B

  • Backward Secrecy An Improvement Over Lee et al.'s Key Agreement Protocol [Volume 5, Issue 1, 2018, Pages 3-12]

C

  • Certificateless cryptography Security Analysis of Two Lightweight Certificateless Signature Schemes [Volume 5, Issue 2, 2018, Pages 59-65]

  • Cryptanalysis Security Analysis of Two Lightweight Certificateless Signature Schemes [Volume 5, Issue 2, 2018, Pages 59-65]

D

  • Dedekind Domains A Provably Secure Variant of ETRU Based on Extended Ideal Lattices Over Direct Product of Dedekind Domains [Volume 5, Issue 1, 2018, Pages 13-34]

E

  • Emergency Response Environments Towards a Model-Driven Framework for Simulating Interactive Emergency Response Environments [Volume 5, Issue 1, 2018, Pages 35-49]

  • ERE-ML 2.0 Towards a Model-Driven Framework for Simulating Interactive Emergency Response Environments [Volume 5, Issue 1, 2018, Pages 35-49]

  • ETRU A Provably Secure Variant of ETRU Based on Extended Ideal Lattices Over Direct Product of Dedekind Domains [Volume 5, Issue 1, 2018, Pages 13-34]

F

  • Face Recognition Robust Face Recognition Under Illumination Changes and Pose Variations [Volume 5, Issue 2, 2018, Pages 81-89]

  • Feature Extraction Robust Face Recognition Under Illumination Changes and Pose Variations [Volume 5, Issue 2, 2018, Pages 81-89]

  • Forward Secrecy An Improvement Over Lee et al.'s Key Agreement Protocol [Volume 5, Issue 1, 2018, Pages 3-12]

G

  • Group Key Agreement An Improvement Over Lee et al.'s Key Agreement Protocol [Volume 5, Issue 1, 2018, Pages 3-12]

H

  • Healthcare Wireless Sensor Networks Security Analysis of Two Lightweight Certificateless Signature Schemes [Volume 5, Issue 2, 2018, Pages 59-65]

  • Hidden Markov Model An HMM-based Method for Adapting Service-based Applications to Users’ Quality Preferences [Volume 5, Issue 2, 2018, Pages 67-79]

I

  • Ideal Lattices A Provably Secure Variant of ETRU Based on Extended Ideal Lattices Over Direct Product of Dedekind Domains [Volume 5, Issue 1, 2018, Pages 13-34]

  • Impact analysis Change Impact Analysis by Concept Propagation [Volume 5, Issue 1, 2018, Pages 51-56]

  • Industrial Internet of Things Security Analysis of Two Lightweight Certificateless Signature Schemes [Volume 5, Issue 2, 2018, Pages 59-65]

  • Interactive Systems Towards a Model-Driven Framework for Simulating Interactive Emergency Response Environments [Volume 5, Issue 1, 2018, Pages 35-49]

L

  • Lattice-Based Cryptography A Provably Secure Variant of ETRU Based on Extended Ideal Lattices Over Direct Product of Dedekind Domains [Volume 5, Issue 1, 2018, Pages 13-34]

M

  • Model Driven Development Towards a Model-Driven Framework for Simulating Interactive Emergency Response Environments [Volume 5, Issue 1, 2018, Pages 35-49]

  • Model-Driven Framework Towards a Model-Driven Framework for Simulating Interactive Emergency Response Environments [Volume 5, Issue 1, 2018, Pages 35-49]

  • Multi-Agent Systems Towards a Model-Driven Framework for Simulating Interactive Emergency Response Environments [Volume 5, Issue 1, 2018, Pages 35-49]

P

  • PCA Robust Face Recognition Under Illumination Changes and Pose Variations [Volume 5, Issue 2, 2018, Pages 81-89]

  • Provable Security A Provably Secure Variant of ETRU Based on Extended Ideal Lattices Over Direct Product of Dedekind Domains [Volume 5, Issue 1, 2018, Pages 13-34]

Q

  • Quality of Service An HMM-based Method for Adapting Service-based Applications to Users’ Quality Preferences [Volume 5, Issue 2, 2018, Pages 67-79]

S

  • Scyther An Improvement Over Lee et al.'s Key Agreement Protocol [Volume 5, Issue 1, 2018, Pages 3-12]

  • Service-Based Applications An HMM-based Method for Adapting Service-based Applications to Users’ Quality Preferences [Volume 5, Issue 2, 2018, Pages 67-79]

  • SIFT Descriptor Robust Face Recognition Under Illumination Changes and Pose Variations [Volume 5, Issue 2, 2018, Pages 81-89]

  • Signature Security Analysis of Two Lightweight Certificateless Signature Schemes [Volume 5, Issue 2, 2018, Pages 59-65]

  • Software Adaptation An HMM-based Method for Adapting Service-based Applications to Users’ Quality Preferences [Volume 5, Issue 2, 2018, Pages 67-79]

W

  • Web Service Selection An HMM-based Method for Adapting Service-based Applications to Users’ Quality Preferences [Volume 5, Issue 2, 2018, Pages 67-79]