Keyword Index

B

  • Buffer Overflow Automated Exploit Generation For Application’s Vulnerability [Volume 4, Issue 1, 2016, Pages 35-50]

C

  • Channel Coding A New Method for Combining the Channel Coding with Polar Coding-Based Encryption [Volume 4, Issue 1, 2016, Pages 1-8]
  • Cipher Chains Hellman Chains Analysis Base on Graph of Random Function [Volume 4, Issue 1, 2016, Pages 81-89]
  • Clock Control Function Time Analysis Attack on a Stream Cipher Algorithm’s [Volume 4, Issue 1, 2016, Pages 51-57]
  • Complexity A New Method for Combining the Channel Coding with Polar Coding-Based Encryption [Volume 4, Issue 1, 2016, Pages 1-8]
  • Cryptographic Pseudo Random Number Generator Design and Analysis of a Novel Synchronous Stream Cipher Using Secure Pseudo Random Number Generator [Volume 4, Issue 1, 2016, Pages 59-68]
  • Cryptography Design and Analysis of a Novel Synchronous Stream Cipher Using Secure Pseudo Random Number Generator [Volume 4, Issue 1, 2016, Pages 59-68]

D

  • Direct Trust A Fuzzy Trust Evaluation Model to Enhance Security of cloud System Entities with Petri Net [Volume 4, Issue 1, 2016, Pages 19-34]

E

  • Encryption A New Method for Combining the Channel Coding with Polar Coding-Based Encryption [Volume 4, Issue 1, 2016, Pages 1-8]
  • Exploit Automated Exploit Generation For Application’s Vulnerability [Volume 4, Issue 1, 2016, Pages 35-50]

F

  • Fuzzy Logic A Fuzzy Trust Evaluation Model to Enhance Security of cloud System Entities with Petri Net [Volume 4, Issue 1, 2016, Pages 19-34]

G

  • GPS Receiver A New Method for Cancelling CW Jamming in GPS Receivers [Volume 4, Issue 1, 2016, Pages 69-79]

H

  • Handshake Secure and Efficient 4-way Handshake in Smart Grid to DoS Attacks Mitigation [Volume 4, Issue 1, 2016, Pages 9-17]
  • Hash Function Secure and Efficient 4-way Handshake in Smart Grid to DoS Attacks Mitigation [Volume 4, Issue 1, 2016, Pages 9-17]
  • Heap Automated Exploit Generation For Application’s Vulnerability [Volume 4, Issue 1, 2016, Pages 35-50]
  • Hidden State Hellman Chains Analysis Base on Graph of Random Function [Volume 4, Issue 1, 2016, Pages 81-89]

K

  • Key exchange Secure and Efficient 4-way Handshake in Smart Grid to DoS Attacks Mitigation [Volume 4, Issue 1, 2016, Pages 9-17]

N

  • NIST Tests Design and Analysis of a Novel Synchronous Stream Cipher Using Secure Pseudo Random Number Generator [Volume 4, Issue 1, 2016, Pages 59-68]
  • Notch Filter A New Method for Cancelling CW Jamming in GPS Receivers [Volume 4, Issue 1, 2016, Pages 69-79]

P

  • Polar Code A New Method for Combining the Channel Coding with Polar Coding-Based Encryption [Volume 4, Issue 1, 2016, Pages 1-8]

R

  • RainbowTables Hellman Chains Analysis Base on Graph of Random Function [Volume 4, Issue 1, 2016, Pages 81-89]
  • Random Functional Graph Hellman Chains Analysis Base on Graph of Random Function [Volume 4, Issue 1, 2016, Pages 81-89]
  • Recommendation Trust A Fuzzy Trust Evaluation Model to Enhance Security of cloud System Entities with Petri Net [Volume 4, Issue 1, 2016, Pages 19-34]

S

  • Shellcode Automated Exploit Generation For Application’s Vulnerability [Volume 4, Issue 1, 2016, Pages 35-50]
  • Smart Grid Secure and Efficient 4-way Handshake in Smart Grid to DoS Attacks Mitigation [Volume 4, Issue 1, 2016, Pages 9-17]
  • Stack Automated Exploit Generation For Application’s Vulnerability [Volume 4, Issue 1, 2016, Pages 35-50]
  • Stream Cipher Algorithm Time Analysis Attack on a Stream Cipher Algorithm’s [Volume 4, Issue 1, 2016, Pages 51-57]
  • Stream Ciphers Design and Analysis of a Novel Synchronous Stream Cipher Using Secure Pseudo Random Number Generator [Volume 4, Issue 1, 2016, Pages 59-68]

T

  • Terminal Vertices Hellman Chains Analysis Base on Graph of Random Function [Volume 4, Issue 1, 2016, Pages 81-89]
  • The Combination of Encryption and Coding A New Method for Combining the Channel Coding with Polar Coding-Based Encryption [Volume 4, Issue 1, 2016, Pages 1-8]
  • Time Analysis Attack Time Analysis Attack on a Stream Cipher Algorithm’s [Volume 4, Issue 1, 2016, Pages 51-57]
  • Trade-off Attacks Hellman Chains Analysis Base on Graph of Random Function [Volume 4, Issue 1, 2016, Pages 81-89]
  • Trust Models A Fuzzy Trust Evaluation Model to Enhance Security of cloud System Entities with Petri Net [Volume 4, Issue 1, 2016, Pages 19-34]

V

  • Vulnerability Automated Exploit Generation For Application’s Vulnerability [Volume 4, Issue 1, 2016, Pages 35-50]

W

  • Wavelet Transform A New Method for Cancelling CW Jamming in GPS Receivers [Volume 4, Issue 1, 2016, Pages 69-79]