N



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Name constraints
National Institute of Standards and Technology (NIST) 2nd 3rd 4th 5th
Network security 2nd 3rd 4th 5th 6th 7th 8th
     applications, types of
     authentication applications
     electronic mail
     Internet protocol (IP)
     Kerberos 2nd
     model for
     projects for teaching
     public-key infrastructure (PKI)
     Web
     X.509
New European Schemes for Signatures, Integrity, and Encryption (NESSIE)
Next Header 2nd
Nibble substitution
Nonce 2nd
Nonce (NONCE) payload 2nd
Nonlinear layer SB
Nonrepudiation
Notification (N) payload 2nd
Number theory
     Chinese remainder theorem (CRT)
     discrete logarithms
     distribution of primes
     Euler's theorem 2nd
     Euler's totient function
     Fermat's theorem
     Miller-Rabin algorithm
     primality, testing for
     prime numbers




Cryptography and Network Security Principles and Practices
Cryptography and Network Security (4th Edition)
ISBN: 0131873164
EAN: 2147483647
Year: 2005
Pages: 209

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net