A
-
Access Control
A context-sensitive dynamic role-based access control model for pervasive computing environments [Volume 2, Issue 1, 2010, Pages 47-66]
-
Access Control
Authorization models for secure information sharing: a survey and research agenda [Volume 2, Issue 2, 2010, Pages 69-87]
-
Arabic E-Text
High capacity steganography tool for Arabic text using 'Kashida' [Volume 2, Issue 2, 2010, Pages 107-118]
-
Attack Scenario
A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs [Volume 2, Issue 1, 2010, Pages 13-32]
-
Authorization Model
Authorization models for secure information sharing: a survey and research agenda [Volume 2, Issue 2, 2010, Pages 69-87]
C
-
Cost-Sensitive Attack Graph
A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs [Volume 2, Issue 1, 2010, Pages 13-32]
-
Countermeasure
A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs [Volume 2, Issue 1, 2010, Pages 13-32]
-
Cryptology
Stream ciphers and the eSTREAM project [Volume 2, Issue 1, 2010, Pages 3-11]
D
-
Dynamic Environment
Authorization models for secure information sharing: a survey and research agenda [Volume 2, Issue 2, 2010, Pages 69-87]
-
Dynamic Permission-Activation
A context-sensitive dynamic role-based access control model for pervasive computing environments [Volume 2, Issue 1, 2010, Pages 47-66]
-
Dynamic Role-Assignment
A context-sensitive dynamic role-based access control model for pervasive computing environments [Volume 2, Issue 1, 2010, Pages 47-66]
E
-
Empirical Matrix
Detection of perturbed quantization (PQ) steganography based on empirical matrix [Volume 2, Issue 2, 2010, Pages 119-128]
-
Evolutionary Fuzzy System
A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection [Volume 2, Issue 1, 2010, Pages 33-46]
F
-
Feature Coding
High capacity steganography tool for Arabic text using 'Kashida' [Volume 2, Issue 2, 2010, Pages 107-118]
-
Fuzzy Rule Extraction
A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection [Volume 2, Issue 1, 2010, Pages 33-46]
I
-
Intrusion Detection System
A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection [Volume 2, Issue 1, 2010, Pages 33-46]
K
-
Kashida
High capacity steganography tool for Arabic text using 'Kashida' [Volume 2, Issue 2, 2010, Pages 107-118]
-
Key Management
An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks [Volume 2, Issue 2, 2010, Pages 89-105]
L
-
Long-Term Context
A context-sensitive dynamic role-based access control model for pervasive computing environments [Volume 2, Issue 1, 2010, Pages 47-66]
M
-
Minimization Analysis
A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs [Volume 2, Issue 1, 2010, Pages 13-32]
-
Multi Objective Decision Making
Authorization models for secure information sharing: a survey and research agenda [Volume 2, Issue 2, 2010, Pages 69-87]
P
-
Particle Swarm Optimization
A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs [Volume 2, Issue 1, 2010, Pages 13-32]
-
Perturbed Quantization (PQ)
Detection of perturbed quantization (PQ) steganography based on empirical matrix [Volume 2, Issue 2, 2010, Pages 119-128]
-
Pervasive Computing Environment
A context-sensitive dynamic role-based access control model for pervasive computing environments [Volume 2, Issue 1, 2010, Pages 47-66]
-
Probabilistic Key Sharing
An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks [Volume 2, Issue 2, 2010, Pages 89-105]
S
-
Secure Information Sharing
Authorization models for secure information sharing: a survey and research agenda [Volume 2, Issue 2, 2010, Pages 69-87]
-
Security
Authorization models for secure information sharing: a survey and research agenda [Volume 2, Issue 2, 2010, Pages 69-87]
-
Sensor Networks
An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks [Volume 2, Issue 2, 2010, Pages 89-105]
-
Short-Term Context
A context-sensitive dynamic role-based access control model for pervasive computing environments [Volume 2, Issue 1, 2010, Pages 47-66]
-
Steganalysis
Detection of perturbed quantization (PQ) steganography based on empirical matrix [Volume 2, Issue 2, 2010, Pages 119-128]
-
Steganography
Detection of perturbed quantization (PQ) steganography based on empirical matrix [Volume 2, Issue 2, 2010, Pages 119-128]
-
Stream Ciphers
Stream ciphers and the eSTREAM project [Volume 2, Issue 1, 2010, Pages 3-11]
-
Symmetric Polynomial
An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks [Volume 2, Issue 2, 2010, Pages 89-105]
T
-
Text Hiding
High capacity steganography tool for Arabic text using 'Kashida' [Volume 2, Issue 2, 2010, Pages 107-118]
-
Text Steganography
High capacity steganography tool for Arabic text using 'Kashida' [Volume 2, Issue 2, 2010, Pages 107-118]
-
Text Watermarking
High capacity steganography tool for Arabic text using 'Kashida' [Volume 2, Issue 2, 2010, Pages 107-118]
-
Time-Memory Trade-offs
Stream ciphers and the eSTREAM project [Volume 2, Issue 1, 2010, Pages 3-11]