Index
# of SPIs field
# of transform
1xEV-DO
1xEV-DV
3DES
3DES-CBC mode
3GPP
3GPP2
A5/3
Abstract Syntax Notation One
acceptable policy identifier
acceptable policy set
access control
Access Control Router (ACR)
Access Gateway (AGW)
access denied
access location field
access method field
access service network (ASN)
ACK flag
Acknowledgement number
acquirer
ACR: Access Control Router
adaptive antenna system (AAS)
Adaptive Interference Management Techniques
Adaptive Modulation and Coding (AMC)
ADCCP
additive inverse
address mapping
address resolution
Address Resolution Protocol
AddRoundKey()
Advanced Data Communication Control
Advanced Encryption Standard
AES
AES algorithm
AES key expansion
AES S-box
aggressive exchange
AGW (Access Gateway)
AH
alarm
American National Standards Institute
AMPS (Advanced Mobile Phone System)
animation
Anomaly-based Systems
ANSI
ANSI X3.66
ANSI X9.30 CRL format
ANSI X9.30 standard
anticlogging
anticlogging token
antireplay service
anycast address
AP: Access Point
Apple-Talk Datagram-Delivery Protocol
application layer
application proxy
application/pgp-signature protocol
application-level gateway
application-level proxy
Armor checksum
Armor tail
ARP
ARP reply
ARP spoofing
ARPANET
AS
ASCII
ASCII Armor
ASCII character
ASCII-Armored data
ASN.1
ASN-Gateway (ASN-GW)
asymmetric key pairs
asynchronous modem link
Asynchronous Transfer Mode
AT: Access Terminal
ATM
ATM network
attenuation
attribute
Attribute certificate
audit
audit ...
Get Wireless Mobile Internet Security, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.