T



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Target of evaluation (TOE)
Technical specifications (TS)
Threats 2nd
Ticket flags
Ticket-granting server (TGS)
Time complexity
Time series model
Time to Live (TTL)
Timestamps 2nd 3rd
Timing attacks 2nd
Timing modification
Traffic analysis 2nd
Traffic confidentiality
Traffic padding
Transfer encodings, MIME
Transform (T) payload 2nd
Transformations 2nd 3rd 4th
     AddRoundKey
     AES 2nd
     equivalent inverse ciphers
     forward 2nd 3rd 4th
     interchanging AddRoundKey and InvMixColumns
     inverse 2nd 3rd 4th
     MixColumns transformations 2nd 3rd
     nibble substitution
     S-AES
     S-box 2nd
     ShiftRows transformation 2nd 3rd
     substitute bytes (SubBytes) 2nd
Transparent key control 2nd
Transport adjacency 2nd
Transport layer functionality (TCP)
Transport Layer Protocol
Transport Layer Security (TLS)
     alert codes
     certificate_verify message
     cipher suites
     client certificate types
     finished messages
     message authentication code
     pseudorandom function (PRF)
     version number
Transport mode 2nd 3rd 4th 5th
     AH
     ESP 2nd
     IPSec overview of 2nd
Transport-tunnel bundle
Transposition techniques
Triple EDS
Trojan horses 2nd
True random number generator (TRNG) 2nd
Trust
     example of
     flags 2nd
     key legitimacy field
     owner field
     PGP use of
     signature field
Trusted systems
     concept of
     data access control
     defined
     Trojan horse defense
Tunnel mode 2nd 3rd 4th 5th
     AH
     ESP 2nd 3rd
     IPSec overview of




Cryptography and Network Security Principles and Practices
Cryptography and Network Security (4th Edition)
ISBN: 0131873164
EAN: 2147483647
Year: 2005
Pages: 209

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net