P
Packet encoding rules, 191
Packet filter, 52
dynamic, 52, 57 “58
static, 52, 54 “57
Packet-level blocking, 361 “63
Parallel dual- homed firewall, 71
Passive eavesdropping, 33, 168
Passive File Transfer Protocol, 58
Passport credentials, 221
Passport unique identifier, 219 “20, 224
Passport user profile, 220
Password security, 216, 227, 232 “33
Password sniffing, 3, 4, 8
Pay-after payment system, 254
Pay-now payment system, 254
Perfect forward secrecy , 141
Perl language, 301, 305 “6, 333
Personal certificate, 177, 204 “5
Personal digital assistant, 7
Pervasive security mechanism, 15
Photuris Key Management Protocol, 137
Platform for Internet content selection, 343, 366 “67, 370
Platform for privacy preferences project, 342 “43
Plug-in application, 273 “75, 284
Point of Presence 3 Protocol, 155
Point-to-Point Protocol, 118 “19, 123
Point-to-Point Protocol extension, 122
Point-to-Point Tunneling Protocol, 122 “24
Preferred encryption algorithm, 190
Preimage resistant hash function, 91 “92
Prepaid payment system, 254
Pretty Good Privacy, 270 “71
Pretty Good Privacy certificate, 188 “90
Privacy enhancing technology, 317, 343
Privacy protection, 317 “24, 341 “44
Private communication technology, 154
Private digital watermark, 354
Private key, 97, 105, 106, 202, 258, 322
Privilege attribute certificate, 240
Privilege attribute server, 240
Protocol data unit, 118, 123
Proxied Application Protocol, 179
Proxy auto-configuration , 78 “80, 243
Proxy-connection header, 24
Proxy server, 25, 39, 59, 68, 77, 179, 181 “82, 291, 293, 324, 330, 361, 363
Pseudorandom bit sequence, 107
Pseudorandom nonce, 140 “41
Public cache-control directive, 39
Public database mapping, 340
Public digital watermark, 354
Public key certificate, 34, 41, 100, 186
overview, 187 “88
Pretty Good Privacy, 188 “90
X.509, 190 “93
Public key cryptography
overview, 96 “100, 103
provable security, 89
types, 100 “3
Public key cryptography standard 1, 168 “69
Public key digital watermarking, 354 “55
Public key infrastructure, 167, 186 “87, 192, 196, 215, 261
Public key infrastructure authentication and authorization infrastructure, 241 “44
Public-Key Infrastructure Working Group, 185, 187, 193 “96
Public switched telephone network, 2, 118, 121
Push model, 244, 324, 364