A

  • Android Aggrandizing the beast's limbs: patulous code reuse attack on ARM architecture [Volume 8, Issue 1, 2016, Pages 39-52]

  • ARM Architecture Aggrandizing the beast's limbs: patulous code reuse attack on ARM architecture [Volume 8, Issue 1, 2016, Pages 39-52]

  • Attack Unauthenticated event detection in wireless sensor networks using sensors co-coverage [Volume 8, Issue 1, 2016, Pages 61-71]

  • Authentication Protocol A note on the security of two improved RFID protocols [Volume 8, Issue 2, 2016, Pages 155-160]

C

  • Closest Vector Problem On the design and security of a lattice-based threshold secret sharing scheme [Volume 8, Issue 1, 2016, Pages 25-38]

  • Code Reuse Attack Aggrandizing the beast's limbs: patulous code reuse attack on ARM architecture [Volume 8, Issue 1, 2016, Pages 39-52]

  • Cryptographic Protocols A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving [Volume 8, Issue 1, 2016, Pages 3-24]

D

  • Desynchronization Attack A note on the security of two improved RFID protocols [Volume 8, Issue 2, 2016, Pages 155-160]

  • Differential Cryptanalysis A new method for accelerating impossible differential cryptanalysis and its application on LBlock [Volume 8, Issue 1, 2016, Pages 73-84]

E

  • Evidence Theory Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory [Volume 8, Issue 2, 2016, Pages 141-153]

F

  • Formal A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving [Volume 8, Issue 1, 2016, Pages 3-24]

  • Forward Traceability Attack Traceability improvements of a new RFID protocol based on EPC C1 G2 [Volume 8, Issue 2, 2016, Pages 105-114]

  • FPGA Self authentication path insertion in FPGA-based design flow for tamper-resistant purpose [Volume 8, Issue 1, 2016, Pages 53-60]

H

  • Hardware Security ASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow [Volume 8, Issue 2, 2016, Pages 93-104]

  • Hardware Security, IP Protection, Security Path Self authentication path insertion in FPGA-based design flow for tamper-resistant purpose [Volume 8, Issue 1, 2016, Pages 53-60]

  • Heterogeneous Sensor Networks A novel key management scheme for heterogeneous sensor networks based on the position of nodes [Volume 8, Issue 2, 2016, Pages 115-130]

I

  • Impossible Differential Cryptanalysis A new method for accelerating impossible differential cryptanalysis and its application on LBlock [Volume 8, Issue 1, 2016, Pages 73-84]

  • IP Piracy ASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow [Volume 8, Issue 2, 2016, Pages 93-104]

K

  • Key Management A novel key management scheme for heterogeneous sensor networks based on the position of nodes [Volume 8, Issue 2, 2016, Pages 115-130]

L

  • Laplacian Distribution Optimum decoder for multiplicative spread spectrum image watermarking with Laplacian modeling [Volume 8, Issue 2, 2016, Pages 131-139]

  • Lattice-based Cryptography On the design and security of a lattice-based threshold secret sharing scheme [Volume 8, Issue 1, 2016, Pages 25-38]

  • LBlock A new method for accelerating impossible differential cryptanalysis and its application on LBlock [Volume 8, Issue 1, 2016, Pages 73-84]

M

  • Maximum Likelihood Decoding Optimum decoder for multiplicative spread spectrum image watermarking with Laplacian modeling [Volume 8, Issue 2, 2016, Pages 131-139]

  • Model Checking A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving [Volume 8, Issue 1, 2016, Pages 3-24]

N

  • Netlist Encryption ASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow [Volume 8, Issue 2, 2016, Pages 93-104]

  • No Keywords Persian Abstract [Volume 8, Issue 1, 2016, Pages 85-90]

O

  • Obfuscation ASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow [Volume 8, Issue 2, 2016, Pages 93-104]

  • Ouafi-Phan Privacy Model Traceability improvements of a new RFID protocol based on EPC C1 G2 [Volume 8, Issue 2, 2016, Pages 105-114]

P

  • Position Based Cryptography A novel key management scheme for heterogeneous sensor networks based on the position of nodes [Volume 8, Issue 2, 2016, Pages 115-130]

  • Privacy Traceability improvements of a new RFID protocol based on EPC C1 G2 [Volume 8, Issue 2, 2016, Pages 105-114]

R

  • Return Oriented Programming Aggrandizing the beast's limbs: patulous code reuse attack on ARM architecture [Volume 8, Issue 1, 2016, Pages 39-52]

  • Reverse Engineering ASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow [Volume 8, Issue 2, 2016, Pages 93-104]

  • RFID A note on the security of two improved RFID protocols [Volume 8, Issue 2, 2016, Pages 155-160]

  • RFID Authentication Protocols Traceability improvements of a new RFID protocol based on EPC C1 G2 [Volume 8, Issue 2, 2016, Pages 105-114]

S

  • Secret Disclosure Attack A note on the security of two improved RFID protocols [Volume 8, Issue 2, 2016, Pages 155-160]

  • Security Evaluation Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory [Volume 8, Issue 2, 2016, Pages 141-153]

  • Software architecture Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory [Volume 8, Issue 2, 2016, Pages 141-153]

  • Spread Spectrum Method Optimum decoder for multiplicative spread spectrum image watermarking with Laplacian modeling [Volume 8, Issue 2, 2016, Pages 131-139]

T

  • Theorem Proving A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving [Volume 8, Issue 1, 2016, Pages 3-24]

  • Threshold Secret Sharing Scheme On the design and security of a lattice-based threshold secret sharing scheme [Volume 8, Issue 1, 2016, Pages 25-38]

  • Traceability Attack Traceability improvements of a new RFID protocol based on EPC C1 G2 [Volume 8, Issue 2, 2016, Pages 105-114]

U

  • Uncertainty Quantification Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory [Volume 8, Issue 2, 2016, Pages 141-153]

V

  • Verification A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving [Volume 8, Issue 1, 2016, Pages 3-24]

W