本书汇聚了世界各地300多位著名密码学家和网络安全专家的成果结晶,系统、全面地介绍了密码学与网络安全等相关领域的专业术语1050条。本书以字母表为序将全部术语按照首字母进行归类,共计25个部分。每条术语分为同义词、相关概念、定义、背景、理论、应用、公开问题和未来方向以及推荐阅读等多个方面进行介绍,有利于读者对相关术语进行全面的理解和掌握。
样章试读
目录
- 目录
译者序
第二版前言
第一版前言
A 1
A5/1 1
访问控制(Access Control) 2
从一个OS安全角度的访问控制(Access Control from an OS Security Perspective) 7
访问控制列表(Access Control Lists) 9
访问控制矩阵(Access Control Matrix) 12
访问控制策略、模型和机制(Access Control Policies,Models,and Mechanisms) 13
访问控制规则(Access Control Rules) 14
访问限制(Access Limitation) 14
访问列表(Access Lists) 14
访问矩阵(Access Matrix) 14
访问模式(Access Pattern) 16
访问权限(Access Rights) 19
访问结构(Access Structure) 19
ACM 19
收单行(Acquirer) 19
适应性选择密文攻击(Adaptive Chosen Ciphertext Attack) 20
适应性选择明文和选择密文攻击(Adaptive Chosen Plaintext and Chosen Ciphertext Attack) 20
适应性选择明文攻击(Adaptive Chosen Plaintext Attack) 20
管理策略(Administrative Policies) 21
SQL中管理策略(Administrative Policies in SQL) 22
高级加密标准(Advanced Encryption Standard) 23
高级哈希竞赛(Advanced Hash Competition) 23
敌手的/外部知识(存在下的隐私)(Adversarial/External Knowledge(Privacy in the Presence of)) 23
广告插件(Adware) 26
AES 26
聚合签名(Aggregate Signature) 26
AHS竞赛/SHA-3(AHS Competition/SHA-3) 27
Alberti加密(Alberti Encryption) 29
布尔函数的代数免疫(Algebraic Immunity of Boolean Functions) 30
代数数域(Algebraic Number Field) 31
算法复杂性攻击(Algorithmic Complexity Attacks) 31
DoS算法(Algorithmic DoS) 32
字母表(Alphabet) 33
安卓安全框架——理解移动手机平台安全性(Android’s Security Framework-Understanding the Security of Mobile Phone Platforms) 34
异常二进制曲线(Anomalous Binary Curves) 37
匿名性(Anonymity) 37
数据挖掘中匿名性(Anonymity in Data Mining) 38
匿名通信(Anonymous Communication) 38
匿名路由(Anonymous Routing) 38
匿名Web浏览和发布(Anonymous Web Browsing and Publishing) 40
人体测量认证(Anthropometric Authentication) 41
人体测量学(Anthropometrics) 41
人体测量学(Anthropometry) 42
抗DoS Cookies(Anti-DoS Cookies) 42
抗干扰策略(Anti-Jamming Strategy) 42
基于发送者信誉的反垃圾邮件(Antispam Based on Sender Reputation) 42
反病毒程序(Antivirus) 42
应用层拒绝服务(Application-Level Denial of Service) 42
对入侵检测的形式化方法的应用(Applications of Formal Methods to Intrusion Detection) 44
对Web应用安全的形式化方法的应用(Applications of Formal Methods to Web Application Security) 45
秩度量码应用(Applications of Rank-Metric Codes) 47
ARIA 47
ARP毒性路由(APR)(ARP Poison Routing(APR)) 48
ARP毒化(ARP Poisoning) 48
ARP欺骗(ARP Spoofing) 48
非对称密码系统(Asymmetric Cryptosystem) 50
异步流密码(Asynchronous Stream Cipher) 50
超立方上的饱和攻击(Attack by Summation Over an Hypercube) 50
证明(Attestation) 51
属性证书(Attribute Certificate) 51
认证加密(Authenticated Encryption) 52
认证(Authentication) 62
认证令牌(Authentication Token) 64
认证,从信息论的角度(Authentication,From an Information Theoretic Perspective) 65
授权(Authorization) 66
授权书(Authorizations) 66
自相关(Autocorrelation) 69
自切签名(Autotomic Signatures) 69
可用性(Availability) 69
B 71
银行卡(Bank Card) 71
Barrett算法(Barrett’s Algorithm) 71
物物交换(Barter) 71
基(Base) 71
Beaufort加密(Beaufort Encryption) 71
Bell-LaPadula保密模型(Bell-LaPadula Confidentiality Model) 72
Bell-LaPadula模型(Bell-LaPadula Model) 74
Berlekamp Q-矩阵(Berlekamp Q-matrix) 78
Berlekamp-Massey算法(Berlekamp- Massey Algorithm) 79
Biba完整性模型(Biba Integrity Model) 80
Biba强制完整性策略(Biba Mandatory Integrity Policy) 81
Biba模型(Biba Model) 81
大数乘法(Big Number Multiplication) 82
大数平方(Big Number Squaring) 82
双线性对(Bilinear Pairings) 82
二进制欧几里得算法(Binary Euclidean Algorithm) 82
二进制求幂(Binary Exponentiation) 84
二元函数(Binary Functions) 86
二进制GCD算法(Binary GCD Algorithm) 86
绑定模式(Binding Pattern) 86
二项分布(Binomial Distribution) 86
生物特征身份验证(Biometric Authentication) 87
生物特征密码系统(Biometric Cryptosystem) 90
生物特征加密(Biometric Encryption) 90
生物特征融合(Biometric Fusion) 98
视频监控中的生物特征识别(Biometric Identification in Video Surveillance) 98
生物特征信息伦理(Biometric Information Ethics) 98
生物特征密钥生成(Biometric Key Generation) 98
生物特征密钥(Biometric Keys) 98
生物特征匹配(Biometric Matching) 98
生物特征护照安全(Biometric Passport Security) 101
生物特征性能评估(Biometric Performance Evaluation) 101
生物特征隐私(Biometric Privacy) 101
生物特征识别(Biometric Recognition) 104
生物特征样本质量(Biometric Sample Quality) 104
生物特征传感器(Biometric Sensors) 110
生物特征社会责任(Biometric Social Responsibility) 113
生物识别系统评估(Biometric Systems Evaluation) 116
生物特征技术与安全性——国际生物特征标准研发活动(Biometric Technologies and Security-International Biometric Standards Development Activities) 122
生物特征测试(Biometric Testing) 127
生物特征取证(Biometrics for Forensics) 128
用于身份管理和应用领域的生物特征(Biometrics for Identity Management and Fields of Application) 131
视频监控中的生物识别技术(Biometrics in Video Surveillance) 135
生物识别技术:术语和定义(Biometrics:Terms and Definitions) 138
BIOS基本输入输出系统(BIOS Basic Input Output System) 142
生日悖论(Birthday Paradox) 143
黑盒算法(Black Box Algorithms) 143
勒索攻击(Blackmailing Attacks) 143
盲签名(Blind Signature) 144
致盲技术(Blinding Techniques) 146
分组密码(Block Ciphers) 147
Blowfish 153
BLP 154
BLP模型(BLP Model) 154
BLS短数字签名(BLS Short Digital Signatures) 154
Blum整数(Blum Integer) 155
Blum-Blum-Shub伪随机比特发生器(Blum-Blum-Shub Pseudorandom Bit Generator) 156
Blum-Goldwasser公钥加密系统(Blum-Goldwasser Public Key Encryption System) 157
布尔函数(Boolean Functions) 158
Boomerang攻击(Boomerang Attack) 161
企业网络中的僵尸网络检测(Botnet Detection in Enterprise Networks) 162
从条件角度来看广播认证(Broadcast Authentication from a Conditional Perspective) 164
从信息论角度来看广播认证(Broadcast Authentication from an Information Theoretic Perspective) 166
广播加密(Broadcast Encryption) 167
广播流认证(Broadcast Stream Authentication) 171
浏览器Cookie(Browser Cookie) 171
BSP板支持包(BSP Board Support Package) 171
缓冲区溢出攻击(Buffer Overflow Attacks) 171
缓冲区越界(Buffer Overrun) 174
字节码验证(Bytecode Verification) 174
C 176
C2-分组密码(C2-Block Cipher) 176
凯撒密码(Caesar Cipher) 177
Camellia 177
级联撤销(Cascade Revoke) 178
Cast 179
Cayley哈希函数(Cayley Hash Functions) 180
CBC-MAC和变体(CBC-MAC and Variants) 181
CCIT2-编码(CCIT2-Code) 185
CDH 185
蜂窝网络安全(Cellular Network Security) 185
证书(Certificate) 185
证书管理(Certificate Management) 186
素性证书(Certificate of Primality) 187
证书撤销(Certificate Revocation) 187
基于证书的访问控制(Certificate-Based Access Control) 189
无证书密码学(Certificateless Cryptography) 189
证书颁发机构(Certification Authority) 190
认证邮件(Certified Mail) 192
选种和筛选系统(Chaffing and Winnowing) 193
挑战-应答认证(Challenge-Response Authentication) 194
挑战-应答识别(Challenge-Response Identification) 195
挑战-应答协议(Challenge-Response Protocol) 196
Chaum盲签名方案(Chaum Blind Signature Scheme) 196
化学组合攻击(Chemical Combinatorial Attack) 197
中国剩余定理(Chinese Remainder Theorem) 198
中国墙(Chinese Wall) 199
中国墙模型(Chinese Wall Model) 200
芯片卡(Chip Card) 202
选择密文攻击(Chosen Ciphertext Attack) 202
选择明文和选择密文攻击(Chosen Plaintext and Chosen Ciphertext Attack) 202
选择明文攻击(Chosen Plaintext Attack) 202
选择前缀攻击(Chosen Prefix Attack) 203
染色体(Chromosome) 203
根目录约束(Chroot Jail) 203
根目录限制(Chroot Prison) 204
唯密文攻击(Ciphertext-Only Attack) 204
Clark-Wilson模型(Clark and Wilson Model) 204
经典密码系统(Classical Cryptosystem) 206
无爪(Claw-Free) 206
CLEFIA 206
客户端难题(Client Puzzles) 207
钟控生成器(Clock-Controlled Generator) 208
最近向量问题(Closet Vector Problem) 209
云计算(Cloud Computing) 211
CMAC 211
CMVP-密码模块验证体系(CMVP-Cryptographic Module Validation Program) 212
代码验证(Code Verification) 212
基于编码的密码学(Code-Based Cryptography) 212
代码本攻击(Codebook Attack) 213
冷启动攻击(Cold-Boot Attacks) 214
协同DoS防御(Collaborative DoS Defenses) 215
碰撞攻击(Collision Attack) 217
抗碰撞(Collision Resistance) 219
组合生成器(Combination Generator) 220
商用现货(Commercial Off-the-Shelf) 221
商业安全模型(Commercial Security Model) 222
承诺(Commitment) 222
通用标准(Common Criteria) 224
从安全策略角度的通用标准(Common Criteria,From a Security Policies Perspective) 226
通信信道匿名(Communication Channel Anonymity) 229
复杂性理论(Complexity Theory) 229
复合性测试(Compositeness Test) 229
泄漏发射(Compromising Emanations) 229
计算复杂性(Computational Complexity) 232
计算性Diffie-Hellman问题(Computational Diffie-Hellman Problem) 237
计算谜题(Computational Puzzles) 240
计算可靠的证明系统(Computational Sound Proof System) 242
安全数据库概念设计(Conceptual Design of Secure Database) 242
概念建模(Conceptual Modeling) 245
会议密钥协商(Conference Key Agreement) 245
会议密钥(Conference Keying) 245
保密模型(Confidentiality Model) 245
证实签名(Confirmer Signatures) 245
安全策略的一致性验证(Consistency Verification of Security Policy) 245
非接触式卡(Contactless Cards) 245
基于内容和基于视图的访问控制(Content-Based and View-Based Access Control) 246
合同签署(Contract Signing) 249
控制向量(Control Vector) 250
传统密码系统(Conventional Cryptosystem) 251
Cookie 251
互素(Coprime) 253
复制保护(Copy Protection) 253
修改分组攻击(Correcting-Block Attack) 256
流密码相关攻击(Correlation Attack for Stream Ciphers) 257
相关免疫和弹性布尔函数(Correlation Immune and Resilient Boolean Functions) 259
伪元组(Cover Story) 261
隐蔽信道(Covert Channels) 262
电子认证业务规则(CPS,Certificate Practice Statement) 263
CPU消耗(CPU Consumption) 264
CPU拒绝服务(CPU Denial of Service) 265
CPU饥饿(CPU Starvation) 266
Cramer-Shoup公钥系统(Cramer-Shoup Public-Key System) 266
凭证验证(Credential Verification) 268
基于凭证的访问控制(Credential-Based Access Control) 268
凭证(Credentials) 269
跨站脚本攻击(Cross Site Scripting Attacks) 273
互相关(Cross-Correlation) 274
CRT 275
密码分析(Cryptanalysis) 275
密码机(Crypto Machines) 277
密码算法评估(Cryptographic Algorithm Evaluation) 279
密码协议(Cryptographic Protocol) 279
密码协议验证(Cryptographic Protocol Verification) 279
密码谜题(Cryptographic Puzzles) 279
可重构设备上的密码学(Cryptography on Reconfigurable Devices) 279
密码学(Cryptology) 279
密码泄漏(Cryptophthora) 280
密码系统(Cryptosystem) 281
日本密码算法评估计划(Japanese Cryptographic Algorithm Evaluation Project(CRYPTREC)) 281
立方攻击(Cube Attack) 284
分割选择协议(Cut-and-Choose Protocol) 286
循环码(Cyclic Codes) 286
D 291
DAC 291
数据加密标准(DES)(Data Encryption Standard(DES)) 291
数据链接(Data Linkage) 297
数据挖掘(隐私)(Data Mining(Privacy in)) 299
数据残留(Data Remanence) 302
数据库加密(Database Encryption) 303
Davies-Meyer哈希函数(Davies-Meyer) 308
DC网络(DC Network) 309
DDH问题(DDH Problem) 311
De Bruijn序列(De Bruijn Sequence) 311
分布式信任管理(Decentralized Trust Management) 313
判定性Diffie-Hellman问题(Decisional Diffie-Hellman Problem) 313
译码算法(Decoding Algorithms) 316
解密指数(Decryption Exponent) 319
可否认加密(Deniable Encryption) 319
拒绝服务(DoS)(Denial of Service(DoS)) 320
拒绝服务检测(Denial-of-Service Detection) 320
去混淆恶意软件(Deobfuscating Malware) 325
派生密钥(Derived Key) 325
指定证实者签名(Designated Confirmer Signature) 325
指定验证者证明(Designated-Verifier Proofs) 327
去扭曲(De-Skewing) 328
DES-X(或DESX)(DES-X(or DESX)) 328
DH密钥协商(DH Key Agreement) 329
DHP 329
字典攻击(Dictionary Attack) 329
字典攻击(Ⅰ)(Dictionary Attack(Ⅰ)) 329
差分密码分析(Differential Cryptanalysis) 330
差分能量分析(Differential Power Analysis) 333
差分隐私(Differential Privacy) 335
差分-线性攻击(Differential-Linear Attack) 337
Diffie-Hellman密钥协商(Diffie-Hellman Key Agreement) 338
Diffie-Hellman密钥交换(Diffie-Hellman Key Exchange) 339
Diffie-Hellman问题(Diffie-Hellman Problem) 339
摘要认证(Digest Authentication) 339
数字证书(Digital Certificate) 339
基于McEliece的数字签名方案(Digital Signature Scheme Based on McEliece) 339
数字签名方案(Digital Signature Schemes) 341
源自编码的数字签名方案(Digital Signature Schemes from Codes) 342
数字签名标准(Digital Signature Standard) 344
数字隐写术(Digital Steganography) 345
离散对数问题(Discrete Logarithm Problem) 349
自主访问控制(Discretionary Access Control) 351
自主访问控制策略(Discretionary Access Control Policies(DAC)) 354
区分攻击(Distinguishing Attacks) 356
DLP 357
DNA 357
基于DNS的僵尸网络检测(DNS-Based Botnet Detection) 360
DoS回推协议(DoS Pushback) 361
DPA 363
动态分析(Dynamic Analysis) 363
动态恶意软件分析(Dynamic Malware Analysis) 365
动态程序分析(Dynamic Program Analysis) 366
动态信任根(Dynamic Root of Trust) 366
动态职责分离(Dynamic Separation of Duties) 367
E 368
E0 368
电子政务(e-Government) 369
耳朵形状生物识别(Ear Shape for Biometric Identification) 369
窃听(Eavesdropping) 375
ECC 376
ECC挑战(ECC Challenges) 376
ECM 377
ECPP 377
ECRYPT流密码计划(ECRYPT Stream Cipher Project) 377
Edwards坐标(Edwards Coordinates) 377
Edwards曲线(Edwards Curves) 377
超椭圆曲线密码系统效率(Efficiency of Hyperelliptic Curve Cryptosystems) 379
电磁攻击(Electromagnetic Attack) 379
电磁指纹(Electro-Magnetic Fingerprinting) 383
电子现金(Electronic Cash) 383
电子支票(Electronic Check) 384
电子支票(Electronic Cheque) 384
电子支付(Electronic Payment) 385
电子邮资(Electronic Postage) 386
电子钱夹(Electronic Purse) 388
电子投票方案(Electronic Voting Schemes) 388
电子钱包(Electronic Wallet) 390
ElGamal数字签名方案(ElGamal Digital Signature Scheme) 392
ElGamal加密(ElGamal Encryption) 393
ElGamal公钥加密(ElGamal Public Key Encryption) 393
椭圆曲线密码学(Elliptic Curve Cryptography) 394
椭圆曲线离散对数问题(Elliptic Curve Discrete Logarithm Problem) 395
椭圆曲线密钥协商方案(Elliptic Curve Key Agreement Schemes) 398
椭圆曲线密钥(Elliptic Curve Keys) 398
用于分解的椭圆曲线方法(Elliptic Curve Method for Factoring) 399
使用折半的椭圆曲线点乘(Elliptic Curves Point Multiplication Using Halving) 401
椭圆曲线公钥加密方案(Elliptic Curve Public-Key Encryption Schemes) 404
椭圆曲线签名方案(Elliptic Curve Signature Schemes) 405
椭圆曲线迹计算(Elliptic Curve Trace Computation) 406
椭圆曲线(Elliptic Curves) 406
椭圆曲线素性证明(Elliptic Curves for Primality Proving) 409
EMV 411
加密(Encryption) 414
加密指数(Encryption Exponent) 414
恩尼格玛(Enigma) 414
实体认证(Entity Authentication) 418
实体认证协议(Entity Authentication Protocol) 419
实体解析(Entity Resolution) 419
熵源(Entropy Sources) 419
环境攻击(Environmental Attacks) 421
电子护照安全(ePassport Security) 421
差分隐私(Differential Privacy) 421
不可区分(Indistinguishability) 421
隐私(Privacy) 422
纠错循环码(Error-Correcting Cyclic Codes) 424
纠错译码(Error-Correction Decoding) 424
托管服务(Escrow Service) 424
eSTREAM 424
欧几里得算法(Euclid’s Algorithm) 425
欧几里得算法(Euclidean Algorithm) 425
欧几里得格(Euclidean Lattice) 428
欧拉函数(Euler’s Totient Function) 428
几乎处处第二原像安全抵抗的哈希函数(Everywhere Second Preimage Resistant Hash
Function(esec)) 428
穷举密钥搜索(Exhaustive Key Search) 429
存在性伪造(Existential Forgery) 432
指数密钥交换(Exponential Key Exchange) 432
指数时间(Exponential Time) 432
指数算法(Exponentiation Algorithms) 433
欧几里得扩展算法(Extended Euclidean Algorithm) 434
扩域(Extension Field) 434
F 436
静态图像和视频的人脸识别(Face Recognition from Still Images and Video) 436
分解基(Factor Base) 442
因式分解电路(Factorization Circuits) 443
失败-停止签名(Fail-Stop Signature) 444
公平交换(Fair Exchange) 446
虚假数据过滤(False Data Filtering) 447
虚假数据注入防御(False Data Injection Defense) 447
快速相关攻击(Fast Correlation Attack) 449
故障攻击(Fault Attack) 451
FEAL 452
Feige-Fiat-Shamir签名方案(Feige-Fiat-Shamir Signature Scheme) 453
Feistel密码(Feistel Cipher) 454
费马素性测试(Fermat Primality Test) 454
费马测试(Fermat Test) 455
费马小定理(Fermat’s Little Theorem) 455
Fiat-Shamir识别协议和Feige-Fiat-Shamir签名方案(Fiat-Shamir Identification Protocol and the Feige-Fiat-Shamir Signature Scheme) 456
域(Field) 457
文件系统权限(File System Permissions) 457
滤波生成器(Filter Generator) 457
指纹(Fingerprint) 459
指纹认证(Fingerprint Authentication) 464
指纹图谱(Fingerprinting) 464
有限域(Finite Field) 467
FIPS 140-2 467
防火墙(Firewall) 470
防火墙策略分析(Firewall Policy Analysis) 473
防火墙(Firewalls) 473
固定窗口求幂(Fixed Window Exponentiation) 480
固定基求幂(Fixed-Base Exponentiation) 481
固定指数求幂(Fixed-Exponent Exponentiation) 483
柔性授权框架(Flexible Authorization Framework(FAF)) 484
流阻断(Flow Blocking) 486
伪造重置(Forged Resets) 486
伪造(Forgery) 487
密码协议的形式化分析(Formal Analysis of Cryptographic Protocols) 488
安全APIs的形式化分析(Formal Analysis of Security APIs) 490
形式化方法(Formal Methods) 491
形式化方法和访问控制(Formal Methods and Access Control) 491
橙皮书的形式化方法(Formal Methods for the Orange Book) 493
认证和评估中的形式化方法(Formal Methods in Certification and Evaluation) 495
前向安全(Forward Secrecy) 497
FPGA现场可编程门阵列(FPGA Field Programmable Gate Array) 497
密码学中的FPGA(FPGAs in Cryptography) 497
函数域筛法(Function Field Sieve) 499
G 501
步态识别(Gait Recognition) 501
伽罗瓦计数器模式(Galois Counter Mode) 504
伽罗瓦消息认证码(Galois Message Authentication Code) 506
间隔(Gap) 506
GCD 506
GCM 507
基因(Gene) 507
广义梅森素数(Generalized Mersenne Prime) 507
生成元(Generator) 508
对离散对数问题的泛型攻击(Generic Attacks Against DLP) 508
一般模型(Generic Model) 510
遗传密码(Genetic Code) 511
几何数论(Geometry of Numbers) 511
GMAC 511
GMR签名(GMR Signature) 512
Goldwasser-Micali加密方案(Goldwasser-Micali Encryption Scheme) 514
Golomb的随机性假定(Golomb’s Randomness Postulates) 514
GOST 515
授予选择权(Grant Option) 516
最大公约数(Greatest Common Divisor) 516
最大公因子(Greatest Common Factor) 517
Grobner基(Grobner Basis) 517
群(Group) 517
组密钥协商(Group Key Agreement) 518
组密钥分发(Group Key Distribution) 524
组密钥交换(Group Key Exchange) 524
群签名(Group Signatures) 524
H 527
掌形识别(Hand Geometry Recognition) 527
掌形验证(Hand Geometry Verification) 529
笔迹分析(Handwriting Analysis) 529
硬核比特(Hard-Core Bit) 532
硬件安全模块(Hardware Security Module) 533
哈希敏捷(Hash Agility) 535
基于哈希的签名(Hash-Based Signatures) 537
哈希链(Hash Chain) 540
哈希函数(Hash Functions) 541
基于哈希的消息认证码(Hash-Based Message Authentication Code) 552
标头注入(Header Injections) 552
基于标头的攻击(Header-Based Attacks) 552
首字母缩写HEC经常用于表达超椭圆曲线(HEC Acronym is Often Used for Hyper Elliptic Curves) 554
遗传(Heredity) 554
高保证评估方法(High Assurance Evaluation Methods) 554
高阶导数攻击(Higher Order Derivative Attack) 554
Hippocratic数据库(Hippocratic Database) 554
基于历史的责任分离(History-Based Separation of Duties) 557
HMAC 557
同态加密(Homomorphic Encryption) 559
同态(Homomorphism) 560
HRU 561
HTTP认证(HTTP Authentication) 562
HTTP基本认证(HTTP Basic Authentication) 563
HTTP Cookie 563
HTTP摘要访问认证方案(HTTP Digest Access Authentication Scheme) 563
HTTP摘要认证(HTTP Digest Authentication) 564
HTTP会话安全(HTTP Session Security) 566
TLS之上的HTTPS和HTTP(HTTPS,HTTP over TLS) 567
人耳生物识别(Human Ear Biometrics) 568
人耳识别(Human Ear Identification) 568
人耳识别(Human Ear Recognition) 568
人耳验证(Human Ear Verification) 568
混合加密(Hybrid Encryption) 569
超椭圆曲线离散对数问题(Hyperelliptic Curve Discrete Logarithm Problem(HECDLP)) 572
超椭圆曲线安全(Hyperelliptic Curve Security) 572
超椭圆曲线(Hyperelliptic Curves) 575
超椭圆曲线性能(Hyperelliptic Curves Performance) 578
I 581
IBE 581
IC集成电路(IC Integrated Circuit) 581
Iceman攻击(Iceman Attack) 581
IC-集成电路(IC-Integrated Circuit) 581
基于ID加密(ID-Based Encryption) 581
IDEA 581
识别(Identification) 583
身份认证(Identity Authentication) 584
身份管理(Identity Management) 584
身份证明(Identity Proof) 586
身份验证协议(Identity Verification Protocol) 586
基于身份的密码系统(Identity-Based Cryptosystems) 587
基于身份加密(Identity-Based Encryption) 593
伪装攻击(Impersonation Attack) 595
隐式密钥认证(Implicit Key Authentication) 595
不可能差分攻击(Impossible Differential Attack) 595
指数积分方法(Index Calculus Method) 596
加密的不可区分性(Indistinguishability of Encryptions) 599
推理控制(Inference Control) 599
信息保障(Information Assurance) 604
信息流和不干扰(Information Flow and Noninterference) 604
信息流安全(Information Flow Security) 606
信息完整性(Information Integrity) 606
信息安全管理系统(Information Security Management System) 606
信息理论模型(Information Theoretic Model) 606
信息论(Information Theory) 606
内部人威胁防御(Insider Threat Defense) 607
整数分解(Integer Factoring) 610
集成电路(Integrated Circuit) 616
集成电路卡(Integrated Circuit Card) 617
完整性模型(Integrity Model) 617
知识产权(Intellectual Property) 617
交互式论证(Interactive Argument) 617
交互式证明(Interactive Proof) 617
交互式证明系统(Interactive Proof Systems) 618
交互定理证明和安全(Interactive Theorem Proving and Security) 618
侦听(Interception) 618
插值攻击(Interpolation Attack) 618
ad hoc网络中的入侵检测(Intrusion Detection in ad hoc Networks) 619
入侵式攻击(Invasive Attacks) 622
逆推攻击(Inversion Attack) 627
有限域和环中求逆(Inversion in Finite Fields and Rings) 628
伽罗瓦域中求逆(Inversion in Galois Fields) 630
IP反向追踪(IP Traceback) 630
IPES 632
IPsec 632
IPSec策略分析(IPSec Policy Analysis) 636
虹膜(Iris) 636
不可约多项式(Irreducible Polynomial) 643
ISMS:信息安全管理架构(ISMS:A Management Framwork for Information Security) 643
ISO 15408 CC-通用标准(ISO 15408 CC-Common Criteria) 645
ISO 19790 2006密码模块安全需求(ISO 19790 2006 Security Requirements for Cryptographic Modules) 645
ISO/IEC 15408 645
ISO/IEC 27001 645
ISO-9796签名标准(ISO-9796 Signature Standards) 645
颁发者(Issuer) 647
Itoh-Tsujii求逆算法(Itoh-Tsujii Inversion Algorithm) 647
J 651
雅可比符号(Jacobi Symbol) 651
干扰攻击防御(Jamming Attack Defense) 651
抗干扰能力(Jamming Resistance) 656
K 658
k-匿名(k-Anonymity) 658
Karatsuba算法(Karatsuba Algorithm) 661
Kasumi/Misty1 664
Keeloq 665
Kerberos 667
Kerberos认证协议(Kerberos Authentication Protocol) 669
Kerckhoffs原则(Kerckhoffs’ Law) 669
Kerckhoffs原则(Kerckhoffs’ Principle) 669
密钥(Key) 670
密钥协商(Key Agreement) 672
密钥认证(Key Authentication) 673
密钥加密密钥(Key Encryption Key) 674
密钥托管(Key Escrow) 675
使用无线通信物理性质的密钥生成(Key Generation Using Physical Properties of Wireless Communication) 676
密钥生命周期管理(Key Life Cycle Management) 677
密钥管理(Key Management) 677
密钥恢复(Key Recovery) 682
密钥变异(Key Variation) 682
键盘动力学(Keyboard Dynamics) 682
键盘记录(Keylogging) 684
密钥流(Keystream) 685
击键动力学(Keystroke Dynamics) 685
击键记录(Keystroke Logging) 688
基于关键词的加密数据检索(Keyword-Based Retrieval over Encrypted Data) 689
背包密码方案(Knapsack Cryptographic Schemes) 689
已知明文攻击(Known Plaintext Attack) 698
Koblitz椭圆曲线(Koblitz Elliptic Curves) 698
L 700
l-多样性(l-Diversity) 700
L符号(L Notation) 702
Lamport一次签名(Lamport One-Time Signatures) 703
最新加载技术(Late Launch) 703
格(Lattice) 703
格基规约(Lattice Basis Reduction) 704
格规约(Lattice Reduction) 704
基于格的密码学(Lattice-Based Cryptography) 707
LCM 709
最小公倍数(Least Common Multiple) 709
最小特权(Least Privilege) 709
勒让德符号(Legendre Symbol) 709
信任度(Levels of Trust) 710
LFSR 713
线性复杂性(Linear Complexity) 713
线性同余生成器(Linear Congruential Generator) 714
线性一致性攻击(Linear Consistency Attack) 715
对分组密码的线性密码分析(Linear Cryptanalysis for Block Ciphers) 715
对流密码的线性密码分析(Linear Cryptanalysis for Stream Ciphers) 719
线性反馈移位寄存器(Linear Feedback Shift Register) 720
线性复合攻击(Linear Syndrome Attack) 722
列表译码(List Decoding) 723
位置信息(隐私)(Location Information(Privacy of)) 723
位置隐私(Location Privacy) 725
无线网络中位置隐私(Location Privacy in Wireless Networks) 725
逻辑炸弹(Logic Bomb) 727
基于逻辑的授权语言(Logic-Based Authorization Languages) 728
普通书写(Longhand) 730
Luby-Rackoff密码(Luby-Rackoff Ciphers) 730
M 732
m-序列(m-Sequence) 732
M-不变性(M-Invariance) 732
MAA 734
MAC算法(MAC Algorithms) 735
机器可读的旅行文件安全(Machine Readable Travel Document Security) 741
宏数据披露限制(Macrodata Disclosure Limitation) 741
宏数据披露保护(Macrodata Disclosure Protection) 741
宏数据保护(Macrodata Protection) 741
管理工具的恶意修改设置(Maliciously Modified Set of Administrative Tools) 743
恶意软件(Malware) 743
恶意软件行为聚类(Malware Behavior Clustering) 743
恶意软件检测(Malware Detection) 745
强制访问控制(Mandatory Access Control) 748
强制访问控制策略(Mandatory Access Control Policy(MAC)) 751
中间人攻击(Man-in-the-Middle Attack) 751
MARS 752
MASH哈希函数(模运算安全的哈希)(MASH Hash Functions(Modular Arithmetic Secure Hash)) 753
主密钥(Master Key) 754
Maurer算法(Maurer’s Algorithm) 755
Maurer方法(Maurer’s Method) 755
最大长度序列(Maximal-Length Sequences) 755
箴言(Maxims) 759
McEliece公钥密码系统(McEliece Public Key Cryptosystem) 759
MD4哈希函数(MD4 Hash Function) 761
MD4-MD5 761
MD5哈希函数(MD5 Hash Function) 764
MDC-2和MDC-4(MDC-2 and MDC-4) 764
软件安全性测量模型(Measurement Models of Software Security) 766
中间相遇攻击(Meet-in-the-Middle Attack) 766
内存和状态耗尽拒绝服务(Memory and State Exhaustion Denial of Service) 766
内存和状态耗尽DoS(Memory and State Exhaustion DoS) 768
内存溢出(Memory Overflow) 768
Merkle哈希树签名(Merkle-Hash-Trees Signatures) 768
梅森素数(Mersenne Prime) 768
消息认证算法(Message Authentication Algorithm) 769
软件安全度量(Metrics of Software Security) 769
微数据匿名化技术(Microdata Anonymization Techniques) 771
微数据披露限制(Microdata Disclosure Limitation) 771
微数据披露保护(Microdata Disclosure Protection) 771
微数据遮蔽技术(Microdata Masking Techniques) 772
微数据保护(Microdata Protection) 774
微数据统计披露控制(Microdata Statistical Disclosure Control) 776
Miller-Rabin概率素性测试(Miller-Rabin Probabilistic Primality Test) 776
Miller-Rabin测试(Miller-Rabin Test) 777
MILS 777
极小多项式(Minimal Polynomial) 777
最小权限(Minimal Privilege) 778
MIPS年(MIPS-Year) 778
中间相错攻击(Miss-in-the-Middle Attack) 779
Mix网络(Mix Networks) 779
ML序列(ML-Sequence) 781
移动支付(Mobile Payments) 781
移动钱包(Mobile Wallet) 782
分组密码的操作模式(Modes of Operation of a Block Cipher) 782
模运算(Modular Arithmetic) 787
模根(Modular Root) 791
模数(Modulus) 791
监听(Monitoring) 791
单调签名(Monotone Signatures) 791
蒙哥马利算法(Montgomery Arithmetic) 792
摩尔定律(Moore’s Law) 795
MPKC 796
MQ或多变量二次公钥密码系统(MQ or Multivariate Quadratic Public-Key Cryptosystem(MQPKC)) 796
多生物特征识别(Multibiometrics) 796
多播认证(Multicast Authentication) 800
多播流认证(Multicast Stream Authentication) 800
多维数据库(Multidimensional Databases) 800
多重求幂(Multi-Exponentiation) 800
多因素认证(Multifactor Authentication) 800
多级数据库(Multilevel Database) 801
多级安全策略(Multilevel Security Policies) 803
多方计算(Multiparty Computation) 804
多方计算(Multiparty Computation(MPC)) 807
多重加密(Multiple Encryption) 807
多重独立安全等级(Multiple Independent Levels of Security) 807
乘法背包密码系统(Multiplicative Knapsack Cryptosystem) 809
多精度乘法(Multiprecision Multiplication) 810
多精度平方(Multiprecision Squaring) 813
多重集攻击(Multiset Attack) 814
加密和密码分析的多线程实现(Multi-Threaded Implementation for Cryptography and Cryptanalysis) 814
多变量密码学(Multivariate Cryptography) 816
N 821
Naccache-Stern高次剩余密码系统(Naccache-Stern Higher Residues Cryptosystem) 821
近场通信(Near Field Communication) 821
最近向量问题(Nearest Vector Problem) 821
Needham-Schroeder协议(Needham-Schroeder Protocols) 821
NESSIE计划(NESSIE Project) 823
网络带宽拒绝服务(Network Bandwidth Denial of Service(DoS)) 828
网络能力(Network Capabilities) 830
网络拒绝服务(Network DoS) 832
网络泛洪攻击(Network Flooding Attack) 832
NFC 832
NFS 834
Niederreiter加密方案(Niederreiter Encryption Scheme) 834
NIST椭圆曲线(NIST Elliptic Curves) 835
节点克隆防御(Node Clone Defense) 837
节点复制(Node Replication) 838
非交互证明(Noninteractive Proof) 838
非线性反馈移位寄存器(Nonlinear Feedback Shift Register) 839
布尔函数的非线性度(Nonlinearity of Boolean Functions) 840
非延展性(Non-Malleability) 841
不可否认协商(Nonrepudiable Agreement) 844
数字签名的不可否认性(Nonrepudiation of Digital Signatures) 845
不可否认协议(Nonrepudiation Protocol) 846
公开密钥加密(Nonsecret Encryption) 846
NSA套件B(NSA Suite B) 849
NSS 850
NTRU 850
NTRUEncrypt 853
NTRUSign 853
核酸(Nucleic Acid) 853
数域(Number Field) 853
数域筛法(Number Field Sieve) 854
因数分解的数域筛法(Number Field Sieve for Factoring) 854
DLP的数域筛法(Number Field Sieve for the DLP) 860
数论(Number Theory) 865
Nyberg-Rueppel签名方案(Nyberg-Rueppel Signature Scheme) 871
Nym 872
O 873
O-符号(O-Notation) 873
OAEP:最优非对称加密填充(OAEP:Optimal Asymmetric Encryption Padding) 874
不经意传输(Oblivious Transfer) 876
一次性口令,从密钥管理角度(One Time Password,from a Key Management Perspective) 877
一次性口令(One-Time Password) 877
单向链(One-Way Chain) 879
单向函数(One-Way Function) 879
单向性质(One-way property) 880
在线分析处理(Online Analytical Processing) 880
操作职责分离(Operational Separation of Duties) 880
最优扩域(Optimal Extension Fields,OEFs) 880
阶(Order) 882
对外身份认证(Outbound Authentication) 883
基于覆盖的DoS防御(Overlay-Based DoS Defenses) 883
超支者检测(Overspender Detection) 888
防止超支(Overspending Prevention) 889
P 890
数据包洪泛攻击(Packet Flooding Attack) 890
数据包丢弃攻击(Packet-Dropping Attack) 890
Paillier加密和签名方案(Paillier Encryption and Signature Schemes) 893
基于配对的密钥交换(Pairing-Based Key Exchange) 894
配对友好的椭圆曲线(Pairing-Friendly Elliptic Curves) 895
配对(Pairings) 898
掌纹认证(Palmprint Authentication) 900
掌纹识别(Palmprint Recognition) 900
并行消息认证码(Parallelizable Message Authentication Code) 904
护照安全(Passport Security) 904
口令(Password) 907
血管模式(Pattern of Blood Vessels) 909
支付卡(Payment Card) 909
PEM,隐私增强的邮件(PEM,Privacy-Enhanced Mail) 910
渗透测试(Penetration Testing) 911
笔迹(Penmanship) 912
完善前向安全(Perfect Forward Secrecy) 912
完美的安全消息传输(Perfectly Secure Message Transmission) 913
权限(Permissions) 915
个人识别码(Personal Identification Number(PIN)) 918
PGP 918
表型(Phenotyping) 918
Phi函数(Phi Function) 918
物理混淆密钥(Physical Obfuscated Key) 918
物理随机函数(Physical Random Function) 918
物理安全(Physical Security) 918
物理不可克隆函数(Physical Unclonable Functions(PUSs)) 920
PKCS 925
PKI 926
PKI信任模型(PKI Trust Models) 927
PKI信任关系(PKI Trust Relationships) 929
PKIX,公钥基础设施(PKIX,Public Key Infrastructure)(X.509) 930
隐私偏好平台(Platform for Privacy Preferences(P3P)) 930
Playfair密码(Playfair Cipher) 931
PMAC 932
点计数(Point Counting) 933
POK 934
策略合成(Policy Composition) 934
波利比奥斯方阵加密(Polybios Square Encryption) 936
多实例(Polyinstantiation) 936
多项式时间(Polynomial Time) 939
Porta加密(Porta Encryption) 940
后量子密码学(Post-Quantum Cryptography) 940
实用的电子现金(Practical E-Cash) 941
原像稳固(Preimage Resistance) 943
PRESENT-分组密码(PRESENT-Block Cipher) 944
良好隐私(PGP)(Pretty Good Privacy(PGP)) 946
素性证明算法(Primality Proving Algorithm) 949
素性测试(Primality Test) 949
素数证书(Prime Certificate) 949
素数生成(Prime Generation) 950
素数(Prime Number) 950
本原元(Primitive Element) 955
外包数据隐私(Privacy of Outsourced Data) 955
生物识别系统中隐私保护(Privacy Protection in Biometric Systems) 960
隐私感知访问控制策略(Privacy-Aware Access Control Policies) 960
隐私感知数据库(Privacy-Aware Database) 961
隐私感知语言(Privacy-Aware Languages) 961
具有隐私保护功能的数据库(Privacy-Enabled Database) 962
隐私增强语言(Privacy-Enhanced Languages) 962
无线接入网中隐私保护认证(Privacy-Preserving Authentication in Wireless Access Networks) 962
私钥指数(Private Exponent) 964
私有信息检索(Private Information Retrieval) 964
私钥密码系统(Private Key Cryptosystem) 966
SQL中权限(Privileges in SQL) 966
PRNG 968
概率密钥共享(Probabilistic Key Sharing) 968
概率素性测试(Probabilistic Primality Test) 970
概率公钥加密(Probabilistic Public-Key Encryption) 970
乘积密码,超级加密(Product Cipher,Superencryption) 971
程序完整性验证(Program Integrity Verification) 971
程序验证和安全(Program Verification and Security) 971
雅典娜计划(Project Athena) 974
知识证明对成员证明(Proof of Knowledge Versus Proof of Membership) 974
工作量证明(Proof of Work) 974
携带证明的代码(Proof-Carrying Code) 974
布尔函数的扩散性(Propagation Characteristics of Boolean Functions) 976
保护模式(Protected Mode) 977
保护(Protection) 978
保护环(Protection Rings) 978
协议(Protocol) 980
协议Cookies(Protocol Cookies) 980
感应卡(Proximity Card) 981
伪梅森素数(Pseudo-Mersenne Prime) 982
伪噪声序列(Pseudo-Noise Seuqences(PN-Sequences)) 982
假名(Pseudonyms) 983
伪素数(Pseudoprime) 984
伪随机函数(Pseudorandom Function) 984
伪随机数发生器(Pseudorandom Number Generator) 985
公共指数(Public Exponent) 987
公钥密码学(Public Key Cryptography) 987
公钥加密(Public Key Encryption) 988
公钥基础设施(Public Key Infrastructure) 988
公钥代理加密(Public Key Proxy Encryption) 988
公钥代理签名(Public Key Proxy Signatures) 990
公钥认证的加密(Public-Key Authenticated Encryption) 992
公钥密码系统(Public-Key Cryptosystem) 992
公钥加密(Public-Key Encryption) 992
PUF 992
Q 993
二次剩余问题(QRP) 993
二次剩余(Quadratic Residue) 993
二次剩余问题(Quadratic Residuosity Problem) 993
二次筛法(Quadratic Sieve) 993
量子密码学(Quantum Cryptography) 995
准标识符(Quasi-Identifier) 1000
R 1002
Rabin密码系统(Rabin Cryptosystem) 1002
Rabin数字签名方案(Rabin Digital Signature Scheme) 1003
无线电指纹(Radio Fingerprinting) 1004
无线射频攻击(Radio Frequency Attacks) 1004
无线电干扰攻击防御(Radio Interference Attack Defense) 1009
无线电射频(RF)指纹(Radio-Frequency(RF) Fingerprinting) 1010
辐射识别(Radiometric Identification) 1010
辐射测量(Radiometrics) 1010
彩虹表(Rainbow Tables) 1010
随机比特发生器(Random Bit Generator) 1011
随机密钥预分配(Random Key Predistribution) 1014
随机数测试(Random Number Testing) 1015
随机预言模型(Random Oracle Model) 1016
秩代码(Rank Codes) 1017
秩矩阵代码(Rank-Matric Codes) 1019
RBAC 1020
RC4 1020
RC5 1021
RC6 1022
接收者匿名(Recipient Anonymity) 1024
记录链接(Record Linkage) 1024
递归撤销(Recursive Revoke) 1024
Reed-Muller码(Reed-Muller Codes) 1026
参考监视器(Reference Monitor) 1027
相关密钥攻击(Related Key Attack) 1029
关系匿名(Relationship Anonymity) 1030
互素(Relatively Prime) 1030
中继攻击(Relay Attack) 1031
远程认证(Remote Attestation) 1031
重放攻击(Replay Attack) 1031
剩余运算(Residue Arithmetic) 1031
抗标准代数攻击(Resistance to the Standard Algebraic Attack) 1031
响应(Response) 1031
再同步攻击(Resynchronization Attack) 1032
恶意软件模拟器逆向工程(Reverse Engineering of Malware Emulators) 1032
可逆公钥加密(Reverse Public Key Encryption) 1033
RFID安全(RFID Security) 1033
右到左求幂(Right-to-Left Exponentiation) 1035
Rijndael 1035
环(Ring) 1038
RIPEMD族(RIPEMD Family) 1039
Rivest密码5(Rivest Cipher 5) 1042
Rivest密码6(Rivest Cipher 6) 1042
基于角色的访问控制(Role-Based Access Control) 1042
SQL中的角色(Roles in SQL) 1044
Ron码5(Ron’s Code 5) 1047
Ron码6(Ron’s Code 6) 1047
可信根(Root of Trust) 1047
Rootkits 1049
路由匿名(Routing Anonymity) 1050
RSA数字签名方案(RSA Digital Signature Scheme) 1050
RSA因数分解挑战(RSA Factoring Challenge) 1054
RSA问题(RSA Problem) 1055
RSA公钥加密(RSA Public-Key Encryption) 1059
基于规则的访问控制(Rule-Based Access Control) 1062
游程(Run) 1062
滚动密钥(Running-Key) 1062
动态分析(Runtime Analysis) 1062
运行时恶意软件分析(Run-Time Malware Analysis) 1062
S 1063
盐(Salt) 1063
沙盒(Sandbox) 1063
基于秩代码的方案(Schemes Based on Rank Codes) 1066
Schnorr数字签名方案(Schnorr Digital Signature Scheme) 1070
Schnorr身份识别协议(Schnorr Identification Protocol) 1071
脚本语言安全(Script Languages Security) 1072
SEAL 1074
密封存储(Sealed Storage) 1075
加密数据搜索(Search over Encrypted Data) 1076
抗第二原像(Second Preimage Resistance) 1080
二次使用规定(Secondary Use Regulations) 1081
秘密密钥密码系统(Secret Key Cryptosystem) 1083
秘密共享方案(Secure Sharing Schemes) 1083
安全审计日志(Secure Audit Logs) 1085
无线传感器网络中安全代码传播(Secure Code Dissemination in Wireless Sensor Networks) 1087
安全通信(Secure Communication) 1090
安全计算(Secure Computation) 1090
安全计算机系统模型(Secure Computer System Model) 1090
安全协处理器(Secure Coprocessor) 1090
安全数据融合(Secure Data Aggregation) 1091
安全数据外包:简要概述(Secure Data Outsourcing:A Brief Overview) 1093
安全设备配对(Secure Device Pairing) 1099
安全元件(Secure Element) 1103
安全电子邮件(Secure Email) 1103
安全函数计算(Secure Function Evaluation) 1103
安全哈希算法(Secure Hash Algorithm) 1104
安全索引(Secure Index) 1104
安全定位(Secure Localization) 1106
安全位置发现(Secure Location Discovery) 1108
安全日志(Secure Logging) 1108
安全多方计算(SMC)(Secure Multiparty Computation) 1108
安全多方计算(SMC)(Secure Multiparty Computation(SMC)) 1108
无线Mesh网络的安全网络编码(Secure Network Coding for Wireless Mesh Networks) 1110
安全网络设计(Secure Netwroks Design) 1113
安全远程编程(Secure Remote Programming) 1113
无线Mesh网络中安全路由(Secure Routing in Wireless Mesh Networks) 1113
安全路由协议(Secure Routing Protocols) 1117
安全外壳(Secure Shell) 1120
来自“强RSA”假设的安全签名(Secure Signatures from the “Strong RSA” Assumption) 1120
安全套接层(SSL)(Secure Socket Layer(SSL)) 1122
安全时间同步(Secure Time Synchronization) 1126
安全车载通信(Secure Vehicular Communication) 1127
安全无线Mesh网络(Security Wireless Mesh Networks) 1130
安全无线多播(Security Wireless Multicast) 1130
安全(Security) 1130
安全架构(Security Architecture) 1130
安全评估标准(Security Evaluation Criteria) 1131
混搭安全(Security for Mashups) 1132
虚拟化中的安全隐患(Security Implication in Virtualization) 1134
认知无线电安全(Security of Cognitive Radios) 1142
距离界定协议安全(Security of Distance Bounding Protocols) 1144
无线Mesh网络中组通信安全(Security of Group Communication in Wireless Mesh Networks) 1145
Web浏览器脚本语言安全(Security of Web Browser Scripting Languages) 1148
无线Mesh网络安全(概述)(Security of Wireless Mesh Networks(General Overview)) 1148
安全归约(Security Reduction) 1152
安全标准活动(Security Standards Activities) 1154
安全令牌(Security Token) 1159
安全验证(Security Verification) 1160
职责分离(Segregation of Duties) 1160
选择性伪造(Selective Forgery) 1160
自缩生成器(Self-Shrinking Generator) 1160
自同步流密码(Self-Synchronizing Stream Cipher) 1161
语义安全(Semantic Security) 1162
发送者匿名(Sender Anonymity) 1163
传感器代码证明(Sensor Code Attestation) 1163
传感器密钥建立和维持(Sensor Key Establishment and Maintenance) 1165
传感器密钥管理(Sensor Key Management) 1165
SEPA 1167
职责分离(Separation of Duties) 1168
序列(Sequences) 1171
SERPENT 1174
会话劫持攻击(Session Hijacking Attacks) 1175
SHA 1176
SHA-0、SHA-1、SHA-2(安全哈希算法)(SHA-0、SHA-1、SHA-2(Secure Hash Algorithm)) 1176
Shamir门限方案(Shamir’s Threshold Scheme) 1179
Shamir窍门(Shamir’s Trick) 1180
香农箴言(Shannon’s Maxim) 1180
香农模型(Shannon’s Model) 1180
共享(Share) 1181
最短向量问题(Shortest Vector Problem) 1182
缩减发生器(Shrinking Generator) 1183
侧信道分析(Side-Channel Analysis) 1184
侧信道攻击(Side-Channel Attacks) 1189
侧信道泄漏(Side-Channel Leakage) 1190
筛选(Sieving) 1190
函数域中的筛选(Sieving in Function Fields) 1190
Σ-协议(Σ-Protocols) 1191
签名的生物识别(Signature Biometrics) 1193
签密(Signcryption) 1196
带符号数求幂(Signed Digit Exponentiation) 1200
带符号窗口求幂(Signed Window Exponentiation) 1202
SIM/UICC 1202
同时求幂(Simultaneous Exponentiation) 1203
同时交易(Simultaneous Transactions) 1205
单一欧元支付区(Single Euro Payments Area) 1205
单线协议(Single Wire Protocol) 1205
Skipjack 1205
滑动攻击(Slide Attack) 1207
滑动窗口求幂(Sliding Window Exponentiation) 1208
智能卡(Smart Card) 1209
智能/算法拒绝服务(Smart/Algorithmic Denial of Service) 1210
防篡改智能卡(Smartcard Tamper Resistance) 1210
平滑(Smoothness) 1212
社会视角的信息隐私(Social Perspectives on Information Privacy) 1213
基于软件的证明(Software-Based Attestation) 1215
软件优化加密算法(Software-Optimized Encryption Algorithm) 1215
纸牌(Solitaire) 1215
源位置隐私(Source Location Privacy) 1215
时空权衡(Space-Time Trade-Off) 1217
使用网络级特性的垃圾邮件检测(Spam Detection Using Network-Level Characteristics) 1217
说话人生物特征识别(Speaker Biometrics) 1218
说话人识别和认证(SIV)(Speaker Identification and Verification(SIV)) 1218
说话人识别(Speaker Recognition) 1218
专用密码分析硬件(Special-Purpose Cryptanalytical Hardware) 1226
特定辐射源识别(SEI)(Specific Emitter Identification(SEI)) 1227
特定辐射源验证(SEV)(Specific Emitter Verification(SEV)) 1227
SPKI 1227
间谍软件(Spyware) 1230
SQL访问控制模型(SQL Access Control Model) 1232
SQL注入攻击(SQL Injection Attacks) 1235
平方乘求幂(Square-and-Multiply Exponentiation) 1236
SSH 1236
SSL 1237
SSS 1237
栈(缓冲区)溢出(Stack(Buffer) Overflow) 1237
栈(缓冲区)溢出(Stack(Buffer) Overrun) 1237
栈/堆溢出(Stack/Heaps Smashing) 1237
标准基(Standard Basis) 1237
标准模型(Standard Model) 1237
静态分析(Static Analysis) 1238
静态代码分析(Static Code Analysis) 1240
静态程序分析(Static Program Analysis) 1240
静态职责分离(Static Separation of Duties) 1240
站到站协议(Station-to-Station Protocol) 1240
统计数据库(Statistical Databases) 1241
Stein算法(Stein’s Algorithm) 1244
流和多播认证(Stream and Multicast Authentication) 1244
流密码(Stream Cipher) 1247
强认证(Strong Authentication) 1249
抗强碰撞性(Strong Collision Resistance) 1249
强排斥(Strong Exclusion) 1249
强素数(Strong Prime) 1249
强RSA假设(Strong RSA Assumption) 1250
结构密码分析(Structural Cryptanalysis) 1250
亚指数时间(Subexponential Time) 1251
子群(Subgroup) 1251
子群密码系统(Subgroup Cryptosystems) 1251
用户身份模块(Subscriber Identity Module) 1252
代换-置换(SP)网络(Substitution-Permutation(SP) Network) 1252
代换和置换(Substitutions and Permutations) 1252
求和生成器(Summation Generator) 1254
SWP 1254
对称密码系统(Symmetric Cryptosystem) 1255
SYN Cookie防御(SYN Cookie Defense) 1255
SYN洪泛攻击(SYN Flood Attack) 1257
同步流密码(Synchronous Stream Cipher) 1258
T 1260
谈话者识别(Talker Recognition) 1260
篡改检测(Tamper Detection) 1260
篡改证据(Tamper Evidence) 1260
防篡改(Tamper Resistance) 1261
篡改响应(Tamper Response) 1261
抗目标碰撞哈希函数(Target Collision Resistant Hash Function) 1262
TCG可信计算组织(TCG Trusted Computing Group) 1262
TCP调制攻击(TCP Modulation Attacks) 1262
TCP重置注入(TCP Reset Injection) 1265
TCP SYN Cookies 1266
TCP SYN洪泛(TCP SYN Flooding) 1266
温度攻击(Temperature Attack) 1266
Tempest 1267
时序访问控制(Temporal Access Control) 1267
时序授权模型(Temporal Authorization Models) 1269
定理证明和安全(Theorem Proving and Security) 1269
三因素认证(Three-Factor Authentication) 1270
门限密码学(Threshold Cryptography) 1272
门限同态密码系统(Threshold Homomorphic Cryptosystems) 1277
门限签名(Threshold Signature) 1279
Tiger 1281
基于时间的访问控制(Time-Based Access Control) 1282
时空平衡算法(Time-Memory Trade-offs) 1282
时间戳(Time-Stamping) 1284
时间攻击(Timing Attack) 1288
TLS 1289
令牌(Token) 1289
基于环面的密码学(Torus-Based Cryptography) 1290
TPM 1292
TPM可信平台模块(TPM Trusted Platform Module) 1295
叛逆跟踪(Tracing Traitors) 1295
追踪Cookie(Tracking Cookie) 1295
流量分析(Traffic Analysis) 1295
叛逆跟踪(Traitor Tracing) 1298
传输层安全(Transport Layer Security(TLS)) 1301
传输层安全(Transport-Level Security) 1302
陷门单向函数(Trapdoor One-Way Function) 1302
三方密钥交换(Tripartite Key Exchange) 1303
三重DES(Triple DES) 1303
特洛伊木马(Trojan) 1304
特洛伊木马、计算机病毒和蠕虫(Trojan Horses,Computer Viruses,and Worms) 1304
截断差分(Truncated Differentials) 1305
信任锚(Trust Anchor) 1305
信任管理(Trust Management) 1306
从一个访问控制的角度(From an access control perspective) 1306
信任管理(Trust Management)从一个分布式系统的角度(From a distributed system perspective) 1308
数据库中的信任管理(Trust Management in Databases) 1311
可信引导(Trusted Boot) 1312
可信计算(Trusted Computing) 1314
可信计算组织(Trusted Computing Group) 1316
可信计算平台联盟(Trusted Computing Platform Alliance) 1317
可信平台模块(Trusted Platform Module) 1317
可信第三方(Trusted Third Party) 1320
TSS 1321
双签名(Twin Signatures) 1323
TWIRL 1323
TWOFISH 1324
2k-Ary求幂(2k-Ary Exponentiation) 1325
双因素认证(Two-Factor Authentication) 1326
双密钥密码系统(Two-Key Cryptosystem) 1327
类型检查和安全(Type Checking and Security) 1327
输入动力学(Typing Dynamics) 1328
键入模式(Typing Patterns) 1328
U 1329
通用移动通讯系统IC卡(UMTS IC Card) 1329
不协调直接序列扩频(Uncoordinated Direct Sequence Spread Spectrum) 1329
不协调跳频扩频(Uncoordinated Frequency Hopping Spread Spectrum) 1330
不可否认签名(Undeniable Signatures) 1330
通用集成电路卡(Universal Integrated Circuit Card) 1332
通用单向哈希函数(Universal One-Way Hash Functions(UOWHF)) 1333
不可链接性(Unlinkability) 1334
拆包恶意软件(Unpacking Malware) 1335
不可追踪性(Untraceability) 1336
用户认证(User Authentication) 1336
用户验证方法(User Verification Method) 1337
V 1338
血脉图形(Vascular Patterns) 1338
向量空间(Vector Space) 1340
可验证加密(Verifiable Encryption) 1341
可验证秘密共享(Verifiable Secret Sharing) 1342
Vernam密码(Vernam Cipher) 1344
近距型卡(Vicinity Card) 1344
维吉尼亚加密(Vigenere Encryption) 1345
虚拟机自省(Virtual Machine Introspection) 1346
虚拟安全(Virtualization Security) 1348
虚拟打包机(Virtualized Packer) 1348
病毒扫描器(Virus Scanner) 1348
可视秘密共享方案(Visual Secret Sharing Schemes) 1348
VM保护(VM Protection) 1349
声音生物测定学(Voice Biometrics) 1349
语音识别(Voice Recognition) 1349
声纹识别(Voiceprint Recognition) 1349
冯·诺依曼校正(von Neumann Correction) 1349
可视秘密共享方案(VSSS) 1350
W 1351
水印(Watermarking) 1351
弱碰撞安全(Weak Collision Resistance) 1352
弱排斥(Weak Exclusion) 1352
弱密钥(Weak Keys) 1352
Web 2.0安全和隐私(Web 2.0 Security and Privacy) 1353
Web访问控制策略(Web Access Control Strategies) 1354
Web应用安全(Web Application Security) 1357
Web浏览器安全和隐私(Web Browser Security and Privacy) 1357
Web缓存中毒攻击(Web Cache Poisoning Attacks) 1359
Web客户安全和隐私(Web Client Security and Privacy) 1359
Web初始认证(Web Initial Authentication) 1360
Web渗透测试(Web Penetration Test) 1360
Web安全(Web Security) 1360
Web安全审计(Web Security Auditing) 1360
Web服务安全(Web Service Security) 1361
Web会话安全(Web Session Security) 1363
Web单点登录和SAML(Web Single Sign On and SAML) 1363
Web SSO和安全断言标记语言(Web SSO and Security Assertion Markup Language) 1368
Web漏洞评估(Web Vulnerability Assessment) 1368
基于网络的安全协议(Web-Based Security Protocols) 1368
Whirlpool 1369
白盒密码(White-Box Cryptography) 1371
对RSA公钥密码系统的Wiener、Boneh-Durfee和May攻击(Wiener,Boneh-Durfee,and May Attacks on the RSA Public Key Cryptosystem) 1372
无线设备指纹(Wireless Device Fingerprinting) 1373
无线位置隐私(Wireless Locational Privacy) 1376
窃听(Wiretapping) 1376
证据隐藏(Witness Hiding) 1376
蜂窝网络中的蠕虫(Worms in Cellular Networks) 1377
X 1379
X.509 1379
基于XML的访问控制语言(XML-Based Access Control Languages) 1379
XSS 1383
Z 1384
清零(Zeroization) 1384
零知识(Zero-Knowledge) 1384
Zeta函数计算(Zeta Function Computation) 1386