2005

Encyclopedia of Cryptography and Security

Editors:

ISBN: 978-0-387-23473-1 (Print) 978-0-387-23483-0 (Online)

Table of contents (463 entries)

previous Page of 24
  1. Front Matter

    Pages -

  2. A

    1. No Access

      Reference Work Entry

      Pages 1-2

      A5/1

    2. No Access

      Reference Work Entry

      Pages 2-2

      ABA digital signature guidelines

    3. No Access

      Reference Work Entry

      Pages 2-7

      Access Control

    4. No Access

      Reference Work Entry

      Pages 7-7

      Access structure

    5. No Access

      Reference Work Entry

      Pages 7-7

      Acquirer

    6. No Access

      Reference Work Entry

      Pages 7-7

      Adaptive Chosen Ciphertext Attack

    7. No Access

      Reference Work Entry

      Pages 7-8

      Adaptive Chosen Plaintext and Chosen Ciphertext Attack

    8. No Access

      Reference Work Entry

      Pages 8-8

      Adaptive Chosen Plaintext Attack

    9. No Access

      Reference Work Entry

      Pages 8-9

      Alberti encryption

    10. No Access

      Reference Work Entry

      Pages 9-10

      Alphabet

    11. No Access

      Reference Work Entry

      Pages 10-11

      Anonymity

    12. No Access

      Reference Work Entry

      Pages 11-11

      Asymmetric Cryptosystem

    13. No Access

      Reference Work Entry

      Pages 11-11

      Attribute certificate

    14. No Access

      Reference Work Entry

      Pages 11-11

      Attributes management

    15. No Access

      Reference Work Entry

      Pages 11-21

      Authenticated encryption

    16. No Access

      Reference Work Entry

      Pages 21-22

      Authentication

    17. No Access

      Reference Work Entry

      Pages 23-23

      Authentication token

    18. No Access

      Reference Work Entry

      Pages 23-27

      Authorization architecture

    19. No Access

      Reference Work Entry

      Pages 27-27

      Authorizations management

    20. No Access

      Reference Work Entry

      Pages 27-27

      Authorization Policy

previous Page of 24