A rich stream of papers and many good books have been written on cryptography, security, and privacy, but most of them a
119 37 38MB
English Pages 2878 [2864] Year 2024
Table of contents :
Preface
Acknowledgments
About the Editors
Section Editors
List of Contributors
A
5G
A5/1
Definition
Background
Theory
Description of the Running-Key Generator
Attacks on A5/1
Cross-References
Recommended Reading
ABAC
ABE
Abuse
Abuse of Trust
Access and Adversary Structure
Definition
Theory
Cross-References
References
Access Control
Access Control for Cyber-Physical Systems
Synonyms
Definition
Background
Traditional Access Control Models
Advanced Access Control Models
Open Problems and Future Directions
References
Access Control Policies, Models, and Mechanisms
Definition
Background
Theory
Cross-References
References
Access Control Rules
Access Limitation
Access Matrix
Definition
Background
Theory and Application
Cross-References
References
Access Pattern
Synonyms
Definition
Background
Applications
Theory
Open Problems
Cross-References
Recommended Reading
Access Rights
Accountability
Accountability for Cyber-Physical Systems
Definition
Background
Application
Open Problems and Future Directions
Cross-References
References
Accountable and Traceable ABE
Accountable and Traceable Attribute Based Encryption
Synonyms
Definitions
Background
Theory
Applications
Open Problems and Future Directions
References
Acquirer
Definition
Recommended Reading
Acronym (DGA)
Active Authentication
Adaptation
Adaptive Chosen Ciphertext Attack
Definition
Cross-References
Recommended Reading
Adaptive Chosen Plaintext and Chosen Ciphertext Attack
Definition
Cross-References
Recommended Reading
Adaptive Chosen Plaintext Attack
Definition
Cross-References
Adaptive Control Framework (ACF)
Adaptive Cyber Defense
Synonyms
Definition
Background
Theory and Application
Open Problems and Future Directions
Cross-References
References
Administrative Policies
Definitions
Background
Theory and Application
Open Problems and Future Directions
Cross-References
References
Administrative Policies in SQL
Synonyms
Definition
Application
Cross-References
References
Advanced Encryption Standard
Advanced Hash Competition
Advanced Persistent Threats
Synonyms
Definition
Background
Common Characteristics of APT Attack Campaigns
Open Problems and Future Directions
References
Adversarial and Trustworthy AI
Synonyms
Definition
Background
Evasion Attacks
Adversarial Inputs
Universal Perturbations
Data Poisoning Attacks
Trustworthy AI
Robust ML
Open Problems and Future Directions
References
Adversarial Artificial Intelligence (AI)
Adversarial Machine Learning (AML)
Synonyms
Definition
Background
Theory and Application
Open Problems and Future Directions
Cross-References
References
Adversarial/External Knowledge (Privacy in the Presence of)
Definition
Background
Theory
Open Problems
Cross-References
Recommended Reading
Adware
AES
Aggregate Signatures
Definition
Applications
Recommended Reading
Agility
Aging of Biometric Traits
Definition
Background
Theory
Open Problems and Future Directions
Summary
Cross-References
References
AHS Competition/SHA-3
Synonyms
Definition
Background
Applications
Cross-References
Recommended Reading
AI Act
AI and Big Data Analytics for Network Security
Definition
Background (Historical Data Optional)
Applications and Use Cases
Open Problems and Future Directions
Description of New Trends/Unsolved Problems
References
AI Approaches in Steganalysis Research
Definition
Background
Theory
Open Problems and Future Directions
References
AI Data Poisoning
AI in Intrusion Detection
AI: Artificial Intelligence
Air Traffic Management Security
Alberti Encryption
Definition
Cross-References
Recommended Reading
Algebraic Immunity of Boolean Functions
Synonyms
Definition
Background
Theory
Open Problems
Cross-References
Recommended Reading
Algebraic Number Field
Algebraic Side-Channel Attack
Synonyms
Definitions
Background
Application
Open Problems and Future Directions
Cross-References
References
Algorithmic Complexity Attacks
Algorithmic DoS
Synonyms
Definition
Background
Theory
Impact
Solutions
Applications
Recommended Reading
Algorithm-Substitution Attack
Alias
Alphabet
Definition
Background
Cross-References
Recommended Reading
Amplification DoS Attacks
Synonyms
Definitions
Theory and Application
Open Problems and Future Directions
Cross-References
References
An Economic View of Privacy Paradox
Anamorphic Cryptography
Definitions
Background
Theory
Open Problems and Future Directions
Cross-References
References
Android's Security Framework–Understanding the Security of Mobile Phone Platforms
Synonyms
Definition
Background
Application
Runtime Environment
Permission Model
Application Storage
Cross-References
References
Anomalous Binary Curves
Anomaly Detection
Anomaly Detection for CPS
Anonymity
Definition
Theory
Applications
Cross-References
References
Anonymity in Data Mining
Anonymity in OSNs
Synonyms
Definitions
Theory
Application
Open Problems and Future Directions
Cross-References
References
Anonymization of Aggregated Location Information
Anonymization of Aggregated Mobility Data
Anonymization of Personal Data (Legal Perspective)
Definition
Background
Theory
Open Problems and Future Directions
Cross-References
References
Anonymous Attribute-Based Encryption
Anonymous Communications over Delay Tolerant Networks
Definition
Background
Theory
Applications
Cross-References
References
Anonymous Communications over Blockchain Technology
Synonyms
Definitions
Background
Application
Mixing Services
Noninteractive Zero-Knowledge Proof
Ring Signature
Open Problems and Future Directions
Cross-References
References
Anonymous Web Browsing and Publishing
Definition
Theory
Applications
Open Problems
Experimental Results
Cross-References
Recommended Reading
Anthropometric Authentication
Anthropometrics
Anthropometry
Anti-DoS Cookies
Anti-jamming Strategy
Antispam Based on Sender Reputation
Antivirus
Application Permissions
Application-Level Denial of Service
Synonyms
Definition
Background
Theory and Application
Open Problems
Cross-References
References
Applications
Applications of Formal Methods to Intrusion Detection
Definition
Background
Applications
Open Problems
Cross-References
Recommended Reading
Applications of Formal Methods to Web Application Security
Synonyms
Definition
Background
Theory
Applications
Cross-References
References
Applications of Rank-Metric Codes
Applied Cryptography
APT Attack
APT Campaigns
APT: Advanced Persistent Threat
Arguments for Privacy Regulations
ARIA
Definition
Background
Theory
Open Problems
Cross-References
Recommended Reading
ARP Poison Routing (APR)
ARP Poisoning
ARP Spoofing
Synonyms
Definition
Background
Theory
Mitigation
External Solutions
Cryptographic Solutions
Cross-References
Recommended Reading
Artificial Intelligence
Artificial Intelligence (AI) Explainability
Artificial Intelligence Act (AI Act) and the GDPR
Synonyms
Definition
Background
Theory
Title I: General Provisions
Title II: Prohibited Artificial Intelligence Practices
Title III: High-Risk AI Systems
Title IV: Transparency Obligations for Certain AI Systems
Title V: Measures in Support of Innovation
Title VI: Governance
Title VII: EU Database for Stand-Alone High-Risk AI Systems
Title VIII: Post-Market Monitoring, Information Sharing, and Market Surveillance
Title IX: Codes of Conduct
Title X: Confidentiality and Penalties
Title XI: Delegation of Power and Committee Procedure
Title XII: Final Provisions
Open Problems and Future Directions
Cross-References
References
Artificial Intelligence Data Poisoning
ASCA
Assumptions
Definition
Theory
Unconditional and Quantum Security
Conditional Security
Cross-References
References
Asymmetric Cryptosystem
Synonyms
Definition
Theory
Application
Cross-References
Asymmetric Setting for Searchable Encryption
Synonyms
Definitions
Background
Theory
Parties
Algorithms
Security Notions
Search Capabilities
Open Problems and Future Directions
Cross-References
References
Asynchronous Byzantine Fault Tolerance
Synonyms
Definition
Background
Theory
Open Problems and Future Directions
Cross-References
References
Asynchronous Consensus
Asynchronous Stream Cipher
Attachment
Attack by Summation over a Hypercube
Attack Detection for Cyber-Physical Systems
Synonyms
Definition
Introduction
Theory or Application
Open Problems and Future Directions
Cross-References
References
Attack Evasion
Attack Graphs
Definitions
Background
Theory and Application
References
Attack Response
Attack Traceability
Synonyms
Definitions
Background
Applications
Open Problems and Future Directions
Cross-References
References
Attacker Models for Location Privacy
Definition
Background
Discussion & Open Issues
Cross-References
References
Attacks on Wi-Fi Availability
Attestation
Synonyms
Definition
Background
Theory and Applications
Cross-References
Recommended Reading
Attribute Based Encryption with Access Policy Hiding
Synonyms
Definitions
Background
Theory
Applications
Open Problems
Cross-References
References
Attribute Certificate
Definition
Background
Theory
Applications
Cross-References
Recommended Reading
Attribute-Based Access Control
Synonyms
Definition
Background
Theory and Concepts
Open Problems and Future Directions
Cross-References
References
Attribute-Based Encryption
Synonyms
Definitions
Background
Theory
Applications
Open Problems and Future Directions
References
Attribute-Based Encryption with Offline Computation and Outsourced Decryption
Definition
Access Structures
Linear Secret Sharing Schemes
Background
ABE with Offline Computation
KP-ABE with Offline Encryption
CP-ABE with Offline Encryption
ABE with Outsourced Decryption
Open Problems and Future Directions
References
Attribute-Based Encryption with Searchable Encryption
Synonyms
Definitions
Background
Theory
Applications
Open Problems
Cross-References
References
Attribute-Based Encryption with Updatable Access Policy
Synonyms
Definitions
Background
Theory
Applications
Open Problems
Cross-References
References
Attribute-Based Keyword Search over Encrypted Data
Attribute-Based Signatures
Auditability
Authenticated Data Feed
Authenticated Encryption
Introduction
Background
Security
Associated Data
Provable Security
AE Schemes
Conventions
Generic Composition
Security
Performance
Associated Data
Can We Do Better?
Single-Pass Combined Modes
IAPM
Comments on IAPM
XCBC and OCB
Associated Data
Intellectual Property
Two-Pass Combined Modes
CCM Mode
CCM Is Parameterized
Comments on CCM
EAX Mode
CWC Mode
AE Primitives
Helix
SOBER-128
Beyond AE and AEAD
Cross-References
Notes on References
Recommended Reading
Authentication
Authentication (General Methods)
Synonyms
Definition
Background
Theory
Applications
Open Problems and Future Directions
Experimental Results
Cross-References
References
Authentication for Cyber-Physical Systems
Synonyms
Definitions
Background
Application
Sensor Authentication
Actuator Authentication
Process Authentication
PLC Authentication
Control Logic Authentication
Open Problems and Future Directions
References
Authentication Token
Synonyms
Related Concepts and Keywords
Definition
Theory
Applications
Open Problems and Future Directions
Cross-References
References
Authentication, from an Information Theoretic Perspective
Synonyms
Definition
Background
Theory
Recommended Reading
Authorization
Authorizations
Synonyms
Definition
Background
Theory and Application
Advanced Authorizations
Cross-References
References
Autocorrelation
Definition
Application
Cross-References
Recommended Reading
Autograph
Autonomous Cyber Response
Autotomic Signatures
Definition
Availability
Definition
Theory
B
Bank Card
Barrett's Algorithm
Definition
Recommended Reading
Barter
Base
Beaufort Encryption
Definition
Cross-References
Recommended Reading
Behavioral Security
Synonyms
Definition
Background
Theory
Open Problems and Future Directions
Cross-References
References
Bell–La Padula Model
Synonyms
Definition
Background
Theory
First Volume: “Secure Computer Systems: Mathematical Foundations” (Bell and La Padula 1973)
Second Volume: “Secure Computer Systems: A Mathematical Model” (La Padula and Bell 1973)
Third Volume: “Secure Computer Systems: Refinement of the Mathematical Model” (Bell 1973a)
Fourth Volume: “Secure Computer Systems: Unified Exposition and MulticsInterpretation” (Bell and La Padula 1975)
Later Developments
Applications
Cross-References
Recommended Reading
Berlekamp Q-matrix
Definition
Theory
Cross-References
Recommended Reading
Berlekamp–Massey Algorithm
Definition
Background
Theory
Cross-References
Recommended Reading
Biba Model
Synonyms
Background
Theory
Applications
Cross-References
Recommended Reading
Big Number Multiplication
Big Number Squaring
Bilinear Pairings
Binary Euclidean Algorithm
Synonyms
Definition
Background
Theory
Applications
Cross-References
Recommended Reading
Binary Exponentiation
Synonyms
Definition
Background
Theory
Applications
Cross-References
Recommended Reading
Binary Functions
Binary GCD Algorithm
Binding Pattern
Binomial Distribution
Definition
Theory
Applications
Bioinformatics
Biometric Authentication
Synonyms
Definition
Background
Theory
Applications
Open Problems and Future Directions
References
Biometric Cryptosystems
Biometric Detectors
Biometric Encryption
Synonyms
Definitions
Background
Theory and Application
Open Problems and Future Directions
Security
Data Representation
Real-World Performance and Deployment
References
Biometric Ethics
Biometric Fusion
Biometric Identification Errors
Biometric Identification in Video Surveillance
Biometric Information Ethics
Biometric Key Generation
Biometric Keys
Biometric Matching
Synonyms
Definition
Background
Theory
Open Problems and Future Directions
Cross-References
References
Biometric Passport Security
Biometric Performance Evaluation
Biometric Performance Measurement
Biometric Privacy
Synonyms
Definitions
Background
Theory
Classification of the Biometric Privacy Risks
Best Practice for Privacy Assessment in Biometrics
Template Protection
Template Transformations
Applications
Open Problems and Future Directions
References
Biometric Recognition
Biometric Recognition Errors
Synonyms
Definitions
Background
Biometric Verification and Identification
Evolution
Errors of a Biometric System
Theory and Application
Open Problems and Future Directions
Cross-References
References
Biometric Sample Quality
Synonyms
Definitions
Biometric Sample Quality for Different Biometric Modalities
Quality-Based Score Normalisation
References
Biometric Scanners
Biometric Sensors
Synonyms
Definition
Theory
Application
Open Problems and Future Directions
Cross-References
References
Biometric Social Responsibility and Supply Chain Implications
Synonyms
Introduction
Definition
Background
Consumer Relationship Management
Supply Chain Management (SCM) Trust Aspects
Theory of Corporate Social Responsibility (CSR) as Strategy
CSR Policy Development
Applications and Future Directions
References
Biometric Spoofing and Its Evaluation
Synonyms
Definitions
Background
Evolution
Errors of a Biometric System: Matching and Spoofing Detection
Theory and Application
Open Problems and Future Directions
Cross-References
References
Biometric Spoofing Evaluation
Biometric Standards
Definition
Background
Standards Developing Organizations (SDOs)
Application
Biometric Systems (INCITS/ISO/IEC 19794-1:2011 2018)
Types of Biometric Standards
Future Directions
References
Biometric Systems Evaluation
Synonyms
Definitions
Background
Types of Evaluation
Evolution
Theory and Application
Technology Evaluation
Scenario Evaluation
Operational Evaluation
Open Problems and Future Directions
Cross-References
References
Biometric Testing
Biometric Transducers
Biometric Verification Errors
Biometrics
Biometrics (Synthetic, Artificial, Inverse, Recognition, Privacy, Forensics, Social Responsibility)
Biometrics Attacks
Biometrics for Authentication
Biometrics for Enrolment
Biometrics for Forensics
Synonyms
Definition
Background
Theory
Forensic Science
Computational Biometrics
Applications
Open Problems
Cross-References
Recommended Reading
Biometrics for Identity Management
Synonyms
Definition
Background
Theory or Application or Both
Biometrics in Identity Management
Biometrics and Authentication
Modalities and Maintenance
Storage of Biometric Reference
Use Cases
Open Problems and Future Directions
Cross-References
References
Biometrics for Wearable Devices
Background
Application
Wearable Constraints
Wearable Authentication
Case Study with NetHealth Biometric Dataset
NetHealth Dataset
Feature Engineering and Modeling
Case Study Findings
Open Problems and Future Directions
Summary
References
Biometrics in Ambient Intelligence
Related Concepts
Definition
Background
Application
Open Problems and Future Directions
Summary
Cross-References
References
Biometrics in Border Control
Background
Application
Open Problems and Future Directions
Summary
Reference
Biometrics in Video Surveillance
Synonyms
Definition
Background
Applications
Open Problems
Noncooperative User Behavior
Low Image Resolution
Image Blur
Interlacing in Video Images
Cross-References
Recommended Reading
Biometrics Security
Synonyms
Definitions
Application
Open Problems and Future Directions
References
Biometrics Vulnerabilities
Biometrics: Terms and Definitions
Definition
Background
Theory
Biometric Systems
Privacy
Application
Open Problems and Future Directions
Summary
References
BIOS Basic Input Output System
Birthday Paradox
Definition
Applications
Cross-References
Recommended Reading
Bitcoin
Definition
Background
Limitations, Mitigations, and Future directions
Cross-References
References
Black Box Algorithms
Black Hat Hacker
Blackmailing Attacks
Definition
Cross-References
Recommended Reading
Blind Signature
Synonyms
Definitions
Background
Theory and Application
Open Problems and Future Directions
Cross-References
References
Blinding
Blinding Techniques
Synonyms
Definitions
Theory and Application
Cross-References
References
Block Ciphers
Definition
Background
Theory
Recommended Reading
Blowfish
Cross-References
Recommended Reading
BLP
BLP Model
BLS Short Digital Signatures
Background
Theory
Cross-References
Recommended Reading
Bluetooth Insecurity
Bluetooth Security
Synonyms
Definitions
Background
Theory
Secure Simple Pairing
LE Legacy Pairing
BR/EDR Legacy Pairing
Applications
Cross-References
References
Blum Integer
Definition
Background
Theory
Applications
Cross-References
Recommended Reading
Blum–Blum–Shub Pseudorandom Bit Generator
Definition
Theory
Cross-References
Recommended Reading
Blum–Goldwasser Public Key Encryption System
Definition
Theory
Cross-References
References
Boolean Functions
Synonyms
Definition
Background
Theory
Cross-References
Recommended Reading
Boolean Interrogations on Encrypted Data
Boomerang Attack
Definition
Theory
Cross-References
Recommended Reading
Botnet Detection in Enterprise Networks
Background
Theory and Applications
Open Problems
Cross-References
Recommended Reading
Broadcast Authentication from a Conditional Perspective
Synonyms
Definition
Background
Theory
Solutions Using Symmetric Cryptography
Solutions Using Asymmetric Cryptography
Applications
Open Problems
Cross-References
Recommended Reading
Broadcast Authentication from an Information Theoretic Perspective
Synonyms
Definition
Background
Theory
Cross-References
References
Broadcast Encryption
Definition
Background
Theory
Constructions
Fiat–Naor Construction
Logical Key Hierarchy
Subset Difference
References
Broadcast Stream Authentication
Browser Cookie
BSP Board Support Package
Buffer Overflow Attacks
Synonyms
Definition
Background
Application
Open Problems
Recommended Reading
Buffer Overrun
Bytecode Verification
Definition
Background
Applications
Recommended Reading
Byzantine Agreement
Synonyms
Definition
Background
Theory
Open Problems and Future Directions
Cross-References
References
C
C2 – Block Cipher
Definition
Background
Theory
Experimental Results
Cross-References
Recommended Reading
C2/CnC: Command and Control
Cæsar Cipher
Definition
Background
Cross-References
Recommended Reading
Camellia
Cross-References
Recommended Reading
Camouflage
Cascade Revoke
Cast
Cross-References
Recommended Reading
Cayley Hash Functions
Definition
Background
Theory
Open Problems
Cross-References
References
CBC-MAC and Variants
Definition
Background
Theory
Simple CBC-MAC
Variants of CBC-MAC
Standardization
Cross-References
Recommended Reading
CCIT2-CodeFriedrich L. Bauer: deceased.
Definition
Recommended Reading
CDH
Cellular Network Security
Cellular Privacy
Synonyms
Definition
Background
Theory
Applications
Open Problems and Future Directions
Cross-References
References
(Centralized) Multi-authority Attribute-Based Encryption
Certificate
Definition
Background
Applications
Cross-References
References
Certificate Management
Related Concepts
Definition
Certificate of Primality
Synonyms
Definition
Cross-References
Certificate Revocation
Definition
Applications
Periodic Publication Mechanisms
Online Query Mechanisms
Other Revocation Options
Cross-References
References
Certificateless Cryptography
Definition
Background
Theory
Applications
Open Problems and Future Directions
Cross-References
Recommended Reading
Certification Authority
Synonyms
Definition
Background
Deployment Results
Cross-References
References
Certified Mail
Synonyms
Definition
Background
Theory
Cross-References
References
Chaffing and Winnowing
Synonyms
Definitions
Background
Theory
Open Problems and Future Directions
References
Challenge-Response Authentication
Challenge-Response Identification
Synonyms
Related Concepts
Definition
Background
Theory
Applications
Open Problems and Future Directions
Cross-References
References
Challenge-Response Protocol
Chaum Blind Signature Scheme
Definitions
Theory
Cross-References
References
Chemical Combinatorial Attack
Definition
Experimental Results
Recommended Reading
Chinese Remainder Theorem
Synonyms
Definition
Background
Theory
Applications
Cross-References
Recommended Reading
Chinese Wall
Definition
Background
Theory
Applications
Cross-References
References
Chip Card
Chosen Ciphertext Attack
Definition
Cross-References
Recommended Reading
Chosen Plaintext and Chosen Ciphertext Attack
Definition
Cross-References
Chosen Plaintext Attack
Definition
Theory
Cross-References
Recommended Reading
Chosen-Prefix Attack
Chromosome
Chroot Jail
Synonyms
Definition
Background
Theory
Applications
Cross-References
Recommended Reading
Chroot Prison
Ciphertext-Only Attack
Definition
Cross-References
Recommended Reading
Ciphertext-Policy ABE
Clark and Wilson Model
Definition
Background
Theory
Cross-References
References
Classical Cryptosystem
Claw-Free
Definition
Background
Theory
Applications
Cross-References
Recommended Reading
CLEFIA
Definition
Background
Theory
Cross-References
Recommended Reading
Client Puzzles
Cliptography
Clock-Controlled Generator
Definition
Background
Theory
Applications
Example: The Alternating Step Generator
Cross-References
Recommended Reading
Closest Vector Problem
Synonyms
Definition
Background
Theory
Applications
Open Problems
Cross-References
Recommended Reading
Cloud Security
CMAC
Definition
Background
Theory
Cross-References
Recommended Reading
CMVP—Cryptographic Module Validation Program
Code Verification
Code-Based Cryptography
Definition
Applications
Cross-References
References
Codebook Attack
Definition
Applications
Cross-References
Cognitive Style
Collaborative DoS Defenses
Definition
Background
Applications
Attack Response Approaches
Attack Prevention Approaches
Open Problems and Future Directions
Cross-References
References
Collective Behavior
Collective Privacy
Collective Remote Attestation
Collision Attack
Definition
Background
Theory
Cross-References
References
Collision Fault Analysis
Collision Resistance
Synonyms
Definition
Background
Theory
Cross-References
References
Combination Generator
Definition
Theory
Cross-References
Recommended Reading
Commercial Off-the-Shelf
Commitment
Definition
Background
Theory
Cross-References
References
Commitment Schemes
Common Criteria
Synonyms
Definition
Background
Theory and Application
Acronyms
Open Problems
Recommended Reading
Common Criteria, from a Security Policies Perspective
Synonyms
Definition
Background
Theory
Evaluated Product
Security Requirements
Security Evaluation
Applications
Open Problems
References
Communication Channel Anonymity
Synonyms
Definitions
Background
Theory and Applications
Open Problems and Future Directions
References
Complexity Theory
Compliance Fatigue
Compositeness Test
Compromising Emanations
Computational Complexity
Synonyms
Definition
Theory
Open Problems
Cross-References
Recommended Reading
Computational Diffie-Hellman Problem
Synonyms
Definition
Background
Theory
Applications
Bit Security of the Diffie-Hellman Secret Key
Number Theoretic and Algebraic Properties
Cross-References
Recommended Reading
Computational Puzzles
Synonyms
Definition
Background
Theory
Applications
Recommended Reading
Computational Versus Unconditional Security
Definition
Cross-References
Recommended Reading
Computationally Sound Proof System
Conceptual Design of Secure Databases
Synonyms
Definition
Background
Application
Open Problems and Future Directions
References
Conceptual Modeling
Conditional k-Anonymity for Multidimensional Data
Conditional Lower Bounds for Oblivious RAM
Introduction
Background
The ORAM Model
Conditional Lower Bounds
The Boyle–Naor Lower Bound: Offline ORAM (Without Balls-and-Bins)
The Weiss–Wichs Lower Bound: Online Read-Only ORAM
Cross-References
References
Conference Key Agreement
Conference Keying
Confidential Data Storage
Synonyms
Definition
Background
Application
Open Problems and Future Directions
Cross-References
References
Confidential Queries for Encrypted Relational DBMS
Synonyms
Definitions
Private Queries Through Multilayered Encryption
Private Queries Through Searchable Symmetric Encryption
Private Queries Mediated by Trusted Hardware
Cross-References
References
Confidential Storage
Confidentiality
Configuration Security
Synonyms
Definition
Background
Theory
Application
Open Problems and Future Directions
Cross-References
References
Confirmer Signatures
Consensus
Consistency Verification of Security Policy
Contactless Cards
Definition
Background
Theory
Applications
Cross-References
Recommended Reading
Contactless Palmprint Biometrics
Content-Based and View-Based Access Control
Definition
Background
Theory
View Authorization
Content-Based Authorization
Row-Level Security
Open Problems
Cross-References
Recommended Reading
Context-Awareness
Context-Based Micro-training
Definition
Background
Theory and Application
Open Problems and Future Directions
Cross-References
References
Continuous Authentication
Synonyms
Definitions
Background
Application
Open Problems and Future Directions
Summary
Cross-References
References
Contract Signing
Synonyms
Definition
Background
Theory
Cross-References
References
Control Vector
Definition
Background
Theory
Applications
Open Problems
Recommended Reading
Controlled Data Sharing in DOSNs
Conventional Cryptosystem
Cookie
Synonyms
Definition
Background
Theory
Applications
Open Problems and Future Directions
Cross-References
Recommended Reading
Coprime
Copy Protection
Definition
Theory and Applications
Open Problems
Recommended Reading
Corporations
Correcting-Block Attack
Synonyms
Definition
Background
Theory
Applications
Cross-References
References
Correlation Attack for Stream Ciphers
Definition
Theory
Cross-References
Recommended Reading
Correlation Immune and Resilient Boolean Functions
Definition
Background
Theory
Cross-References
Recommended Reading
Countermeasure Identification
Cover Story
Definition
Background
Theory
Cross-References
References
Covert Channels
Definition
Theory
Cross-References
References
Covert Channels over Wi-Fi
Synonyms
Definitions
Background
Theory
Application
References
CPS
CPS Forensics
CPS, Certificate Practice Statement
Definition
Background
Theory
Cross-References
Recommended Reading
CPU Consumption
CPU Denial of Service
Synonyms
Definition
Background
Theory
Applications
Open Problems
Recommended Reading
CPU Starvation
Cramer–Shoup Public-Key System
Definition
Background
Theory
Cross-References
Recommended Reading
Credential Vaulting
Synonyms
Definition
The Application
Future Directions
References
Credential Verification
Credential-Based Access Control
Definition
Background
Theory
Applications
Open Problems and Future Directions
Cross-References
References
Critical Information Infrastructure Protection
Critical Infrastructure
Cross Site Scripting Attacks
Synonyms
Definition
Theory
Recommended Reading
Cross-Chains
Cross-Correlation
Definition
Applications
Cross-References
Recommended Reading
CRT
Cryptanalysis
Definition
Applications
Statistical Approaches to Classical Cryptosystems
Cross-References
Recommended Reading
Crypto Machines
Definition
Applications*-7pt
Cross-References
Recommended Reading
Cryptographic Algorithm Evaluation
Cryptographic Credentials
Definition
Theory
Applications
Cross-References
Recommended Reading
Cryptographic Obfuscation
Cryptographic Protocol Verification
Cryptographic Puzzles
Cryptographic Subversion Attack
Cryptographically Enforced Dynamic Access Control
Cryptography on Reconfigurable Devices
Cryptology
Definition
Cross-References
Recommended Reading
Cryptophthora
Synonyms
Definition
Open Problems
Cross-References
Recommended Reading
Cryptosystem
Definition
Applications
Cross-References
Recommended Reading
CRYPTREC (Japanese Cryptographic Algorithm Evaluation Project)
Synonyms
Definition
Background
Applications
Overview
History
Open Problems (Future Schedules)
Other Activities
Cross-References
Recommended Reading
CTI: Cyber Threat Intelligence
Cube Attack
Synonyms
Related Concepts
Definition
Background
Theory
Scenario of the Cube Attack
Applications
References
Cut-and-Choose Protocol
Definition
Background
Cross-References
Recommended Reading
CVE-2017-5715
CVE-2017-5753
CVE-2017-5754
Cyber Attack Insurance/Protection
Cyber Awareness
Cyber Bonds
Cyber Crime
Synonyms
Definition
Background
Theory and Application
Theft
Disruption
Manipulation
Hybrid Activity
Open Problems and Future Directions
References
Cyber Crime Insurance/Protection
Cyber Deception
Synonyms
Definition
Background
Theory and Applications
Offensive Deception
Defensive Deception
Deception for Encouragement
Deception for Discouragement
The Costs of Deception
The Ethics of Deception
Open Problems and Future Directions
Cross-References
References
Cyber Deception Engineering
Synonyms
Definition
Background
Theory
Application
Open Problems and Future Directions
Cross-References
References
Cyber Derivatives
Cyber Forensics for Cyber-Physical Systems
Synonyms
Definitions
Background
Application
Open Problems and Future Directions
References
Cyber Insurance
Cyber Insurance and Security Investment Strategy
Synonyms
Definitions
Background
Theory
Modeling Cyber Risks
Pricing Cyber Insurance Contracts
Cyber Insurance and Security Investment Decisions
Open Problems and Future Directions
Cross-References
References
Cyber Insurance: Models and Challenges
Synonyms
Definition
Background
Theory and Applications
Actuarial Model for Pricing Cyber Insurance
Nonactuarial Model for Risk Management
Open Problems and Future Directions
References
Cyber Ransom
Cyber Risk Assessment
Cyber Risk Insurance, Lessons Learned So Far
Synonyms
Definition
Background
Theory and Application
Research Trends
Open Problems and Future Directions
Cross-References
References
Cyber Risk Measurement
Cyber Risk Protection
Cyber Risk Quantification
Synonyms
Definition
Theory
Open Problems and Future Directions
Cross-References
References
Cyber Risk Transfer
Cyber Risk, Risk Transfer, and Financial Innovation
Synonyms
Definition
Background
Theory and Application
Open Problems and Future Directions
Cross-References
References
Cyber Security Insurance Models
Cyber Security Insurance/Protection
Cyber Security Liability Insurance/Protection
Cyber Situational Awareness
Definition
Background
Theory
Cyber SA Data Triaging Systems
Desirable Cyber SA Capabilities
Open Problems and Future Directions
Cross-References
References
Cyber Threat Intelligence
Synonyms
Definition
Background
Theory and Applications
Open Problems and Future Directions
Cross-References
References
Cyber Threat Intelligence Sharing
Synonyms
Definition
Background
Theory and Applications
Open Problems and Future Directions
Cross-References
References
Cyberattacks in Wireless IoT Systems
Cyber-Insurance Economics
Cyber-Insurance Market
Synonyms
Definition
Historical Background
A Techno-Economic Overview
Open Problems and Future Directions
Cross-References
References
Cyber-Insurance: Past, Present and Future
Definitions
Outline
Background
Advantages
Key Challenges
References
Cyber-Liability Economics
Cyber-Physical Range
Cyber-Physical System
Synonyms
Definition
Background
Theory and Application
Open Problems and Future Directions
Cross-References
References
Cyber-Physical Systems Governance
Cyber-Physical Systems Security
Cyberpsychology
Cybersecurity Awareness
Synonyms
Definition
Background
Theory and Application
Cybersecurity Awareness in Practice
Open Problems and Future directions
Cross-References
References
Cybersecurity Capability Maturity Model
Cybersecurity Insurance
Cybersecurity Knowledge
Cybersecurity of the Low-Power Wide Area Networks (LPWAN)
Synonyms
Definition
Background
Theory
Future Directions
Cross-References
References
Cybersecurity Skills
Synonyms
Definition
Background
Theory and Application
Technical Skills
Domain-Aligned
Offensive-v-Defensive Security
Cloud-Native Skills
Developer Skills
Process Skills
People Skills
Security Awareness
Pragmatic Security
Executive Reporting and Metrics
Open Problems and Future Directions
The Cybersecurity Skills Shortage
Cross-References
References
Cyclic Codes
Synonyms
Definition
Background
Theory
Applications
Cross-References
Recommended Reading
D
DAC
Data Act
Synonyms
Definition
Background
Theory and Application
Open Problems and Future Directions
Cross-References
References
Data Anonymization
Data Breach
Data Breach Impacts
Data Encryption
Data Encryption Standard (DES)
Background
Definition
Theory
Cryptanalysis of DES
Extensions of DES
Cross-References
Recommended Reading
Data Exfiltration
Synonyms
Definitions
Background
Theory/Application
Open Problems and Future Directions
Cross-References
References
Data Extrusion
Data Governance Act (DGA)
Synonyms
Definition
Background
Theory and Application
Open Problems and Future Directions
Cross-References
References
Data Leakage
Data Linkage
Synonyms
Definition
Background
Theory
Applications
Cross-References
Recommended Reading
Data Mining (Privacy in)
Synonyms
Definition
Background
Theory and Algorithms
Applications
Medical Databases
Bioterrorism Applications
Homeland Security Applications
Cross-References
Recommended Reading
Data Poisoning Attacks in Machine Learning
Synonyms
Definition
Background
Theory
Threat Model (A subsection of Theory)
Data Governance Scenarios (A subsection of Theory)
Attack Models (A subsection of Theory)
Defense Strategies (A subsection of Theory)
Open Problems and Future Directions
Cross-References
References
Data Privacy Regulations
Data Protection by Design
Data Protection by Design and by Default (DPbDD)
Synonyms
Definition
Background
Theory
Open Problems and Future Directions
Cross-References
References
Data Protection Impact Assessment (DPIA)
Synonyms
Definition
Background
Theory
Open Problems and Future directions
Cross-References
References
Data Protection Regulations
Data Remanence
Definition
Application
References
Data Theft
Database Administration Policies
Database Encryption
Synonyms
Definition
Theory
Encryption Level
Encryption Algorithm and Mode of Operation
Key Management
Open Problems and Future Directions
Cross-References
Recommended Reading
Database Governance Policies
Database Management Guidelines
Database Operational Policies
Database Protection
Data-Oblivious Shuffle
Davies-Meyer
Definition
Background
Theory
Cross-References
References
DDH Problem
De Bruijn Sequence
Definition
Theory and Application
Cross-References
Recommended Reading
Decentralized (Multi-authority) Attribute-Based Encryption
Decentralized Access Control
Decentralized Digital Identity
Decentralized Identity for IoT Systems
Synonyms
Definition
Background
Theory
Decentralized Identifiers (DIDs)
Example Scenario
Open Problems and Future Directions
Cross-References
References
Decentralized Trust Management
Deception
Deceptive Software and Networks
Decisional Diffie–Hellman Problem
Synonyms
Definition
Background
Theory
Candidate Groups
Applications
Cross-References
Recommended Reading
Decoding Algorithms
Synonyms
Definition
Background
Theory
Application
Cross-References
Recommended Reading
Decryption Exponent
Synonyms
Definition
Cross-References
Deduplication of Encrypted Data
Synonyms
Definition
Background
Theory
Applications
Open Problems
Cross-References
References
Deep Learning
Deniable Encryption
Definition
Theory
Cross-References
References
Denial of Service (DoS)
Denial-of-Service Detection
Synonyms
Definition
Background
Theory
Applications
Host Monitors
Network Monitors
Attack Detection Based on Observation of a Single Packet Stream
Deployment Issues: LAN Versus Network Edge Versus Tier-1 ISP
Collaborative Detection
Attacks Targeting Defenses
Attacks Targeting Vulnerabilities of Critical Infrastructure
Experimental Results
Open Problems and Future Directions
Recommended Reading
Deobfuscating Malware
De-obfuscation
Dependency Graphs
Synonyms
Definition
Background
Theory
Application
Open Problems and Future Directions
Cross-References
References
Derived Key
Synonyms
Definition
Theory
Cross-References
Recommended Reading
Designated Confirmer Signature
Synonyms
Definition
Theory
Applications
Open Problems
Cross-References
Recommended Reading
Designated Verifier Proofs
Cross-References
References
De-skewing
DES-X (or DESX)
Definition
Background
Theory
Cross-References
Recommended Reading
Detection and Threat-Hunting Approaches for Advanced Persistent Threats
Synonyms
Definition
Background
Application
APT Detection Mechanisms
Forensic Analysis and Threat Hunting of APTs
Open Problems and Future Directions
References
Detection-Based Countermeasure
Synonyms
Definitions
Background
Theory
Detection-Based Countermeasures
Redundancy in Hardware
Redundancy in Time
Redundancy in Information
Open Problems and Future Directions
Cross-References
References
Detector Placement Strategies
Synonyms
Definition
Background
Theory and Application
Game-Theoretic Approaches
Graph-Theoretic Approaches
Open Problems and Future Directions
Cross-References
References
Developer-Centred Security
Synonyms
Definitions
Background
Theory and Application
Open Problems and Future Directions
Cross-References
References
Device Pairing
DH Key Agreement
DHP
Dictionary Attack
Definition
Application
Cross-References
References
Dictionary Attack (I)
Definition
Theory
Cross-References
Differential Cryptanalysis
Cross-References
Recommended Reading
Differential Fault Analysis
Synonyms
Definitions
Background
Analyzing Block Ciphers
Analyzing Public-Key Algorithms
Countermeasures
Cross-References
References
Differential Power Analysis
Synonyms
Definitions
Background
Theory
Open Problems and Future Directions
Cross-References
References
Differential Privacy
Synonyms
Definition
Background
Theory
Achieving Differential Privacy
Applications
Experimental Results
Open Problems and Future Directions
Cross-References
Recommended Reading
Differential Privacy for Location-Based Systems
-Differential Privacy
Differential–Linear Attack
Definition
Theory
Cross-References
Recommended Reading
Differentially Oblivious Algorithms
Differentially Private Oblivious RAM
Differentially Private ORAM
Synonyms
Definition
Theory
Open Problems
Cross-References
References
Diffie-Hellman Key Agreement
Synonyms
Definition
Background
Theory
Applications
Cross-References
References
Diffie–Hellman Key Exchange
Diffie-Hellman Problem
Digest Authentication
Digital Certificate
Digital Control
Digital Crime
Digital Forensic Readiness
Digital Forensics for CPS
Digital Signature Scheme Based on McEliece
Definition
Theory
General Idea
Signature Scheme Using Complete Decoding
Signature Scheme Using a Counter
Security and Practice
Security
Signature Size
Cross-References
Recommended Reading
Digital Signature Schemes
Definition
Theory
Cross-References
References
Digital Signature Schemes from Codes
Definition
Theory
Stern Identification Scheme and Signature
General Idea
Description
The Fiat-Shamir Paradigm
Variations on the Scheme
The Kababtiansky-Krouk-Smeets Scheme
General Idea
The Protocol
Security
Specialized Signatures
Identity-Based Signature
Ring Signature
Cross-References
Recommended Reading
Digital Signature Standard
Background
Theory
Cross-References
Recommended Reading
Digital Steganography
Definition
Background
Theory
Security Definition
Information-Theoretically Secure Steganography
Computationally Secure Steganography
Public-Key Steganography
Cross-References
Recommended Reading
Dining Cryptographers (DC) Network
Definition
Background
Theory
Open Problems
Cross-References
References
Direct Anonymous Attestation
Definition
Theory
Application
Open Problems and Future Directions
Cross-References
References
Disclosure Window
Discrete Logarithm Problem
Synonyms
Definition
Background
Theory
Applications
Experimental Results
Open Problems
Cross-References
References
Discretionary Access Control (DAC) Policies
Synonyms
Definition
Background
Theory and Application
Vulnerabilities of the Discretionary Policies
Cross-References
References
Distinguishing Attacks
Definition
Theory
Applications
Cross-References
Recommended Reading
Distributed Differential Privacy
Distributed Identity
Distributed Oblivious RAM
Synonyms
Definition
Background
Theory
Model and Definition
The Hierarchical Approach
Tree-Based Schemes
Optimizing Communication Using Server-Side Computation
References
Distributed Oblivious Transfer
Definitions
Theory
Cross-References
References
Divide-and-Conquer Side-Channel Attacks
Definitions
Background
Theory and Application
Diffusion Property
Divide-and-Conquer Methodology
Attack Output
Asymmetric Cryptography
Open Problems and Future Directions
References and Citations
Citations
Cross-References
References
DLP
DNA
Synonyms
*-12pt
Background
Theory and Applications
DNA Fingerprinting
Amplified Fragment Length Polymorphism (AFLP)
Satellite DNA
Enzymes
Regulatory Sequence Analysis Tools
Public Databases
CODIS System
GenBank
EMBL
DDBJ
Open Problems
The Drawbacks of DNA Profiling
Privacy Issues
Recommended Reading
DNS-Based Botnet Detection
Definition
Background
Theory and Application
Cross-References
Recommended Reading
DoS Attacks in Wi-Fi Networks
Synonyms
Definitions
Background
Application
Reactive Jamming
Channel Estimation Jamming
Interleaving Jamming
Medium Access Control (MAC) Attacks
Rate Adaptation Algorithms (RAA) Attacks
Link Layer Attacks
Network-Level Cascading Attacks
DoS for Evil Twins
Friendly Jamming
Open Problems and Future Directions
Cross-References
References
DoS Pushback
Definition
Introduction
Theory
Pushback Mechanism
Open Problems
Discussion
Recommended Reading
Doubly Efficient Private Information Retrieval
Definitions
Background
Theory
Formal Definition
Syntax
Correctness
Double Efficiency
Security
Definitional Variants
Public Client
Malicious Preprocessing Security
Transparent Preprocessing
Candidate Constructions
Open Problems and Future Directions
Cross-References
References
DPA
Duplication
Dynamic Access Control Using Identity-Based Encryption
Synonyms
Definition
Background
Security Analysis
Efficiency
Open Problems and Future Directions
Cross-References
References
Dynamic Analysis
Synonyms
Definition
Theory
Applications
Cross-References
Recommended Reading
Dynamic Defenses
Dynamic Malware Analysis
Synonyms
Definition
Background
Theory and Application
Cross-References
Recommended Reading
Dynamic Program Analysis
Dynamic Root of Trust
Synonyms
Definition
Background
Theory and Applications
Cross-References
Recommended Reading
Dynamic Separation of Duties
E
E0
Definition
Background
Theory
Applications
Cross-References
Recommended Reading
Ear Biometrics
Ears in Biometrics and Identity Science
Synonyms
Definition
Background
History of Ear Biometrics
Ear Anatomy
Ear Recognition
Holistic Approaches
Local Approaches
Geometric Approaches
Hybrid Approaches
Deep Learning
Identity Science and Ear Biometrics
Gender Classification from Ear Images
Other Information
Open Problems and Future Directions
References
Eavesdropping
Synonyms
Definition
Background
Applications
Open Problems
Cross-References
Recommended Reading
ECC
ECG Authentication
ECG Biometrics
Synonyms
Definition
Background
Theory
Applications
Open Problems and Future Directions
Cross-References
References
ECG Identification
ECG Verification
ECM
Economics of Cybercrime: Identity Theft and Fraud
Synonyms
Definitions
Background
Collection of Identity Theft and Fraud Data
Agency Data
Surveys
Interviews
News Stories
Reports from Affected Organizations
Anecdotal Information
Open Problems and Future Directions
References
Economics of Information Sharing
Synonyms
Definition
Background
Theory and Application
Information Sharing Among Firms
Sharing Security Information
Open Problems and Future Directions
Cross-References
References
Economics of Personal Data
Definitions
Background
Theory and Application
Personal Data as an Asset
Fair Usage of Personal Data
Open Problems and Future Directions
Cross-References
References
Economics of Privacy and Personal Data
Synonyms
Definition
Theory and Application
Open Problems and Future Directions
Cross-References
References
Economics of Privacy and the Paradox of Privacy
Synonyms
Definition
Background
Theory
Open Problems and Future Directions
Cross-References
References
Economics of Privacy: Privacy, a Machine Learning Perspective
Synonyms
Definitions
Background
Application
Economics of Privacy
Open Problems and Future Directions
References
Economics of Software Vulnerability Markets
Synonyms
Definition
Background
Theory and Application
Standardization
Market Characteristics
Open Problems and Future Directions
References
Economics of Surveillance
Synonyms
Definitions
Theory
Open Problems and Future Directions
Cross-References
References
ECPP
Edwards Coordinates
Edwards Curves
Synonyms
Definition
Background
Applications
Theory
Experimental Results
Cross-References
Recommended Reading
EEG Biometrics
Definitions
Background
Theory
Open Problems and Future Directions
Cross-References
References
Efficiency of Hyperelliptic Curve Cryptosystems
e-Government
Electrocardiogram-Based Biometrics
Electromagnetic Attack
Definition
Introduction
Background
History
Theory
Principles
Advantages
Context
Countermeasures
Conclusion
Cross-References
Recommended Reading
Electro-Magnetic Fingerprinting
Electromagnetic Security
Electronic Cash
Definition
Theory
Applications
Open Problems and Future Directions
Cross-References
Editorial Note
References
Electronic Check
Synonyms
Definition
Background
Theory
Applications
Cross-References
Recommended Reading
Electronic Crime
Electronic Payment
Definition
Background
Theory
Applications
Cross-References
References
Electronic Postage
Definition
Background
Theory
Applications
Cross-References
Editorial Note
Recommended Reading
Electronic Purse
Electronic Voting Schemes
Definition
Background
Theory
Discussion
References
Electronic Wallet
Synonyms
Definition
Background
Theory
Applications
Cross-References
Editorial Note
Recommended Reading
ElGamal Digital Signature Scheme
Background
Theory
Cross-References
Recommended Reading
ElGamal Encryption
ElGamal Public Key Encryption
Synonyms
Definition
Theory
Cross-References
References
Elliptic Curve Cryptography
Synonyms
Definition
Background
Theory
Cross-References
References
Elliptic Curve Discrete Logarithm Problem
Definition
Background
Theory
Pollard's Rho Method
Index-Calculus Methods
Special-Purpose Algorithms
Attack on Prime-Field Anomalous Curves
Weil and Tate Pairing Attacks
Weil Descent
Cross-References
References
Elliptic Curve Isogenies
Definition
Applications
Theory
Vélu's Formulas
Endomorphism Ring
References
Elliptic Curve Key Agreement Schemes
Definition
Background
Application
Cross-References
References
Elliptic Curve Keys
Definition
Background
Application
Cross-References
References
Elliptic Curve Method for Factoring
Synonyms
Definition
Background
Theory
Applications
Experimental Results
Open Problems
Cross-References
Recommended Reading
Elliptic Curve Point Multiplication Using Halving
Definition
Background
Point Halving
Trace computations
Solving the quadratic equation
Computing square roots
Point Multiplication
Summary
References
Elliptic Curve Public-Key Encryption Schemes
Definition
Background
Applications
Cross-References
Recommended Reading
Elliptic Curve Signature Schemes
Definition
Background
Application
Cross-References
References
Elliptic Curve Trace computation
Elliptic Curves
Definition
Background
Theory
Simplified Weierstrass Equation
Group Law
Group Law for E/F:y2=x3+ax+b, char(F) ≠2,3
Group Law for E/F:y2+xy=x3+ax2+b, char(F) = 2
Group Order
Group Structure
Example
Cross-References
References
Elliptic Curves for Primality Proving
Synonyms
Definition
Background
Theory
Experimental Results
Cross-References
Recommended Reading
EMV
Definition
Background
Application: The EMV Architecture
The Transaction Flow
Offline Data Authentication (Offline CAM)
Online Card Authentication
Cardholder Verification Method
Terminal and Card Risk Management
Approved Algorithms
Cross-References
Recommended Reading
Encapsulation
Encoding
Encrypted Data Deduplication
Encrypted Data Indexing
Encrypted Keyword Index
Encrypted Ranked Search
Encrypted Relational Databases
Definitions
Background
Design Principles
Cross-References
References
Encrypted Search on Secure Enclaves
Encryption
Encryption – Historical Perspective
Definition
Example
Cross-References
Editorial Note
Recommended Reading
Encryption Exponent
Synonyms
Definition
Cross-References
Endowment Effect
Synonyms
Definitions
Theory
Open Problems and Future Directions
Cross-References
References
Enigma
Definition
Background
Theory (of Encryption and Cryptoanalysis)
Cross-References
Recommended Reading
Entity Authentication
Synonyms
Definition
Theory
Applications
Open Problems and Future Directions
Cross-References
References
Entity Authentication Protocol
Entity Resolution
Entropy Sources
Definition
Background
Theory
Entropy Density
Entropy Definition
Attack Models
Model 1
Model 2
Entropy Pool Architecture
Entropy Compression
Entropy Extraction
Experimental Results
Open Problems and Future Direction
Cross-References
Recommended Reading
ePassport Security
Error-Correcting Cyclic Codes
Error-Correction Decoding
Escrow Service
Ethical Aspects of Biometrics
Ethical Implications of Biometrics
Ethics of Biometrics
Synonyms
Definition
Background
Human Dignity
Surveillance
Privacy and Data Protection
Open Problems
Summary
References
Euclidean Algorithm
Synonyms
Definition
Background
Theory
Applications
Cross-References
Recommended Reading
Euclidean Lattice
Euclids Algorithm
Euler's Totient Function
Synonyms
Definition
Theory
Applications
Cross-References
Everywhere Second Preimage Resistant Hash Function (ESEC)
Evolution of Fault Attacks on Cryptosystems
Synonyms
Definitions
Background
Theory
Fault-Induced Information Leakage
Fault Injection Techniques
Countermeasures
Automated Tools
Open Problems and Future Directions
Cross-References
References
Exhaustive Key Search
Introduction
History
Modern Block Ciphers
Countermeasures
Frequent Key Changes
Eliminate Known Plaintext
Different Modes of Encryption
Extensive Key Setup
All-or-Nothing Encryption
Related Attacks
Conclusion
Cross-References
Recommended Reading
Existential Forgery of Digital Signatures
Definition
Applications
Recommended Reading
Explainable AI
Explainable Artificial Intelligence
Synonyms
Definition
Background
Theory
Open Problems and Future Directions
Cross-References
References
Explaining for the Paradoxical Behavior in Privacy Choices
Exploit and Vulnerability Trade
Exploit Dependency Graphs
Exploit Pricing
Exponential Key Exchange
Exponential Time
Definition
Theory
Applications
Cross-References
2k-Ary Exponentiation
Synonyms
Definition
Background
Theory
Cross-References
Recommended Reading
Exponentiation Algorithms
Definition
Background
Theory
General Exponentiation
Fixed-Base Exponentiation
Fixed-Exponent Exponentiation
Applications
Cross-References
Exposure
Exposure-Resilient Cryptography
Extend and Prune Side-Channel Attacks
Definitions
Background
Theory an Application
Elliptic Curve Cryptography
Extend and Prune Methodology
Applications: Attack Literature
Open Problems and Future Directions
References and Citations
Citations
Cross-References
References
Extended Euclidean Algorithm
Extension Field
Definition
Theory
Applications
Cross-References
Eye Region
Eye-Based Vascular Biometrics
Eye-Based Vascular Patterns
Synonyms
Definitions
Background
Commercial Systems
Open problems and Future directions
Mobile and On-the-Move Acquisition
Disease Impact and (Template) Privacy
Real-world Performance and Deployment
References
Eye-Based Vascular Recognition
F
3D Face
Synonyms
Definitions
Theory and Application
3D Face Representation
3D Face Acquisition
3D Face Recognition Systems
Open Problems and Future Directions
Summary
Cross-References
References
Face Association
Face Depth Map
Face Detection
Face Identification
Face Mesh
Face Morphable Model
Face Recognition from Still Images and Video
Synonyms
Definition
Background
Datasets
Face Detection and Alignment
Feature Representation
Face Association
Theory and Applications
Loss Function
Applications
Open Problems
References
Face Recognition Under Atmospheric Turbulence
Face Tracking
Face Verification
Facial Recognition
Factor Base
Definition
Applications
Cross-References
Factorization Circuits
Definition
Theory and Applications
Cross-References
Recommended Reading
Fail-Stop Signature
Definition
Background
Theory
Applications
Recommended Reading
Fair Exchange
Synonyms
Definition
Background
Theory
Cross-References
References
Fake Biometrics
False Data Filtering
False Data Injection Defense
Synonyms
Definition
Background
Theory and Application
Open Problems
Recommended Reading
Fast Correlation Attack
Definition
Theory
Applications
Cross-References
Recommended Reading
Fault Analysis
Fault Attack
Definition
Introduction
Fault Injection
Fault Exploitation
Cross-References
Recommended Reading
Fault Countermeasures
Fault Detection
Fault Diagnosis in Cyber-Physical Systems
Synonyms
Definitions
Background
Theory
Open Problems and Future Directions
Discrimination of Various Types of Faults
Distinguishing Faults from Malicious Attacks
Automated Decision-Making for Large-Scale CPS Systems
References
Fault Identification in Cyber-Physical Systems
Fault Injection
Fault Injection Attacks
Fault Isolation
Fault Sensitivity Analysis
Definitions
Introduction
FSA Attack on AES
Countermeasure
References
Fault Tolerance in Cyber-Physical Systems
Synonyms
Definitions
Theory and Application
Open Problems and Future Directions
Cross-References
References
FEAL
Cross-References
Recommended Reading
Fear Appeals
Feistel Cipher
Definition
Theory
Cross-References
Fermat Primality Test
Synonyms
Definition
Background
Theory
Cross-References
Recommended Reading
Fermat Test
Fermat's Little Theorem
Definition
Background
Theory
Cross-References
Recommended Reading
Field
Definition
Theory
Applications
Cross-References
File System Permissions
Filter Generator
Definition
Theory
Cross-References
Recommended Reading
Financial Innovation
Finger Back Surface Identification
Finger Dorsal Patterns Identification
Finger Knuckle Patterns Recognition
Finger Knuckle Print Recognition
Synonyms
Definition
Background
Theory
Characteristics of FKP Images
Construction of FKP Systems
Application
2D FKP Recognition
3D FKP Recognition
Open Problems and Future Directions
References
Finger Knuckle Surface Authentication
Finger Surface Identification
Finger Vein
Definitions
Background
Applications
Finger Vein Capture Devices
Biometric Recognition
Presentation Attack Detection
Biometric Template Protection
Finger Vein Quality
Commercial Use
Open Problems and Future Directions
References
Finger Vein Recognition
Fingerprint
Definition
Background
Theory
Fingerprint Images
Fingerprint Analysis
Fingerprint Matching
Security and Privacy in Fingerprint Recognition Systems
Open Problems and Future Directions
Summary
References
3D Fingerprint
Synonyms
Definitions
Background
Theory
3D Fingerprint Reconstruction
3D Fingerprint Recognition
Open Problems and Future Directions
Summary
References
Fingerprint Authentication
3D Fingerprint Recognition
3D Fingerprint Reconstruction
Fingerprinting
Definition
Background
Theory
Fingerprinting of Digital Data
Fingerprinting of Analog Data
Cross-References
Recommended Reading
Finite Field
Definition
Theory
Applications
Open Problems
Cross-References
Recommended Reading
FIPS 140-2
Synonyms
Definition
Background
Theory and Applications
Acronyms
Cross-References
Recommended Reading
Firewall
Definition
Theory
Additional Definitions
Recommended Reading
Firewall Policy Analysis
Firewalls
Synonyms
Definition
Background
Complexity of Managing Network Access Control Polices
Network Access Control Background
Theory and Applications
Modeling of Rule Relations
Classification of Access-List Conflicts
Intra-Policy Access-List Conflicts
Inter-Policy Access-List Conflicts
Classification of Map-List Conflicts
Overlapping-Session Conflicts
Multi-Transform Conflicts
Open Problems
Experimental Results
Recommended Reading
Fixed Window Exponentiation
Fixed-Base Exponentiation
Definition
Theory
Applications
Cross-References
Recommended Reading
Fixed-Exponent Exponentiation
Definition
Theory
Applications
Cross-References
Recommended Reading
Flexible Authorization Framework (FAF)
Definitions
Background
Theory
Open Problems and Future Directions
Cross-References
References
Flow Blocking
Flow Policies
Forensic Psychology
Forensic Readiness
Forensics Analysis for CPS
Forged Resets
Forgery of Digital Signatures
Definition
Theory
References
Formal Analysis of Cryptographic Protocols
Synonyms
Related Concepts
Definition
Background
Applications
Open Problems and Future Directions
References
Formal Analysis of Cryptographic APIs
Related Concepts
Definition
Background
Applications
References
Formal Methods
Formal Methods and Access Control
Definition
Background
Theory and Application
Open Problems and Future Directions
Cross-References
References
Formal Methods for the Orange Book
Synonyms
Definition
Background
Applications
Cross-References
Recommended Reading
Formal Methods in Certification and Evaluation
Synonyms
Definition
Background
A Key Distinction Used Is in the Common Criteria
Applications and Experiments
Open Problems
Cross-References
Recommended Reading
Formal Verification of Cryptosystems
Synonyms
Definition
Background
Applications
Open Problems
Cross-References
References
Forward Secrecy
FPGA Field Programmable Gate Array
FPGA Security
Synonyms
Definitions
Background
Theory
Open Problems and Future Directions
Cross-References
References
FPGA Trust
FPGAs in Cryptography
Synonyms
Definition
Background
Applications
Open Problems
Recommended Reading
Fraud
Fresh Re-keying
Definitions
Theory
Application
Time-Memory Trade-Off Attacks
Side-Channel Attacks
The Choice for g
Cross-References
References
Frictionless User Authentication
Synonyms
Definition
Background
Theory and Application
Open Problems and Future Directions
Cross-References
References
Function Field Sieve
Definition
Background
Theory
Experimental Results
Cross-References
Recommended Reading
Functional Safety
Fuzzy (Similarity) Search on Encrypted Data
Fuzzy Search on Encrypted Data
Fuzzy Searchable Encryption
Synonyms
Related Concepts
Definition
Background
Solutions
Open Problems
Cross References
References
G
Gait Biometrics
Gait Forensics
Gait Recognition
Synonyms
Definitions
Background
Algorithms
Segmentation
Time Series Features
Global Features
Matching
Benchmark Datasets and Performance
Open Problems and Future Directions
Cross-References
References
Galois Counter Mode
Synonyms
Definition
Background
Theory
Applications
Open Problems
Cross-References
Recommended Reading
Galois Message Authentication Code
Gap
Definition
Applications
Cross-References
Recommended Reading
GCD
GCM
GDPR
Gene
General Data Protection Regulation (GDPR)
Synonyms
Definition
Background
Theory
Chapter I: General provisions
Chapter II: Principles
Chapter III: Rights of the Data Subject
Chapter IV: Controller and Processor
Chapter V: Transfer of Personal Data to Third Countries or Internal Organizations
Chapter VI: Independent Supervisory Authorities
Chapter VII: Cooperation and Consistency
Chapter VIII: Remedies, Liability, and Penalties
Chapter IX: Provisions Relating to Specific Processing Situation
Chapter X: Delegated Acts and Implementing Acts
Chapter XI: Final Provisions
Open Problems and Future Directions
Cross-References
References
Generalized Mersenne Prime
Definition
Applications
Recommended Reading
Generator
Synonyms
Definition
Theory
Applications
Cross-References
Generic Attacks Against DLP
Synonyms
Definition
Background
Theory
Experimental Results
Cross-References
Recommended Reading
Generic Group/Ring Model
Definition
Cross-References
References
Genetic Code
Genome Privacy
Synonyms
Definitions
Background
Theory
Open Problems and Future Directions
Cross-References
References
Genomics
Geo-Indistinguishability
Synonyms
Definitions
Background
Theory
Open Problems and Future Directions
Cross-References
References
Geometry of Numbers
Geoprivacy
Geo-Social Networks (Privacy of)
Geo-Social Networks Privacy
Synonyms
Definitions
Background
Privacy Violations in geoSNs
Theory
Open Problems and Future Directions
Cross-References
References
GMAC
Synonyms
Definition
Background
Theory
Cross-References
Recommended Reading
GMR Signature
Definition
Background
Theory
Recommended Reading
Goldwasser–Micali Encryption Scheme
Definition
Background
Theory
Cross-References
Recommended Reading
Golomb's Randomness Postulates
Definition
Theory and Applications
Cross-References
Recommended Reading
GOST
Cross-References
Recommended Reading
Governance in Cyber-Physical Systems
Synonyms
Definition
Background
Theory
Open Problems and Future Directions
References
GPRS Tunneling Protocol (GTP)
Synonyms
Definition
Background
Application
Cross-References
References
Grant Statement
Definitions
Theory
Cross-References
References
Graph Anonymization
Graphical Authentication
Definition
Background
Theory and Application
Open Problems and Future Directions
Cross-References
References
Greatest Common Divisor
Synonyms
Definition
Background
Theory
Cross-References
Greatest Common Factor
Gröbner Basis
Synonyms
Definition
Open Problems
Cross-References
Recommended Reading
Group
Definition
Theory
Applications
Cross-References
Recommended Reading
Group Attestation
Group Behavior in Cybersecurity
Synonyms
Definition
Background: Group Behavior
Theory: Threshold Models of Collective Behavior
Application: Example in Cybersecurity
Open Problems and Future Directions
Cross-References
References
Group Key Agreement
Synonyms
Definition
Background
Requirements
Private Group Key Agreement for Small Groups
Authenticated Group Key Agreement, Provable Security
Authenticated Group Key Agreement: Robustness Against Insider Attacks
Group Key Agreement for Large Groups
Applications of GKA
Cross-References
Recommended Reading
Group Key Distribution
Group Key Exchange
Group Privacy
Group Signatures
Definition
Background
Theory
Applications
Cross-References
Recommended Reading
H
HABE
Hacking the Human
Hall Sensor Security, The
Synonyms
Definitions
Background
Theory
Hall Sensor Basics
Distinct Types of Batk
Generation of Batk
An Experimental Case Study
Results
Defense
Shielding
Robust Sensors
Open Problems and Future Directions
References
Hand Geometry Biometrics
Hand Geometry Recognition
Synonyms
Definitions
Background
Theory
Applications
Open Problems and Future Directions
Cross-References
References
Hand Shape Biometrics
Hand Vein Recognition
Hand-Based Vascular Biometrics
Hand-Based Vascular Patterns
Synonyms
Definitions
Background
Commercial Systems
Open Problems and Future Directions
Mobile and On-the-Move Acquisition
Disease Impact and (Template) Privacy
Real-World Performance and Deployment
References
Hand-Based Vascular Recognition
Handwriting
Handwriting Analysis
Synonyms
Definition
Background
Theory
Applications
Recommended Reading
Hard-Core Bit
Definition
Theory
Applications
Cross-References
Recommended Reading
Hardware Backdoor
Hardware Considerations for Post-quantum Cryptography
Hardware Implementation Explorations of Post-quantum Cryptographic Primitives
Hardware Intellectual Property Protection
Hardware Intellectual Property Reverse Engineering
Hardware Obfuscation
Hardware Obfuscation and Logic Locking
Synonyms
Definitions
Background
Application
Obfuscation Techniques
Attacks on Obfuscation
Open Problems and Future Directions
Cross-References
References
Hardware Security
Hardware Security in Cyber-Physical Systems
Definitions
Background
Theory
Open Problems and Future Directions
Cross-References
References
Hardware Security in the Age of Machine Learning
Synonyms
Definition
Background
Application
Machine Learning and Hardware for Security
Machine Learning and Security of Hardware
Open Problems and Future Directions
Cross-References
References
Hardware Security Module
Background
Theory
Useful Links
Definitions (Extracted from ISO 15408)
Tamper Evidence Requirement
Tamper Resistance Requirements
Cross-References
Hardware Trojan
Synonyms
Definition
Background
Theory and Application
Open Problems and Future Directions
Cross-References
References
Hardware Trojan Horse
Hardware Trojans
Hardware-Induced Covert Channels in Wireless Networks: Risks and Remedies
Synonyms
Definitions
Background
Covert Channel Attacks in Wireless Networks
Baseband Attack
Analog/RF Trojan
Hardware Trojan Defense Solutions
Channel Noise Profiling
Adaptive Channel Estimation (ACE)
Open Problems and Future Directions
Formal Metric
Extension to Future Wireless Networks
Covert Channel Prevention
References
Hash Agility
Definition
Background
Theory and Applications
Protocols and Applications
Devices
TPMs and Hash Agility
Key Storage
Platform Control Registers
Certificate Chains
Cross-References
Recommended Reading
Hash Chain
Synonyms
Definition
Background
Theory
Application
Open Problems and Future Directions
Cross-References
References
Hash Functions
Introduction
One-Way Hash Function (OWHF)
Collision Resistant Hash Function (CRHF)
Relation Between Definitions
Black-Box Attacks on Hash Functions
Black-Box Attacks on the Compression Function
Attacks Dependent on the Internal Details of the Compression Function
Attacks Dependent on the Interaction with the Signature Scheme
Custom Designed Hash Functions
Hash Functions Based on a Block Cipher
Hash Functions Based on Algebraic Structures
Recommended Reading
Hash Tree
Hash-Based Message Authentication Code
Hash-Based Signatures
Synonyms
Definition
Theory
Applications
Cross-References
Recommended Reading
Header Injections
Header-Based Attacks
Synonyms
Definition
Background
Theory
Header Attacks Below the Application Layer
Header Attacks at the Application Layer Level
Applications
Recommended Reading
Herding Behavior
Heredity
HIBE
Hierarchical Identity-Based Encryption and Attribute-Based Encryption
Synonyms
Definitions
Background
Theory
Open Problems and Future Directions
References
Hierarchical ORAM Constructions
Definition
Background
Theory
Memory Organization
Accessing Virtual Words
Merging and Remapping Layers
Open Problems and Future Directions
Cross-References
References
High Assurance Evaluation Methods
Higher Order Derivative Attack
Hippocratic Database
Synonyms
Definition
Background
Theory
Applications
Open Problems
Recommended Reading
History-Based Separation of Duties
HMAC
Synonyms
Definition
Background
Theory
Applications
Open problems
Cross-References
References
Homomorphic Cryptosystems
Homomorphism
Definition
Theory
Applications
Cross-References
Recommended Reading
Horizontal Scaling
HRU
Background
Definition
Theory
Applications
Open Problems and Future Directions
Cross-References
Recommended Reading
HTTP Authentication
Synonyms
Definition
Background
Applications
Open Problems
Cross-References
Recommended Reading
HTTP Basic Authentication
HTTP Cookie
HTTP Digest Access Authentication Scheme
HTTP Digest Authentication
Synonyms
Definition
Background
Applications
Cross-References
Recommended Reading
HTTP Session Security
Synonyms
Definition
Background
Theory
Open Problems
Cross-References
Recommended Reading
HTTPS, HTTP Over TLS
Definition
Background
Theory
Cross-References
Recommended Reading
Human Factors in Secure Software Development
Human Rights and Cybersecurity
Definition
Theory
Future Directions
Cross-References
References
Human Security Behavior
Hybrid Cyber Range
Synonyms
Definitions
Background
Hybrid Cyber Range Functionalities
Open Problems and Future Directions
References
Hybrid Encryption
Definition
Background
Theory
Another Direction Without Random Oracle
Cross-References
References
Hyperelliptic Curve Discrete Logarithm Problem (HECDLP)
Hyperelliptic Curve Security
Synonyms
Definition
Background
Theory
Generic Methods
Index Calculus Methods
Curves of Large Genus
Curves of Small Genus
Curves Over Field Extensions
Special-Purpose Algorithms
Weil and Tate Pairing Attacks
Weil Descent
Curve Mappings
Cross-References
References
Hyperelliptic Curves
Synonyms
Definition
Theory
General Curve Isomorphisms
Group Law
Group Order and Structure
Examples
First Example
Second Example
Cross-References
References
Hyperelliptic Curves Performance
Synonyms
Definition
Background
Application and Experimental Results
Curves Over Prime Fields
Curves Over Binary Fields
Cross-References
References
I
IBE
IBE: Identity-Based Encryption
IBS: Identity-Based Signature
IC Integrated Circuit
IC-Integrated Circuit
ICS
ID-Based Encryption
Idea
Definition
Background
Theory
Cross-References
Recommended Reading
Identification
Definition
Theory
Identity Uniqueness
Authorities for Naming and Authentication
Cross-References
References
Identifier
Identity Authentication
Identity Management
Related Concepts
Definition
Background
Theory
Applications
Experimental Results
Open Problems and Future Directions
References
Identity Management for Cyber-Physical Systems
Definitions
Background
Application
Open problems and Future directions
Cross-References
References
Identity Proof
Identity Theft
Identity Verification Protocol
Synonyms
Definition
Theory
Applications
Cross-References
References
Identity-Based Cryptosystems
Synonyms
Definition
Background
Theory
Identity-Based Signatures
Generic IBS from Any Signature
The Guillou–Quisquater IBS
The Bellare–Namprempre–Neven IBS
Other IBS Schemes Based on Specific Number Theoretic Assumptions
Identity-Based Encryption from Quadratic Residuosity: The Cocks IBE
Cross-References
Recommended Reading
Identity Based Encryption
Synonyms
Definitions
Background
Theory
Application
References
Identity-Based Encryption: Historical Perspective and Hierarchical Systems
Synonyms
Definition
Background
Theory
Applications
Open Problems
Cross-References
References
IDS Deployment
IDS: Intrusion Detection System
IFA
IIoT
ILS
Impacts of Information Privacy Violations
Synonyms
Definition
Background
Theory and Application
Open Problems and Future Directions
Cross-References
References
Impersonation
Impersonation Attack
Synonyms
Definition
Application
Open Problems and Future Directions
Cross-References
Recommended Reading
Implicit Authentication
Implicit Key Authentication
Impossible Differential Attack
Definition
Background
Theory
Cross-References
Recommended Reading
Incentives for Distributed Ledgers
Definition
Theory
Open Problems and Future Directions
Cross-References
References
Incident Analysis
Index Calculus Method
Definition
Theory
Applications
Implementation Choice and Complexity Estimate
Variants of the Algorithm
Index Calculus Using the Number Field Sieve
Index Calculus and Elliptic Curves
Cross-References
Recommended Reading
Indistinguishability of Encryptions
-Indistinguishability
Industrial Control Network
Industrial Control Systems
Industrial Internet
Industrial Internet of Things
Synonyms
Definition
Background
Application
Open Problems and Future Directions
Cross-References
References
Industry 4.0
Ineffective Fault Attack
Synonyms
Definitions
Background
Theory/Application/Both
Open Problems and Future Directions
Cross-References
References
Infection Risk Prediction and Management
Synonyms
Definitions
Background
Open Problems and Future Directions
Cross-References
References
Infective Countermeasures
Synonyms
Definitions
Background
Theory
Open Problems and Future Directions
Cross-References
References
Inference Attacks
Inference Control
Definitions
Background
Theory
Application
Open Problems and Future Directions
Cross-References
References
Information Assurance
Information Cascades
Information Disclosure
Synonyms
Definitions
Background
Theory
Open problems and Future directions
Cross-References
References
Information Economics
Information Flow and Noninterference
Synonyms
Definitions
Background
Theory
The Lattice Model
Noninterference
Transitive and Intransitive Flow
Dealing with Nondeterminism
Verification and Refinement
Other Variants
Application
Open Problems and Future Directions
Cross-References
References
Information Flow Policies
Synonyms
Definitions
Theory
Security Domains and Levels
Specifying Security Requirements
Declassification and Endorsement
Application
Cross-References
References
Information Integrity
Information Leakage
Information Privacy Requirements
Synonyms
Definition
Background
Theory and Application
Open Problems and Future Directions
Cross-References
References
Information Privacy Awareness
Synonyms
Definition
Background
Theory and Application
Open Problems and Future Directions
References
Information Privacy Costs
Information Privacy Law
Information Security (InfoSec)
Information Security Awareness
Synonyms
Definition
Background
Theory and Applications
Open Problems and Future Directions
Cross-References
References
Information Security Culture
Synonyms
Definition
Background
Theory
Definition
Dominant and Subcultures
Factors that Influence the Information Security Culture
Measuring the Information Security Culture
Open Problems and Future Directions
Cross-References
References
Information Security Management System
Information Security Policy Adherence
Information Security Policy Compliance
Synonyms
Definition
Background
Theory and Applications
Open Problems and Future Directions
Cross-References
References
Information Security Policy Compliance Capacities
Information Security Policy Compliance Competences
Synonyms
Definition
Background
Theory and Applications
Open Problems and Future Directions
Cross-References
References
Information Security Policy Compliance Competency
Information Security Risk Treatment
Synonyms
Definition
Theory
References
Information Security Skills
Information Theoretic Model
Information Theory
Shannon's Main Theorem
Cross-References
Recommended Reading
Information-Flow Security
Initial Coin Offering
Synonyms
Definition
Background
Theory and Application
Open Problems and Future Directions
Cross-References
References
Initial Token Distributions
Initial Trust Establishment
Insider Attack
Insider Problem
Insider Threat
Synonyms
Definition
Theory and Application
Prediction
Detection
Open Problems and Future Directions
Cross-References
References
Insider Threat Defense
Definition
Background
Theory
Experimental Results
Open Problems
Recommended Reading
Instant Disclosure
Integer Factoring
Definition
Background
Theory and Applications
Methods for Integer Factorization
Establishing Compositeness
Distinct Factors
Repeated Factors
Trial Division
Pollard's rho Method
Pollard's p − 1 Method
Generalizations of Pollard's p − 1 Method
Usage of “Strong Primes” in RSA
Cycling Attacks Against RSA
Elliptic Curve Method for Factoring
Fermat's Method and Congruence of Squares
The Morrison–Brillhart Approach
Matrix Step
Dixon's Random Squares Method
Continued Fraction Method (CFRAC)
Note on the Size of RSA Moduli
Linear Sieve
Quadratic Sieve
Number Field Sieve
Cross-References
Recommended Reading
Integrated Circuit
Integrated Circuit Card
Integrity and Encryption
Integrity Model
Intellectual Property
Intelligence Distribution to Prevent Attacks
Interactive Argument
Synonyms
Interactive Proof
References
Interactive Proof
Synonyms
Cross-References
References
Interactive Proof Systems
Interactive Theorem Proving and Security
Interactive Verification
Interactive Verification of Security Properties
Synonyms
Definition
Theory
Applications
Open Problems and Future Directions
Cross-References
References
Interception
Interconnection
Interdependent Location Privacy
Synonyms
Definitions
Background
Discussion
Open Problems and Future Directions
Cross-References
References
Interdependent Privacy (IDP)
Synonyms
Definitions
Background
Theory
Statistical Inference
Game Theory
Cryptography and Access Control
Communication Privacy Management (CPM) Theory
Open Problems and Future Directions
Cross-References
References
Internet Fraud
Interpolation Attack
Cross-References
Recommended Reading
Intrusion Detection in Ad Hoc Networks
Definition
Background
Theory
Applications
Experimental Results
Open Problems
Recommended Reading
Intrusion Tolerance
Invasive Attacks
Definition
Background
Smart Card Security
Overview of Attacks on Smart Cards
Social Attacks
Logical Attacks
Invasive Attacks
Access to Silicon
Delayering
Block Localization
Memory Content Extraction
ROM
RAM
EEPROM or FLASH
Bus Localization
Chip Probing
Chip Modification
Protection Against Physical Attacks
Conclusion
Inverse Biometrics: Privacy, Risks, and Trust
Synonyms
Definitions
Background
Theory
Privacy, Risk, and Trust
Applications
Summary
Open Problems
References
Inversion Attack
Definition
Theory
Original Inversion Attack
Generalized Inversion Attack
Cross-References
Recommended Reading
Inversion in Finite Fields and Rings
Synonyms
Definition
Theory
Extended Euclidean Algorithm
Fermat's Little Theorem
Look-Up Tables
Reduction to Subfield Inversion
Direct Inversion
Applications
Cross-References
Recommended Reading
Inversion in Galois Fields
IOC: Indicators of Compromise
iOS Security Framework: Understanding the Security of Mobile Phone Platforms
Synonyms
Definition
Background
Application
App Development
App Runtime
Protecting User Data
Cross-References
References
IP Traceback
Definition
Background
Theory
Return Packets
In-Net State
Packet Marking
Experimental Results
Open Problems
Recommended Reading
IP: Internet Protocol
IPES
Definition
Cross-References
Recommended Reading
IPsec
Definition
Background
Theory
IPsec Components
Packet Processing
Key Exchange
IPsec and NAT
Policy and Configuration
Recommended Reading
IPSec Policy Analysis
Iris Recognition
Definitions
Background
Theory
Applications
Open Problems and Future Directions
References
Irreducible Polynomial
Definition
Theory
Cross-References
ISMS: A Management Framework for Information Security
Synonyms
Definition
Background
Theory
Applications
Recommended Reading
ISO 15408 CC – Common Criteria
ISO 19790 2006 Security Requirements for Cryptographic Modules
ISO/IEC 15408
ISO/IEC 27001
ISO-9796 Signature Standards
Definition
Background
Theory
Applications
Recommended Reading
Issuer
Definition
Recommended Reading
IT Forensic Readiness
Synonyms
Definition
Background
Theory and Application
Open Problems and Future Directions
Cross-References
References
Itoh–Tsujii Inversion AlgorithmWork done while the author was at Philips Research, The Netherlands
Definition
Related Concepts
Theory
Optimizations and Applications
Recommended Reading
IT-Security Capability Maturity Model
J
Jacobi Symbol
Background
Definition
Theory
Applications
Cross-References
Recommended Reading
Jamming Attack Defense
Synonyms
Definitions
Background
Spread spectrum techniques
Theory and Applications
Jamming Attack Defense in the Physical Layer
Power control
Jamming Attack Defense in the Link Layer and Layers Above
Error-correcting code
Link-layer channel adaptation
Spatial retreats
Convert timing channels
Jamming-resilient multipath routing
Open Problems and Future Directions
References
Jamming Resistance
Definition
Background
Theory
Recommended Reading
K
k-Anonymity
Definitions
Background
Theory and Application
Generalization and Suppression
Algorithms for Enforcing k-Anonymity
Open Problems and Future Directions
Cross-References
References
Karatsuba Algorithm
Definition
Theory
Applications
Cross-References
Recommended Reading
Kasumi/Misty1
Cross-References
Recommended Reading
Keeloq
Definition
Background
Theory
Applications
Cross-References
Recommended Reading
Kerberos
Synonyms
Definition
Background
*-10pt
Weaknesses and Limitations
Applications
Cross-References
Recommended Reading
Kerberos Authentication Protocol
Related Concepts
Definition
Background
Applications
References
Kerckhoffs Law
Kerckhoffs' Principle
Synonyms
Definition
Background
Recommended Reading
Key
Definition
Background
Cross-References
Recommended Reading
Key Agreement
Synonyms
Definition
Background
Theory
Applications
Cross-References
References
Key Authentication
Synonyms
Related Concepts
Definition
Theory
Open Problems and Future Directions
Cross-References
References
Key Encrypting Key (KEK)
Key Encryption Key
Definition
Background
Theory
Open Problems
Cross-References
Recommended Reading
Key Enumeration
Synonyms
Definitions
Background
Application
Open Problems and Future Directions
Cross-References
References
Key Escrow
Synonyms
Definition
Background
Theory
Applications
Cross-References
References
Key Generation Using Physical Properties of Wireless Communication
Definition
Background
Theory
Open Problems
Experimental Results
Recommended Reading
Key Life Cycle Management
Key Management
Synonyms
Definition
Background
Theory
Symmetric or Secret Key Cryptography
Background
Initialization
Distribution
Cancellation
Summary and Observations
Asymmetric or Public Key Cryptography
Initialization
Distribution
Cancellation
Summary and Observations
Open Problems
Cross-References
References
Key Recovery
Key Search with Hints
Key Variation
Keyboard Dynamics
Synonyms
Definition
Background
Theory
Applications
Experimental Results
Open Problems and Future Directions
Cross-References
References
Keylogging
Synonyms
Definition
Application
References
Key-Policy ABE
Keystream
Keystroke Biometrics
Keystroke Dynamics
Synonyms
Definitions
Background
Theory
Applications
Open Problems and Future Directions
Cross-References
References
Keystroke Logging
Kleptographic Attack
Kleptography
Synonyms
Definitions
Background
Theory
Applications
Open Problems and Future Directions
Cross-References
References
km-Anonymity
Synonyms
Definitions
Background
Theory
Application
Open Problems and Future Directions
Cross-References
References
Knapsack Cryptographic Schemes
Definition
Relevance to Modern Public Key Systems
Introduction
The Cryptographic Knapsack Scheme: An Introduction
The Encryption in Additive Knapsack Schemes
The Decryption
The Merkle–Hellman Trapdoor
A Survey of the History of the Cryptographic Knapsack
The Trials to Avoid Weaknesses and Attacks for the Class of Usual Knapsacks
The Case of Usual Knapsacks with Other Encryption Functions
The Multiplicative Knapsack Scheme and Its History
The Trapdoor Knapsack Schemes to Protect Signatures and Authenticity
Some Details
The Existence of Infinitely Many Decryption Keys
The LLL Algorithm
The Use of the LLL Algorithm in Brickell's Low Dense Attack
Conclusion
Cross-References
References
Known Plaintext Attack
Definition
Cross-References
Recommended Reading
Koblitz Elliptic Curves
Synonyms
Definition
Background
Application
Cross-References
References
L
Lamport One-Time Signatures
Late Launch
Lattice
Synonyms
Definition
Background
Theory
Applications
Cross-References
Recommended Reading
Lattice Basis Reduction
Lattice Reduction
Synonyms
Definition
Background
Theory
Applications
Open Problems
Experimental Results
Cross-References
Recommended Reading
Lattice-Based Cryptography
Definition
Background
Theory
Applications
Open Problems
Cross-References
Recommended Reading
Layer-2 Protocol
Synonyms
Definitions
Background
Theory
Payment & State Channels
Operator/Client Protocols
Optimistic OCPs
OCPs with Non-Interactive Proofs
Open Problems and Future Directions
Cross-References
References
LCM
-Diversity
Definition
Background
Theory
Open Problems
Cross-References
Recommended Reading
Leakage Resilience
Synonyms
Definitions
Background
Theory
Applications
Open Problems and Future Directions
Cross-References
References
Leakage-Resilient Cryptography
Least Common Multiple
Synonyms
Definition
Theory
Cross-References
Least Privilege
Synonyms
Definition
Theory
Cross-References
References
Ledger Consensus
Legendre Symbol
Background
Definition
Theory
Cross-References
Lemming Effect
Levels of Trust
Synonyms
Definition
Background
Theory
Applications
Level 1 Trust (Very Low Risk of Compromise)
Level 2 Trust (Low Risk of Compromise)
Level 3 Trust (Medium Risk of Compromise)
Level 4 Trust (High Risk of Compromise)
Level 5 Trust (Very High Risk of Compromise)
Open Problems
Cross-References
Recommended Reading
LFSR
Linear Complexity
Definition
Theory
Cross-References
Recommended Reading
Linear Congruential Generator
Definition
Example
Background
Applications
Cross-References
Recommended Reading
Linear Consistency Attack
Definition
Theory
Cross-References
Recommended Reading
Linear Cryptanalysis for Block Ciphers
Definition
Background
Theory
Outline of a Linear Attack
Piling-up Lemma
Matsui's Search for the Best Approximations
Linear Hulls
Provable Security Against Linear Cryptanalysis
Comparison with Differential Cryptanalysis
Extensions
Cross-References
Recommended Reading
Linear Cryptanalysis for Stream Ciphers
Definition
Background
Theory
Cross-References
Recommended Reading
Linear Feedback Shift Register
Synonyms
Definition
Theory
Cross-References
Recommended Reading
Linear Syndrome Attack
Definition
Cross-References
Recommended Reading
List Decoding
Liveness Detection
L Notation
Definition
Theory
Cross-References
Location Information (Privacy of)
Synonyms
Definitions
Background
Theory
Application
Open Problems and Future Directions
Cross-References
References
Location Privacy
Location Privacy in Ride-Hailing Service
Synonyms
Definitions
Background
Theory
Open Problems and Future Directions
References
Location Privacy in Social Networks
Location Privacy in Wireless Networks
Synonyms
Definition
Background
Theory
Applications
Cross-References
Recommended Reading
Location Privacy Metrics
Location Privacy Protection in Ride-Hailing Service
Location Privacy Quantification
Location Semantics
Synonyms
Definitions
Background
Theory
Application
Open Problems and Future Directions
Cross-References
References
Logic Bomb
Definition
Background
Theory and Applications
Cross-References
Recommended Reading
Logic Decryption
Logic Locking
Logic-Based Policy Languages
Related Concepts and Keywords
Definition
Background
Theory
Implementations
Open Problems and Future Directions
References
Longest Chain Protocol
Synonyms
Definition
Background
Theory
Applications
Open Problems and Future Directions
Cross-References
References
Longhand
Lower Bound for the Bandwidth Cost of Oblivious RAMs
Luby-Rackoff Ciphers
Definition
Background
Theory
Cross-References
Recommended Reading
M
MAA
Synonyms
Definition
Background
Theory
Cross-References
References
MAC Algorithms
Introduction
Definition
Security of MAC Algorithms
Forgery Attack
Key Recovery Attack
Brute Force Key Search
MAC Guessing Attack
Internal Collision Attack on Iterated MAC Algorithms
Weaknesses of the Algorithm
Practical MAC Algorithms
Based on Block Ciphers
Based on Cryptographic Hash Functions
Dedicated MAC Algorithms
Cross-References
Recommended Reading
Machine Learning
Machine Learning (Data Mining) for Privacy Policy Summarization
Machine Learning for Attack Detection
Machine Learning for Network Intrusion Detection
Synonyms
Definitions
Background
Theory and Application
Open Problems and Future Directions
References
Machine Learning in Secured Computing
Definitions
Background
Theory and Applications
Classical Machine Learning
Supervised Learning
Unsupervised Learning
Reinforcement Learning
Deep Learning
Emerging Machine Learning Framework
Open Issues and Future Directions
Cross-References
References
Machine Readable Travel Document Security
Macrodata Disclosure Limitation
Macrodata Disclosure Protection
Macrodata Protection
Synonyms
Definition
Background
Theory
Discovering sensitive cells
Protecting sensitive cells
Application
Cross-References
References
Malicious Circuit
Malicious Cryptography
Maliciously Modified Set of Administrative Tools
Malware
Malware Behavior Clustering
Definition
Theory
Cross-References
Recommended Reading
Malware Detection
Synonyms
Definition
Background
Rapid Releases of Malware Variants
Poly- and Metamorphic Malware
Theory and Applications
Signature Matching
Static Analysis
Dynamic Analysis
Cross-References
Recommended Reading
Managing and Monitoring Social Network Privacy Policies
Synonyms
Introduction
Potential Policy Misconfigurations
Proposed Treemap-Based Visualization
Conclusion and Future Directions
References
Mandatory Access Control (MAC) Policies
Definition
Theory
Cross-References
References
Maneuvering
Man-in-the-Middle and Relay Attack
Definition
Theory
Experimental Results
References
Manipulation Detection Code-2
Manipulation Detection Code-4
MARS
Cross-References
Recommended Reading
MASH Hash Functions (Modular Arithmetic Secure Hash)
Definition
Background
Theory
Cross-References
Recommended Reading
Masking Countermeasure
Synonyms
Definition
Theory
Masking in Practice
Open Problems and Future Directions
Cross-References
References
Master Key
Synonyms
Definition
Applications
Open Problems and Future Directions
Cross-References
References
Maurers Algorithm
Maurer's Method
Synonyms
Definition
Background
Theory and Applications
Cross-References
Recommended Reading
Maximal-Length Sequences
Synonyms
Definition
Theory
Applications
Cross-References
Recommended Reading
Maxims
Cross-References
Recommended Reading
McEliece Public Key Cryptosystem
Definition
Theory
General Idea
Description
Security and Practice
Security Reduction
Best Known Attacks
System Implementation
Recommended Reading
MD4 Hash Function
MD4-MD5
Synonyms
Definition
Theory
Description
Applications
Attacks
Attacks on the Short Output Length
Collision Attacks
Preimage Attacks
Attacks on Concatenated Combiners
Open Problems
Cross-References
Recommended Reading
MD5 Hash Function
MDC-2 and MDC-4
Synonyms
Definition
Background
Theory
Open Problems and Future Directions
Cross-References
References
Measurement Models of Software Security
Measuring Location Privacy
Synonyms
Definitions
Background
Theory
Error-Based Metrics
Uncertainty-Based Metrics
Information Gain Metrics
Success-Based Metrics
Time-/Distance-Based Metrics
Indistinguishability Metrics
Application
Open Problems and Future Directions
Cross-References
References
Mechanized Theorem Proving
Meet-in-the-Middle Attack
Definition
Cross-References
Recommended Reading
Melbourne Shuffle, The
Synonyms
Definitions
Background
Theory
Shuffle Pass
The Melbourne Shuffle
Security
Performance
Further Information
Cross-References
References
Meltdown
Synonyms
Definitions
Background
Theory
Application
Open Problems and Future Directions
Cross-References
References
Meltdown Attack
Membership Inference Attacks in Machine Learning
Synonyms
Definition
Background
Theory
Threat Model
Data Governance Scenarios
Attack Models
Defense Strategies
Open Problems and Future Directions
Cross-References
References
Memory and State Exhaustion Denial of Service
Synonyms
Definition
Background
Theory
Applications
Cross-References
Recommended Reading
Memory and State Exhaustion DoS
Memory Overflow
Merkle Trees
Synonyms
Definitions
Background
Theory
Integrity Verification
Merkle Tree
Applications
Cross-References
References
Merkle-Hash-Trees Signatures
Mersenne Prime
Definition
Background
Applications
Message Authentication Algorithm
Message-Locked Encryption
Metrics of Software Security
Synonyms
Definition
Background
Theory
Measurements and Qualitative Models
Defense Patterns, Attack Patterns, and Related Measurements
Attack Trees
Toward Quantitative Predictive Models
Probability-Based and Reliability-Like Models
Applications
Open Problems and Future Directions
Cross-References
References
Meyer-Schilling Hash Functions
MIA
Microdata Anonymization Techniques
Microdata Disclosure Limitation
Microdata Disclosure Protection
Microdata Masking Techniques
Synonyms
Definition
Theory
Applications
Cross-References
Recommended Reading
Microdata Protection
Synonyms
Definition
Background
Theory
Classification of microdata disclosure protection techniques
Assessing microdata confidentiality and utility
Application
Open problems
Cross-References
References
Microdata Statistical Disclosure Control
Milieu
Miller–Rabin Probabilistic Primality Test
Synonyms
Definition
Background
Theory and Applications
Cross-References
Recommended Reading
Miller-Rabin Test
MILS
Minimal Polynomial
Definition
Cross-References
Minimal Privilege
m-Invariance
Definition
Theory
Cross-References
Recommended Reading
MIPS-Year
Definition
Background
Theory
Applications
Cross-References
Recommended Reading
Miss-in-the-Middle Attack
Definition
Background
Cross-References
Recommended Reading
MITRE ATT&CK: MITRE Adversarial Tactics, Techniques, and Common Knowledge
Mix Networks
Synonyms
Definition
Background
Theory and Application
Cryptographic Unlinkability of Messages
Strategies for Reordering Messages
Anonymous Routing
Open Problems and Future Directions
Tradeoffs Between Anonymity, Latency and Traffic Volume
Statistical Disclosure Attacks
Key Distribution and Management
Unobservability and Undetectability
Applications
Cross-References
References
MixSlice
Definition
Background
Theory
Access Management
Open Problems and Future Directions
Cross-References
References
Mixnets
Mix-Nets
Mix-Zones in Wireless Mobile Networks
Definition
Background
Theory and Applications
Open Problems and Future Directions
Cross-References
References
ML Data Poisoning
ML Membership Inference
ML-Sequence
Mobile Application Security
Mobile Device Security
Mobile Payments
Definition
Background
Theory
Applications
Recommended Reading
Mobile Platform Security
Mobile Wallet
Definition
Theory
Applications
Cross-References
Recommended Reading
Modes of Operation of a Block Cipher
Cross-References
Recommended Reading
Modular Arithmetic
Synonyms
Definition
Background
Theory
Introduction
Modular Arithmetic Operations
Multiplicative Groups and Euler's ϕ Function
Prime Fields
Cross-References
Recommended Reading
Modular Root
Definition
Background
Theory
Open Problems
Cross-References
Modulus
Definition
Background
Cross-References
Monitor Placement Strategy
Monitoring
Monotone Signatures
Definition
Cross-References
Recommended Reading
Montgomery Arithmetic
Definition
Background
Theory
Introduction
Montgomery Exponentiation
Efficient Montgomery Multiplication
Application to Finite Fields
Secure Montgomery Multiplication
Cross-References
Recommended Reading
Moore's Law
Definition
Background
Theory
Applications
Cross-References
Recommended Reading
Moving Target Defense
Synonyms
Definition
Background
Theory
Application
Open Problems and Future Directions
Cross-References
References
Moving Target Techniques
MPKC
MQ
m-sequence
Multi-authority and Decentralized Attribute-Based Encryption
Synonyms
Definition
Background
Theory and Applications
Open Problems and Future Directions
References
Multibiometrics
Synonyms
Definition
Background
Theory
Applications
Open Problems
Cross-References
Recommended Reading
Multicast Authentication
Multicast Stream Authentication
Multi-client Oblivious RAM
Synonyms
Definitions
The Role of Each Entity
Security
Related Notions
Efficiency
Design Challenge
Open Problems and Future Directions
Cross-References
References
Multidimensional Databases
Multi-Exponentiation
Multifactor Authentication
Multilevel DBMS
Definitions
Theory
Application
Cross-References
References
Multilevel Security Policies
Definition
Background
Theory
Cross-References
Recommended Reading
Multiparty ComputationEditors' note: Due to the increased set of applications of privacy enhancing technologies, designing more efficient multiparty computation protocols, improving both fundamental methods and implementations has been an area of extensive research since 2010.
Synonyms
Definition
Background
Theory
Applications
Cross-References
References
Multiparty Privacy
Multiple Encryption
Definition
Cross-References
Multiple Independent Levels of Security
Synonyms
Definition
Background
Applications
MILS Principles
Cross-References
Recommended Reading
Multiplicative Knapsack Cryptosystem
Definition
Open Problems
Cross-References
Recommended Reading
Multiprecision Multiplication
Synonyms
Definition
Background
Theory
Applications
Recommended Reading
Multiprecision Squaring
Synonyms
Definition
Background
Theory
Applications
Cross-References
Recommended Reading
Multi-Reader-Multi-Writer Searchable Encryption
Multi-Reader-Single-Writer Searchable Encryption
Multi-Server Oblivious RAM
Multiset Attack
Definition
Background
Theory
Cross-References
Recommended Reading
Multi-Subject Privacy
Multi-Threaded Implementation for Cryptography and Cryptanalysis
Definition
Background
Theory
Applications
Open Problems
Cross-References
Recommended Reading
Multi-User Keyword Search in Encrypted Database
Multi-User Searchable Encryption
Synonyms
Definition
Background
Theory
Cross-References
References
Multivariate Cryptography
Synonyms
Definition
Background
Theory
Variants (Perturbations)
Applications
C and SFLASH
HFE and QUARTZ
UOV
Rainbow/TTS
“Medium-Sized” Extension Fields and IFS
Implementations
Open Problems
Cross-References
References
Multivariate Quadratic Public-Key Cryptosystem (MQPKC)
N
Naccache–Stern Higher Residues Cryptosystem
Definition
Open Problems
Cross-References
Recommended Reading
Nakamoto Style Consensus Protocol
Near Field Communication
Nearest Vector Problem
Needham–Schroeder Protocols
Definition
Background
Theory
Applications
Cross-References
References
NESSIE Project
Synonyms
Definition
Background
Theory
The NESSIE Call
The Evaluation Process
Security Evaluation
Performance Evaluation
Tools
The NESSIE Submissions
Response to the NESSIE Call
Selection for Phase II
The NESSIE Portfolio
Conclusion
Cross-References
References
Network Attack Graphs
Network Bandwidth Denial of Service (DoS)
Synonyms
Definition
Background
Applications
Open Problems
Cross-References
Network Capabilities
Definition
Background
Theory
Bootstrap
Unforgeable Capabilities
Open Problems
Recommended Reading
Network Diversity
Definitions
Background
Theory and Application
Applications.
Open Problems and Future Directions
Cross-References
References
Network DoS
Network Flooding Attack
Network Hardening
Synonyms
Definitions
Background
Theory
Open Problems and Future Directions
Cross-References
References
Network Intrusion Detection System
Synonyms
Definition
Background
Theory and Application
Open Problems and Future Directions
References
Network Security
Network Tunneling Protocol
Networked Privacy
Neural Trojans
Introduction
Neural Trojan Attacks
Training Data Poisoning
Hiding Trojan Triggers
Altering Training Algorithms
Trojan Insertion via Transfer Learning
Neural Trojans in Hardware
Binary-Level Attacks
Defense Techniques
Neural Network Verification
Trojan Trigger Detection
Conclusion and Discussion
References
New European Schemes for Signature
NFC
Synonyms
Definition
Background
Theory
Applications
Open Problems and Future Directions
Cross-References
Recommended Reading
NFS
NIDS
Niederreiter Encryption Scheme
Definition
Theory
General Idea
Description
Practice and Security
Cross-References
Recommended Reading
NIST Elliptic Curves
Definition
Background
Application
References
Noninteractive Proof
References
Nonintrusive Authentication
Nonlinear Feedback Shift Register
Definition
Background
Example
Theory
Applications
Open Problems and Future Directions
Remarks
Cross-References
Recommended Reading
Nonlinearity of Boolean Functions
Definition
Background
Theory
Cross-References
Recommended Reading
Nonmalleability
Background
*-10pt
Recommended Reading
Nonrepudiable Agreement
Nonrepudiation of Digital Signatures
Definition
Background
Theory
Applications
Open Problems and Future Directions
Recommended Reading
Nonrepudiation Protocol
Nonsecret Encryption
Synonyms
Definition
Background
Retrospection
Theory
Discussion
Cross-References
Recommended Reading
Non-Secure Communication Channels and the Future of Privacy
Definitions
Introduction
Background
Challenges
Open Problems
Cross-References
References
NSS
NTRU
Synonyms
Definition
Background
Theory
Description of the NTRUEncrypt System
Security of the NTRUEncrypt System
NTRUSign
Applications
Background
Cross-References
Recommended Reading
NTRUEncrypt
NTRUSign
Nucleic Acid
Nudging Privacy
Number Field
Synonyms
Definition
Theory
Applications
Cross-References
Number Field Sieve
Number Field Sieve for Factoring
Synonyms
Definition
Background
Theory
Basic Idea of the NFS
Polynomial Selection
Sieving
Linear Algebra
Square Root
Applications
Open Problems
Experimental Results
Cross-References
Recommended Reading
Number Field Sieve for the DLP
Synonyms
Definition
Background
Theory
Number Fields
NFS-DLP Algorithm
Optimal Parameters
Cross-References
Recommended Reading
Number Theory
Definition
Background
Applications
Modular Arithmetic
Prime Numbers
Discrete Logarithms and Integer Factorization
Elliptic Curves
Lattices
Open Problems
Cross-References
Recommended Reading
Nyberg–Rueppel Signature Scheme
Definition
Theory
Cross-References
Recommended Reading
Nym
O
OAEP: Optimal Asymmetric Encryption Padding
Definition
Background
Theory
The RSA–PKCS #1 v1.5 Encryption
The Optimal Asymmetric Encryption Padding
The Random Oracle Model
Description of OAEP
OAEP and Provable Security
Fixing the OAEP Proof of Security
OAEP Alternatives
Cross-References
Recommended Reading
Oblivious Data Structures
Definition
Background
Theory and Application
Formal Definition
Main Techniques
Applications
Open Problems and Future Directions
References
Oblivious Joins
Oblivious Locally Decodable Codes (OLDC)
Oblivious Parallel RAM (OPRAM)
Synonyms
Definition
Background
Theory: Overview of the Construction
Cross-References
References
Oblivious Parallel Random Access Memory
Oblivious RAM (ORAM)
Synonyms
Definitions
Background
Hierarchical Construction
Tree-Based Construction
Applications
Cross-References
References
Oblivious RAM Lower Bound
Synonyms
Definition
Theory
Lower Bound in the Online Setting
Open Problems and Future Directions
Cross-References
References
Oblivious RAM-Based Secure Processors
Definitions
Background
Recent Results
Open Problems and Future Directions
References
Oblivious Random Access Memory
Oblivious Transfer
References
Ocular Region
Off-Chain Protocol
One Time Password, from a Key Management Perspective
Related Concepts
Definition
Applications
References
One-Time Password
Synonyms
Definition
Background
Theory
Cross-References
Recommended Reading
One-Way Chain
One-Way Function
Definition
Background
Theory
Cross-References
Recommended Reading
One-Way Hash Chain
One-Way Property
Online Analytical Processing
O-Notation
Definition
Theory
Applications
Cross-References
Open Web Proxies
Definition
Background
Open Web Proxy Anonymity
Open Web Proxy Behavior, Security, and Privacy Threats
References
Operational Safety
Operational Separation of Duties
Optimal Extension Fields (OEFs)
Definition
Theory
Applications
Cross-References
Recommended Reading
Oracle (Blockchain Concept)
Synonyms
Definition
Applications
Theory
Basic Design and Functionality
Security Goals
A Broader Perspective
Open Problems and Future Directions
Cross-References
References
ORAM
Order
Definition
Theory
Applications
Cross-References
Order-Preserving Encryption
OTP
Outbound Authentication
Outsourced Private Information Retrieval
Introduction
References
Overlay-Based DoS Defenses
Definition
Background
Applications and Experimental Results
First-Generation Overlay-Based DoS Defenses
Second Generation Overlay-Based DoS Defenses
Protection for Web Services
Removing ISP Packet Filtering
Overlay-Based Defenses Against Targeted DoS Attacks
Open Problems
Recommended Reading
Overspender Detection
Definition
Theory
Cross-References
Recommended Reading
Overspending Prevention
Definition
Theory
Cross-References
Recommended Reading
Over-the-Air (OTA) Programming
Ownership
P
P2P
Packet Error Rate
Packet Flooding Attack
Paillier Encryption and Signature Schemes
Definition
Theory
Applications
Cross-References
Recommended Reading
Pairing-Based Key Exchange
Synonyms
Definition
Background
Theory
Applications
Cross-References
Recommended Reading
Pairing-Friendly Elliptic Curves
Definition
Background
Theory
Supersingular Curves
Embedding Degree k=2
Ordinary Curves
MNT Curves
BN Curves
Other Constructions of Pairing-Friendly Ordinary Elliptic Curves
Cross-References
References
Pairings
Synonyms
Definition
Background
Theory
References
Palm Vein Recognition
Palmprint Authentication
Palmprint Recognition
Synonyms
Definitions
Background
Theory
Competitive Code
Ordinal Measure
RLOC
Applications
Experimental Results
Open Problems
References
3D Palmprint
Synonyms
Definitions
Background
Theory
Open Problems
Summary
References
Parallelizable Message Authentication Code
Parent/Child Chains
Passive Physical Attacks
Passport Security
Synonyms
Definition
Background
Theory
Passive Authentication
Active Authentication
Basic Access Control
Secure Messaging
Other Security Mechanisms
Open Problems and Future Directions
Cross-References
References
Password
Definition
Theory
Cross-References
Recommended Reading
Password Nudges
Patch Release
Payment Card
Synonyms
Definition
Theory
Applications
Cross-References
Recommended Reading
Peer Privacy
Peer-to-Peer Systems
Synonyms
Definition
Background
Applications
Open Problems and Future Directions
Cross-References
References
Pegged Sidechains
PEM, Privacy-Enhanced Mail
Synonyms
Definition
Background
Theory
Cross-References
Recommended Reading
Penetration Testing
Definition
Theory
Cross-References
Recommended Reading
Penmanship
Perfect Forward Secrecy
Synonyms
Related concepts and keywords
Definition
Background
Application
References
Perfectly Secure Message Transmission
Background
Definition
Theory
Open Problems
Cross-References
References
Periocular Biometrics
Synonyms
Definitions
Background
Periocular Biometric System
Feature Extraction for Periocular Biometrics
Application
Open Problems and Future Directions
References
Periocular Region
Permissions: Access Control Fundamentals
Synonyms
Definition
Background
Theory
Application
Open Problems and Future Directions
Cross-References
References
Personal Identification Number (PIN)
Definition
References
Personally Identifiable Information
Definitions
Theory and Application
Cross-References
References
Persuasive Communication
Persuasive Security Messages
Synonyms
Definition
Background
Theory and Application
Open Problems and Future Directions
Cross-References
References
PGP
Phenotyping
Synonyms
Definition
Recommended Reading
Phi Function
Photo Privacy
Physical Obfuscated Key
Physical One-Way Function (previously)
Physical Random Function
Physical Random Function (previously)
Physical Security
Definition
Background
Theory
Recommended Reading
Physical Unclonable Functions (PUFs)Work done while the author was at Philips Research, The Netherlands
Synonyms
Definition
Theory
Applications
Cross-References
Recommended Reading
Physical(ly) Unclonable Function (alternate spelling)
Physically Obfuscated Key or POK (variant)
Physically Unclonable Function (PUF)
Synonyms
Definition
Background
Theory
PUF Design
PUF Challenges and Responses
Strong and Weak PUFs, POKs
PUF Quality Metrics
Applications
Constructions
Use Cases
Open Problems and Future Directions
Cross-References
References
PIR with Compressed Queries
Synonyms
Definitions
Background
Large Elements
Sublinear Communication
High Computation Costs
Compressing Queries
Brakerski-Fan-Vercauteren FHE Cryptosystem (BFV)
Encoding the Index
Expanding Queries Obliviously
Optimizations
Future Directions
Cross-References
References
PKCS
Definition
Background
Theory
Cross-References
Recommended Reading
PKI
Synonyms
Definition
Theory
Applications
Cross-References
Recommended Reading
PKI Trust Models
Synonyms
Definition
Background
Theory
Applications
Experimental Results
Open Problems and Future Directions
Cross-References
References
PKI Trust Relationships
PKIX, Public Key Infrastructure (X.509)
Definition
Background
Theory
Recommended Reading
Platform for Privacy Preferences (P3P)
Definition
Background
Applications
References
Playback Attack
Playfair Cipher
Cross-References
Recommended Reading
PMAC
Synonyms
Definition
Background
Theory
Cross-References
Recommended Reading
POI: Point of Interest
Point Counting
Synonyms
Definition
Background
Theory and Application
Cross-References
References
POK
Policy Composition
Definition
Background
Theory and Application
Open Problems and Future Directions
Cross-References
References
Policy Hiding Attribute-Based Encryption
Policy Misconfigurations
Policy Updatable Attribute-Based Encryption
Political Economy
Polybios Square Encryption
Definition
Cross-References
Recommended Reading
Polyinstantiation
Definition
Background
Theory and Application
Cross-References
References
Polynomial Time
Definition
Theory
Applications
Open Problems
Cross-References
Porta Encryption
Definition
Cross-References
Recommended Reading
Post-quantum ABE
Post-quantum Cryptographic Hardware Primitives
Synonyms
Definitions
Background
Theory and Application
Open Problems and Future Directions
Cross-References
References
Post-quantum Cryptography
Definition
Background
Theory and Applications
Cross-References
References
Post-quantum IBE
Post-quantum Identity-Based Encryption and Attribute-Based Encryption
Synonyms
Definitions
Background
IBE and ABE from Lattices
PQ Models and Assumptions
Open Problems
Cross-References
References
Post-Snowden Cryptography
Synonyms
Definitions
Background
Theory
Algorithm Subversion and Countermeasures
Parameter Subversions and Countermeasures
Hardware Subversions and Countermeasures
Open Problems and Future Directions
Cross-References
References
Power/EM Analysis Attacks
Practical E-Cash
Synonyms
Related Concepts
Definition
Background
Theory of E-Cash
Differences Between E-Cash and E-Investments
Open Problems
References
Practical Revocation in Cryptographic Access Control
Preimage Resistance
Synonyms
Definition
Background
Theory
Cross-References
References
-Presence
Definition
Background
Theory
δ-Presence: Generic Definition
Data Publishing Scenario: Enforcing δ-Presence
Open Problems
Cross-References
References
PRESENT – Block Cipher
Definition
Background
Theory
The sBoxLayer
The pLayer
The Key Scheduling
Cryptanalytic Results
Implementation Results
Cross-References
Recommended Reading
Pretty Good Privacy (PGP)
Synonyms
Definition
Background
History
GnuPG
Theory
OpenPGP Standard
Web of Trust Model
Experimental Results
Cross-References
Recommended Reading
Prevention
Primality Proving Algorithm
Definition
Cross-References
Primality Test
Definition
Cross-References
Primary Key
Prime Certificate
Prime Generation
Definition
Theory
Cross-References
Prime Number
Definition
Background
Theory
Primality Tests and Primality Proofs
Primality Test
Primality Proofs
Overview
Cross-References
Recommended Reading
Primitive Element
Definition
Theory
Applications
Cross-References
Privacy
Privacy Assessment
Privacy Attacks Against Relationship on OSNs
Synonyms
Definitions
Background
Telling Relationship from Rich OSN Data
Finding Hidden Relationship in Apps
Compromising Relationship in Data Publishing
References
Privacy Awareness
Privacy Breach Impacts
Privacy by default
Privacy by Design
Privacy Dilemma
Privacy Dilemma, The
Privacy Economics: From Information Theory to Privacy as an Asset
Synonyms
Definitions
Background
Theory
Open Problems and Future Directions
Cross-References
References
Privacy in Data-Driven Circular Economy
Definition
Background
Theory and Application
Open Problems and Future Directions
References
Privacy in Location-Based Data Mining
Definition
Background
Theory
Privacy Attacks
Privacy Protection Schemes
Privacy Protection Through Data Manipulation
Privacy Protection Through the Algorithms and Models
Applications
References
Privacy in Location-Based Social Networks
Privacy in Mobile Crowdsensing
Privacy in Mobile Participatory Sensing
Synonyms
Definition
Background
Threats to Privacy
Theory and Application
Open Problems and Future Directions
Cross-References
References
Privacy in Mobile Sensing Applications
Privacy in Mobile Urban Sensing Applications
Privacy in Participatory Sensing Applications
Privacy Law: Understanding Data Protection Regulations
Synonyms
Definition
Background
Theory
Application
Open Problems and Future Directions
Cross-References
References
Privacy Legislation
Privacy Measurement
Privacy Metrics
Synonyms
Definitions
Theory
Inputs for Privacy Metrics
Properties Measured by Privacy Metrics
Uncertainty Metrics
Information Gain Metrics
Similarity Metrics
Indistinguishability Metrics
Success Metrics
Error Metrics
Time Metrics
Accuracy Metrics
Criteria for Selecting Privacy Metrics
Open Problems and Future Directions
Cross-References
References
Privacy Metrics for Online Social Network Data
Synonyms
Definitions
Theory
k-Anonymity-Based Privacy Metrics
Differential Privacy-Based Metrics
Open Problems and Future Directions
Cross-References
References
Privacy Nudging
Synonyms
Definition
Background
Theory
Open Problems and Future Directions
Cross-References
References
Privacy of Aggregated Location Information
Privacy of Aggregated Mobility Data
Synonyms
Definitions
Background
Theory
Approach 1: Anonymization of Specific Query Results
Syntactic Anonymization
Anonymization with Differential Privacy
Approach 2: Anonymization of the Mobility Dataset
Syntactic Anonymization
Anonymization with Differential Privacy
Approach 3: Anonymization of Spatiotemporal Density
Open Problems and Future Directions
Cross-References
References
Privacy of Outsourced Data
Definitions
Background
Theory
Cloud Adversarial Behavior and Security Requirements/Properties
Honest-but-curious (HBC) adversary
Adversarial view
Malicious adversary
Security properties
Ciphertext indistinguishability
Execution privacy
Security Solutions
Encryption-Based Techniques
Limitations of encryption-based techniques
Systems built using encryption-based techniques
Secret-Sharing-Based Techniques
Limitations
Systems built using secret-sharing-based techniques
Secure Hardware-Based Techniques
Limitations
Systems built using secure hardware-based techniques
Open Problems and Future Directions
Cross-References
References
Privacy of Trace Data
Privacy of Trajectory Data
Synonyms
Definition
Background
Theory
Privacy of a Whole Trajectory
Privacy of Sensitive Place Visits
Open Problems and Future Directions
Cross-References
References
Privacy of Trajectory Micro-data
Privacy Paradox, The
Synonyms
Definition
Background
Theory
Open Problems and Future Directions
Cross-References
References
Privacy Protection in Biometric Systems
Privacy Quantification
Privacy Requirements
Privacy Soft Paternalism
Privacy Violation Impacts
Privacy-Aware Access Control in Decentralized Online Social Networks
Synonyms
Definitions
Background
Theory and Application
Existing Solutions and Future Directions
Cross-References
References
Privacy-Aware Access Control Policies
Definition
Background
Theory
User-Based Privacy Restrictions
Regulation Modeling
Open Problems and Future Directions
Cross-References
References
Privacy-Aware Database
Privacy-Aware Languages
Synonyms
Definition
Background
Theory and Application
Open Problems and Future Directions
Cross-References
References
Privacy-Enabled Database
Privacy-Enhanced Languages
Privacy-Enhanced Technologies
Privacy-Enhancing Technologies (PET)
Synonyms
Definitions
Background
Theory and Applications
Open Problems and Future Directions
Cross-References
References
Privacy-Preserving Authentication in Wireless Access Networks
Synonyms
Definitions
Background
Theory
Application
Open Problems
References
Privacy-Preserving Data Publishing
Synonyms
Definition
Background
Theory
Open Problems and Future Directions
Cross-References
References
Privacy-Preserving Joins over Encrypted Data
Synonyms
Definition
Theory
Open Problems and Future Directions
Cross-References
References
Privacy-Preserving Machine Learning
Privacy-Preserving Outlier Detection
Privacy-Preserving Technologies
Private Boolean Queries on Encrypted Data
Synonyms
Definition
Background
Theory
Application
Open Problems and Future Directions
Cross-References
References
Private Exponent
Private Information Retrieval
Definitions
Background
Theory
Perfect Privacy Constructions
Cross-References
References
Private Information Retrieval with Preprocessing
Synonyms
Definitions
Background
Theory
Formal Definition
Syntax
Semantics
Negative Results
Constructions
Open Problems and Future Directions
Cross-References
References
Private Information Retrieval with Sublinear Online Time
Private Key Cryptosystem
Private Machine Learning
Private Range Queries
Synonyms
Definitions
Theory
Order-Preserving Encryption
Range-Searchable Encryption
Attacks on Private Range Queries
Open Problems and Future Directions
Cross-References
References
Private Stateful Information Retrieval
Definition
Background
Construction
Cross-References
References
Private-Key Constructions for Dynamic Access Control
Privileges in SQL
Definitions
Theory
Cross-References
References
PRNG
Probabilistic Key Sharing
Synonyms
Definition
Background
Theory
Security Improvements
Attacker Model
Applications
Open Problems and Future Directions
References
Probabilistic Primality Test
Synonyms
Definition
Theory
Cross-References
Probabilistic Public-Key Encryption
Definition
Background
Theory
Cross-References
Recommended Reading
Probabilistic Query Integrity
Definitions
Background
Theory and Application
Open Problems and Future Directions
Cross-References
References
Probing Model
Synonyms
Definitions
Background
Theory
Composition
Real-World Leakage
Open Problems and Future Directions
References
Product Cipher, Superencryption
Definition
Theory
Applications
Cross-References
Recommended Reading
Profiling
Program Verification and Security
Synonyms
Definition
Background
Applications and Experiments
Open Problems and Future Directions
Cross-References
References
Project Athena
Proof of Knowledge Versus Proof of Membership
Cross-References
References
Proof of Stake
Definition
Background
Theory
Nakamoto-Style PoS
PoS via Iterated Byzantine Agreement
Cross-References
References
Proof of Work
Synonyms
Definition
Theory
Applications
Open Problems and Future Directions
Cross-References
References
Proof-Carrying Code
Definition
Background
Theory and Applications
Experimental Results
Recommended Reading
Proofs of Proof-of-Work
Definition
Background
Theory
Application
Open Problems and Future Directions
Cross-References
References
Propagation Characteristics of Boolean Functions
Definition
Background
Theory
Cross-References
Recommended Reading
Protection Rings
Definition
Background
Theory
Applications
Challenges
References
Protocol
Synonyms
Definition
References
Protocol Cookies
Synonyms
Definition
Background
Application and Theory
Cross-References
Recommended Reading
-Protocols
Definition
Background
Theory
Applications
Cross-References
Recommended Reading
Proximity Card
Definition
Background
Applications
Cross-References
Recommended Reading
Proxy Re-encryption
Definition
Bilinear Groups
Strong One-Time Signature
Background
Multi-hop Bidirectional PRE
Single-Hop Unidirectional PRE
More on Proxy Re-encryption
Open Problems and Future Directions
References
PSC
Pseudo-Mersenne Prime
Definition
Applications
Recommended Reading
Pseudo-Noise Sequences (PN-Sequences)
Definition
Cross-References
Recommended Reading
Pseudonym
Pseudonymity
Pseudonymity in OSNs
Pseudonymization (Accordingto GDPR)
Definition
Background
Theory
Open Problems and Future Directions
Cross-References
References
Pseudonyms
Synonyms
Definition
Background
Theory
Applications
Cross-References
References
Pseudonyms for Mobile Networks
Synonyms
Definitions
Background
Theory
Open Challenges
Cross-References
References
Pseudoprime
Definition
Applications
Cross-References
Pseudorandom Function
Definition
Theory
Applications
Cross-References
Recommended Reading
Pseudorandom Number Generator
Synonyms
Definition
Background
Theory
Applications
PRNG Structure
PRNG Examples
PRNG Initialization
Experimental Results
Open Problems
Cross-References
Recommended Reading
Psychology of Cybercrime
Synonyms
Definition
Background
Theory and Application
The Online Offender
The Online Victim
Open Problems and Future Directions
Cross-References
References
Public Exponent
Public Key Cryptography
Definition
Background
Theory
Cross-References
Recommended Reading
Public Key Encryption
Public Key Infrastructure
Public Key Proxy Encryption
Definition
Theory
Applications
Cross-References
Recommended Reading
Public Key Proxy Signatures
Definition
Theory
Applications
Cross-References
Recommended Reading
Public-Key Authenticated Encryption
Public-Key Cryptosystem
Public-Key Searchable Encryption Models
Publicly Verifiable Proof-of-Sequential Work
PUF
Pufferfish
Pufferfish Privacy
Synonyms
Definitions
Background
Theory and Application
Open Problems and Future Directions
Cross-References
References
Q
QRP
Quadratic Residue
Definition
Theory
Open Problems
Cross-References
Quadratic Residuosity Problem
Synonyms
Definition
Theory
Applications
Cross-References
Recommended Reading
Quadratic Sieve
Definition
Background
Theory
Generation of Relations
Computation of Polynomial Coefficients
Optimization and Parameter Selection
Cross-References
Recommended Reading
Quality Measures
Quantum Cryptography
Definition
Background
Theory
The Various Uses of Quantum Physics for Cryptography
Quantum Key Distribution
Alternative Quantum Key Distribution Protocols and Implementations
Cryptography on Quantum Data
Recommended Reading
Quantum-Safe Identity and Attribute Based Encryption
Quasi-Identifier
Definition
Background
Theory
Application
Experimental results
Cross-References
References
Queries over Encrypted Relational DBMS
Query Integrity
Definitions
Background
Theory and Application
Open Problems and Future Directions
Cross-References
References
Query Processing on Encrypted Relational Databases
R
Rabin Cryptosystem
Definition
Background
Theory
The Rabin Primitive
Cross-References
Recommended Reading
Rabin Digital Signature Scheme
Background
Theory
Cross-References
Recommended Reading
Radio Fingerprinting
Radio Frequency Attacks
Definition
Background
Theory
Principles and Description
ElectroMagnetic Pulse
Coupling
Damage
Energy
Nonnuclear Techniques
Protection and Countermeasures
Targets and Properties
Properties
Further Reading
Conclusions
Recommended Reading
Radio Interference Attack Defense
Radio-Frequency (RF) Fingerprinting
Radiometric Identification
Radiometrics
Rainbow Tables
Definition
Theory
Cross-References
Recommended Reading
Random Bit Generator
Definition
Background
Theory
Raw Random Bit Sources
SW-Based Generators
HW-Based Generators
Randomness Sources in HW-Based Generators
Post-Processing
Recommended Reading
Random Key Predistribution
Random Number Testing
Definition
Background
Theory/Application
The Monobit or Frequency Test for Entire Sequence
The Runs Test for the Entire Sequence
Test for the Longest-Run-of-Ones in a Block
Frequency Test Within a Block
Open Problems
Cross-References
References
Random Oracle Model
Definition
Theory
Cross-References
Recommended Reading
Randomised Agreement
Range Queries over Encrypted Data
Synonyms
Definitions
Background
Theory
Open Problems and Future Directions
Cross-References
References
Range-Searchable Encryption
Rank Codes
Synonyms
Definition
Background
Theory
Delsarte's Optimal Rank Codes in Matrix Representation
Optimal Rank Codes in Vector Representation
Correcting Rank Errors and Rank Erasures
Open Problems
Cross-References
Recommended Reading
Rank Estimation
Synonyms
Definitions
Background
Application
Open Problems and Future Directions
Cross-References
References
Ranked Search on Encrypted Data
Synonyms
Definitions
Historical Background
General Framework of Ranked Search Over Encrypted Data
Challenges and Future Directions
Key Application
Cross-References
References
Ranking Queries on Encrypted Data
Rank-Metric Codes
Ransomware
Synonyms
Definitions
Background
Application
Open Problems and Future Directions
Cross-References
References
RBAC
RC4
Definition
Background
Theory
Applications
Cross-References
Recommended Reading
RC5
Synonyms
Definition
Background
Theory
Applications
Cross-References
Recommended Reading
RC6
Synonyms
Definition
Background
Theory
Applications
Cross-References
Recommended Reading
Reactive Security
Recipient Anonymity
Definition
Theory
Applications
Open Problems and Future Directions
Cross-References
References
Recognition
Record Linkage
Recursive Revoke
Synonyms
Definition
Theory
Historical Notes
Cross-References
References
Redundancy-Based Countermeasures
Reed–Muller Codes
Synonyms
Definition
Background
Theory
Cross-References
Recommended Reading
Reference Monitor
Definition
Background
Theory
Applications
Open Problems
Cross-References
Recommended Reading
Reflection DoS Attacks
Regulation (EU) 2022/868
Regulation (EU) 2023/2854
Regulation EU 2016/679
Re-identification and Automatic Update for Biometrics
Synonyms
Summary
Definitions
Background
Application
Open Problems and Future Directions
References
Related (not identical) to Doubly Efficient Private Information Retrieval (DEPIR)
Related Key Attack
Definition
Background
Theory
Applications
Cross-References
Recommended Reading
Relationship Anonymity
Relationship on OSNs
Relatively Prime
Synonyms
Definition
Cross-References
Remote Attestation
Remote Attestation in IoT Devices
Definition
Background
Theory
Open Problems and Future Directions
Cross-References
References
Remote Face Recognition
Synonyms
Definitions
Background
Theory
Low Resolution
Blur
Atmospheric Turbulence
Application
Summary
Open Problems and Future Directions
References
Remote Updates
Replay Attack
Synonyms
Definition
Application
Open Problems and Future Directions
Cross-References
References
Residue Arithmetic
Resilience Expenditure
Resilience in Cyber Physical Systems
Resilience in Cyber-Physical Systems
Synonyms
Definition
Background
Theory and Application
Open Problems and Future Directions
Cross-References
References
Resilient Control Systems
Resilient Embedded and Smart Systems
Resistance to the Standard Algebraic Attack
Response
Definition
Cross-References
Response and Reconfiguration Under Attacks in CPS
Synonyms
Definitions
Background
Attack Detection and the Missing Link to Attack Response
Response and Reconfiguration Under Attacks in CPS
Conclusions
References
Resynchronization Attack
Definition
Applications
Cross-References
Recommended Reading
Retina Recognition
Reverse Engineering of Malware Emulators
Synonyms
Definition
Background
Applications
Open Problems
Recommended Reading
Reverse Public Key Encryption
Definition
Recommended Reading
RFID Security
Synonyms
Definition
Background
Theory
Impersonation
Privacy
Denial of Service
Open Problems and Future Directions
Cross-References
References
Right-to-Left Exponentiation
Definition
Background
Theory
Cross-References
Recommended Reading
Rijndael
Synonyms
Definition
Background
Theory
Structure
The Round Transformation
Key Schedule
Security
Applications
Cross-References
Recommended Reading
Ring
Definition
Theory
Applications
Cross-References
Ring Signatures
RIPEMD Family
Cross-References
Recommended Reading
Risk Communication
Synonyms
Definition
Background
Theory and Application
Open Problems and Future Directions
Cross-References
References
Risk Mitigation
Risk Perception
Risk Prediction
Risk Reduction
Risk Response
Rivest Cipher 5
Rivest Cipher 6
Robust Machine Learning
Robust Private Information Retrieval
Definitions
Theory
References
Role-Based Access Control
Synonyms
Definition
Background
Theory
Applications
Experimental Results
Open Problems and Future Directions
Cross-References
Recommended Reading
Roles in SQL
Synonyms
Definition
Background
Application
Open Problems and Future Directions
Cross-References
References
Rons Code 5
Rons Code 6
Root Cause Analysis
Synonyms
Definition
Theory
Five Why's Technique
Fishbone Diagram
Causal Factors Analysis
Open Problems and Future Directions
Root of Trust
Synonyms
Definition
Background
Hardware Root of Trust
Attributes of a TPM Root of Trust
Attributes of a Secure Processor Root of Trust
Current Research in Secure Processing
Open Problems
Cross-References
Recommended Reading
Rootkits
Synonyms
Definition
Background
Applications
Cross-References
References
RSA Digital Signature Scheme
Definition
Theory
Applications
Cross-References
Recommended Reading
RSA Factoring Challenge
Definition
Background
Applications
Cross-References
Recommended Reading
RSA Problem
Definition
Theory
Relationship to Integer Factoring
Recovering the Private Key
Self-Reducibility
Low Public-Exponent RSA
Strong RSA Assumption
Bit-Security of RSA Encryption
Chosen Ciphertext Attacks
Conclusions
Applications
Open Problems
Cross-References
Recommended Reading
RSA Public-Key Encryption
Definition
Theory
One-Way Permutations
Number Theory
Modular Powers and Roots
The RSA Primitive
The RSA Problem
The Plain RSA Cryptosystem
Security Weaknesses
Multicast Encryption
Small Exponents
Applications
Cross-References
Recommended Reading
RTL Security Verification
Run
Definition
Applications
Cross-References
Recommended Reading
Running-Key
Synonyms
Definition
Cross-References
Runtime Analysis
Run-Time Malware Analysis
S
Safety in Cyber-Physical Systems
Synonyms
Definition
Theory and Applications
Open Problems and Future Directions
Cross-References
References
Salt
Related Concepts
Definition
Applications
Cross-References
References
Sandbox
Definition
Background
Theory
Applications
Open Problems
Cross-References
References
SCADA System
Schemes Based on Rank Codes
Synonyms
Definition
Background
Theory
Optimal Linear Rank Codes
Parallel Channels and Correcting Random Rank Errors and Rank Erasures
Rank Codes as Space-Time Codes
Rank Codes in Network Coding
Public Key Cryptosystems Based on Rank Codes
Open Problems
Recommended Reading
Schnorr Digital Signature Scheme
Background
Theory
Cross-References
Recommended Reading
Schnorr Identification Protocol
Definition
Background
Theory
Applications
Cross-References
References
Sclera Recognition
Score Calibration
Score Normalization
Synonyms
Definitions
Theory
Statistics-based score normalization procedures
Min-max normalization
Z-score normalization
Median-MAD normalization
Generalized logit transform
Class-aware score normalization
F-norm
Tanh-approximator
Score normalization based on the Bayes theorem
The log-likelihood ratio approach
Logistic regression
Logistic regression as a linear approximation to LLR
Double sigmoid function
Open problems
Summary
References
Screaming Channels
Definitions
Background
Radio Transmitters
Mixed-Signal Chips
Theory and Application
A Side Channel over Radio
Overview
Root Problem
Characteristics
Attack
Large Distance
Realistic Target
Future Directions
Attacks
Hardware Encryption
Other Radio Protocols
Defenses
Software
Hardware
Cross-References
References
Script Language Security
Synonyms
Definition
Background
Theory
Browsers Security Measures
Open Problems
Cross-References
References
SEAL
Synonyms
Definition
Background
Applications
Cross-References
Recommended Reading
Sealed Storage
Definition
Sealed Storage in the TPM
Applications
Open Problems
Cross-References
Recommended Reading
Search on Encrypted Multi-writer Tables
Definition
Background
Theory
Applications
Open Problems
Cross-References
References
Search over Ciphertext Datasets Using Partition Computation
Definitions
Background
Theory
Partitioned Computations
Inference Attack in Partitioned Computations
Partitioned Data Security at the Public Cloud
Query Binning
Open Problems
Cross-References
References
Search over Encrypted Data
Definitions
Background
Theory
Keyword Search over Encrypted Documents
Range Queries over Encrypted Data
Bucketization for Relational Queries
Search Using Secure Hardware
Open Problems
Cross-References
References
Search over Secret-Shared Datasets
Definitions
Background
Theory
String-Matching Using Accumulating Automata
Open Problems and Future Directions
Cross-References
References
Searchable Attribute-Based Encryption
Searchable Encryption
Searchable Encryption with Fine-Grained Access Control
Searchable Symmetric Encryption
Synonyms
Definition
Background
Theory
Open Problems
Cross-References
References
Searchable Symmetric Encryption on Trusted Execution Environments
Synonyms
Definitions
Background
Searchable Symmetric Encryption
Trusted Execution Environments in Encrypted Search
Theory
Attacks on Trusted Hardware
Open Problems and Future Directions
Cross-References
References
Second Preimage Resistance
Synonyms
Definition
Background
Theory
Cross-References
References
Secondary Use Regulations
Definition
Background
Theory and Applications
Secondary Purpose
Secondary Disclosure
Cross-References
Recommended Reading
Secret Key Agreement
Secret Key Cryptosystem
Secret Key Establishment
Secret Key Generation in Sensor Networks
Synonyms
Definitions
Background
Theory
The Process of Secret Key Generation
Application
Radio Signals
Audio Signals
Movements
Human Biometrics
Others
Open Problems and Future Directions
Cross-References
References
Secret Sharing
Secret Sharing and Shamir Threshold Scheme
Background
Definition
Theory
Shamir's Secret Sharing
The Scheme
Security
Properties of Shamir's Scheme
General Adversary Case
Ideal Secret Sharing and Size of Shares
Enhanced Properties
Dealing with Active Adversaries
Dynamic Aspects
Variants
Cross-References
References
Secret Vaulting
Secure and Privacy-Preserving Machine Learning
Synonyms
Definition
Background
Theory
Open Problems and Future Directions
Cross-References
References
Secure and Private Communication
Secure Audit Logs
Synonyms
Definition
Background
Theory
Cross-References
References
Secure Cloud Data Utilization
Secure Code Updates
Secure Communication
Secure Communication Bootstrapping
Secure Computation
Secure Computation of Differentially Private Mechanisms
Synonyms
Definition
Background
Theory
Models
Distributed Noise Generation
Applications
Open Problems and Future Directions
Cross-References
References
Secure Computer System Model
Secure Configuration Management
Secure Coprocessor
Synonyms
Definition
Background
Theory and Applications
Cross-References
Recommended Reading
Secure Data Aggregation
Definition
Background
Theory and Applications
Open Problems
Recommended Reading
Secure Data Deduplication
Secure Data Deduplication Schemes
Synonyms
Definitions
Background
Theory
Open Problems and Future Directions
Cross-References
References
Secure Data Outsourcing
Synonyms
Definition
Background
Query Correctness
Verifiable Computation
Data Confidentiality
Searching on Encrypted Data
Encrypted Databases
Data Access Privacy
Private Information Retrieval
Oblivious RAM
Theory & Applications
Query Correctness
Verifiable Computation
Data Confidentiality
Data Access Privacy
Open Problems and Future Directions
Cross-References
References
Secure Deduplication
Secure Deletion
Secure Device Pairing
Synonyms
Definitions
Background
Theory
General Procedure and System Model
Terminology
Threat Models
Device Pairing Methods
Cryptographic Protocols
Pairwise Device Pairing
Extension to a Group of Devices
Applications
Open Problems and Future Directions
Cross-References
References
Secure Element
Definition
Background
Applications
Open Problems and Future Directions
Cross-References
Recommended Reading
Secure Email
Secure Erasure
Secure Firmware Updates
Secure First Connect
Secure Function Evaluation
Secure Hash Algorithm
Secure Index
Synonyms
Definition
Background
Theory
Cross-References
References
Secure Joins
Secure Logging
Secure Machine Learning
Secure Multiparty Computation
Secure Multi-party Computation
Secure Multi-party Computation of Differentially Private Mechanisms
Secure Network Coding for Wireless Mesh Networks
Synonyms
Definitions
Background
Theory
Attacks Against Network Coding
Defenses
Cross-References
References
Secure Networks Design
Secure Routing in Wireless Mesh Networks
Synonyms
Definitions
Background
Theory
Attacks Against Routing
Defenses
Applications
References
Secure Shell
Secure Signatures from the “Strong RSA” Assumption
Background
Theory
Cross-References
References
Secure Socket Layer (SSL)
Synonyms
Definition
Background
History
Theory
Layer Structure
Basic Protocol Sequence
Server Authentication
Client Authentication
Ephemeral Diffie–Hellman Key Agreement
Protocol Resumption
Additional Information
Security Analysis
Cross-References
References
Secure Software Dissemination
Secure Software Updates in IoT Devices
Synonyms
Definition
Background
Theory
Security Properties
Open Problems and Future Directions
Cross-References
References
Secure Time Synchronization
Definition
Background
Theory
Applications
Open Problems
Cross-References
Recommended Reading
Secure Vehicular Communication Systems
Synonyms
Definition
Background
Theory and Applications
Security and Privacy Architecture for VC Systems
Open Problems and Future Directions
Cross-References
References
Secure Wireless Mesh Networks
Secure Wireless Multicast
Security
Security Analytics
Synonyms
Definition
Background
Theory OR Application OR Both
Open Problems and Future Directions
Cross-References
References
Security and Device Aging
Definitions
Background
Aging-Induced Security Concerns
Device Aging in Cryptographic Cores
Open Problems and Future Directions
Cross-References
References
Security and Privacy Aspects in the Dedicated Short-Range Communications (DSRC) Protocol
Synonyms
Definitions
Background
Theory
Open Problems and Future Directions
References
Security Architecture
Definition
Theory
Applications
Recommended Reading
Security Awareness
Security Budget
Security Capability Maturity Model
Synonyms
Definition
Background
Theory and Application
Open Problems and Future Directions
Cross-References
References
Security Compliance
Security Controls
Security Culture
Security Evaluation Criteria
Definition
Background
Theory/Applications
Cross-References
References
Security Evaluation Tool
Security Fatigue
Synonyms
Definition
Background
Theory and Application
Causes of Fatigue
Assessing Fatigue
Open Problems and Future Directions
Cross-References
References
Security for Mashups
Definition
Background
Theory
Open Problems
Cross-References
Recommended Reading
Security if Web Browser Scripting Languages
Security Implication in Virtualization
Synonyms
Definition
Background
What Is Virtualization?
Virtualization Types
Virtualization Benefits
Virtualization Security Risks
Theory
Operating System-Based Virtualization Methods
Workload Isolation
Workload Consolidation
Workload Migration
Hardware-Based Virtualization
Performance Comparisons
System Architectures for Virtualization
Virtualization Security Overview
Guest OS Isolation
Guest OS Monitoring
Image and Snapshot Management
Access Control Policy-Based Virtualization Security
Trusted Platform Module-Based Virtualization Security
Applications
Overview
Hypervisor Architecture
Secure Hypervisor (sHype) Example
Commercially Available Products
Virtualization Security Tools
Open Problems and Future Directions
Virtualization Security Problems
Future Directions for Virtualization-Based Security
Conclusion
Acronyms and Abbreviations
Cross-References
References
Security Information and Event Management (SIEM)
Synonyms
Definition
Background
Theory and Applications
Open Problems and Future Directions
Cross-References
References
Security Information Event Management (SIEM)
Security Information Sharing
Security Investment
Synonyms
Definitions
Theory
Open Problems and Future Directions
Cross-References
References
Security Investment, Interdependence, Attacking, and Information Sharing
Synonyms
Definition
Background
Introduction
Security Investment
Income Effect
Interdependence
Substitution Effect
Information Sharing
Results
Future Research
References
Security Motivation
Security Nudges
Synonyms
Definition
Background
Theory and Application
Synchronous and Asynchronous Strength Indicators
Password Policy Alignment
Presentation
Evaluating the Effectiveness of Nudges
Moving Image Strength Indicator in the Context of Nudges
Cross-References
References
Security of Cognitive Radios
Definition
Background
Applications
Recommended Reading
Security of Contactless Integrated Circuits
Security of Contactless Microcircuits
Security of Contactless Smartcards
Security of Distance Bounding Protocols
Definition
Background
Theory
Recommended Reading
Security of Group Communication in Wireless Mesh Networks
Synonyms
Definitions
Background
Theory
Approaches to Secure Group Communication
Secure Group Overlay-Based Group Communication in WMNs
Applications
References
Security of Radio Frequency Identification
Security of Wireless Mesh Networks (General Overview)
Synonyms
Definitions
Background
Theory
Applications
Cross-References
References
Security Operations Center (SOC)
Definition
Background
Theory and Applications
Open Problems and Future Directions
Cross-References
References
Security Reduction
Definition
Background
Theory
Applications
Recommended Reading
Security Reputation Metrics
Definitions
Background
Application
Hosting Providers
Top-Level Domains
Internet Service Providers
Open Problems and Future Directions
References
Security Risk Assessment for Cyber-Physical Systems
Definition
Background
Theory and Application
Open Problems and Future Directions
Cross-References
References
Security Standards Activities
Definition
Background
Activities
X.509
PKIX
LDAP
S/MIME
LAMPS
JOSE
COSE
IPsec
IPsecME
TLS
Secure Shell
AAA
OpenPGP
XML Security
IEEE P802
ANSI X9F
FIPS
Influential Activities
US FPKI
References
Security Testbed
Security Token
Security Validation
Security Verification
Security Verification of System-on-Chips (SoCs)
Synonyms
Background
State of the Art
Information Flow Tracking
Theorem Proving
Secure HDL
Assertion-Based Verification
Symbolic Testing
Open Problems and Future Directions
References
Security Visualization
Segregation of Duties
Selective Forgery of Digital Signatures
Definition
Recommended Reading
Self-Defense
Selfie Biometrics
Definitions
Background
Application
Open Problems and Future Directions
Open-set liveness/spoof detection
On-device computation
Fairness analysis
Summary
References
Self-Shrinking Generator
Definition
Background
Example
Theory
Cross-References
Recommended Reading
Self-Sovereign Identity
Definitions
Theory and Applications
Open Problems and Future Directions
Cross-References
References
Self-Synchronizing Stream Cipher
Synonyms
Definition
Background
Example
Theory
Applications
Cross-References
Recommended Reading
Semantic Security
Synonyms
Definition
Theory
Cross-References
Recommended Reading
Sender Anonymity
Synonyms
Definitions
Background
Theory/Application/Both
Open Problems and Future Directions
Cross-References
References
Sensitive Privacy: Data Privacy for Analyzing Anomalies
Synonyms
Definitions
Background
Theory & Concepts
How to Achieve Sensitive Privacy
Cross-References
References
Sensor Key Establishment and Maintenance
Sensor Key Management
Synonyms
Definition
Background
Theory
Open Problems
Cross-References
Recommended Reading
SEPA
Synonyms
Definition
Background
Applications
Recommended Reading
Separation of Duties
Synonyms
Definition
Background
Applications
Strong Exclusion (Static Separation of Duty)
Weak Exclusion (Dynamic Separation of Duty)
Open Problems
Experimental Results
Cross-References
Recommended Reading
Sequences
Definition
Theory
Applications
Cross-References
Recommended Reading
Sequential and Combinational Satisfiability Attacks
Synonyms
Definition
Background
Theory and Application
Open Problems and Future Directions
Cross-References
References
SERPENT
Cross-References
Recommended Reading
Session Hijacking Attacks
Definition
Background
Theory
Open Problems
Cross-References
Recommended Reading
SFA
SHA
SHA-0, SHA-1, SHA-2 (Secure Hash Algorithm)
Synonyms
Definition
Background
Theory
Padding
SHA-1 Compression Function
SHA-0
SHA-256 and SHA-512 Compression Functions
SHA-224
SHA-384
Applications
Security Considerations
Open Problems
Cross-References
References
Shamirs Trick
Shannons Maxim
Shannon's Model
Synonyms
Definition
Background
Theory
Applications
Cross-References
Recommended Reading
Sharding
Synonyms
Definitions
Background
Theory
Multiconsensus Architecture
Uniconsensus Architecture
Cross-Shard Transactions
Open Problems and Future Directions
Cross-References
References
Shortest Vector Problem
Definition
Background
Theory
Applications
Open Problems
Cross-References
Recommended Reading
Short-Term Credential
Shrinking Generator
Definition
Example
Theory
Cross-References
Recommended Reading
Shuffle Index
Definition
Background
Theory
Open Problems
Cross-References
References
Sidechains
Synonyms
Definition
Background
Theory
Security of Sidechains
Firewall Property
Cross-Chain Communication
Types of Cross-Chain Communication
Techniques for Cross-Chain Communication
Application
Open Problems and Future Directions
Cross-References
References
Side-Channel Attacks
Synonyms
Definitions
Background
Application
Mitigation
Open Problems
Cross-References
References
Side-Channel Attacks and Countermeasures
Side-Channel Leakage
Side-Channel Security Evaluation Tool
SIDH
SIEM System
SIEM: Security Information and Event Management
Sieving
Definition
Theory
Applications
Cross-References
Sieving in Function Fields
Definition
Applications
Cross-References
Recommended Reading
Signature Biometrics
Synonyms
Definitions
Background
Theory
Applications
Open Problems and Future Directions
Cross-References
References
Signcryption
Synonyms
Definition
Background
Theory
Defining Signcryption
Security of Signcryption
Supporting Long Inputs
Generic Composition Schemes
Schemes from Trapdoor Permutations
Schemes based on Gap Diffie–Hellman
Applications
Cross-References
Recommended Reading
Signed Digit Exponentiation
Synonyms
Definition
Background
Applications
Cross-References
Recommended Reading
Signed Window Exponentiation
SIKE
Silicon Fingerprint (colloquially)
SIM/UICC
Synonyms
Definition
Background
Theory
Applications
References
Simple Power Analysis
Synonyms
Definitions
Background
Theory
Open Problems and Future Directions
References
Simultaneous Exponentiation
Synonyms
Definition
Background
Theory
Applications
Cross-References
Recommended Reading
Simultaneous Transactions
Singe-Reader-Multi-Writer Searchable Encryption
Single Euro Payments Area
Single Wire Protocol
Definition
Background
Cross-References
References
Single-Server Private Information Retrieval
Definitions
Background
Homomorphic Encryption-Based Construction
Future Directions
References
Situational Awareness for Cyber-Physical Systems
Synonyms
Definitions
Background
Application
Open Problems and Future Directions
References
Skipjack
Definition
Background
Theory
Application
Cross-References
Recommended Reading
Slide Attack
Definition
Theory
Applications
Cross-References
Recommended Reading
Sliding Window Exponentiation
Definition
Background
Theory
Applications
Cross-References
Recommended Reading
Smart Card
Synonyms
Definition
Background
Theory
Applications
Cross-References
Recommended Reading
Smart Contract
Definition
Background
Theory
Application
Open Problems and Future Directions
Cross-References
References
Smart Environment
Smart Grids
Smart/Algorithmic Denial of Service
Smartcard Tamper Resistance
Definition
Theory and Applications
Cross-References
Recommended Reading
Smoothness
Definition
Theory
Cross-References
Recommended Reading
SNARK
Synonyms
Background
Definitions
Types of SNARKs
Applications
Cross-References
References
Social Context in Security and Privacy
Synonyms
Definition
Background
Theory and Application
Open Problems and Future Directions
Cross-References
References
Social Engineering
Synonyms
Definition
Background
Theory
Social Engineering Attack Cycle
Principles of Persuasion and Social Engineering Triggers
Examples of Social Engineering
Addressing Social Engineering
Open Problems and Future Directions
Cross-References
References
Social Environment
Social Network Anonymization
Social Network Data Privacy Definitions
Social Networks
Social Perspectives on Information Privacy
Definition
Theory
Open Problems and Future Directions
Cross-References
Recommended Reading
Sociocultural Factors
Soft Biometrics
Definition
Background
Theory and Application
Taxonomy of Soft Biometrics
Applications
Open Problems and Future Directions
Summary
References
Software Secure Element
Software Vendor
Software-Defined Networks privacy
Definitions
Background
Theory
Privacy Attacks
Application Plane
Control and Data Plane
References
Software-Optimized Encryption Algorithm
Solitaire
Definition
Background
Cross-References
Recommended Reading
Source Address Validation
Definitions
Background
Application
Open Problems and Future Directions
References
SPA
Space-Time Trade-Off
Spam Detection Using Network-Level Characteristics
Synonyms
Definition
Background
Theory and Applications
Recommended Reading
Spatial Context
Spatial Knowledge
Spatiotemporal Event Privacy
Spatiotemporal Privacy
Synonyms
Definitions
Background
Theory
Open Problems and Future Directions
Cross-References
References
Speaker Biometrics
Speaker Identification and Verification (SIV)
Speaker Recognition
Synonyms
Definition
Background
Speaker Enrollment
Speaker Verification (Authentication)
Speaker Identification
Speaker and Event Classification
Speaker Segmentation, Diarization, Detection, and Tracking
Speaker Verification Modalities
Knowledge-Based Speaker Recognition (Speech Biometrics)
Theory
Gaussian Mixture Model (GMM): Generic Case
Speaker Space
Speaker Embeddings (x-Vectors): Neural Network Kernels
Speaker Diarization
Application
Open Problems
References
Special-Purpose Cryptanalytical Hardware
Definition
Background
Theory
Applications
Cross-References
Recommended Reading
Specific Emitter Identification (SEI)
Specific Emitter Verification (SEV)
Spectre
Synonyms
Definitions
Background
Theory
Spectre Gadgets
Application
Open Problems and Future Directions
Cross-References
References
Spectre Attack
Spectre Variant 1
Spectre Variant 2
SPKI
Source of Names
Group Names
Globally Unique SDSI Names
Canonical S-Expressions (CSEXP)
Recommended Reading
Spontaneous Device Association
Spoofing a Hall Sensor
Spoofing and Antispoofing
Synonyms
Definitions
Background
Application
Open Problems and Future Directions
Summary
References
Spyware
Synonyms
Definition
Background
Theory
Applications
Open Problems
Cross-References
Recommended Reading
SQL Access Control Model
Definitions
Theory and Application
Access Control Enforcement via Views
Cross-References
References
SQL Administration Standards
SQL Control Procedures
SQL Injection Attacks
Definition
Background
Theory
Open Problems
Recommended Reading
Square-and-Multiply Exponentiation
SSE (acronym)
SSH
Synonyms
Definition
Background
Theory
Applications
Recommended Reading
SSL
Stablecoin
Definition
Background
Theory and Application
Open Problems and Future Directions
Cross-References
References
Stack (buffer) Overflow
Stack (buffer) Overrun
Stack/Heap Smashing
Standard Basis
Standard Model
Definition
Open Problems
Cross-References
Recommended Reading
State Machine Replication
Synonyms
Definition
Background
Theory
Application
Open Problems and Future Directions
Cross-References
References
Static Analysis
Synonyms
Definition
Background
Theory
Applications
Cross-References
Recommended Reading
Static Code Analysis
Static Program Analysis
Static Separation of Duties
Station-to-Station protocol
Definition
Theory
References
Statistical Databases
Synonyms
Definition
Background
Applications
Privacy Disclosure Measures
Security Protection Approaches
Conceptual Approach
Query Restriction Approach
Auditing
Perturbation Approach
Notes on Recommended Reading
Cross-References
Recommended Reading
Statistical Fault Attack
Synonyms
Definitions
Background
Theory/Application/Both
Open Problems and Future Directions
Cross-References
References
Steins Algorithm
Stream and Multicast Authentication
Synonyms
Definition
Background
Theory
Applications
Cross-References
References
Stream Ciphers
Definition
Background
Theory
Synchronous and Asynchronous Stream Ciphers
Families of Stream Ciphers
Families of Attacks Against Stream Ciphers
Properties of Stream Ciphers
Applications
Cross-References
Recommended Reading
Strong Authentication
Strong Collision Resistance
Strong Exclusion
Strong Prime
Definition
Theory
Cross-References
Recommended Reading
Strong RSA Assumption
Theory
Recommended Reading
Structural Cryptanalysis
Definition
Theory and Application
Structured Encryption
Definition
Related Work
Theory
Leakage
Security
Cross-References
References
Structured Encryption on Trusted Hardware
Subexponential Time
Definition
Theory
Applications
Cross-References
Subgroup
Definition
Theory
Applications
Cross-References
Subgroup Cryptosystems
Subscriber Identity Module
Substitution–Permutation (SP) Network
Definition
Theory
Applications
Cross-References
Recommended Reading
Substitutions and Permutations
Definition
Cross-References
Recommended Reading
Subversion-Resilient Cryptography
Summation Generator
Definition
Theory
Cross-References
Recommended Reading
Supersingular Isogeny Diffie-Hellman
Synonyms
Definition
Applications
Theory
Security
References
Supersingular Isogeny Key Encapsulation
Supervisory Control and Data Acquisition
Synonyms
Definition
Background
Theory and Application
Open Security Problems and Future Directions
Cross-References
References
Survivability
Swarm Attestation
Synonyms
Definition
Background
Verifiers in Swarms
Prover's Attestation in Swarms
Swarm Topology
Exchanged Communication Data Among Provers
Granularity of Attestation Result
Theory
Open Problems and Future Directions
Cross-References
References
Symmetric Cryptosystem
Synonyms
Definition
Applications
Cross-References
SYN Cookie Defense
Synonyms
Definition
Background (Historical Data Optional)
Theory
Application
Open Problems and Future Directions
References
SYN Flood Attack
Synonyms
Definition
Background (Historical Data Optional)
Theory
Application
Open Problems and Future Directions
Cross-References
References
Synchronous Stream Cipher
Definition
Background
Theory
Applications
Cross-References
Recommended Reading
Synthetic Data
Synonyms
Definition
Background
Theory
Traditional Models
Deep Generative Models
Privacy-Preserving Synthetic Data Generation
Open Problems and Future Directions
Cross-References
References
Synthetic Data Generation
Synthetic Mobility Traces
Definitions
Background
Theory
Traditional Approaches for SMT Generation
ML-based Approaches for SMT Generation
Privacy-Preserving SMT Generation
Open problems
Cross-References
References
System Component Graphs
System Hardening
T
Talker Recognition
Tamper Detection
Definition
Theory and Applications
Open Problems
Cross-References
References
Tamper Evidence
Definition
Background
Theory and Application
Cross-References
Recommended Reading
Tamper Resistance
Definition
Theory and Applications
Open Problems
Cross-References
Recommended Reading
Tamper Response
Definition
Theory and Applications
Open Problems
Cross-References
Recommended Reading
Target Collision Resistant Hash function
Targeted Hardware Manipulation
TCG Trusted Computing Group
T-Closeness
Definitions
Background
Theory/Application/Both
Open Problems and Future Directions
Cross-References
References
TCP Modulation Attacks
Definition
Low-Rate TCP Attacks
Background
Applications
Low-Rate Attacks Against TCP Variants
Potential Mitigation Solutions
Limitations of Router-Assisted Defenses
Experimental Results
Mitigation Using Randomization of the Minimum RTO
Recommended Reading
TCP Reset Injection
Synonyms
Definition
Background
Applications
Recommended Reading
TCP SYN Cookie
TCP SYN Flooding
TCP/IP from Network Security Perspective
Synonyms
Definition
Background
Theory
Open Problems and Future Directions
References
TCP/IP Protocol Suite
Technical Data Protection
Temperature Attack
Definition
Experimental Results
Cross-References
Recommended Reading
Tempest
Synonyms
Definitions
Background
Theory
Application
Cross-References
References
Temporal Access Control
Synonyms
Definitions
Background
Theory and Applications
Applications
Open Problems and Future Directions
Cross-References
References
Temporal Authorization Models
Temporary Identity
The Economics of Information Exchange
The Economics of Personal Data
The Fiat-Shamir Identification Protocol and the Feige-Fiat-Shamir Signature Scheme
Definition
Introduction
Preliminary
The Protocol
Parameters
Feige-Fiat-Shamir Signature Scheme
Cross-References
References
Theorem Proving and Security
Synonyms
Definition
Background
Applications
Open Problems and Future Directions
Cross-References
References
Threat Intelligence
Three-Dimensional Palmprint
Three-Factor Authentication
Synonyms
Definition
Background
Applications
Open Problems
Cross-References
Recommended Reading
Threshold Cryptography
Definition
Introduction
Different Approaches
A General Approach
A 2-Out-of-2 Case
Using a Multiplicative Secret Sharing Scheme
Unknown Subset of Participants
Particular Approaches
A Variant of the General Approach
Enhancements
Robustness
No Trusted Dealer
Proactive Security and Its Generalizations
The Multiverse Case
Post-quantum Threshold Cryptosystems
Cross-References
References
Threshold Homomorphic Cryptosystems
Cross-References
References
Threshold Probing Model
Threshold Signature
Definition
Theory
Applications
Cross-References
Editorial Note
References
Throughput of a Distributed Ledger
Definition
Background
Theory
Influential Factors
Further Aspects
Cross-References
References
Tiger
Definition
Background
Theory
Open Problems
Cross-References
Recommended Reading
Time-Based Access Control
Time-Memory Trade-Offs
Synonyms
Definition
Background
Theory
The Original Method
Distinguished Points and Rainbow Tables
Recommended Reading
Time-Stamping
Introduction
Techniques
Hash-and-Sign
Linking
Long-Lived Digital Signatures
Renewability
Standards
References
Timing Attack
Synonyms
Definition
Background
Time Measurement
Timing Analysis
Attack Targets
Countermeasures
Cross-References
References
TLS
Token
Definition
Theory
Cross-References
Recommended Reading
Token Pre-sales
Token Sales
Top-k Query Processing on Encrypted Data
Synonyms
Definition
Theory
Open Problems
Cross-References
References
Top-n Queries on Encrypted Data
Topological Vulnerability Analysis
Synonyms
Definition
Background
Theory
Application
Open Problems and Future Directions
Cross-References
References
Torus-Based Cryptography
Synonyms
Definition
Background
Theory
Applications
Open Problems
Cross-References
Recommended Reading
Touchless Palmprint Biometrics
TPM
Definition
Background
Theory and Applications
Functions: 1.1b
New Functions of the TPM 1.2 Specification
Open Problems
Cross-References
Recommended Reading
TPM Trusted Platform Module
Tracing Traitors
Tracking Cookie
Traffic Analysis
Definition
Background
Theory
Applications
Open Problems and Future Directions
Cross-References
Recommended Reading
Traitor Tracing
Synonyms
Definition
Background
Theory
Public-Key Traitor Tracing
Advanced Schemes
Cross-References
Recommended Reading
Transparent Authentication
Transport Layer Security (TLS)
Synonyms
Definition
Background
Theory
Cross-References
References
Transport-Level Security
Trapdoor One-Way Function
Definition
Background
Theory
Cross-References
Recommended Reading
Treemap Visualization
Tripartite Key Exchange
Triple-DES
Cross-References
References
Trojan
Trojan Horses, Computer Viruses, and Worms
Original Definition
Current Definition
Theory
Computer Viruses
Worms
Cross-References
References
Truncated Differentials
Definitions
Theory
Applications
Cross-References
Recommended Reading
Trust Anchor
Trust Management
Synonyms
Related Concepts
Definition
Background
Theory
Applications
Open Problems and Future Directions
References
Trust Management for Cyber-Physical Systems
Definition
Background
Theory and Application
Open Problems and Future Directions
Cross-References
References
Trust Management in Databases
Definition
Background
Theory
Cross-References
References
Trusted Boot
Synonyms
Definition
Background
Theory
Applications
Open Problems
Cross-References
Recommended Reading
Trusted Computing
Synonyms
Definitions
Background
Theory
Applications
Software Trust
Hardware Trust
Hardware Run-Time Trust
Hardware Design Trust
Open Problems
Cross-References
Recommended Reading
Trusted Computing Group
Definition
Background
Applications
Cross-References
Recommended Reading
Trusted Computing Platform Alliance
Definition
Background
Cross-References
Recommended Reading
Trusted Platform Module
Definition
Background
Applications
Final Remarks
Cross-References
References
Trusted Third Party
Definition
Applications
Open Problems and Future Directions
Cross-References
References
Trustworthy Autonomous Systems
Trustworthy Machine Learning
TSS
Definition
Background
Theory and Applications
Cross-References
Recommended Reading
TTP: Tactics, Techniques, and Procedures
Twin Signatures
Definition
Cross-References
Recommended Reading
TWIRL
Definition
Background
Theory
Experimental Results
Cross-References
Recommended Reading
Two-Factor Authentication
Definition
Theory
Applications
Cross-References
TWOFISH
Cross-References
Recommended Reading
Two-Key Cryptosystem
Type Checking and Security
Definition
Background
Applications
Open Problems and Future Directions
Cross-References
References
Typing Biometrics
Typing Dynamics
Typing Patterns
U
UMTS IC Card
Unconstrained Fingerprint Biometrics
Definitions
Background
Theory
Acquisition and Sensors
Constrained and Semi-constrained
Unconstrained
Fingerprint Segmentation
Fingerphoto
Latent Fingerprints
Fingerprint Feature Extraction
Traditional Fingerprint Descriptors
Non-Minutia Descriptors
Open Problems and Future Research Directions
Summary
References
Unconstrained Palmprint Biometrics
Synonyms
Definitions
Background
Theory
ROI Localization and Alignment
Feature Extraction
Open Problems and Future Directions
Summary
Cross-References
References
Unconstrained Remote Face Recognition
Uncoordinated Direct Sequence Spread Spectrum
Definition
Background
Theory
Applications
Recommended Reading
Uncoordinated Frequency Hopping Spread Spectrum
Definition
Background
Theory
Applications
Cross-References
Recommended Reading
Undeniable Signatures
Definition
Background
Theory
Convertible Undeniable Signatures
Applications
Recommended Reading
Unidentifiable OSN User
Universal Integrated Circuit Card
Universal One-Way Hash Functions (UOWHF)
Synonyms
Definition
Background
Theory
Cross-References
References
Unlinkability
Synonyms
Definitions
Theory and Application
Open Problems and Future Directions
Cross-References
References
Unobservability
Unpacking Malware
Synonyms
Definition
Background
Theory and Application
Recommended Reading
Untraceability
Definitions
Theory
Application
Open Problems and Future Directions
Cross-References
References
Usable Security Application Programming Interfaces (APIs)
User Authentication
Synonyms
Definition
Application
Open Problems and Future Directions
Cross-References
User Revocation
User Revocation in Identity Based Encryption and Attribute Based Encryption
Synonyms
Definitions
Theory
Direct Revocation
Indirect Revocation
Others
Open Problems and Future Directions
References
User Tracking and Reidentification
Definitions
Application
Theory
Cross-References
References
V
Value of Privacy
Value-Based Compliance Theory
Synonyms
Definition
Background
Theory
Open Problems and Future Directions
Cross-References
References
Variant 3
VBC Theory
VDF
Vector Space
Definition
Theory
Applications
Cross-References
Recommended Reading
Vehicular Privacy
Definition
Theory and Application
Cooperative Awareness Systems and Pseudonyms
Location-Based Services
Advanced Driver-Assistance Systems
Driver Behavior Monitoring
Open Issues
Cross-References
References
Verifiable Delay Function
Synonyms
Definition
Theory
Applications
Random Multi-Party Beacon
Beacon from Entropy Source
Resource-Efficient Permissionless Blockchains
Proof of Replication
Open Problems and Future Directions
Cross-References
References
Verifiable Encryption
Definition
Applications
Theory
Recommended Reading
Verifiable Secret Sharing
Cross-References
References
Verification
Vernam Cipher
Definition
Cross-References
Recommended Reading
Vicinity Card
Definition
Background
Applications
Cross-References
Recommended Reading
Video Analysis
Vigenère Encryption
Definition
Cross-References
Recommended Reading
Virtual Black Box
Virtual Machine Introspection
Definition
Background
Applications
Open Problems
Cross-References
Recommended Reading
Virtualization Security
Virtualized Packer
Virus Scanner
Visual Secret Sharing Schemes
Synonyms
Definition
Theory
Cross-References
Recommended Reading
Visual Security Analytics
Synonyms
Definition
Background
Theory and Applications
Open Problems and Future Directions
References
Visualization
VM Protection
Voice Biometrics
Voice Recognition
Voiceprint Recognition
von Neumann Correction
Synonyms
Definition
Experimental Results
Cross-References
Recommended Reading
VSSS
Vulnerability Disclosure
Vulnerability Disclosure Economics
Synonyms
Definitions
Background
Entities Involved in Disclosure
Disclosure Options
Theory of Disclosure
Open Problems and Future Direction
References
Vulnerability Metrics
Synonyms
Definition
Background
The National Vulnerability Database
Common Vulnerability Scoring System
Theory and Application
Open Problems and Future Directions
Cross-References
References
Vulnerability Quantification
Vulnerability Ranking
Vulnerability Scoring
W
Watermarking
Theory
Applications
Cross-References
Recommended Reading
Weak Collision Resistance
Weak Exclusion
Weak Keys
Definition
Theory
Applications
Cross-References
Recommended Reading
Web 2.0 Security and Privacy
Definition
Background
Theory
Cross-References
Recommended Reading
Web Access Control Strategies
Synonyms
Definition
Introduction
Theory
Application
Resource Sharing Using CORS
Access Delegation
IAM Policies
Open Problems and Future Directions
Cross-References
References
Web and Cloud Security
Web Application Security
Web Browser Security and Privacy
Synonyms
Related Concepts
Definition
Background
Theory
Applications
Recommended Reading
Web Cache Poisoning Attacks
Definition
Background
Theory
Recommended Reading
Web Client Security and Privacy
Web Initial Authentication
Web Initial Sign On
Web Penetration Test
Web Security
Web Security Auditing
Synonyms
Definition
Background
Theory
Applications
Cross-References
Recommended Reading
Web Security Policy
Web Service Security
Definition
Background
Theory
OAuth
The WS- Family of Specifications
The XACML Specification
Open Problems
References
Web Session Security
Web Single Sign On and SAML
Synonyms
Definition
Background
Theory
Applications
Open Problems
Cross-References
Recommended Reading
Web SSO and Security Assertion Markup Language
Web Vulnerability Assessment
Web-Based Security Protocols
Synonyms
Definition
Background
Theory
Applications
Cross-References
Recommended Reading
Whirlpool
Definition
Background
Theory
Applications
Experimental Results
Open Problems
Cross-References
Recommended Reading
White-Box Cryptography
Synonyms
Definitions
Background
Theory
Virtual Black Box
WBC Notions
Application
Early White-Box Designs and Attacks
New Paradigm: Gray-Box Resistance
Relaxing White-Box Cryptography
Open Problems and Future Directions
Cross-References
References
Wiener, Boneh–Durfee, and May Attacks on the RSA Public Key Cryptosystem
Definition
Theory
Recommended Reading
Winternitz One-Time Signatures
Wireless Air Traffic Communications Security
Synonyms
Definition
Background
Modernizing Airspace: Analog to Digital
Application
Challenges in Securing Infrastructure Systems
Open Problems and Future Directions
References
Wireless Avionics Security
Wireless Device Fingerprinting
Synonyms
Definition
Background
Theory
Applications
Experimental Results
Cross-References
Recommended Reading
Wireless Locational Privacy
Wireless Networks
Wireless Steganography
Wiretapping
Witness Hiding
Cross-References
References
Worms in Cellular Networks
Synonyms
Definitions
Background
Theory
Applications
Open Problems and Future Directions
References
X
(X, Y)-Privacy
Synonyms
Definitions
Background
Theory
Cross-References
References
X.509
Synonyms
Definition
Theory and Application
Cross-References
Recommended Reading
XML-Based Access Control Languages
Definitions
Background
Theory
Application
Open Problems and Future Directions
Cross-References
References
XSS
Z
Zero Trust Architecture
Synonyms
Definition
Background
Theory
Application
Open Problems and Future Directions*-12pt
Cross-References
References
Zero Trust Cybersecurity
Zero Trust Network
Zero Trust Threat Model
Zeroization
Definition
Background
Theory and Applications
Cross-References
Recommended Reading
Zero-Knowledge
Definition
Theory
Real Conversations
Simulated Conversations
Cross-References
Reference
Zeta Function Computation