2011

Encyclopedia of Cryptography and Security

Editors:

ISBN: 978-1-4419-5905-8 (Print) 978-1-4419-5906-5 (Online)

Table of contents (1,175 entries)

previous Page of 59
  1. Front Matter

    Pages i-xl

  2. A

    1. No Access

      Reference Work Entry

      Pages 1-2

      A5/1

    2. No Access

      Reference Work Entry

      Pages 2-7

      Access Control

    3. No Access

      Reference Work Entry

      Pages 7-9

      Access Control from an OS Security Perspective

    4. No Access

      Reference Work Entry

      Pages 9-12

      Access Control Lists

    5. No Access

      Reference Work Entry

      Pages 12-13

      Access Control Matrix

    6. No Access

      Reference Work Entry

      Pages 13-14

      Access Control Policies, Models, and Mechanisms

    7. No Access

      Reference Work Entry

      Pages 14-14

      Access Control Rules

    8. No Access

      Reference Work Entry

      Pages 14-14

      Access Limitation

    9. No Access

      Reference Work Entry

      Pages 14-14

      Access Lists

    10. No Access

      Reference Work Entry

      Pages 14-17

      Access Matrix

    11. No Access

      Reference Work Entry

      Pages 17-20

      Access Pattern

    12. No Access

      Reference Work Entry

      Pages 20-20

      Access Rights

    13. No Access

      Reference Work Entry

      Pages 20-20

      Access Structure

    14. No Access

      Reference Work Entry

      Pages 20-20

      ACM

    15. No Access

      Reference Work Entry

      Pages 20-20

      Acquirer

    16. No Access

      Reference Work Entry

      Pages 21-21

      Adaptive Chosen Ciphertext Attack

    17. No Access

      Reference Work Entry

      Pages 21-21

      Adaptive Chosen Plaintext and Chosen Ciphertext Attack

    18. No Access

      Reference Work Entry

      Pages 21-21

      Adaptive Chosen Plaintext Attack

    19. No Access

      Reference Work Entry

      Pages 21-23

      Administrative Policies

    20. No Access

      Reference Work Entry

      Pages 23-23

      Administrative Policies in SQL

previous Page of 59