C
Caching, 26, 34, 39, 170, 182, 197, 324
Card verification code, 261
Card verification value, 261
Cashlike payment system, 254
CCTA risk analysis and management methodology, 378
Censorship, 359 “60
content blocking, 360 “65
content rating, 360, 365 “71
Certificate, 100, 175 “78, 185 “86
Certificate authority certificate, 201 “3
Certificate-based authentication, 41 “42
Certificate owner information field, 189
Certificate practice statement, 194
Certificate repository, 193, 195, 196 “97
Certificate request message, 164 “65, 194
Certificate revocation, 196 “201
Certificate revocation list, 194, 198 “99, 288
Certificate revocation system, 200
Certificate revocation tree, 200 “1
Certificate verify message, 166
Certification authority, 97, 100, 111, 164, 175 “78, 186, 192, 193, 242
Certification path (certification chain), 192
Challenge handshake authentication protocol, 123
Change Cipher Spec Protocol, 161, 163, 166, 167, 172
Chaum mixing network, 322 “23, 324, 330, 334
Checklike payment system, 254
Children s Online Privacy Protection Act, 229
Chosen ciphertext attack, 168 “69
Cipher block chaining, 94, 174
Circuit-level gateway, 58 “64, 77
Client hello message, 162 “63, 167
Client key exchange message, 165, 168 “69
Client-side security, 267 “71
Client software customization, 65
Code signing, 281 “83, 286 “88
Collision resistant hash function, 91
Common electronic purse specification, 257
Common gateway interface, 22, 299 “309
Common gateway interface directory, 305 “6
Common gateway interface script, 300 “1, 304 “9
Common Object Request Broker Architecture, 63, 179
Communication security, 15, 62
Component object model, 283
Compression control protocol, 123
Computational security, 88 “90
Computer emergency response team, 3
Computer emergency response team/ coordination center, 3
Computer oracle and password system, 380
Conditional Access for Europe, 257
Connection anonymity, 320 “21
Connectionless Network Protocol, 125
Content blocking, 360 “65
Content rating and self-determination, 360, 365 “71
Contents scramble system, 350
Cookie, 139, 223 “28, 324 “28
Cryptographic algorithm, 88
Cryptographic file system, 144
Cryptographic hash function, 91 “92
Cryptographic key protection, 105 “6
Cryptographic message syntax, 195
Cryptographic Protocol, 88
Cryptography, 87 “90, 111 “13
Cumulative trust model, 190