The ISC International Journal of Information Security (ISECURE) - Keyword Index
Home
Browse
Current Issue
By Issue
By Author
By Subject
Author Index
Keyword Index
Journal Info
About Journal
Aims and Scope
Editorial and International Advisory Board
Editorial Staff
Publication Ethics
Indexing and Abstracting
Related Links
FAQ
Peer Review Process
News
Guide for Authors
Submit Manuscript
Reviewers
Contact Us
Login
Register
Home
Keyword Index
Volume 5 (2013)
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
Access Control; Volume 5, Issue 2, 2013, Page 119-140
Agent-based modeling; Volume 5, Issue 2, 2013, Page 141-154
Anomaly Detection; Volume 5, Issue 2, 2013, Page 209-225
API Call; Volume 5, Issue 1, 2013, Page 71-82
Applied pi Calculus; Volume 5, Issue 1, 2013, Page 37-53
Artificial Immune Systems; Volume 5, Issue 2, 2013, Page 209-225
B
Bilinear Pairing; Volume 5, Issue 2, 2013, Page 189-208
Broadcast Encryption; Volume 5, Issue 1, 2013, Page 37-53
C
Chaotic Tent Map; Volume 5, Issue 1, 2013, Page 97-110
Context-Aware; Volume 5, Issue 2, 2013, Page 119-140
Convertible Limited (Multi-) Verifier Signature; Volume 5, Issue 2, 2013, Page 189-208
CPU Register Values; Volume 5, Issue 1, 2013, Page 71-82
D
Danger Theory; Volume 5, Issue 2, 2013, Page 209-225
Data hiding; Volume 5, Issue 1, 2013, Page 5-36
Deniable Authentication; Volume 5, Issue 2, 2013, Page 189-208
Dynamic analysis; Volume 5, Issue 1, 2013, Page 71-82
E
Electronic Voting; Volume 5, Issue 2, 2013, Page 189-208
Elliptic Curve Cryptography; Volume 5, Issue 1, 2013, Page 55-70
F
Formal Methods; Volume 5, Issue 1, 2013, Page 37-53
Frequency Domain; Volume 5, Issue 1, 2013, Page 97-110
G
Group; Volume 5, Issue 2, 2013, Page 155-170
GTrust; Volume 5, Issue 2, 2013, Page 155-170
H
I
Identity-Based Cryptography; Volume 5, Issue 1, 2013, Page 55-70
Image Encryption; Volume 5, Issue 1, 2013, Page 97-110
Information Propagation; Volume 5, Issue 2, 2013, Page 141-154
J
K
Key Agreement Protocol; Volume 5, Issue 1, 2013, Page 55-70
Key Image; Volume 5, Issue 1, 2013, Page 97-110
L
M
Malware Detection; Volume 5, Issue 1, 2013, Page 71-82
Maximum Likelihood Decoding; Volume 5, Issue 1, 2013, Page 83-95
Metagraph; Volume 5, Issue 2, 2013, Page 155-170
Multiplicative Video Watermarking; Volume 5, Issue 1, 2013, Page 83-95
N
Non-Monotonic Logic; Volume 5, Issue 2, 2013, Page 119-140
O
P
Pervasive Computing Environment; Volume 5, Issue 2, 2013, Page 119-140
Q
R
Random Oracle Model; Volume 5, Issue 1, 2013, Page 55-70
Reputation; Volume 5, Issue 2, 2013, Page 171-187
S
Secure Multiparty Computation; Volume 5, Issue 1, 2013, Page 37-53
Security; Volume 5, Issue 1, 2013, Page 5-36
Similarity Measure; Volume 5, Issue 2, 2013, Page 171-187
Social Networks; Volume 5, Issue 2, 2013, Page 171-187
Social Simulation; Volume 5, Issue 2, 2013, Page 141-154
Steganalysis; Volume 5, Issue 1, 2013, Page 5-36
STLR algorithm; Volume 5, Issue 2, 2013, Page 209-225
T
Text mining; Volume 5, Issue 2, 2013, Page 171-187
Threshold Secret Sharing; Volume 5, Issue 1, 2013, Page 37-53
Time Domain; Volume 5, Issue 1, 2013, Page 97-110
TLR algorithm; Volume 5, Issue 2, 2013, Page 209-225
Trust; Volume 5, Issue 2, 2013, Page 155-170
Trust; Volume 5, Issue 2, 2013, Page 171-187
U
Universal Designated (Multi-) Verifier Signature; Volume 5, Issue 2, 2013, Page 189-208
User Similarity; Volume 5, Issue 2, 2013, Page 171-187
V
W
X
Y
Z