packet, 16
packet filter, 136
packet filter gateway, 137
packet-filtering rule, 146
packet key, 239
packet switching, 12
packet-filtering-only firewall, 137
parallel dual-homed firewall, 184
passive attack, 55, 56
passive mode FTP, 149
passive wiretapping attack, 56
passphrase, 113
password guessing, 114
password, 113
Patent and Trademark Office, 103
peer entity authentication service, 73
personal digital assistant, 113
personal identification number, 113
PGP, 316, 319, 320
PGP certificate, 340
PGP-CCI, 293
PGP/MIME, 321
PGPdisk, 320
PGPi scanning project, 318, 320
PGPnet, 320
Photuris Key Management Protocol, 236
Photuris Plus, 237
PKINT, 306
point of presence, 208
Point-to-Point Protocol (PPP), 35, 205
Point-to-Point Protocol Extensions, 210
Point-to-Point Tunneling Protocol (PPTP), 210
Post Office Protocol (POP), 26, 50
PPTP Forum, 210
preimage resistant, 85
Pretty Good Privacy, Inc., 317
principal, 5, 297
principal identifier, 297
privacy, 380
Privacy and Security Research Group, 315
privacy enhancing technology, 58, 356
private communication technology, 253
private key, 91
privilege attribute certificate, 305
privilege attribute server, 305
privilege management infrastructure, 353
privileged ports, 47
process, 5
promiscuous mode, 57
proof by knowledge, 112, 113
proof by location, 112, 118
proof by possession, 112
proof by property, 112, 117
protocol, 6
protocol stack, 8
protocol suite, 8
proxy server, 138
pseudonym, 380
public key, 91, 341
public key certificate, 93, 338
public key cryptography, 90
public key cryptography standards, 323
public key infrastructure (PKI), 21, 95, 122, 337
public-switched telephone network (PSTN), 206
Public-Key Infrastructure X.509, 345
pull model, 121
push model, 121
Team-Fly |