling systems using correction of audio spectrogram [Volume 9, Issue 2, 2017, Pages 131-145]
-
Automated Testing
An automatic test case generator for evaluating implementation of access control policies [Volume 9, Issue 1, 2017, Pages 73-91]
C
-
Certificateless Signcryption Scheme
An efficient certificateless signcryption scheme in the standard model [Volume 9, Issue 1, 2017, Pages 3-16]
-
Channel Coding
An efficient secure channel coding scheme based on polar codes [Volume 9, Issue 2, 2017, Pages 111-118]
-
Cipher text only attack
Cipher text only attack on speech time scrambling systems using correction of audio spectrogram [Volume 9, Issue 2, 2017, Pages 131-145]
-
Code Based Cryptography
An efficient secure channel coding scheme based on polar codes [Volume 9, Issue 2, 2017, Pages 111-118]
-
Code Injection
Side channel parameter characteristics of code injection attacks [Volume 9, Issue 1, 2017, Pages 17-26]
-
Code Reuse Attacks
Dwarf Frankenstein is still in your memory: tiny code reuse attacks [Volume 9, Issue 1, 2017, Pages 53-72]
-
Computational Complexity
On the computational complexity of finding a minimal basis for the guess and determine attack [Volume 9, Issue 2, 2017, Pages 101-110]
-
Continuous Non-malleability
A new security proof for FMNV continuous non-malleable encoding scheme [Volume 9, Issue 1, 2017, Pages 41-51]
-
Cryptanalysis
Cipher text only attack on speech time scrambling systems using correction of audio spectrogram [Volume 9, Issue 2, 2017, Pages 131-145]
D
-
DPA
A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study [Volume 9, Issue 2, 2017, Pages 119-130]
E
-
Embedded Systems
Side channel parameter characteristics of code injection attacks [Volume 9, Issue 1, 2017, Pages 17-26]
F
-
Feature
Analyzing new features of infected web content in detection of malicious web pages [Volume 9, Issue 2, 2017, Pages 161-181]
-
Feature Extraction
Phishing website detection using weighted feature line embedding [Volume 9, Issue 2, 2017, Pages 147-159]
-
Feature Line
Phishing website detection using weighted feature line embedding [Volume 9, Issue 2, 2017, Pages 147-159]
-
Fixed Parameter Tractable
On the computational complexity of finding a minimal basis for the guess and determine attack [Volume 9, Issue 2, 2017, Pages 101-110]
-
Forcing Number
On the computational complexity of finding a minimal basis for the guess and determine attack [Volume 9, Issue 2, 2017, Pages 101-110]
G
-
Graph Coloring
LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring [Volume 9, Issue 1, 2017, Pages 27-39]
-
Guess-and-determine Attack
On the computational complexity of finding a minimal basis for the guess and determine attack [Volume 9, Issue 2, 2017, Pages 101-110]
I
-
Implementation of Access Control
An automatic test case generator for evaluating implementation of access control policies [Volume 9, Issue 1, 2017, Pages 73-91]
J
-
Jigsaw puzzle
Cipher text only attack on speech time scrambling systems using correction of audio spectrogram [Volume 9, Issue 2, 2017, Pages 131-145]
-
Jump Number
On the computational complexity of finding a minimal basis for the guess and determine attack [Volume 9, Issue 2, 2017, Pages 101-110]
-
Jump Oriented Programming
Dwarf Frankenstein is still in your memory: tiny code reuse attacks [Volume 9, Issue 1, 2017, Pages 53-72]
K
-
Kernel Trapper Gadget
Dwarf Frankenstein is still in your memory: tiny code reuse attacks [Volume 9, Issue 1, 2017, Pages 53-72]
L
-
Leakage-resilient
A new security proof for FMNV continuous non-malleable encoding scheme [Volume 9, Issue 1, 2017, Pages 41-51]
M
-
Machine Learning
Analyzing new features of infected web content in detection of malicious web pages [Volume 9, Issue 2, 2017, Pages 161-181]
-
Malicious-but-passive Key Generation Center Attack
An efficient certificateless signcryption scheme in the standard model [Volume 9, Issue 1, 2017, Pages 3-16]
-
Malicious web pages
Analyzing new features of infected web content in detection of malicious web pages [Volume 9, Issue 2, 2017, Pages 161-181]
-
Model Based Technique
An automatic test case generator for evaluating implementation of access control policies [Volume 9, Issue 1, 2017, Pages 73-91]
-
Multimedia encryption systems
Cipher text only attack on speech time scrambling systems using correction of audio spectrogram [Volume 9, Issue 2, 2017, Pages 131-145]
N
-
No Keywords
Persian Abstract [Volume 9, Issue 1, 2017, Pages 93-98]
-
Non-malleable
A new security proof for FMNV continuous non-malleable encoding scheme [Volume 9, Issue 1, 2017, Pages 41-51]
-
NP-complete
On the computational complexity of finding a minimal basis for the guess and determine attack [Volume 9, Issue 2, 2017, Pages 101-110]
O
-
Obfuscation
Analyzing new features of infected web content in detection of malicious web pages [Volume 9, Issue 2, 2017, Pages 161-181]
P
-
Phishing Detection
Phishing website detection using weighted feature line embedding [Volume 9, Issue 2, 2017, Pages 147-159]
-
Polar Codes
An efficient secure channel coding scheme based on polar codes [Volume 9, Issue 2, 2017, Pages 111-118]
-
Probabilistic Key Sharing
LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring [Volume 9, Issue 1, 2017, Pages 27-39]
-
Public Key Replacement Attack
An efficient certificateless signcryption scheme in the standard model [Volume 9, Issue 1, 2017, Pages 3-16]
R
-
Random Graph
LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring [Volume 9, Issue 1, 2017, Pages 27-39]
-
Random Key Pre-distribution
LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring [Volume 9, Issue 1, 2017, Pages 27-39]
-
Random Oracle Model
An efficient certificateless signcryption scheme in the standard model [Volume 9, Issue 1, 2017, Pages 3-16]
-
Rao-Nam Cryptosystem
An efficient secure channel coding scheme based on polar codes [Volume 9, Issue 2, 2017, Pages 111-118]
S
-
Shannon Capacity
An efficient secure channel coding scheme based on polar codes [Volume 9, Issue 2, 2017, Pages 111-118]
-
Side Channel
Side channel parameter characteristics of code injection attacks [Volume 9, Issue 1, 2017, Pages 17-26]
-
Side Channel Attack
A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study [Volume 9, Issue 2, 2017, Pages 119-130]
-
Smoothing Power
A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study [Volume 9, Issue 2, 2017, Pages 119-130]
-
Software Countermeasure
A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study [Volume 9, Issue 2, 2017, Pages 119-130]
-
Software Security
Dwarf Frankenstein is still in your memory: tiny code reuse attacks [Volume 9, Issue 1, 2017, Pages 53-72]
-
Spectrogram
Cipher text only attack on speech time scrambling systems using correction of audio spectrogram [Volume 9, Issue 2, 2017, Pages 131-145]
-
Standard Model
An efficient certificateless signcryption scheme in the standard model [Volume 9, Issue 1, 2017, Pages 3-16]
-
Symmetric Key Management
LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring [Volume 9, Issue 1, 2017, Pages 27-39]
T
-
Tamper-resilient Cryptography
A new security proof for FMNV continuous non-malleable encoding scheme [Volume 9, Issue 1, 2017, Pages 41-51]
-
Tiny JOP
Dwarf Frankenstein is still in your memory: tiny code reuse attacks [Volume 9, Issue 1, 2017, Pages 53-72]
U
-
Uniquely Restricted Matching
On the computational complexity of finding a minimal basis for the guess and determine attack [Volume 9, Issue 2, 2017, Pages 101-110]
V
-
Virtual Training
Phishing website detection using weighted feature line embedding [Volume 9, Issue 2, 2017, Pages 147-159]
W
-
Wireless Sensor Network
LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring [Volume 9, Issue 1, 2017, Pages 27-39]
X
-
XACML
An automatic test case generator for evaluating implementation of access control policies [Volume 9, Issue 1, 2017, Pages 73-91]