L



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Karger, Paul
KDC (key distribution center)
Kennedy, Edward
Kerberos
     access to protected objects
     network controls
     networks
Kernel
Kernelized design
Key Online Banking
Keyless ciphers
Keyrings, e-mail
Keys (encryption)
     clustering
     definition
     distribution
     encryption
     escrow
     exchange
     length
     management
     private [See also AES (Advanced Encryption System); DES (Data Encryption Standard); Symmetric encryption.]
     proliferation
     public [See also Asymmetric encryption; RSA (Rivest-Shamir-Adelman) encryption.]
         characteristics
         definition
         flow diagram
         key proliferation
         purpose of
     RSA (Rivest-Shamir-Adelman) encryption
     transformation
Keystroke logging 2nd
Klein, Joe
Knapsack problem
Knapsacks
     and modular arithmetic
     as cryptographic algorithms
     decryption algorithm
     general
     hard
     MerkleHellman 2nd
     simple 2nd
     superincreasing 2nd
Kneed-to-know security policies
KSOS 2nd
KVM 2nd




Security in Computing
Security in Computing, 4th Edition
ISBN: 0132390779
EAN: 2147483647
Year: 2006
Pages: 171

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net