default search action
Encyclopedia of Cryptography and Security 2011
- Henk C. A. van Tilborg, Sushil Jajodia:
Encyclopedia of Cryptography and Security, 2nd Ed. Springer 2011, ISBN 978-1-4419-5905-8
A
- Anne Canteaut:
A5/1. 1-2 - Gerald Brose:
Access Control. 2-7 - Hakki C. Cankaya:
Access Control from an OS Security Perspective. 7-9 - Hakki C. Cankaya:
Access Control Lists. 9-12 - Aaron Estes:
Access Control Matrix. 12-13 - Sabrina De Capitani di Vimercati:
Access Control Policies, Models, and Mechanisms. 13-14 - Access Control Rules. 14
- Access Limitation. 14
- Access Lists. 14
- Sabrina De Capitani di Vimercati:
Access Matrix. 14-17 - Davide Martinenghi:
Access Pattern. 17-20 - Access Rights. 20
- Yvo Desmedt:
Access Structure. 20 - ACM. 20
- Marijke De Soete:
Acquirer. 20 - Alex Biryukov:
Adaptive Chosen Ciphertext Attack. 21 - Alex Biryukov:
Adaptive Chosen Plaintext and Chosen Ciphertext Attack. 21 - Alex Biryukov:
Adaptive Chosen Plaintext Attack. 21 - Pierangela Samarati:
Administrative Policies. 21-23 - Alessandro Campi, Stefano Paraboschi:
Administrative Policies in SQL. 23 - Advanced Encryption Standard. 24
- Advanced Hash Competition. 24
- Kristen LeFevre, Bee-Chung Chen:
Adversarial/External Knowledge (Privacy in the Presence of). 24-26 - Adware. 26
- AES. 26
- Dan Boneh:
Aggregate Signatures. 27 - Bart Preneel:
AHS Competition/SHA-3. 27-29 - Friedrich L. Bauer:
Alberti Encryption. 29-31 - Claude Carlet:
Algebraic Immunity of Boolean Functions. 31-32 - Algebraic Number Field. 32
- Algorithmic Complexity Attacks. 32
- Scott A. Crosby, Dan S. Wallach:
Algorithmic DoS. 32-33 - Friedrich L. Bauer:
Alphabet. 33-34 - William Enck:
Android's Security Framework-Understanding the Security of Mobile Phone Platforms. 34-37 - Anomalous Binary Curves. 37
- Gerrit Bleumer:
Anonymity. 37-38 - Anonymity in Data Mining. 39
- Anonymous Communication. 39
- Yi Yang, Sencun Zhu:
Anonymous Routing. 39-40 - Stefan Köpsell:
Anonymous Web Browsing and Publishing. 40-42 - Anthropometric Authentication. 42
- Anthropometrics. 42
- Anthropometry. 42
- Anti-DoS Cookies. 42
- Anti-Jamming Strategy. 42
- Antispam Based on Sender Reputation. 42
- Antivirus. 42
- Mudhakar Srivatsa, Arun Iyengar:
Application-Level Denial of Service. 42-44 - Catherine Meadows:
Applications of Formal Methods to Intrusion Detection. 44-45 - V. N. Venkatakrishnan:
Applications of Formal Methods to Web Application Security. 45-46 - Applications of Rank-Metric Codes. 46
- Sebastiaan Indesteege:
ARIA. 47 - ARP Poison Routing (APR). 47
- ARP Poisoning. 47
- William Enck:
ARP Spoofing. 48-49 - Burt Kaliski:
Asymmetric Cryptosystem. 49-50 - Asynchronous Stream Cipher. 50
- Attack by Summation Over an Hypercube. 50
- Sean W. Smith:
Attestation. 50-51 - Marijke De Soete:
Attribute Certificate. 51-52 - J. Black:
Authenticated Encryption. 52-61 - Ebru Celikel Cankaya:
Authentication. 61-62 - Robert J. Zuccherato:
Authentication Token. 62-63 - Gregory A. Kabatiansky, Ben J. M. Smeets:
Authentication, From an Information Theoretic Perspective. 63-65 - Authorization. 65
- Sabrina De Capitani di Vimercati:
Authorizations. 65-68 - Tor Helleseth:
Autocorrelation. 68 - David Naccache:
Autotomic Signatures. 68 - Eric Cronin:
Availability. 68-69
B
- Bank Card. 71
- David Naccache:
Barrett's Algorithm. 71 - Barter. 71
- Base. 71
- Friedrich L. Bauer:
Beaufort Encryption. 71 - Ebru Celikel Cankaya:
Bell-LaPadula Confidentiality Model. 71-74 - David Elliott Bell:
Bell-La Padula Model. 74-79 - Burt Kaliski:
Berlekamp Q-matrix. 79 - Anne Canteaut:
Berlekamp-Massey Algorithm. 80 - Aaron Estes:
Biba Integrity Model. 81 - Biba Mandatory Integrity Policy. 81
- Jonathan K. Millen:
Biba Model. 81-82 - Big Number Multiplication. 82
- Big Number Squaring. 82
- Bilinear Pairings. 82
- Berk Sunar:
Binary Euclidean Algorithm. 83-84 - Bodo Möller:
Binary Exponentiation. 84-86 - Binary Functions. 86
- Binary GCD Algorithm. 86
- Binding Pattern. 86
- Burt Kaliski:
Binomial Distribution. 86 - Nary Subramanian:
Biometric Authentication. 86-90 - Biometric Cryptosystem. 90
- Ann Cavoukian, Alex Stoianov:
Biometric Encryption. 90-98 - Biometric Fusion. 98
- Biometric Identification in Video Surveillance. 98
- Biometric Information Ethics. 98
- Biometric Key Generation. 98
- Biometric Keys. 98
- B. V. K. Vijaya Kumar:
Biometric Matching. 98-101 - Biometric Passport Security. 101
- Biometric Performance Evaluation. 101
- Fabio Scotti, Stelvio Cimato, Roberto Sassi:
Biometric Privacy. 101-104 - Biometric Recognition. 104
- Krzysztof Kryszczuk, Jonas Richiardi:
Biometric Sample Quality. 104-110 - Achint Thomas, Venu Govindaraju:
Biometric Sensors. 110-113 - Alan D. Smith:
Biometric Social Responsibility. 113-117 - Jonas Richiardi, Krzysztof Kryszczuk:
Biometric Systems Evaluation. 117-124 - Fernando L. Podio:
Biometric Technologies and Security - International Biometric Standards Development Activities. 124-130 - Biometric Testing. 130
- Evangelia Micheli-Tzanakou, Konstantinos N. Plataniotis:
Biometrics: Terms and Definitions. 142-147 - Martin Evison:
Biometrics for Forensics. 130-134 - Elisabeth de Leeuw:
Biometrics for Identity Management and Fields of Application. 134-139 - Stan Z. Li:
Biometrics in Video Surveillance. 139-142 - BIOS Basic Input Output System. 147
- Arjen K. Lenstra:
Birthday Paradox. 147-148 - Black Box Algorithms. 148
- David Naccache:
Blackmailing Attacks. 148 - Gerrit Bleumer:
Blind Signature. 148-150 - Gerrit Bleumer:
Blinding Techniques. 150-152 - Lars R. Knudsen:
Block Ciphers. 152-157 - Christophe De Cannière:
Blowfish. 157-158 - BLP. 158
- BLP Model. 158
- Dan Boneh:
BLS Short Digital Signatures. 158-159 - Burt Kaliski:
Blum Integer. 159-160 - Dan Boneh:
Blum-Blum-Shub Pseudorandom Bit Generator. 160-161 - Dan Boneh:
Blum-Goldwasser Public Key Encryption System. 161-162 - Claude Carlet:
Boolean Functions. 162-165 - Alex Biryukov:
Boomerang Attack. 165-166 - Guofei Gu:
Botnet Detection in Enterprise Networks. 166-168 - Donggang Liu:
Broadcast Authentication from a Conditional Perspective. 168-170 - Yvo Desmedt, Goce Jakimoski:
Broadcast Authentication from an Information Theoretic Perspective. 170-171 - Dalit Naor:
Broadcast Encryption. 171-174 - Broadcast Stream Authentication. 174
- Browser Cookie. 174
- BSP Board Support Package. 174
- Angelos D. Keromytis:
Buffer Overflow Attacks. 174-177 - Buffer Overrun. 177
- Jean-Louis Lanet:
Bytecode Verification. 177-178
C
- Lars R. Knudsen, Gregor Leander:
C2 - Block Cipher. 179-180 - Christophe De Cannière:
Camellia. 180-182 - Cascade Revoke. 182
- Christophe De Cannière:
Cast. 182-183 - Christophe Petit, Jean-Jacques Quisquater:
Cayley Hash Functions. 183-184 - Bart Preneel:
CBC-MAC and Variants. 184-188 - Friedrich L. Bauer:
CCIT2-Code. 188 - CDH. 188
- Cellular Network Security. 188
- Carlisle Adams:
Certificate. 188-189 - Carlisle Adams:
Certificate Management. 189 - Anton Stiglic:
Certificate of Primality. 189 - Carlisle Adams:
Certificate Revocation. 190-192 - Certificate-Based Access Control. 192
- Alexander W. Dent:
Certificateless Cryptography. 192-193 - Carlisle Adams, Russ Housley, Sean Turner:
Certification Authority. 193-195 - Matthias Schunter:
Certified Mail. 195-196 - Gerrit Bleumer:
Chaffing and Winnowing. 197-198 - Challenge-Response Authentication. 198
- Mike Just:
Challenge-Response Identification. 198-199 - Challenge-Response Protocol. 199
- Gerrit Bleumer:
Chaum Blind Signature Scheme. 199-200 - David Naccache:
Chemical Combinatorial Attack. 200-201 - Henk C. A. van Tilborg:
Chinese Remainder Theorem. 201-202 - Sabrina De Capitani di Vimercati, Pierangela Samarati:
Chinese Wall. 202-203 - Ebru Celikel Cankaya:
Chinese Wall Model. 203-205 - Chip Card. 205
- Alex Biryukov:
Chosen Ciphertext Attack. 205 - Alex Biryukov:
Chosen Plaintext and Chosen Ciphertext Attack. 205 - Alex Biryukov:
Chosen Plaintext Attack. 205-206 - Chosen Prefix Attack. 206
- Chromosome. 206
- Chroot Prison. 207
- Lee D. McFearin:
Chroot Jail. 206-207 - Alex Biryukov:
Ciphertext-Only Attack. 207 - Sabrina De Capitani di Vimercati, Pierangela Samarati:
Clark and Wilson Model. 208-209 - Classical Cryptosystem. 209
- Burt Kaliski:
Claw-Free. 209-210 - Lars R. Knudsen:
CLEFIA. 210-211 - Client Puzzles. 211
- Caroline Fontaine:
Clock-Controlled Generator. 211-212 - Daniele Micciancio:
Closest Vector Problem. 212-214 - Cloud Computing. 214
- Bart Preneel:
CMAC. 214-215 - CMVP - Cryptographic Module Validation Program. 215
- Code Verification. 215
- Nicolas Sendrier:
Code-Based Cryptography. 215-216 - Alex Biryukov:
Codebook Attack. 216 - Nadia Heninger:
Cold-Boot Attacks. 216-217 - Jelena Mirkovic:
Collaborative DoS Defenses. 217-220 - Bart Preneel:
Collision Attack. 220-221 - Bart Preneel:
Collision Resistance. 221-222 - Anne Canteaut:
Combination Generator. 222-224 - Commercial Off-the-Shelf. 224
- Commercial Security Model. 224
- Claude Crépeau:
Commitment. 224-227 - Tom Caddy:
Common Criteria. 227-229 - Paolo Salvaneschi:
Common Criteria, From a Security Policies Perspective. 229-232 - Gerrit Bleumer:
Communication Channel Anonymity. 232 - Complexity Theory. 232
- Compositeness Test. 232
- Markus Kuhn:
Compromising Emanations. 232-235 - Salil P. Vadhan:
Computational Complexity. 235-240 - Igor E. Shparlinski:
Computational Diffie-Hellman Problem. 240-244 - XiaoFeng Wang:
Computational Puzzles. 244-245 - Computationally Sound Proof System. 245
- Günther Pernul, Moritz Riesner:
Conceptual Design of Secure Databases. 245-248 - Conceptual Modeling. 248
- Conference Key Agreement. 248
- Conference Keying. 248
- Confidentiality Model. 248
- Confirmer Signatures. 249
- Consistency Verification of Security Policy. 249
- Marc Vauclair:
Contactless Cards. 249 - Arnon Rosenthal, Edward Sciore:
Content-Based and View-Based Access Control. 249-253 - Matthias Schunter:
Contract Signing. 253-254 - Marijke De Soete:
Control Vector. 254 - Conventional Cryptosystem. 254
- Michael T. Hunter:
Cookie. 254-256 - Coprime. 256
- Gerrit Bleumer:
Copy Protection. 256-259 - Bart Preneel:
Correcting-Block Attack. 259-260 - Anne Canteaut:
Correlation Attack for Stream Ciphers. 261-262 - Claude Carlet:
Correlation Immune and Resilient Boolean Functions. 262-264 - Frédéric Cuppens, Nora Cuppens-Boulahia:
Cover Story. 264-265 - Yvo Desmedt:
Covert Channels. 265-266 - Torben Pedersen:
CPS, Certificate Practice Statement. 266-267 - CPU Consumption. 267
- Michael E. Locasto:
CPU Denial of Service. 268-269 - CPU Starvation. 269
- Dan Boneh:
Cramer-Shoup Public-Key System. 269-270 - Credential Verification. 270
- Adam J. Lee:
Credential-Based Access Control. 271-272 - Gerrit Bleumer:
Credentials. 272-275 - Engin Kirda:
Cross Site Scripting Attacks. 275-277 - Tor Helleseth:
Cross-Correlation. 277 - CRT. 277
- Friedrich L. Bauer:
Cryptanalysis. 277-281 - Friedrich L. Bauer:
Crypto Machines. 281-283 - Cryptographic Algorithm Evaluation. 283
- Cryptographic Protocol. 283
- Cryptographic Protocol Verification. 283
- Cryptographic Puzzles. 283
- Cryptography on Reconfigurable Devices. 283
- Friedrich L. Bauer:
Cryptology. 283-284 - David Naccache:
Cryptophthora. 284 - Friedrich L. Bauer:
Cryptosystem. 284-285 - Hideki Imai, Atsuhiro Yamagishi:
CRYPTREC (Japanese Cryptographic Algorithm Evaluation Project). 285-288 - Marion Videau:
Cube Attack. 289-290 - Claude Crépeau:
Cut-and-Choose Protocol. 290-291 - Pascale Charpin:
Cyclic Codes. 291-294 - Friedrich L. Bauer:
Cæsar Cipher. 180
D
- DAC. 295
- Alex Biryukov, Christophe De Cannière:
Data Encryption Standard (DES). 295-301 - William E. Winkler:
Data Linkage. 301-303 - Charu C. Aggarwal:
Data Mining (Privacy in). 303-306 - Markus Kuhn:
Data Remanence. 306 - Luc Bouganim, Yanli Guo:
Database Encryption. 307-312 - Bart Preneel:
Davies-Meyer. 312-313 - Gerrit Bleumer:
DC Network. 313-315 - DDH Problem. 315
- Tor Helleseth:
De Bruijn Sequence. 315-316 - De-Skewing. 331
- Decentralized Trust Management. 316
- Ran Canetti, Mayank Varia:
Decisional Diffie-Hellman Problem. 316-319 - Christiane Peters:
Decoding Algorithms. 319-322 - Burt Kaliski:
Decryption Exponent. 322 - Yvo Desmedt:
Deniable Encryption. 322-323 - Denial of Service (DoS). 323
- George Kesidis:
Denial-of-Service Detection. 323-328 - Deobfuscating Malware. 328
- Marijke De Soete:
Derived Key. 328 - Alex Biryukov:
DES-X (or DESX). 331 - Gerrit Bleumer:
Designated Confirmer Signature. 328-330 - Berry Schoenmakers:
Designated-Verifier Proofs. 330-331 - DH Key Agreement. 331
- DHP. 331
- Carlisle Adams:
Dictionary Attack. 332 - Alex Biryukov:
Dictionary Attack (I). 332 - Eli Biham:
Differential Cryptanalysis. 332-336 - Tom Caddy:
Differential Power Analysis. 336-338 - Cynthia Dwork:
Differential Privacy. 338-340 - Alex Biryukov:
Differential-Linear Attack. 340-341 - Diffie-Hellman Problem. 342
- Mike Just:
Diffie-Hellman Key Agreement. 341-342 - Diffie-Hellman Key Exchange. 342
- Digest Authentication. 342
- Digital Certificate. 342
- Matthieu Finiasz, Nicolas Sendrier:
Digital Signature Scheme Based on McEliece. 342-343 - Kazue Sako:
Digital Signature Schemes. 343-344 - Philippe Gaborit, Nicolas Sendrier:
Digital Signature Schemes from Codes. 344-347 - Dan Boneh:
Digital Signature Standard. 347 - Christian Cachin:
Digital Steganography. 348-352 - Daniel M. Gordon:
Discrete Logarithm Problem. 352-353 - Ninghui Li:
Discretionary Access Control. 353-356 - Sabrina De Capitani di Vimercati:
Discretionary Access Control Policies (DAC). 356-358 - Marion Videau:
Distinguishing Attacks. 358-359 - DLP. 359
- Svetlana N. Yanushkevich, Denis V. Popel:
DNA. 359-362 - Brent ByungHoon Kang:
DNS-Based Botnet Detection. 362-363 - John Ioannidis:
DoS Pushback. 363-365 - DPA. 365
- Mihai Christodorescu, Vinod Ganapathy:
Dynamic Analysis. 365-367 - Brent ByungHoon Kang, Anurag Srivastava:
Dynamic Malware Analysis. 367-368 - Dynamic Program Analysis. 368
- Sean W. Smith:
Dynamic Root of Trust. 368-369 - Dynamic Separation of Duties. 369
E
- e-Government. 372
- Johannes Gehrke, Ashwin Machanavajjhala:
E-Privacy. 424-426 - Caroline Fontaine:
E0. 371-372 - Bir Bhanu:
Ear Shape for Biometric Identification. 372-378 - Micah Sherr:
Eavesdropping. 378-379 - ECC. 379
- Darrel Hankerson, Alfred Menezes:
ECC Challenges. 379-380 - ECM. 380
- ECPP. 380
- ECRYPT Stream Cipher Project. 380
- Edwards Coordinates. 380
- Tanja Lange:
Edwards Curves. 380-382 - Efficiency of Hyperelliptic Curve Cryptosystems. 382
- Electro-Magnetic Fingerprinting. 385
- Jean-Jacques Quisquater, David Samyde:
Electromagnetic Attack. 382-385 - Gerrit Bleumer:
Electronic Cash. 385-387 - Electronic Check. 387
- Marijke De Soete:
Electronic Cheque. 387 - Gerrit Bleumer:
Electronic Payment. 387-389 - Gerrit Bleumer:
Electronic Postage. 389-391 - Electronic Purse. 391
- Kazue Sako:
Electronic Voting Schemes. 391-393 - Gerrit Bleumer:
Electronic Wallet. 393-395 - Dan Boneh:
ElGamal Digital Signature Scheme. 395-396 - ElGamal Encryption. 396
- Yvo Desmedt:
ElGamal Public Key Encryption. 396 - Darrel Hankerson, Alfred Menezes:
Elliptic Curve Cryptography. 397 - Darrel Hankerson, Alfred Menezes:
Elliptic Curve Discrete Logarithm Problem. 397-400 - Darrel Hankerson, Alfred Menezes:
Elliptic Curve Key Agreement Schemes. 400-401 - Darrel Hankerson, Alfred Menezes:
Elliptic Curve Keys. 401 - Paul Zimmermann:
Elliptic Curve Method for Factoring. 401-403 - Darrel Hankerson, Alfred Menezes:
Elliptic Curve Point Multiplication Using Halving. 403-406 - Darrel Hankerson, Alfred Menezes:
Elliptic Curve Public-Key Encryption Schemes. 406-407 - Darrel Hankerson, Alfred Menezes:
Elliptic Curve Signature Schemes. 407-408 - Elliptic Curve Trace Computation. 408
- Darrel Hankerson, Alfred Menezes:
Elliptic Curves. 408-410 - François Morain:
Elliptic Curves for Primality Proving. 411-412 - Michael Ward, Anita Ochieano:
EMV. 412-416 - Friedrich L. Bauer:
Encryption. 416 - Burt Kaliski:
Encryption Exponent. 417 - Arkadiusz Orlowski:
Enigma. 417-420 - Robert J. Zuccherato:
Entity Authentication. 420-421 - Entity Authentication Protocol. 421
- Entity Resolution. 421
- Carl M. Ellison:
Entropy Sources. 421-423 - Environmental Attacks. 423
- ePassport Security. 423
- Error-Correcting Cyclic Codes. 426
- Error-Correction Decoding. 426
- Escrow Service. 426
- Marion Videau:
eSTREAM. 426-427 - Berk Sunar:
Euclidean Algorithm. 427-430 - Euclidean Lattice. 430
- Euclid's Algorithm. 427
- Burt Kaliski:
Euler's Totient Function. 430 - Everywhere Second Preimage Resistant Hash Function (esec). 430
- Michael J. Wiener:
Exhaustive Key Search. 431-433 - Gerrit Bleumer:
Existential Forgery. 433-434 - Exponential Key Exchange. 434
- Burt Kaliski:
Exponential Time. 434 - Christof Paar:
Exponentiation Algorithms. 434-436 - Extended Euclidean Algorithm. 436
- Burt Kaliski:
Extension Field. 436
F
- Soma Biswas, Rama Chellappa:
Face Recognition from Still Images and Video. 437-444 - Daniel J. Bernstein:
Factorization Circuits. 444-445 - Burt Kaliski:
Factor Base. 444 - Gerrit Bleumer:
Fail-Stop Signature. 446-447 - Matthias Schunter:
Fair Exchange. 447-448 - False Data Filtering. 448
- Wensheng Zhang:
False Data Injection Defense. 448-450 - Anne Canteaut:
Fast Correlation Attack. 450-452 - Olivier Benoît:
Fault Attack. 452-453 - Christophe De Cannière:
FEAL. 454-455 - Feige-Fiat-Shamir Signature Scheme. 455
- Alex Biryukov:
Feistel Cipher. 455 - Moses D. Liskov:
Fermat Primality Test. 455-456 - Fermat Test. 456
- Moses D. Liskov:
Fermat's Little Theorem. 456 - Yvo Desmedt:
Fiat-Shamir Identification Protocol and the Feige-Fiat-Shamir Signature Scheme. 457-458 - Burt Kaliski:
Field. 458 - File System Permissions. 458
- Anne Canteaut:
Filter Generator. 458-460 - Ruggero Donida Labati, Fabio Scotti:
Fingerprint. 460-465 - Fingerprint Authentication. 465
- Alexander Barg, Gregory A. Kabatiansky:
Fingerprinting. 465-467 - Burt Kaliski:
Finite Field. 468 - Tom Caddy:
FIPS 140-2. 468-471 - Niels Provos:
Firewall. 471-474 - Firewall Policy Analysis. 474
- Ehab Al-Shaer:
Firewalls. 474-482 - Fixed Window Exponentiation. 482
- André Weimerskirch:
Fixed-Base Exponentiation. 482-485 - André Weimerskirch:
Fixed-Exponent Exponentiation. 485-486 - Pierangela Samarati:
Flexible Authorization Framework (FAF). 486-489 - Flow Blocking. 489
- Forged Resets. 489
- Gerrit Bleumer:
Forgery. 489-490 - Catherine Meadows:
Formal Analysis of Cryptographic Protocols. 490-492 - Graham Steel:
Formal Analysis of Security APIs. 492-494 - Formal Methods. 494
- Michael Huth:
Formal Methods and Access Control. 494-495 - Jonathan K. Millen:
Formal Methods for the Orange Book. 495-498 - Catherine Meadows:
Formal Methods in Certification and Evaluation. 498-499 - Forward Secrecy. 499
- FPGA Field Programmable Gate Array. 499
- Tim Güneysu:
FPGAs in Cryptography. 499-501 - Emmanuel Thomé:
Function Field Sieve. 501-502
G
- Sudeep Sarkar, Zongyi Liu:
Gait Recognition. 503-506 - David A. McGrew:
Galois Counter Mode. 506-508 - Galois Message Authentication Code. 508
- Tor Helleseth:
Gap. 508-509 - GCD. 509
- GCM. 509
- Gene. 509
- Jerome A. Solinas:
Generalized Mersenne Prime. 509-510 - Burt Kaliski:
Generator. 510 - Daniel M. Gordon:
Generic Attacks Against DLP. 510-512 - David Naccache:
Generic Model. 512-513 - Genetic Code. 513
- Geometry of Numbers. 513
- Bart Preneel:
GMAC. 513-514 - Gerrit Bleumer:
GMR Signature. 514-515 - Kazue Sako:
Goldwasser-Micali Encryption Scheme. 516 - Tor Helleseth:
Golomb's Randomness Postulates. 516-517 - Christophe De Cannière:
GOST. 517-518 - Sabrina De Capitani di Vimercati, Giovanni Livraga:
Grant Option. 518 - Scott Contini:
Greatest Common Divisor. 518-519 - Greatest Common Factor. 519
- Burt Kaliski:
Group. 519-520 - Mike Burmester:
Group Key Agreement. 520-526 - Group Key Distribution. 526
- Group Key Exchange. 526
- Gerrit Bleumer:
Group Signatures. 526-528 - David Naccache:
Gröbner Basis. 519
H
- David Zhang, Vivek Kanhangad:
Hand Geometry Recognition. 529-531 - Hand Geometry Verification. 531
- Patrizio Campisi, Emanuele Maiorana, Harold Mouchère, Christian Viard-Gaudin, Alessandro Neri:
Handwriting Analysis. 531-534 - Burt Kaliski:
Hard-Core Bit. 534-535 - Laurent Sustek:
Hardware Security Module. 535-538 - David Challener:
Hash Agility. 538-540 - Dwight Horne:
Hash Chain. 542-543 - Bart Preneel:
Hash Functions. 543-553 - Hash-Based Message Authentication Code. 553
- Tanja Lange:
Hash-Based Signatures. 540-542 - Header Injections. 553
- Serge Fenet:
Header-Based Attacks. 553-556 - HEC Acronym is Often Used for Hyper Elliptic Curves. 556
- Heredity. 556
- High Assurance Evaluation Methods. 556
- Higher Order Derivative Attack. 556
- Tyrone Grandison, Kristen LeFevre:
Hippocratic Database. 556-559 - History-Based Separation of Duties. 559
- Bart Preneel:
HMAC. 559-560 - Berry Schoenmakers:
Homomorphic Encryption. 560-562 - Burt Kaliski:
Homomorphism. 562 - Vijay Alturi:
HRU. 562-564 - Jörg Schwenk:
HTTP Authentication. 564-565 - HTTP Basic Authentication. 565
- HTTP Cookie. 565
- HTTP Digest Access Authentication Scheme. 565
- Italo Dacosta:
HTTP Digest Authentication. 565-567 - Andrew Clark:
HTTP Session Security. 567-569 - Torben Pedersen:
HTTPS, HTTP over TLS. 569-570 - Human Ear Biometrics. 570
- Human Ear Identification. 570
- Human Ear Recognition. 570
- Human Ear Verification. 570
- Kaoru Kurosawa:
Hybrid Encryption. 570-572 - Hyperelliptic Curve Discrete Logarithm Problem (HECDLP). 573
- Roberto Avanzi, Nicolas Thériault:
Hyperelliptic Curve Security. 573-576 - Roberto Avanzi, Nicolas Thériault:
Hyperelliptic Curves. 576-580 - Roberto Avanzi, Nicolas Thériault:
Hyperelliptic Curves Performance. 580-582
I
- IBE. 583
- IC Integrated Circuit. 583
- IC-Integrated Circuit. 583
- Iceman Attack. 583
- ID-Based Encryption. 583
- Alex Biryukov:
IDEA. 583-584 - Carlisle Adams:
Identification. 584-585 - Identity Authentication. 585
- Mike Just:
Identity Management. 586-587 - Identity Proof. 587
- Robert J. Zuccherato:
Identity Verification Protocol. 587-588 - Benoît Libert, Jean-Jacques Quisquater:
Identity-Based Cryptosystems. 588-594 - Martin Gagné:
Identity-Based Encryption. 594-596 - Carlisle Adams:
Impersonation Attack. 596 - Implicit Key Authentication. 596
- Alex Biryukov:
Impossible Differential Attack. 597 - Kim Nguyen:
Index Calculus Method. 597-600 - Indistinguishability of Encryptions. 600
- Joachim Biskup:
Inference Control. 600-605 - Information Assurance. 605
- Heiko Mantel:
Information Flow and Noninterference. 605-607 - Information Flow Security. 607
- Information Integrity. 607
- Information Security Management System. 607
- Information Theoretic Model. 608
- Friedrich L. Bauer:
Information Theory. 608-609 - Salvatore J. Stolfo, Brian M. Bowen, Malek Ben Salem:
Insider Threat Defense. 609-611 - Arjen K. Lenstra:
Integer Factoring. 611-618 - Integrated Circuit. 618
- Integrated Circuit Card. 618
- Integrity Model. 618
- Intellectual Property. 618
- Berry Schoenmakers:
Interactive Argument. 618-619 - Berry Schoenmakers:
Interactive Proof. 619 - Interactive Proof Systems. 619
- Interactive Theorem Proving and Security. 619
- Interception. 619
- Christophe De Cannière:
Interpolation Attack. 620 - Qijun Gu:
Intrusion Detection in Ad Hoc Networks. 620-623 - Assia Tria, Hamid Choukri:
Invasive Attacks. 623-629 - Anne Canteaut:
Inversion Attack. 629-630 - Christof Paar:
Inversion in Finite Fields and Rings. 631-632 - Inversion in Galois Fields. 632
- Steven M. Bellovin:
IP Traceback. 632-634 - Alex Biryukov:
IPES. 634-635 - John Ioannidis:
IPsec. 635-638 - IPSec Policy Analysis. 638
- Yu Chen:
Iris. 638-646 - Burt Kaliski:
Irreducible Polynomial. 646 - Angelika Plate:
ISMS: A Management Framework for Information Security. 647-648 - ISO 15408 CC - Common Criteria. 648
- ISO 19790 2006 Security Requirements for Cryptographic Modules. 648
- Mehdi Tibouchi:
ISO-9796 Signature Standards. 649-650 - ISO/IEC 15408. 648
- ISO/IEC 27001. 649
- Marijke De Soete:
Issuer. 650 - Jorge Guajardo:
Itoh-Tsujii Inversion Algorithm. 650-653
J
- Burt Kaliski:
Jacobi Symbol. 655 - Wenyuan Xu:
Jamming Attack Defense. 655-661 - Srdjan Capkun:
Jamming Resistance. 661-662
K
- Pierangela Samarati:
k-Anonymity. 663-666 - André Weimerskirch:
Karatsuba Algorithm. 666-669 - Christophe De Cannière:
Kasumi/Misty1. 669-670 - Thomas Eisenbarth, Timo Kasper, Christof Paar, Sebastiaan Indesteege:
Keeloq. 671-673 - Radmilo Racic:
Kerberos. 673-674 - Carlisle Adams:
Kerberos Authentication Protocol. 674-675 - Kerckhoffs' Law. 675
- Fabien A. P. Petitcolas:
Kerckhoffs' Principle. 675 - Friedrich L. Bauer:
Key. 676-677 - Mike Just:
Key Agreement. 677-678 - Robert J. Zuccherato:
Key Authentication. 678-679 - Torben Pedersen:
Key Encryption Key. 679-681 - Mike Just:
Key Escrow. 681-682 - Aggelos Kiayias, Bülent Yener:
Key Generation Using Physical Properties of Wireless Communication. 682-683 - Key Life Cycle Management. 683
- Steve Lloyd, Carlisle Adams:
Key Management. 683-688 - Key Recovery. 688
- Key Variation. 688
- Mitchell A. Thornton:
Keyboard Dynamics. 688-691 - Aaron Estes:
Keylogging. 691 - Keystream. 691
- Patrizio Campisi, Alessandro Neri:
Keystroke Dynamics. 692-695 - Keystroke Logging. 695
- Keyword-Based Retrieval over Encrypted Data. 695
- Yvo Desmedt:
Knapsack Cryptographic Schemes. 695-704 - Alex Biryukov:
Known Plaintext Attack. 704-705 - Darrel Hankerson, Alfred Menezes:
Koblitz Elliptic Curves. 705-706
L
- Arjen K. Lenstra:
L Notation. 709-710 - Lamport One-Time Signatures. 710
- Late Launch. 710
- Phong Q. Nguyen:
Lattice. 710-711 - Lattice Basis Reduction. 711
- Phong Q. Nguyen:
Lattice Reduction. 711-713 - Daniele Micciancio:
Lattice-Based Cryptography. 713-715 - LCM. 715
- Scott Contini:
Least Common Multiple. 715 - Sabrina De Capitani di Vimercati:
Least Privilege. 716 - Burt Kaliski:
Legendre Symbol. 716 - Stephen M. Papa, William D. Casper:
Levels of Trust. 716-720 - LFSR. 720
- Anne Canteaut:
Linear Complexity. 720 - Caroline Fontaine:
Linear Congruential Generator. 721 - Anne Canteaut:
Linear Consistency Attack. 721-722 - Alex Biryukov, Christophe De Cannière:
Linear Cryptanalysis for Block Ciphers. 722-725 - Anne Canteaut:
Linear Cryptanalysis for Stream Ciphers. 725-726 - Anne Canteaut:
Linear Feedback Shift Register. 726-729 - Anne Canteaut:
Linear Syndrome Attack. 729 - List Decoding. 729
- Claudio A. Ardagna:
Location Information (Privacy of). 729-732 - Location Privacy. 732
- Marco Gruteser:
Location Privacy in Wireless Networks. 732-734 - Sean W. Smith:
Logic Bomb. 734 - Piero A. Bonatti:
Logic-Based Authorization Languages. 734-736 - Longhand. 736
- Lars R. Knudsen:
Luby-Rackoff Ciphers. 736-737
M
- m-Sequence. 737
- Xiaokui Xiao:
M-Invariance. 739-741 - Bart Preneel:
MAA. 741-742 - Bart Preneel:
MAC Algorithms. 742-748 - Machine Readable Travel Document Security. 748
- Macrodata Disclosure Limitation. 748
- Macrodata Disclosure Protection. 748
- Sara Foresti:
Macrodata Protection. 749-750 - Maliciously Modified Set of Administrative Tools. 750
- Malware. 750
- Engin Kirda:
Malware Behavior Clustering. 751-752 - Stefan Katzenbeisser, Johannes Kinder, Helmut Veith:
Malware Detection. 752-755 - Yvo Desmedt:
Man-in-the-Middle Attack. 759 - Shambhu J. Upadhyaya:
Mandatory Access Control. 756-758 - Sabrina De Capitani di Vimercati, Pierangela Samarati:
Mandatory Access Control Policy (MAC). 758 - Christophe De Cannière:
MARS. 759-760 - Bart Preneel:
MASH Hash Functions (Modular Arithmetic Secure Hash). 761 - Carlisle Adams:
Master Key. 762 - Maurer's Algorithm. 762
- Moses D. Liskov:
Maurer's Method. 762-763 - Tor Helleseth:
Maximal-Length Sequences. 763-766 - Friedrich L. Bauer:
Maxims. 766 - Nicolas Sendrier:
McEliece Public Key Cryptosystem. 767-768 - MD4 Hash Function. 768
- Nicky Mouha:
MD4-MD5. 768-771 - MD5 Hash Function. 771
- Bart Preneel:
MDC-2 and MDC-4. 771-772 - Measurement Models of Software Security. 772
- Alex Biryukov:
Meet-in-the-Middle Attack. 772-773 - XiaoFeng Wang:
Memory and State Exhaustion Denial of Service. 773-774 - Memory and State Exhaustion DoS. 774
- Memory Overflow. 774
- Merkle-Hash-Trees Signatures. 774
- Jerome A. Solinas:
Mersenne Prime. 774-775 - Message Authentication Algorithm. 775
- Guido Salvaneschi, Paolo Salvaneschi:
Metrics of Software Security. 775-778 - Microdata Anonymization Techniques. 778
- Microdata Disclosure Limitation. 778
- Microdata Disclosure Protection. 778
- Josep Domingo-Ferrer:
Microdata Masking Techniques. 778-781 - Sara Foresti:
Microdata Protection. 781-783 - Microdata Statistical Disclosure Control. 784
- Miller-Rabin Test. 785
- Moses D. Liskov:
Miller-Rabin Probabilistic Primality Test. 784-785 - MILS. 785
- Anne Canteaut:
Minimal Polynomial. 785 - Minimal Privilege. 785
- Burt Kaliski:
MIPS-Year. 785-786 - Alex Biryukov:
Miss-in-the-Middle Attack. 786 - Matthew K. Franklin:
Mix Networks. 786-788 - ML-Sequence. 788
- Marijke De Soete:
Mobile Payments. 788-789 - Marijke De Soete:
Mobile Wallet. 789 - Bart Preneel:
Modes of Operation of a Block Cipher. 789-794 - Scott Contini, Çetin Kaya Koç, Colin D. Walter:
Modular Arithmetic. 795-798 - Scott Contini:
Modular Root. 798 - Scott Contini:
Modulus. 798-799 - Monitoring. 799
- David Naccache:
Monotone Signatures. 799 - Çetin Kaya Koç:
Montgomery Arithmetic. 799-803 - Burt Kaliski:
Moore's Law. 803 - MPKC. 804
- MQ or Multivariate Quadratic Public-Key Cryptosystem (MQPKC). 804
- Multi-Exponentiation. 808
- Chen-Mou Cheng:
Multi-Threaded Implementation for Cryptography and Cryptanalysis. 823-824 - Arun Ross:
Multibiometrics. 804-808 - Multicast Authentication. 808
- Multicast Stream Authentication. 808
- Multidimensional Databases. 808
- Multifactor Authentication. 808
- Pierangela Samarati, Giovanni Livraga:
Multilevel Database. 809-811 - Frédéric Cuppens, Nora Cuppens-Boulahia:
Multilevel Security Policies. 811-812 - Berry Schoenmakers:
Multiparty Computation. 812-815 - Multiparty Computation (MPC). 815
- Alex Biryukov:
Multiple Encryption. 815 - Jim Alves-Foss:
Multiple Independent Levels of Security. 815-818 - David Naccache:
Multiplicative Knapsack Cryptosystem. 818 - Berk Sunar:
Multiprecision Multiplication. 818-821 - Berk Sunar:
Multiprecision Squaring. 821-822 - Alex Biryukov:
Multiset Attack. 822 - Louis Goubin, Jacques Patarin, Bo-Yin Yang:
Multivariate Cryptography. 824-828
N
- David Naccache:
Naccache-Stern Higher Residues Cryptosystem. 829 - Near Field Communication. 829
- Nearest Vector Problem. 829
- Mike Just:
Needham-Schroeder Protocols. 829-831 - Bart Preneel:
NESSIE Project. 831-836 - Angelos D. Keromytis:
Network Bandwidth Denial of Service (DoS). 836-838 - Xiaowei Yang:
Network Capabilities. 838-840 - Network DoS. 840
- Network Flooding Attack. 840
- Marc Vauclair:
NFC. 840-842 - NFS. 842
- Nicolas Sendrier:
Niederreiter Encryption Scheme. 842-843 - Darrel Hankerson, Alfred Menezes:
NIST Elliptic Curves. 843-844 - Donggang Liu:
Node Clone Defense. 844-846 - Node Replication. 846
- Cynthia Dwork:
Non-Malleability. 849-852 - Berry Schoenmakers:
Noninteractive Proof. 846 - Caroline Fontaine:
Nonlinear Feedback Shift Register. 846-848 - Claude Carlet:
Nonlinearity of Boolean Functions. 848-849 - Nonrepudiable Agreement. 852
- Mike Just:
Nonrepudiation of Digital Signatures. 852-854 - Nonrepudiation Protocol. 854
- Gerrit Bleumer:
Nonsecret Encryption. 854-857 - Darrel Hankerson, Alfred Menezes:
NSA Suite B. 857 - NSS. 857
- William Whyte, Jeffrey Hoffstein:
NTRU. 858-861 - NTRUEncrypt. 861
- NTRUSign. 861
- Nucleic Acid. 861
- Burt Kaliski:
Number Field. 861 - Number Field Sieve. 861
- Alexander Kruppa, Paul Leyland:
Number Field Sieve for Factoring. 862-867 - Antoine Joux, Reynald Lercier:
Number Field Sieve for the DLP. 867-873 - Scott Contini:
Number Theory. 873-879 - Kazue Sako:
Nyberg-Rueppel Signature Scheme. 879 - Nym. 879
O
- Burt Kaliski:
O-Notation. 881-882 - David Pointcheval:
OAEP: Optimal Asymmetric Encryption Padding. 882-884 - Berry Schoenmakers:
Oblivious Transfer. 884-885 - Carlisle Adams:
One Time Password, from a Key Management Perspective. 885 - Mohamed Omar Rayes:
One-Time Password. 885-887 - One-Way Chain. 887
- Matthew J. B. Robshaw:
One-Way Function. 887-888 - One-way property. 888
- Online Analytical Processing. 888
- Operational Separation of Duties. 888
- Christof Paar:
Optimal Extension Fields (OEFs). 888-890 - Burt Kaliski:
Order. 890-891 - Outbound Authentication. 891
- Angelos Stavrou:
Overlay-Based DoS Defenses. 891-897 - Gerrit Bleumer:
Overspender Detection. 897 - Gerrit Bleumer:
Overspending Prevention. 898
P
- Packet Flooding Attack. 899
- Qijun Gu:
Packet-Dropping Attack. 899-902 - Pascal Paillier:
Paillier Encryption and Signature Schemes. 902-903 - Tanja Lange:
Pairing-Based Key Exchange. 903-904 - Edlyn Teske:
Pairing-Friendly Elliptic Curves. 904-907 - Darrel Hankerson, Alfred Menezes:
Pairings. 907-909 - Palmprint Authentication. 909
- David Zhang, Feng Yue, Wangmeng Zuo:
Palmprint Recognition. 909-913 - Parallelizable Message Authentication Code. 913
- Jean-Jacques Quisquater, Gildas Avoine:
Passport Security. 913-916 - Gerald Brose:
Password. 916-918 - Pattern of Blood Vessels. 918
- Marijke De Soete:
Payment Card. 918-919 - Torben Pedersen:
PEM, Privacy-Enhanced Mail. 919-920 - Tom Caddy:
Penetration Testing. 920-921 - Penmanship. 921
- Hugo Krawczyk:
Perfect Forward Secrecy. 921-922 - Yvo Desmedt, Qiushi Yang:
Perfectly Secure Message Transmission. 922-924 - Dwight Horne:
Permissions. 924-927 - Carlisle Adams:
Personal Identification Number (PIN). 927 - PGP. 927
- David Naccache:
Phenotyping. 927 - Phi Function. 927
- Physical Obfuscated Key. 927
- Physical Random Function. 928
- François-Xavier Standaert, Jean-Jacques Quisquater:
Physical Security. 928-929 - Jorge Guajardo:
Physical Unclonable Functions (PUFs). 929-934 - Peter Landrock, Danny De Cock:
PKCS. 934-935 - Marijke De Soete:
PKI. 935-936 - Mike Just:
PKI Trust Models. 936-939 - PKI Trust Relationships. 939
- Torben Pedersen:
PKIX, Public Key Infrastructure (X.509). 939-940 - Lorrie Faith Cranor:
Platform for Privacy Preferences (P3P). 940-941 - Friedrich L. Bauer:
Playfair Cipher. 941 - Bart Preneel:
PMAC. 941-942 - Pierrick Gaudry:
Point Counting. 942-944 - POK. 944
- Sabrina De Capitani di Vimercati:
Policy Composition. 944-945 - Friedrich L. Bauer:
Polybios Square Encryption. 945-946 - Sabrina De Capitani di Vimercati, Pierangela Samarati:
Polyinstantiation. 946-948 - Burt Kaliski:
Polynomial Time. 948-949 - Friedrich L. Bauer:
Porta Encryption. 949 - Daniel J. Bernstein:
Post-Quantum Cryptography. 949-950 - Jon Callas, Daniel Nagy, Akira Otsuka:
Practical E-Cash. 951-952 - Bart Preneel:
Preimage Resistance. 952-953 - Lars R. Knudsen, Gregor Leander:
PRESENT - Block Cipher. 953-955 - Clemens Heinrich:
Pretty Good Privacy (PGP). 955-958 - Anton Stiglic:
Primality Proving Algorithm. 958 - Anton Stiglic:
Primality Test. 958-959 - Prime Certificate. 959
- Anton Stiglic:
Prime Generation. 959 - Anton Stiglic:
Prime Number. 959-964 - Burt Kaliski:
Primitive Element. 965 - Hakan Hacigümüs, Bijit Hore, Sharad Mehrotra:
Privacy of Outsourced Data. 965-969 - Privacy Protection in Biometric Systems. 969
- Sabrina De Capitani di Vimercati:
Privacy-Aware Access Control Policies. 969-970 - Privacy-Aware Database. 970
- Claudio A. Ardagna:
Privacy-Aware Languages. 971-972 - Privacy-Enabled Database. 972
- Privacy-Enhanced Languages. 972
- Shucheng Yu, Wenjing Lou, Kui Ren:
Privacy-Preserving Authentication in Wireless Access Networks. 972-974 - Private Exponent. 974
- Carlo Blundo:
Private Information Retrieval. 974-976 - Private Key Cryptosystem. 976
- Sabrina De Capitani di Vimercati, Giovanni Livraga:
Privileges in SQL. 976-977 - PRNG. 978
- Donggang Liu:
Probabilistic Key Sharing. 978-980 - Anton Stiglic:
Probabilistic Primality Test. 980 - Kazue Sako:
Probabilistic Public-Key Encryption. 980 - Alex Biryukov:
Product Cipher, Superencryption. 980-981 - Program Integrity Verification. 981
- Catherine Meadows:
Program Verification and Security. 981-983 - Project Athena. 983
- Berry Schoenmakers:
Proof of Knowledge Versus Proof of Membership. 983-984 - Proof of Work. 984
- George C. Necula:
Proof-Carrying Code. 984-986 - Claude Carlet:
Propagation Characteristics of Boolean Functions. 986-987 - Mohamed Omar Rayes:
Protected Mode. 987 - Protection. 988
- Jeffrey J. Wiley:
Protection Rings. 988-990 - Berry Schoenmakers:
Protocol. 990 - Debbie Cook:
Protocol Cookies. 990-991 - Marc Vauclair:
Proximity Card. 991 - Jerome A. Solinas:
Pseudo-Mersenne Prime. 992 - Tor Helleseth:
Pseudo-Noise Sequences (PN-Sequences). 992 - Gerrit Bleumer:
Pseudonyms. 992-994 - Anton Stiglic:
Pseudoprime. 994-995 - Burt Kaliski:
Pseudorandom Function. 995 - François Koeune:
Pseudorandom Number Generator. 995-996 - Public Exponent. 996
- Kazue Sako:
Public Key Cryptography. 996-997 - Public Key Encryption. 997
- Public Key Infrastructure. 997
- Gerrit Bleumer:
Public Key Proxy Encryption. 997-999 - Gerrit Bleumer:
Public Key Proxy Signatures. 999-1001 - Public-Key Authenticated Encryption. 1001
- Public-Key Cryptosystem. 1001
- Public-Key Encryption. 1001
- PUF. 1001
Q
- QRP. 1003
- Burt Kaliski:
Quadratic Residue. 1003 - Burt Kaliski:
Quadratic Residuosity Problem. 1003 - Robert Silverman:
Quadratic Sieve. 1004-1005 - Gilles Brassard, Claude Crépeau:
Quantum Cryptography. 1005-1010 - Sabrina De Capitani di Vimercati, Sara Foresti:
Quasi-Identifier. 1010-1011
R
- David Pointcheval:
Rabin Cryptosystem. 1013-1014 - Dan Boneh:
Rabin Digital Signature Scheme. 1014-1015 - Radio Fingerprinting. 1015
- Jean-Jacques Quisquater, David Samyde:
Radio Frequency Attacks. 1015-1021 - Radio Interference Attack Defense. 1021
- Radio-Frequency (RF) Fingerprinting. 1021
- Radiometric Identification. 1021
- Radiometrics. 1021
- Gerald Brose:
Rainbow Tables. 1021-1022 - Marco Bucci:
Random Bit Generator. 1022-1026 - Random Key Predistribution. 1026
- Tom Caddy:
Random Number Testing. 1026-1027 - Gerrit Bleumer:
Random Oracle Model. 1027-1028 - Ernst M. Gabidulin:
Rank Codes. 1028-1031 - Rank-Matric Codes. 1031
- RBAC. 1031
- Caroline Fontaine:
RC4. 1031-1032 - Helena Handschuh:
RC5. 1032-1033 - Helena Handschuh:
RC6. 1033-1034 - Gerrit Bleumer:
Recipient Anonymity. 1034-1035 - Record Linkage. 1035
- Pierangela Samarati:
Recursive Revoke. 1035-1037 - Pascale Charpin:
Reed-Muller Codes. 1037-1038 - Trent Jaeger:
Reference Monitor. 1038-1040 - Alex Biryukov:
Related Key Attack. 1040-1041 - Relationship Anonymity. 1041
- Burt Kaliski:
Relatively Prime. 1041 - Yvo Desmedt:
Relay Attack. 1042 - Remote Attestation. 1042
- Carlisle Adams:
Replay Attack. 1042 - Residue Arithmetic. 1042
- Resistance to the Standard Algebraic Attack. 1042
- Carlisle Adams:
Response. 1042 - Alex Biryukov:
Resynchronization Attack. 1042-1043 - Michalis Polychronakis:
Reverse Engineering of Malware Emulators. 1043-1044 - David Naccache:
Reverse Public Key Encryption. 1044 - Gildas Avoine:
RFID Security. 1044-1045 - Bodo Möller:
Right-to-Left Exponentiation. 1045-1046 - Joan Daemen, Vincent Rijmen:
Rijndael. 1046-1049 - Burt Kaliski:
Ring. 1049-1050 - Antoon Bosselaers:
RIPEMD Family. 1050-1053 - Rivest Cipher 5. 1053
- Rivest Cipher 6. 1053
- Vijay Alturi, David F. Ferraiolo:
Role-Based Access Control. 1053-1055 - Alessandro Campi:
Roles in SQL. 1055-1057 - Ron's Code 5. 1057
- Ron's Code 6. 1057
- William D. Casper, Stephen M. Papa:
Root of Trust. 1057-1060 - Padmaraj M. V. Nair:
Rootkits. 1060 - Routing Anonymity. 1060
- Burt Kaliski:
RSA Digital Signature Scheme. 1061-1064 - Burt Kaliski:
RSA Factoring Challenge. 1064-1065 - Ronald L. Rivest, Burt Kaliski:
RSA Problem. 1065-1069 - David Pointcheval:
RSA Public-Key Encryption. 1069-1072 - Rule-Based Access Control. 1072
- Tor Helleseth:
Run. 1072-1073 - Run-Time Malware Analysis. 1073
- Anne Canteaut:
Running-Key. 1073 - Runtime Analysis. 1073
S
- Carlisle Adams:
Salt. 1075 - Mark Stephens:
Sandbox. 1075-1078 - Ernst M. Gabidulin:
Schemes Based on Rank Codes. 1079-1082 - Dan Boneh:
Schnorr Digital Signature Scheme. 1082-1083 - Mike Just:
Schnorr Identification Protocol. 1083 - Claudio A. Ardagna, Ernesto Damiani:
Script Language Security. 1084-1086 - Caroline Fontaine:
SEAL. 1086 - Paul England:
Sealed Storage. 1087-1088 - Ali Bagherzandi, Bijit Hore, Sharad Mehrotra:
Search over Encrypted Data. 1088-1093 - Bart Preneel:
Second Preimage Resistance. 1093 - Laurent Bussard:
Secondary Use Regulations. 1094-1095 - Secret Key Cryptosystem. 1095
- G. R. Blakley, Gregory A. Kabatiansky:
Secret Sharing Schemes. 1095-1097 - Gerardo Pelosi:
Secure Audit Logs. 1097-1099 - Sangwon Hyun, Peng Ning:
Secure Code Dissemination in Wireless Sensor Networks. 1099-1102 - Secure Communication. 1102
- Secure Computation. 1102
- Secure Computer System Model. 1102
- Sean W. Smith:
Secure Coprocessor. 1102-1103 - Wensheng Zhang:
Secure Data Aggregation. 1104-1105 - Radu Sion:
Secure Data Outsourcing: A Brief Overview. 1105-1111 - Ming Li, Wenjing Lou, Kui Ren:
Secure Device Pairing. 1111-1115 - Marc Vauclair:
Secure Element. 1115-1116 - Secure Email. 1116
- Secure Function Evaluation. 1116
- Secure Hash Algorithm. 1116
- Gerardo Pelosi:
Secure Index. 1116-1119 - Donggang Liu:
Secure Localization. 1119-1121 - Secure Location Discovery. 1121
- Secure Logging. 1121
- Secure Multiparty Computation. 1121
- Keith B. Frikken:
Secure Multiparty Computation (SMC). 1121-1123 - Cristina Nita-Rotaru, Reza Curtmola:
Secure Network Coding for Wireless Mesh Networks. 1123-1126 - Secure Networks Design. 1126
- Secure Remote Programming. 1126
- Cristina Nita-Rotaru, Jing Dong, Reza Curtmola:
Secure Routing in Wireless Mesh Networks. 1126-1130 - Qijun Gu:
Secure Routing Protocols. 1130-1134 - Secure Shell. 1134
- Dan Boneh:
Secure Signatures from the "Strong RSA" Assumption. 1134-1135 - Clemens Heinrich:
Secure Socket Layer (SSL). 1135-1139 - Kun Sun, Peng Ning:
Secure Time Synchronization. 1139-1140 - Panos Papadimitratos, Jean-Pierre Hubaux:
Secure Vehicular Communication Systems. 1140-1143 - Secure Wireless Mesh Networks. 1143
- Secure Wireless Multicast. 1143
- Friedrich L. Bauer:
Security. 1143-1144 - Marijke De Soete:
Security Architecture. 1144 - Tom Caddy:
Security Evaluation Criteria. 1144-1146 - Sachiko Yoshihama:
Security for Mashups. 1146-1147 - Tae Hwan Oh, Shinyoung Lim, Young B. Choi, Jungwoo Ryoo:
Security Implication in Virtualization. 1148-1156 - Jung-Min "Jerry" Park, Kaigui Bian:
Security of Cognitive Radios. 1157-1158 - Srdjan Capkun:
Security of Distance Bounding Protocols. 1158-1159 - Cristina Nita-Rotaru, Reza Curtmola, Jing Dong:
Security of Group Communication in Wireless Mesh Networks. 1159-1163 - Security of Web Browser Scripting Languages. 1163
- Reza Curtmola, Jing Dong, Cristina Nita-Rotaru:
Security of Wireless Mesh Networks (General Overview). 1163-1167 - Mehdi Tibouchi:
Security Reduction. 1167-1168 - Russ Housley:
Security Standards Activities. 1168-1174 - Security Token. 1174
- Security Verification. 1174
- Segregation of Duties. 1174
- Gerrit Bleumer:
Selective Forgery. 1174-1175 - Caroline Fontaine:
Self-Shrinking Generator. 1175 - Caroline Fontaine:
Self-Synchronizing Stream Cipher. 1175-1176 - Kazue Sako:
Semantic Security. 1176-1177 - Gerrit Bleumer:
Sender Anonymity. 1177-1178 - Yi Yang, Sencun Zhu:
Sensor Code Attestation. 1178-1179 - Sensor Key Establishment and Maintenance. 1179
- Yi Yang, Sencun Zhu:
Sensor Key Management. 1179-1181 - Marijke De Soete:
SEPA. 1181-1182 - Mary Ellen Zurko, Richard T. Simon:
Separation of Duties. 1182-1185 - Tor Helleseth:
Sequences. 1185-1188 - Christophe De Cannière:
SERPENT. 1188-1189 - Martin Johns:
Session Hijacking Attacks. 1189-1190 - SHA. 1190
- Helena Handschuh:
SHA-0, SHA-1, SHA-2 (Secure Hash Algorithm). 1190-1193 - G. R. Blakley, Gregory A. Kabatiansky:
Shamir's Threshold Scheme. 1193-1194 - Shamir's Trick. 1194
- Shannon's Maxim. 1194
- Henk C. A. van Tilborg:
Shannon's Model. 1194-1195 - G. R. Blakley, Gregory A. Kabatiansky:
Share. 1195-1196 - Daniele Micciancio:
Shortest Vector Problem. 1196-1197 - Caroline Fontaine:
Shrinking Generator. 1197-1198 - Marc Joye, Francis Olivier:
Side-Channel Analysis. 1198-1204 - Tom Caddy:
Side-Channel Attacks. 1204 - Side-Channel Leakage. 1205
- Burt Kaliski:
Sieving. 1205 - Emmanuel Thomé:
Sieving in Function Fields. 1205-1206 - Patrizio Campisi, Emanuele Maiorana, Alessandro Neri:
Signature Biometrics. 1208-1210 - Yevgeniy Dodis:
Signcryption. 1210-1215 - Bodo Möller:
Signed Digit Exponentiation. 1215-1216 - Signed Window Exponentiation. 1217
- Marijke De Soete:
SIM/UICC. 1217-1218 - Bodo Möller:
Simultaneous Exponentiation. 1218-1220 - Simultaneous Transactions. 1220
- Single Euro Payments Area. 1220
- Single Wire Protocol. 1220
- Alex Biryukov:
Skipjack. 1220-1221 - Alex Biryukov:
Slide Attack. 1221-1222 - Bodo Möller:
Sliding Window Exponentiation. 1222-1224 - Marijke De Soete:
Smart Card. 1224-1225 - Smart/Algorithmic Denial of Service. 1225
- Markus Kuhn:
Smartcard Tamper Resistance. 1225-1227 - Kim Nguyen:
Smoothness. 1227 - Mary J. Culnan:
Social Perspectives on Information Privacy. 1228-1229 - Software-Based Attestation. 1229
- Software-Optimized Encryption Algorithm. 1229
- Bruce Schneier:
Solitaire. 1229-1230 - Wensheng Zhang:
Source Location Privacy. 1230-1231 - Space-Time Trade-Off. 1231
- Brent ByungHoon Kang, Gautam Singaraju:
Spam Detection Using Network-Level Characteristics. 1231-1232 - Speaker Biometrics. 1232
- Speaker Identification and Verification (SIV). 1232
- Homayoon S. M. Beigi:
Speaker Recognition. 1232-1242 - Christof Paar:
Special-Purpose Cryptanalytical Hardware. 1242-1243 - Specific Emitter Identification (SEI). 1243
- Specific Emitter Verification (SEV). 1243
- Carl M. Ellison:
SPKI. 1243-1245 - Nary Subramanian:
Spyware. 1246-1248 - Sabrina De Capitani di Vimercati, Giovanni Livraga:
SQL Access Control Model. 1248-1251 - Alessandro Orso:
SQL Injection Attacks. 1251-1252 - Square-and-Multiply Exponentiation. 1252
- Marijke De Soete:
SSH. 1252-1253 - SSL. 1253
- SSS. 1253
- Stack (Buffer) Overflow. 1253
- Stack (Buffer) Overrun. 1253
- Stack/Heap Smashing. 1253
- Standard Basis. 1253
- David Naccache:
Standard Model. 1253 - David Brumley:
Static Analysis. 1254-1256 - Static Code Analysis. 1256
- Static Program Analysis. 1256
- Static Separation of Duties. 1256
- Yvo Desmedt:
Station-to-Station Protocol. 1256 - Nabil R. Adam, Haibing Lu, Jaideep Vaidya, Basit Shafiq:
Statistical Databases. 1256-1260 - Stein's Algorithm. 1260
- Yvo Desmedt, Goce Jakimoski:
Stream and Multicast Authentication. 1260-1263 - Anne Canteaut:
Stream Cipher. 1263-1265 - Strong Authentication. 1265
- Strong Collision Resistance. 1265
- Strong Exclusion. 1265
- Anton Stiglic:
Strong Prime. 1265-1266 - Dan Boneh:
Strong RSA Assumption. 1266 - Alex Biryukov:
Structural Cryptanalysis. 1266 - Burt Kaliski:
Subexponential Time. 1267 - Burt Kaliski:
Subgroup. 1267 - Subgroup Cryptosystems. 1267
- Subscriber Identity Module. 1268
- Friedrich L. Bauer:
Substitutions and Permutations. 1268-1270 - Alex Biryukov:
Substitution-Permutation (SP) Network. 1268 - Caroline Fontaine:
Summation Generator. 1270 - Marc Vauclair:
SWP. 1270-1271 - Burt Kaliski:
Symmetric Cryptosystem. 1271 - Wesley M. Eddy:
SYN Cookie Defense. 1271-1273 - Wesley M. Eddy:
SYN Flood Attack. 1273-1274 - Caroline Fontaine:
Synchronous Stream Cipher. 1274-1275
T
- Talker Recognition. 1277
- Tom Caddy:
Tamper Detection. 1277 - Sean W. Smith:
Tamper Evidence. 1277-1278 - Tom Caddy:
Tamper Resistance. 1278 - Tom Caddy:
Tamper Response. 1278-1279 - Target Collision Resistant Hash Function. 1279
- TCG Trusted Computing Group. 1279
- Angelos Stavrou:
TCP Modulation Attacks. 1279-1281 - Nicholas C. Weaver:
TCP Reset Injection. 1282-1283 - TCP SYN Cookies. 1283
- TCP SYN Flooding. 1283
- David Naccache:
Temperature Attack. 1283 - Markus Kuhn:
Tempest. 1283-1284 - Claudio Bettini:
Temporal Access Control. 1284-1285 - Temporal Authorization Models. 1285
- Catherine Meadows:
Theorem Proving and Security. 1285-1287 - Saeed Abu-Nimeh:
Three-Factor Authentication. 1287-1288 - Yvo Desmedt:
Threshold Cryptography. 1288-1293 - Berry Schoenmakers:
Threshold Homomorphic Cryptosystems. 1293-1294 - Gerrit Bleumer:
Threshold Signature. 1294-1296 - Sebastiaan Indesteege:
Tiger. 1297 - Time-Based Access Control. 1297
- François-Xavier Standaert, Jean-Jacques Quisquater:
Time-Memory Trade-offs. 1297-1299 - Stuart Haber, Henri Massias:
Time-Stamping. 1299-1303 - François Koeune:
Timing Attack. 1303-1305 - TLS. 1305
- Marijke De Soete:
Token. 1305-1306 - Elisa Gorla:
Torus-Based Cryptography. 1306-1308 - David Challener:
TPM. 1308-1310 - TPM Trusted Platform Module. 1310
- Tracing Traitors. 1310
- Tracking Cookie. 1310
- Scott E. Coull:
Traffic Analysis. 1311-1313 - Benny Pinkas:
Traitor Tracing. 1313-1316 - Clemens Heinrich:
Transport Layer Security (TLS). 1316-1317 - Transport-Level Security. 1317
- Matthew J. B. Robshaw:
Trapdoor One-Way Function. 1317-1318 - Tripartite Key Exchange. 1318
- Christophe De Cannière:
Triple DES. 1318-1319 - Trojan. 1319
- Yvo Desmedt:
Trojan Horses, Computer Viruses, and Worms. 1319-1320 - Alex Biryukov:
Truncated Differentials. 1320 - Trust Anchor. 1320
- Ninghui Li:
Trust Management. 1323-1325 - Brian Wongchaowart, Adam J. Lee:
Trust Management. 1320-1323 - Scott D. Stoller:
Trust Management in Databases. 1326-1327 - William D. Casper, Stephen M. Papa:
Trusted Boot. 1327-1328 - Stephen M. Papa, William D. Casper:
Trusted Computing. 1328-1331 - Scott A. Rotondo:
Trusted Computing Group. 1331 - Scott A. Rotondo:
Trusted Computing Platform Alliance. 1332 - Thomas Morris:
Trusted Platform Module. 1332-1335 - Carlisle Adams:
Trusted Third Party. 1335 - David Challener:
TSS. 1336-1338 - David Naccache:
Twin Signatures. 1338 - Adi Shamir, Eran Tromer:
TWIRL. 1338-1339 - Bodo Möller:
2k-AryExponentiation. 1340-1341 - Marijke De Soete:
Two-Factor Authentication. 1341 - Two-Key Cryptosystem. 1342
- Christophe De Cannière:
TWOFISH. 1339-1340 - Catherine Meadows:
Type Checking and Security. 1342-1343 - Typing Dynamics. 1343
- Typing Patterns. 1343
U
- UMTS IC Card. 1345
- Srdjan Capkun:
Uncoordinated Direct Sequence Spread Spectrum. 1345-1346 - Srdjan Capkun:
Uncoordinated Frequency Hopping Spread Spectrum. 1346 - Gerrit Bleumer:
Undeniable Signatures. 1347-1348 - Universal Integrated Circuit Card. 1348
- Bart Preneel:
Universal One-Way Hash Functions (UOWHF). 1349-1350 - Gerrit Bleumer:
Unlinkability. 1350 - Brent ByungHoon Kang, Greg Sinclair:
Unpacking Malware. 1350-1351 - Gerrit Bleumer:
Untraceability. 1351-1352 - Carlisle Adams:
User Authentication. 1352 - Marijke De Soete:
User Verification Method. 1352
V
- Kar-Ann Toh, Andrew Beng Jin Teoh:
Vascular Patterns. 1353-1356 - Tanja Lange:
Vector Space. 1356 - Kazue Sako:
Verifiable Encryption. 1356-1357 - Berry Schoenmakers:
Verifiable Secret Sharing. 1357-1358 - Friedrich L. Bauer:
Vernam Cipher. 1359-1360 - Marc Vauclair:
Vicinity Card. 1360 - Friedrich L. Bauer:
Vigenère Encryption. 1360 - Bryan D. Payne:
Virtual Machine Introspection. 1360-1362 - Virtualization Security. 1362
- Virtualized Packer. 1362
- Virus Scanner. 1362
- G. R. Blakley, Gregory A. Kabatiansky:
Visual Secret Sharing Schemes. 1363-1364 - VM Protection. 1364
- Voice Biometrics. 1364
- Voice Recognition. 1364
- Voiceprint Recognition. 1364
- David Naccache:
von Neumann Correction. 1364 - VSSS. 1364
W
- Gerrit Bleumer:
Watermarking. 1365-1366 - Weak Collision Resistance. 1366
- Weak Exclusion. 1366
- Alex Biryukov:
Weak Keys. 1366-1367 - Collin Jackson:
Web 2.0 Security and Privacy. 1367-1368 - Alban Gabillon:
Web Access Control Strategies. 1368-1371 - Web Application Security. 1372
- V. N. Venkatakrishnan:
Web Browser Security and Privacy. 1372-1373 - Amit Klein:
Web Cache Poisoning Attacks. 1373 - Web Client Security and Privacy. 1373
- Web Initial Authentication. 1374
- Web Initial Sign on. 1374
- Web Penetration Test. 1374
- Web Security. 1374
- Dario V. Forte:
Web Security Auditing. 1374-1375 - Ernesto Damiani:
Web Service Security. 1375-1377 - Web Session Security. 1377
- Frédérique Biennier:
Web Single Sign On and SAML. 1377-1382 - Web SSO and Security Assertion Markup Language. 1382
- Web Vulnerability Assessment. 1383
- William Stallings:
Web-Based Security Protocols. 1383-1384 - Paulo S. L. M. Barreto, Vincent Rijmen:
Whirlpool. 1384-1385 - Brecht Wyseur:
White-Box Cryptography. 1386-1387 - Glenn Durfee:
Wiener, Boneh-Durfee, and May Attacks on the RSA Public Key Cryptosystem. 1387-1388 - Suman Banerjee, Vladimir Brik:
Wireless Device Fingerprinting. 1388-1390 - Wireless Locational Privacy. 1391
- Wiretapping. 1391
- Berry Schoenmakers:
Witness Hiding. 1391-1392 - Guohong Cao, Zhichao Zhu:
Worms in Cellular Networks. 1392-1393
X
- Danny De Cock:
X.509. 1395 - Claudio A. Ardagna:
XML-Based Access Control Languages. 1395-1399 - XSS. 1399
Z
- Berry Schoenmakers:
Zero-Knowledge. 1401-1403 - Sean W. Smith:
Zeroization. 1401 - Zeta Function Computation. 1403
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.