D
Data confidentiality, 14, 62, 135, 156
Data encryption standard, 93 “95, 108, 135, 171, 339
Data integrity, 14, 15, 62, 98, 156
Data validation and certification server, 195
Data validation certificate, 195
Decentralized firewall, 53
Delta certificate revocation list, 199
Demilitarized zone, 73, 298, 310
Denial-of-service attack, 3, 4, 276
Deoxyribonucleic acid computer, 90 “91
Destination Internet protocol address, 54, 55
Destination port number, 55, 56
Differential fault analysis, 9
Differential power analysis, 9
Diffie-Hellman algorithm, 101 “2, 137, 139 “40, 165 “66, 173, 195, 332 “33
Digest access authentication, 34 “41, 45 “46, 387
Digital copyright labeling, 349, 351 “56
Digital Millennium Copyright Act, 356 “57
Digital shrink-wrap , 205 “6, 282
Digital signature, 15, 98 “99, 100, 101, 146, 188, 205 “6, 281 “82
legislation, 110 “11
Digital signature giving message recovery, 98 “99
Digital signature standard, 98, 102, 140, 173 “74
Digital signature with appendix, 99
Digital watermarking, 349, 351 “56
Directory information tree, 192
Disable routing/forwarding, 69
Distinguished encoding rules, 191
Distinguished name , 187, 191
Distributed computing environment, 145
Domain name system, 23, 27 “28, 63, 187, 363
Domain name system security, 144
Domain of interpretation, 138
Donnerhacke s ActiveX control, 286
Dual- homed firewall, 69 “71
Dynamic packet filtering, 52, 57 “58