


default search action
Encyclopedia of Cryptography and Security 2011
- Henk C. A. van Tilborg, Sushil Jajodia:
Encyclopedia of Cryptography and Security, 2nd Ed. Springer 2011, ISBN 978-1-4419-5905-8
A
- Anne Canteaut:
A5/1. 1-2 - Gerald Brose:
Access Control. 2-7 - Hakki C. Cankaya:
Access Control from an OS Security Perspective. 7-9 - Hakki C. Cankaya:
Access Control Lists. 9-12 - Aaron Estes:
Access Control Matrix. 12-13 - Sabrina De Capitani di Vimercati:
Access Control Policies, Models, and Mechanisms. 13-14 - Access Control Rules. 14
- Access Limitation. 14
- Access Lists. 14
- Sabrina De Capitani di Vimercati:
Access Matrix. 14-17 - Davide Martinenghi:
Access Pattern. 17-20 - Access Rights. 20
- Yvo Desmedt:
Access Structure. 20 - ACM. 20
- Marijke De Soete:
Acquirer. 20 - Alex Biryukov:
Adaptive Chosen Ciphertext Attack. 21 - Alex Biryukov:
Adaptive Chosen Plaintext and Chosen Ciphertext Attack. 21 - Alex Biryukov:
Adaptive Chosen Plaintext Attack. 21 - Pierangela Samarati:
Administrative Policies. 21-23 - Alessandro Campi, Stefano Paraboschi:
Administrative Policies in SQL. 23 - Advanced Encryption Standard. 24
- Advanced Hash Competition. 24
- Kristen LeFevre, Bee-Chung Chen:
Adversarial/External Knowledge (Privacy in the Presence of). 24-26 - Adware. 26
- AES. 26
- Dan Boneh:
Aggregate Signatures. 27 - Bart Preneel:
AHS Competition/SHA-3. 27-29 - Friedrich L. Bauer:
Alberti Encryption. 29-31 - Claude Carlet:
Algebraic Immunity of Boolean Functions. 31-32 - Algebraic Number Field. 32
- Algorithmic Complexity Attacks. 32
- Scott A. Crosby, Dan S. Wallach:
Algorithmic DoS. 32-33 - Friedrich L. Bauer:
Alphabet. 33-34 - William Enck:
Android's Security Framework-Understanding the Security of Mobile Phone Platforms. 34-37 - Anomalous Binary Curves. 37
- Gerrit Bleumer:
Anonymity. 37-38 - Anonymity in Data Mining. 39
- Anonymous Communication. 39
- Yi Yang, Sencun Zhu:
Anonymous Routing. 39-40 - Stefan Köpsell:
Anonymous Web Browsing and Publishing. 40-42 - Anthropometric Authentication. 42
- Anthropometrics. 42
- Anthropometry. 42
- Anti-DoS Cookies. 42
- Anti-Jamming Strategy. 42
- Antispam Based on Sender Reputation. 42
- Antivirus. 42
- Mudhakar Srivatsa, Arun Iyengar:
Application-Level Denial of Service. 42-44 - Catherine Meadows:
Applications of Formal Methods to Intrusion Detection. 44-45 - V. N. Venkatakrishnan:
Applications of Formal Methods to Web Application Security. 45-46 - Applications of Rank-Metric Codes. 46
- Sebastiaan Indesteege:
ARIA. 47 - ARP Poison Routing (APR). 47
- ARP Poisoning. 47
- William Enck:
ARP Spoofing. 48-49 - Burt Kaliski:
Asymmetric Cryptosystem. 49-50 - Asynchronous Stream Cipher. 50
- Attack by Summation Over an Hypercube. 50
- Sean W. Smith:
Attestation. 50-51 - Marijke De Soete:
Attribute Certificate. 51-52 - J. Black:
Authenticated Encryption. 52-61 - Ebru Celikel Cankaya:
Authentication. 61-62 - Robert J. Zuccherato:
Authentication Token. 62-63 - Gregory A. Kabatiansky, Ben J. M. Smeets:
Authentication, From an Information Theoretic Perspective. 63-65 - Authorization. 65
- Sabrina De Capitani di Vimercati:
Authorizations. 65-68 - Tor Helleseth:
Autocorrelation. 68 - David Naccache:
Autotomic Signatures. 68 - Eric Cronin:
Availability. 68-69
B
- Bank Card. 71
- David Naccache:
Barrett's Algorithm. 71 - Barter. 71
- Base. 71
- Friedrich L. Bauer:
Beaufort Encryption. 71 - Ebru Celikel Cankaya:
Bell-LaPadula Confidentiality Model. 71-74 - David Elliott Bell:
Bell-La Padula Model. 74-79 - Burt Kaliski:
Berlekamp Q-matrix. 79 - Anne Canteaut:
Berlekamp-Massey Algorithm. 80 - Aaron Estes:
Biba Integrity Model. 81 - Biba Mandatory Integrity Policy. 81
- Jonathan K. Millen:
Biba Model. 81-82 - Big Number Multiplication. 82
- Big Number Squaring. 82
- Bilinear Pairings. 82
- Berk Sunar:
Binary Euclidean Algorithm. 83-84 - Bodo Möller:
Binary Exponentiation. 84-86 - Binary Functions. 86
- Binary GCD Algorithm. 86
- Binding Pattern. 86
- Burt Kaliski:
Binomial Distribution. 86 - Nary Subramanian:
Biometric Authentication. 86-90 - Biometric Cryptosystem. 90
- Ann Cavoukian, Alex Stoianov:
Biometric Encryption. 90-98 - Biometric Fusion. 98
- Biometric Identification in Video Surveillance. 98
- Biometric Information Ethics. 98
- Biometric Key Generation. 98
- Biometric Keys. 98
- B. V. K. Vijaya Kumar:
Biometric Matching. 98-101 - Biometric Passport Security. 101
- Biometric Performance Evaluation. 101
- Fabio Scotti
, Stelvio Cimato, Roberto Sassi:
Biometric Privacy. 101-104 - Biometric Recognition. 104
- Krzysztof Kryszczuk, Jonas Richiardi
:
Biometric Sample Quality. 104-110 - Achint Thomas, Venu Govindaraju:
Biometric Sensors. 110-113 - Alan D. Smith:
Biometric Social Responsibility. 113-117 - Jonas Richiardi
, Krzysztof Kryszczuk:
Biometric Systems Evaluation. 117-124 - Fernando L. Podio:
Biometric Technologies and Security - International Biometric Standards Development Activities. 124-130 - Biometric Testing. 130
- Evangelia Micheli-Tzanakou, Konstantinos N. Plataniotis:
Biometrics: Terms and Definitions. 142-147 - Martin Evison
:
Biometrics for Forensics. 130-134 - Elisabeth de Leeuw:
Biometrics for Identity Management and Fields of Application. 134-139 - Stan Z. Li:
Biometrics in Video Surveillance. 139-142 - BIOS Basic Input Output System. 147
- Arjen K. Lenstra:
Birthday Paradox. 147-148 - Black Box Algorithms. 148
- David Naccache:
Blackmailing Attacks. 148 - Gerrit Bleumer:
Blind Signature. 148-150 - Gerrit Bleumer:
Blinding Techniques. 150-152 - Lars R. Knudsen:
Block Ciphers. 152-157 - Christophe De Cannière:
Blowfish. 157-158 - BLP. 158
- BLP Model. 158
- Dan Boneh:
BLS Short Digital Signatures. 158-159 - Burt Kaliski:
Blum Integer. 159-160 - Dan Boneh:
Blum-Blum-Shub Pseudorandom Bit Generator. 160-161 - Dan Boneh:
Blum-Goldwasser Public Key Encryption System. 161-162 - Claude Carlet:
Boolean Functions. 162-165 - Alex Biryukov:
Boomerang Attack. 165-166 - Guofei Gu:
Botnet Detection in Enterprise Networks. 166-168 - Donggang Liu:
Broadcast Authentication from a Conditional Perspective. 168-170 - Yvo Desmedt, Goce Jakimoski:
Broadcast Authentication from an Information Theoretic Perspective. 170-171 - Dalit Naor:
Broadcast Encryption. 171-174 - Broadcast Stream Authentication. 174
- Browser Cookie. 174
- BSP Board Support Package. 174
- Angelos D. Keromytis:
Buffer Overflow Attacks. 174-177