Index
3DES, see triple DES
3GPP
3rd Generation Partnership Project
see 3GPP
A3/A5/A
access control
and operating system
access control list, see ACL
access control matrix
ACK scan
ACL
Address Resolution Protocol, see ARP
Address Space Layout
Randomization, see ASLR
Adleman, Leonard
Adobe
eBooks
Advanced Encryption Standard, see
AES
AddRoundKey
block size
ByteSub
confusion and diffusion
key length
key schedule
MixColumn
number of rounds
ShiftRow
subkey
AFS Software, Inc.
AH
and Microsoft
Ali Baba’s Cave
Alice
Alice’s Restaurant
Almes, Guy
Amis, Kingsley
Anderson, Ross
anomaly detection
anonymity
anti-debugging
anti-disassembly
Apple II
application layer
Aristophanes
Aristotle
ARP
cache poisoning
ASLR
asymmetric cryptography
ATM
card
machine
attack tree
authentication
and TCP
two-factor
Authentication Header, see AH
authorization
availability
avalanche effect
Aycock, John, xviii
backdoor
Ballantyne, Sheila
Bell-LaPadula, see BLP
Biba’s model
low water mark policy
write access rule
Biham, Eli
biometric
attack
authentication
enrollment phase
equal error rate
error rate
errors
fingerprint
fraud rate
hand geometry
ideal
identification
insult rate
iris scan
recognition phase
birthday paradox, see birthday
problem
birthday problem
and hash functions
block cipher
bit errors
cut-and-paste attack
design
modes of operation
round function
Blowfish
S-box
BLP
simple security condition
star property
strong tranquility
system Z
weak tranquility
BMA, see British Medical Association
Bob
Bob’s ...