Index

# of SPIs field

# of transform

1xEV-DO

1xEV-DV

3DES

3DES-CBC mode

3GPP

3GPP2

 

A5/3

Abstract Syntax Notation One

acceptable policy identifier

acceptable policy set

access control

Access Control Router (ACR)

Access Gateway (AGW)

access denied

access location field

access method field

access service network (ASN)

ACK flag

Acknowledgement number

acquirer

ACR: Access Control Router

adaptive antenna system (AAS)

Adaptive Interference Management Techniques

Adaptive Modulation and Coding (AMC)

ADCCP

additive inverse

address mapping

address resolution

Address Resolution Protocol

AddRoundKey()

Advanced Data Communication Control

Advanced Encryption Standard

AES

AES algorithm

AES key expansion

AES S-box

aggressive exchange

AGW (Access Gateway)

AH

alarm

American National Standards Institute

AMPS (Advanced Mobile Phone System)

animation

Anomaly-based Systems

ANSI

ANSI X3.66

ANSI X9.30 CRL format

ANSI X9.30 standard

anticlogging

anticlogging token

antireplay service

anycast address

AP: Access Point

Apple-Talk Datagram-Delivery Protocol

application layer

application proxy

application/pgp-signature protocol

application-level gateway

application-level proxy

Armor checksum

Armor tail

ARP

ARP reply

ARP spoofing

ARPANET

AS

ASCII

ASCII Armor

Armor headers
Armor head line

ASCII character

ASCII-Armored data

ASN.1

ASN-Gateway (ASN-GW)

asymmetric key pairs

asynchronous modem link

Asynchronous Transfer Mode

AT: Access Terminal

ATM

ATM network

attenuation

attribute

Attribute certificate

audit

audit ...

Get Wireless Mobile Internet Security, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.