A
-
Access Control
Access control in ultra-large-scale systems using a data-centric middleware [Volume 6, Issue 1, 2014, Pages 3-22]
-
Access Control
A centralized privacy-preserving framework for online social networks [Volume 6, Issue 1, 2014, Pages 35-52]
-
Anonymity
Improving Tor security against timing and traffic analysis attacks with fair randomization [Volume 6, Issue 1, 2014, Pages 67-76]
-
Artemia
Artemia: a family of provably secure authenticated encryption schemes [Volume 6, Issue 2, 2014, Pages 125-139]
-
Authenticated Encryption
Artemia: a family of provably secure authenticated encryption schemes [Volume 6, Issue 2, 2014, Pages 125-139]
-
Authentication
Artemia: a family of provably secure authenticated encryption schemes [Volume 6, Issue 2, 2014, Pages 125-139]
-
Authentication and Non-repudiation
An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks [Volume 6, Issue 2, 2014, Pages 141-153]
B
-
Behavioral Patterns of Web Visitors
A density based clustering approach to distinguish between web robot and human requests to a web server [Volume 6, Issue 1, 2014, Pages 77-89]
-
Blind Steganalysis
An extended feature set for blind image steganalysis in contourlet domain [Volume 6, Issue 2, 2014, Pages 169-181]
-
Broadcast Authentication
Toward an energy efficient PKC-based key management system for wireless sensor networks [Volume 6, Issue 1, 2014, Pages 53-66]
C
-
Cellular Network
An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks [Volume 6, Issue 2, 2014, Pages 141-153]
-
Characteristic Function Moments
An extended feature set for blind image steganalysis in contourlet domain [Volume 6, Issue 2, 2014, Pages 169-181]
-
Colored-Petri-Nets Model
Access control in ultra-large-scale systems using a data-centric middleware [Volume 6, Issue 1, 2014, Pages 3-22]
-
Confidentiality
A centralized privacy-preserving framework for online social networks [Volume 6, Issue 1, 2014, Pages 35-52]
-
Contourlet Transform
An extended feature set for blind image steganalysis in contourlet domain [Volume 6, Issue 2, 2014, Pages 169-181]
D
-
Database Security
A hybrid approach for database intrusion detection at transaction and inter-transaction levels [Volume 6, Issue 2, 2014, Pages 155-167]
-
Data-Distribution-Service Middleware
Access control in ultra-large-scale systems using a data-centric middleware [Volume 6, Issue 1, 2014, Pages 3-22]
-
DBSCAN
A density based clustering approach to distinguish between web robot and human requests to a web server [Volume 6, Issue 1, 2014, Pages 77-89]
-
Density Based Clustering
A density based clustering approach to distinguish between web robot and human requests to a web server [Volume 6, Issue 1, 2014, Pages 77-89]
-
Differential Attack
Total break of Zorro using linear and differential attacks [Volume 6, Issue 1, 2014, Pages 23-34]
F
-
Fairness
Improving Tor security against timing and traffic analysis attacks with fair randomization [Volume 6, Issue 1, 2014, Pages 67-76]
H
-
Heterogeneous Network
An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks [Volume 6, Issue 2, 2014, Pages 141-153]
I
-
Inter-Transaction Dependency
A hybrid approach for database intrusion detection at transaction and inter-transaction levels [Volume 6, Issue 2, 2014, Pages 155-167]
-
Inter-Transaction Sequence
A hybrid approach for database intrusion detection at transaction and inter-transaction levels [Volume 6, Issue 2, 2014, Pages 155-167]
-
Intrusion Detection
A hybrid approach for database intrusion detection at transaction and inter-transaction levels [Volume 6, Issue 2, 2014, Pages 155-167]
K
-
Key Management System
Toward an energy efficient PKC-based key management system for wireless sensor networks [Volume 6, Issue 1, 2014, Pages 53-66]
L
-
Lightweight Block Cipher
Total break of Zorro using linear and differential attacks [Volume 6, Issue 1, 2014, Pages 23-34]
-
Linear Attack
Total break of Zorro using linear and differential attacks [Volume 6, Issue 1, 2014, Pages 23-34]
M
-
Middleware
Access control in ultra-large-scale systems using a data-centric middleware [Volume 6, Issue 1, 2014, Pages 3-22]
-
Mobile ad-hoc Networks
A two-phase wormhole attack detection scheme in MANETs [Volume 6, Issue 2, 2014, Pages 183-191]
O
-
Online Social Network
A centralized privacy-preserving framework for online social networks [Volume 6, Issue 1, 2014, Pages 35-52]
P
-
Privacy
A centralized privacy-preserving framework for online social networks [Volume 6, Issue 1, 2014, Pages 35-52]
-
Privacy
Artemia: a family of provably secure authenticated encryption schemes [Volume 6, Issue 2, 2014, Pages 125-139]
-
Provable Security
Artemia: a family of provably secure authenticated encryption schemes [Volume 6, Issue 2, 2014, Pages 125-139]
-
Public Key Cryptography
Toward an energy efficient PKC-based key management system for wireless sensor networks [Volume 6, Issue 1, 2014, Pages 53-66]
R
-
Randomness
Improving Tor security against timing and traffic analysis attacks with fair randomization [Volume 6, Issue 1, 2014, Pages 67-76]
-
Risk Assessment
A risk model for cloud processes [Volume 6, Issue 2, 2014, Pages 99-123]
S
-
Secure Computation
A risk model for cloud processes [Volume 6, Issue 2, 2014, Pages 99-123]
-
Significance of the Difference Test
A density based clustering approach to distinguish between web robot and human requests to a web server [Volume 6, Issue 1, 2014, Pages 77-89]
-
Similar Privacy Setting
A centralized privacy-preserving framework for online social networks [Volume 6, Issue 1, 2014, Pages 35-52]
-
State machine
A hybrid approach for database intrusion detection at transaction and inter-transaction levels [Volume 6, Issue 2, 2014, Pages 155-167]
T
-
Timing Attacks
Improving Tor security against timing and traffic analysis attacks with fair randomization [Volume 6, Issue 1, 2014, Pages 67-76]
-
Tor
Improving Tor security against timing and traffic analysis attacks with fair randomization [Volume 6, Issue 1, 2014, Pages 67-76]
-
Traffic analysis
Improving Tor security against timing and traffic analysis attacks with fair randomization [Volume 6, Issue 1, 2014, Pages 67-76]
U
-
Ultra-Large-Scale Systems
Access control in ultra-large-scale systems using a data-centric middleware [Volume 6, Issue 1, 2014, Pages 3-22]
V
-
Value of Information
A risk model for cloud processes [Volume 6, Issue 2, 2014, Pages 99-123]
W
-
Web Robots
A density based clustering approach to distinguish between web robot and human requests to a web server [Volume 6, Issue 1, 2014, Pages 77-89]
-
Wireless Sensor Networks
Toward an energy efficient PKC-based key management system for wireless sensor networks [Volume 6, Issue 1, 2014, Pages 53-66]
-
WLAN
An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks [Volume 6, Issue 2, 2014, Pages 141-153]
-
Wormhole Attack
A two-phase wormhole attack detection scheme in MANETs [Volume 6, Issue 2, 2014, Pages 183-191]
-
Wormhole Detection Scheme
A two-phase wormhole attack detection scheme in MANETs [Volume 6, Issue 2, 2014, Pages 183-191]
-
Wormhole Tunnel
A two-phase wormhole attack detection scheme in MANETs [Volume 6, Issue 2, 2014, Pages 183-191]
Z
-
Zernike Moments
An extended feature set for blind image steganalysis in contourlet domain [Volume 6, Issue 2, 2014, Pages 169-181]
-
Zorro
Total break of Zorro using linear and differential attacks [Volume 6, Issue 1, 2014, Pages 23-34]