B
-
Buffer Overflow
Automated Exploit Generation For Application’s Vulnerability [Volume 4, Issue 1, 2016, Pages 35-50]
C
-
Channel Coding
A New Method for Combining the Channel Coding with Polar Coding-Based Encryption [Volume 4, Issue 1, 2016, Pages 1-8]
-
Cipher Chains
Hellman Chains Analysis Base on Graph of Random Function [Volume 4, Issue 1, 2016, Pages 81-89]
-
Clock Control Function
Time Analysis Attack on a Stream Cipher Algorithm’s [Volume 4, Issue 1, 2016, Pages 51-57]
-
Complexity
A New Method for Combining the Channel Coding with Polar Coding-Based Encryption [Volume 4, Issue 1, 2016, Pages 1-8]
-
Cryptographic Pseudo Random Number Generator
Design and Analysis of a Novel Synchronous Stream Cipher Using Secure Pseudo Random Number Generator [Volume 4, Issue 1, 2016, Pages 59-68]
-
Cryptography
Design and Analysis of a Novel Synchronous Stream Cipher Using Secure Pseudo Random Number Generator [Volume 4, Issue 1, 2016, Pages 59-68]
D
-
Direct Trust
A Fuzzy Trust Evaluation Model to Enhance Security of cloud System Entities with Petri Net [Volume 4, Issue 1, 2016, Pages 19-34]
E
-
Encryption
A New Method for Combining the Channel Coding with Polar Coding-Based Encryption [Volume 4, Issue 1, 2016, Pages 1-8]
-
Exploit
Automated Exploit Generation For Application’s Vulnerability [Volume 4, Issue 1, 2016, Pages 35-50]
F
-
Fuzzy Logic
A Fuzzy Trust Evaluation Model to Enhance Security of cloud System Entities with Petri Net [Volume 4, Issue 1, 2016, Pages 19-34]
G
-
GPS Receiver
A New Method for Cancelling CW Jamming in GPS Receivers [Volume 4, Issue 1, 2016, Pages 69-79]
H
-
Handshake
Secure and Efficient 4-way Handshake in Smart Grid to DoS Attacks Mitigation [Volume 4, Issue 1, 2016, Pages 9-17]
-
Hash Function
Secure and Efficient 4-way Handshake in Smart Grid to DoS Attacks Mitigation [Volume 4, Issue 1, 2016, Pages 9-17]
-
Heap
Automated Exploit Generation For Application’s Vulnerability [Volume 4, Issue 1, 2016, Pages 35-50]
-
Hidden State
Hellman Chains Analysis Base on Graph of Random Function [Volume 4, Issue 1, 2016, Pages 81-89]
K
-
Key exchange
Secure and Efficient 4-way Handshake in Smart Grid to DoS Attacks Mitigation [Volume 4, Issue 1, 2016, Pages 9-17]
N
-
NIST Tests
Design and Analysis of a Novel Synchronous Stream Cipher Using Secure Pseudo Random Number Generator [Volume 4, Issue 1, 2016, Pages 59-68]
-
Notch Filter
A New Method for Cancelling CW Jamming in GPS Receivers [Volume 4, Issue 1, 2016, Pages 69-79]
P
-
Polar Code
A New Method for Combining the Channel Coding with Polar Coding-Based Encryption [Volume 4, Issue 1, 2016, Pages 1-8]
R
-
RainbowTables
Hellman Chains Analysis Base on Graph of Random Function [Volume 4, Issue 1, 2016, Pages 81-89]
-
Random Functional Graph
Hellman Chains Analysis Base on Graph of Random Function [Volume 4, Issue 1, 2016, Pages 81-89]
-
Recommendation Trust
A Fuzzy Trust Evaluation Model to Enhance Security of cloud System Entities with Petri Net [Volume 4, Issue 1, 2016, Pages 19-34]
S
-
Shellcode
Automated Exploit Generation For Application’s Vulnerability [Volume 4, Issue 1, 2016, Pages 35-50]
-
Smart Grid
Secure and Efficient 4-way Handshake in Smart Grid to DoS Attacks Mitigation [Volume 4, Issue 1, 2016, Pages 9-17]
-
Stack
Automated Exploit Generation For Application’s Vulnerability [Volume 4, Issue 1, 2016, Pages 35-50]
-
Stream Cipher Algorithm
Time Analysis Attack on a Stream Cipher Algorithm’s [Volume 4, Issue 1, 2016, Pages 51-57]
-
Stream Ciphers
Design and Analysis of a Novel Synchronous Stream Cipher Using Secure Pseudo Random Number Generator [Volume 4, Issue 1, 2016, Pages 59-68]
T
-
Terminal Vertices
Hellman Chains Analysis Base on Graph of Random Function [Volume 4, Issue 1, 2016, Pages 81-89]
-
The Combination of Encryption and Coding
A New Method for Combining the Channel Coding with Polar Coding-Based Encryption [Volume 4, Issue 1, 2016, Pages 1-8]
-
Time Analysis Attack
Time Analysis Attack on a Stream Cipher Algorithm’s [Volume 4, Issue 1, 2016, Pages 51-57]
-
Trade-off Attacks
Hellman Chains Analysis Base on Graph of Random Function [Volume 4, Issue 1, 2016, Pages 81-89]
-
Trust Models
A Fuzzy Trust Evaluation Model to Enhance Security of cloud System Entities with Petri Net [Volume 4, Issue 1, 2016, Pages 19-34]
V
-
Vulnerability
Automated Exploit Generation For Application’s Vulnerability [Volume 4, Issue 1, 2016, Pages 35-50]
W
-
Wavelet Transform
A New Method for Cancelling CW Jamming in GPS Receivers [Volume 4, Issue 1, 2016, Pages 69-79]
Your query does not match with any item