A
-
Adversarial Machine Learning
Bypassing Web Application Firewalls Using Deep Reinforcement Learning [Volume 14, Issue 2, 2022, Pages 131-145]
-
AES
Secure and Low-Area Implementation of the AES Using FPGA [Volume 14, Issue 3, 2022, Pages 93-99]
-
Android
Lightweight Identification of Android Malware with Knowledge Distillation and Deep Learning Approach [Volume 14, Issue 3, 2022, Pages 81-92]
-
Android Malware Detection
Android Malware Detection Using One-Class Graph Neural Networks [Volume 14, Issue 3, 2022, Pages 51-60]
-
Android Security
SANT: Static Analysis of Native Threads for Security Vetting of Android Applications [Volume 14, Issue 1, 2022, Pages 13-25]
-
Android Security
Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System [Volume 14, Issue 3, 2022, Pages 61-69]
-
Applied Cryptography
An Electronic Voting Scheme Based on Blockchain Technology and Zero-Knowledge Proofs [Volume 14, Issue 3, 2022, Pages 123-133]
-
Attribute-Based Authentication
Attribute-Based Remote Data Auditing and User Authentication for Cloud Storage Systems [Volume 14, Issue 3, 2022, Pages 43-49]
-
Attribute-Based Cryptography
Attribute-Based Remote Data Auditing and User Authentication for Cloud Storage Systems [Volume 14, Issue 3, 2022, Pages 43-49]
-
Attribute-Based Encryption
Attribute-Based Encryption with Efficient Attribute Revocation, Decryption Outsourcing, and Multi-Keyword Searching in Cloud Storage [Volume 14, Issue 3, 2022, Pages 135-149]
-
Attributed Function Call Graph
Android Malware Detection Using One-Class Graph Neural Networks [Volume 14, Issue 3, 2022, Pages 51-60]
-
Attribute Revocation
Attribute-Based Encryption with Efficient Attribute Revocation, Decryption Outsourcing, and Multi-Keyword Searching in Cloud Storage [Volume 14, Issue 3, 2022, Pages 135-149]
-
Authentication
A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems [Volume 14, Issue 1, 2022, Pages 57-68]
-
Authentication Code
Perfect Recovery of Small Tampers Using a Novel Fragile Watermarking Technique Based on Distributed Hamming Code [Volume 14, Issue 2, 2022, Pages 147-156]
-
AV-Net Mask
Light-Weight Privacy-Preserving Data Aggregation Protocols in Smart Grid Metering Networks [Volume 14, Issue 3, 2022, Pages 101-112]
B
-
Battery Consumption
On the Suitability of Improved TrustChain for Smartphones [Volume 14, Issue 3, 2022, Pages 33-42]
-
Binary Relevance
A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis [Volume 14, Issue 1, 2022, Pages 105-113]
-
Blockchain
On the Suitability of Improved TrustChain for Smartphones [Volume 14, Issue 3, 2022, Pages 33-42]
-
Blockchain Privacy
An Electronic Voting Scheme Based on Blockchain Technology and Zero-Knowledge Proofs [Volume 14, Issue 3, 2022, Pages 123-133]
-
Blockchain Voting
An Electronic Voting Scheme Based on Blockchain Technology and Zero-Knowledge Proofs [Volume 14, Issue 3, 2022, Pages 123-133]
-
Business Process
Business-Layer Session Puzzling Racer: Dynamic Security Testing Against Session Puzzling Race Conditions in Business Layer [Volume 14, Issue 1, 2022, Pages 83-104]
C
-
Certificateless Signcryption
An Efficient Pairing-Free Identity-Based Certificateless Signcryption [Volume 14, Issue 1, 2022, Pages 69-82]
-
Certificateless Signcryption
Attacks to Some Recently Proposed CL-SC Schemes and Presenting a Secure Scheme with KSSTIS [Volume 14, Issue 2, 2022, Pages 193-213]
-
Classification
A Graph-based Online Feature Selection to Improve Detection of New Attacks [Volume 14, Issue 2, 2022, Pages 115-130]
-
Clustering
A Graph-based Online Feature Selection to Improve Detection of New Attacks [Volume 14, Issue 2, 2022, Pages 115-130]
-
Confidentiality
SecureKV: Secure Searchable Outsourcing of Key-Value Databases to the Public Cloud [Volume 14, Issue 3, 2022, Pages 113-121]
-
CRAFT
Practical Differential Fault Analysis on CRAFT, a Lightweight Block Cipher [Volume 14, Issue 3, 2022, Pages 21-31]
D
-
Data Auditing
Attribute-Based Remote Data Auditing and User Authentication for Cloud Storage Systems [Volume 14, Issue 3, 2022, Pages 43-49]
-
Database-Driven CRN
Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network [Volume 14, Issue 2, 2022, Pages 215-227]
-
Data Integrity
Attribute-Based Remote Data Auditing and User Authentication for Cloud Storage Systems [Volume 14, Issue 3, 2022, Pages 43-49]
-
Data Outsourcing
SecureKV: Secure Searchable Outsourcing of Key-Value Databases to the Public Cloud [Volume 14, Issue 3, 2022, Pages 113-121]
-
Deep Learning
Lightweight Identification of Android Malware with Knowledge Distillation and Deep Learning Approach [Volume 14, Issue 3, 2022, Pages 81-92]
-
Differential Fault Analysis
Practical Differential Fault Analysis on SKINNY [Volume 14, Issue 3, 2022, Pages 9-19]
-
Differential Fault Analysis
Practical Differential Fault Analysis on CRAFT, a Lightweight Block Cipher [Volume 14, Issue 3, 2022, Pages 21-31]
-
Digital Signature
Revisiting the Security and Efficiency of SP2DAS, 3PDA, and EPPA Smart Grid Security Protocols [Volume 14, Issue 2, 2022, Pages 157-165]
-
Digital Steganography
Secure and Imperceptible Image Steganography in Discrete Wavelet Transform Using the XOR Logical Function and Genetic Algorithm [Volume 14, Issue 2, 2022, Pages 167-179]
-
Discrete Wavelet transform
Secure and Imperceptible Image Steganography in Discrete Wavelet Transform Using the XOR Logical Function and Genetic Algorithm [Volume 14, Issue 2, 2022, Pages 167-179]
-
Distributed Cloud
On the Suitability of Improved TrustChain for Smartphones [Volume 14, Issue 3, 2022, Pages 33-42]
-
Distributed Systems
On the Suitability of Improved TrustChain for Smartphones [Volume 14, Issue 3, 2022, Pages 33-42]
-
Dynamic testing
Business-Layer Session Puzzling Racer: Dynamic Security Testing Against Session Puzzling Race Conditions in Business Layer [Volume 14, Issue 1, 2022, Pages 83-104]
E
-
Efficiency
An Efficient Pairing-Free Identity-Based Certificateless Signcryption [Volume 14, Issue 1, 2022, Pages 69-82]
-
Electronic Voting
An Electronic Voting Scheme Based on Blockchain Technology and Zero-Knowledge Proofs [Volume 14, Issue 3, 2022, Pages 123-133]
-
Elliptic Curve Cryptography
Light-Weight Privacy-Preserving Data Aggregation Protocols in Smart Grid Metering Networks [Volume 14, Issue 3, 2022, Pages 101-112]
-
Ensemble
A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis [Volume 14, Issue 1, 2022, Pages 105-113]
-
Ensemble Clustering
A Graph-based Online Feature Selection to Improve Detection of New Attacks [Volume 14, Issue 2, 2022, Pages 115-130]
-
Ensemble Learning
Lightweight Identification of Android Malware with Knowledge Distillation and Deep Learning Approach [Volume 14, Issue 3, 2022, Pages 81-92]
F
-
FLD
A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis [Volume 14, Issue 1, 2022, Pages 105-113]
-
Forgery Attack
Revisiting the Security and Efficiency of SP2DAS, 3PDA, and EPPA Smart Grid Security Protocols [Volume 14, Issue 2, 2022, Pages 157-165]
-
Formal Methods
Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System [Volume 14, Issue 3, 2022, Pages 61-69]
-
FPGA
Secure and Low-Area Implementation of the AES Using FPGA [Volume 14, Issue 3, 2022, Pages 93-99]
-
Fragile Watermarking
Perfect Recovery of Small Tampers Using a Novel Fragile Watermarking Technique Based on Distributed Hamming Code [Volume 14, Issue 2, 2022, Pages 147-156]
G
-
Genetic Algorithm
Secure and Imperceptible Image Steganography in Discrete Wavelet Transform Using the XOR Logical Function and Genetic Algorithm [Volume 14, Issue 2, 2022, Pages 167-179]
-
Glitch Frequency
Practical Differential Fault Analysis on SKINNY [Volume 14, Issue 3, 2022, Pages 9-19]
-
Glitch Frequency
Practical Differential Fault Analysis on CRAFT, a Lightweight Block Cipher [Volume 14, Issue 3, 2022, Pages 21-31]
-
Graded Discrete-Logarithm Problem
A New Variant of the Winternitz One Time Signature Based on Graded Encoding Schemes [Volume 14, Issue 1, 2022, Pages 1-11]
-
Graph Convolutional Layer
Android Malware Detection Using One-Class Graph Neural Networks [Volume 14, Issue 3, 2022, Pages 51-60]
H
-
Hamming Code
Perfect Recovery of Small Tampers Using a Novel Fragile Watermarking Technique Based on Distributed Hamming Code [Volume 14, Issue 2, 2022, Pages 147-156]
-
Homomorphic Encryption
Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network [Volume 14, Issue 2, 2022, Pages 215-227]
-
Hyperelliptic Curve
An Efficient Pairing-Free Identity-Based Certificateless Signcryption [Volume 14, Issue 1, 2022, Pages 69-82]
I
-
Implementation of Fault Attack
Practical Differential Fault Analysis on CRAFT, a Lightweight Block Cipher [Volume 14, Issue 3, 2022, Pages 21-31]
-
Internet of Things
A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems [Volume 14, Issue 1, 2022, Pages 57-68]
-
Intrusion Detection System
A Graph-based Online Feature Selection to Improve Detection of New Attacks [Volume 14, Issue 2, 2022, Pages 115-130]
-
IoT
Mutual Lightweight PUF-Based Authentication Scheme Using Random Key Management Mechanism for Resource-Constrained IoT Devices [Volume 14, Issue 3, 2022, Pages 1-8]
J
-
JavaScript
A Study of Timing Side-Channel Attacks and Countermeasures on JavaScript and WebAssembly [Volume 14, Issue 1, 2022, Pages 27-46]
K
-
Key-Value Database
SecureKV: Secure Searchable Outsourcing of Key-Value Databases to the Public Cloud [Volume 14, Issue 3, 2022, Pages 113-121]
-
Knowledge Distillation
Lightweight Identification of Android Malware with Knowledge Distillation and Deep Learning Approach [Volume 14, Issue 3, 2022, Pages 81-92]
-
KSSTIS
Attacks to Some Recently Proposed CL-SC Schemes and Presenting a Secure Scheme with KSSTIS [Volume 14, Issue 2, 2022, Pages 193-213]
L
-
Lightning
Lightweight Identification of Android Malware with Knowledge Distillation and Deep Learning Approach [Volume 14, Issue 3, 2022, Pages 81-92]
-
Location Privacy
Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network [Volume 14, Issue 2, 2022, Pages 215-227]
M
-
Malicious Code Detection
A Study of Timing Side-Channel Attacks and Countermeasures on JavaScript and WebAssembly [Volume 14, Issue 1, 2022, Pages 27-46]
-
Malware Detection
Lightweight Identification of Android Malware with Knowledge Distillation and Deep Learning Approach [Volume 14, Issue 3, 2022, Pages 81-92]
-
Medical System
A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems [Volume 14, Issue 1, 2022, Pages 57-68]
-
Mobile Security
SANT: Static Analysis of Native Threads for Security Vetting of Android Applications [Volume 14, Issue 1, 2022, Pages 13-25]
-
Model-Selection
A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis [Volume 14, Issue 1, 2022, Pages 105-113]
-
Multi-Cloud
SecureKV: Secure Searchable Outsourcing of Key-Value Databases to the Public Cloud [Volume 14, Issue 3, 2022, Pages 113-121]
-
Multi-Keyword Searching
Attribute-Based Encryption with Efficient Attribute Revocation, Decryption Outsourcing, and Multi-Keyword Searching in Cloud Storage [Volume 14, Issue 3, 2022, Pages 135-149]
-
Multiple Access Channel
One-Shot Achievable Secrecy Rate Regions for Quantum Interference Wiretap Channel [Volume 14, Issue 3, 2022, Pages 71-80]
-
Mutual Information
One-Shot Achievable Secrecy Rate Regions for Quantum Interference Wiretap Channel [Volume 14, Issue 3, 2022, Pages 71-80]
N
-
Network Security
Mutual Lightweight PUF-Based Authentication Scheme Using Random Key Management Mechanism for Resource-Constrained IoT Devices [Volume 14, Issue 3, 2022, Pages 1-8]
-
Nibble Fault Injection
Practical Differential Fault Analysis on SKINNY [Volume 14, Issue 3, 2022, Pages 9-19]
-
NoSQL
SecureKV: Secure Searchable Outsourcing of Key-Value Databases to the Public Cloud [Volume 14, Issue 3, 2022, Pages 113-121]
O
-
One-Class Classification
Android Malware Detection Using One-Class Graph Neural Networks [Volume 14, Issue 3, 2022, Pages 51-60]
-
Online Feature Selection
A Graph-based Online Feature Selection to Improve Detection of New Attacks [Volume 14, Issue 2, 2022, Pages 115-130]
P
-
Physical Layer Security
Mutual Lightweight PUF-Based Authentication Scheme Using Random Key Management Mechanism for Resource-Constrained IoT Devices [Volume 14, Issue 3, 2022, Pages 1-8]
-
Point Factorization problem
An Efficient Pairing-Free Identity-Based Certificateless Signcryption [Volume 14, Issue 1, 2022, Pages 69-82]
-
Privacy
Revisiting the Security and Efficiency of SP2DAS, 3PDA, and EPPA Smart Grid Security Protocols [Volume 14, Issue 2, 2022, Pages 157-165]
-
Privacy Preserving
A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems [Volume 14, Issue 1, 2022, Pages 57-68]
-
Privacy-Preserving
Light-Weight Privacy-Preserving Data Aggregation Protocols in Smart Grid Metering Networks [Volume 14, Issue 3, 2022, Pages 101-112]
-
Profiled attacks
A Time Randomization-Based Countermeasure Against the Template Side-Channel Attack [Volume 14, Issue 1, 2022, Pages 47-55]
-
ProVerif
A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems [Volume 14, Issue 1, 2022, Pages 57-68]
Q
-
Quantum Channel
One-Shot Achievable Secrecy Rate Regions for Quantum Interference Wiretap Channel [Volume 14, Issue 3, 2022, Pages 71-80]
-
Query Processing
SecureKV: Secure Searchable Outsourcing of Key-Value Databases to the Public Cloud [Volume 14, Issue 3, 2022, Pages 113-121]
R
-
Race Condition
Business-Layer Session Puzzling Racer: Dynamic Security Testing Against Session Puzzling Race Conditions in Business Layer [Volume 14, Issue 1, 2022, Pages 83-104]
-
Radio frequency identification
Mutual Lightweight PUF-Based Authentication Scheme Using Random Key Management Mechanism for Resource-Constrained IoT Devices [Volume 14, Issue 3, 2022, Pages 1-8]
-
Random Oracle
An Efficient Pairing-Free Identity-Based Certificateless Signcryption [Volume 14, Issue 1, 2022, Pages 69-82]
-
Random Oracle Model
Attacks to Some Recently Proposed CL-SC Schemes and Presenting a Secure Scheme with KSSTIS [Volume 14, Issue 2, 2022, Pages 193-213]
-
Ransomware
Ransomware Detection Based on PE Header Using Convolutional Neural Networks [Volume 14, Issue 2, 2022, Pages 181-192]
-
Reinforcement Learning
Bypassing Web Application Firewalls Using Deep Reinforcement Learning [Volume 14, Issue 2, 2022, Pages 131-145]
S
-
Secrecy Capacity
One-Shot Achievable Secrecy Rate Regions for Quantum Interference Wiretap Channel [Volume 14, Issue 3, 2022, Pages 71-80]
-
Secure Cloud Storage
Attribute-Based Encryption with Efficient Attribute Revocation, Decryption Outsourcing, and Multi-Keyword Searching in Cloud Storage [Volume 14, Issue 3, 2022, Pages 135-149]
-
Security
A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems [Volume 14, Issue 1, 2022, Pages 57-68]
-
Security
SecureKV: Secure Searchable Outsourcing of Key-Value Databases to the Public Cloud [Volume 14, Issue 3, 2022, Pages 113-121]
-
Semi-Supervised Deep Learning
Android Malware Detection Using One-Class Graph Neural Networks [Volume 14, Issue 3, 2022, Pages 51-60]
-
Side-channel attacks
A Time Randomization-Based Countermeasure Against the Template Side-Channel Attack [Volume 14, Issue 1, 2022, Pages 47-55]
-
Side-channel attacks
Secure and Low-Area Implementation of the AES Using FPGA [Volume 14, Issue 3, 2022, Pages 93-99]
-
SKINNY
Practical Differential Fault Analysis on SKINNY [Volume 14, Issue 3, 2022, Pages 9-19]
-
Smart Meter
Light-Weight Privacy-Preserving Data Aggregation Protocols in Smart Grid Metering Networks [Volume 14, Issue 3, 2022, Pages 101-112]
-
Sql Injection
Bypassing Web Application Firewalls Using Deep Reinforcement Learning [Volume 14, Issue 2, 2022, Pages 131-145]
-
Stacked Graph Autoencoder
Android Malware Detection Using One-Class Graph Neural Networks [Volume 14, Issue 3, 2022, Pages 51-60]
-
Standard Model
Attacks to Some Recently Proposed CL-SC Schemes and Presenting a Secure Scheme with KSSTIS [Volume 14, Issue 2, 2022, Pages 193-213]
-
Static analysis
SANT: Static Analysis of Native Threads for Security Vetting of Android Applications [Volume 14, Issue 1, 2022, Pages 13-25]
-
Steganalysis
A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis [Volume 14, Issue 1, 2022, Pages 105-113]
-
Steganalysis
Secure and Imperceptible Image Steganography in Discrete Wavelet Transform Using the XOR Logical Function and Genetic Algorithm [Volume 14, Issue 2, 2022, Pages 167-179]
T
-
Tamper Detection and Recovery
Perfect Recovery of Small Tampers Using a Novel Fragile Watermarking Technique Based on Distributed Hamming Code [Volume 14, Issue 2, 2022, Pages 147-156]
-
Template attack
A Time Randomization-Based Countermeasure Against the Template Side-Channel Attack [Volume 14, Issue 1, 2022, Pages 47-55]
-
Threshold Implementation
Secure and Low-Area Implementation of the AES Using FPGA [Volume 14, Issue 3, 2022, Pages 93-99]
-
Timers
A Study of Timing Side-Channel Attacks and Countermeasures on JavaScript and WebAssembly [Volume 14, Issue 1, 2022, Pages 27-46]
-
Time shuffling countermeasure
A Time Randomization-Based Countermeasure Against the Template Side-Channel Attack [Volume 14, Issue 1, 2022, Pages 47-55]
-
Timing Side-Channel Attacks
A Study of Timing Side-Channel Attacks and Countermeasures on JavaScript and WebAssembly [Volume 14, Issue 1, 2022, Pages 27-46]
-
TrustChain
On the Suitability of Improved TrustChain for Smartphones [Volume 14, Issue 3, 2022, Pages 33-42]
V
-
Verification
Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System [Volume 14, Issue 3, 2022, Pages 61-69]
-
Vulnerability Analysis
Business-Layer Session Puzzling Racer: Dynamic Security Testing Against Session Puzzling Race Conditions in Business Layer [Volume 14, Issue 1, 2022, Pages 83-104]
W
-
Web Application Firewall (WAF)
Bypassing Web Application Firewalls Using Deep Reinforcement Learning [Volume 14, Issue 2, 2022, Pages 131-145]
-
WebAssembly
A Study of Timing Side-Channel Attacks and Countermeasures on JavaScript and WebAssembly [Volume 14, Issue 1, 2022, Pages 27-46]
-
Whitewashing
On the Suitability of Improved TrustChain for Smartphones [Volume 14, Issue 3, 2022, Pages 33-42]
Z
-
ZK-SNARKs
An Electronic Voting Scheme Based on Blockchain Technology and Zero-Knowledge Proofs [Volume 14, Issue 3, 2022, Pages 123-133]