Encyclopedia of Cryptography, Security and Privacy. 3 Ed

Encyclopedia of Cryptography, Security and Privacy. 3 Ed

Encyclopedia of Cryptography, Security and Privacy. 3 Ed
Автор: Jajodia Sushil, Samarati Pierangela, Yung Moti
Дата выхода: 2005
Издательство: Springer Nature
Количество страниц: 2864
Размер файла: 36,5 МБ
Тип файла: PDF
Добавил: Федоров_АИ
 Проверить на вирусы

Preface....5

Acknowledgments....6

About the Editors....7

Section Editors....10

List of Contributors....22

A....59

5G....59

A5/1....59

Definition....59

Background....59

Theory....59

Description of the Running-Key Generator....59

Attacks on A5/1....60

Cross-References....60

Recommended Reading....60

ABAC....61

ABE....61

Abuse....61

Abuse of Trust....61

Access and Adversary Structure....61

Definition....61

Theory....61

Cross-References....62

References....62

Access Control....62

Access Control for Cyber-Physical Systems....62

Synonyms....62

Definition....62

Background....62

Traditional Access Control Models....63

Advanced Access Control Models....64

Open Problems and Future Directions....65

References....66

Access Control Policies, Models, and Mechanisms....67

Definition....67

Background....67

Theory....68

Cross-References....69

References....69

Access Control Rules....69

Access Limitation....69

Access Matrix....69

Definition....69

Background....69

Theory and Application....70

Cross-References....72

References....72

Access Pattern....72

Synonyms....72

Definition....72

Background....72

Applications....72

Theory....73

Open Problems....75

Cross-References....75

Recommended Reading....75

Access Rights....76

Accountability....76

Accountability for Cyber-Physical Systems....76

Definition....76

Background....76

Application....77

Open Problems and Future Directions....78

Cross-References....78

References....78

Accountable and Traceable ABE....79

Accountable and Traceable Attribute Based Encryption....79

Synonyms....79

Definitions....79

Background....79

Theory....79

Applications....80

Open Problems and Future Directions....81

References....81

Acquirer....81

Definition....81

Recommended Reading....82

Acronym (DGA)....82

Active Authentication....82

Adaptation....82

Adaptive Chosen Ciphertext Attack....82

Definition....82

Cross-References....82

Recommended Reading....82

Adaptive Chosen Plaintext and Chosen Ciphertext Attack....82

Definition....82

Cross-References....83

Recommended Reading....83

Adaptive Chosen Plaintext Attack....83

Definition....83

Cross-References....83

Adaptive Control Framework (ACF)....83

Adaptive Cyber Defense....83

Synonyms....83

Definition....83

Background....83

Theory and Application....84

Open Problems and Future Directions....87

Cross-References....88

References....88

Administrative Policies....88

Definitions....88

Background ....88

Theory and Application....88

Open Problems and Future Directions....90

Cross-References....90

References....90

Administrative Policies in SQL....90

Synonyms....90

Definition....90

Application....90

Cross-References....92

References....92

Advanced Encryption Standard....92

Advanced Hash Competition....92

Advanced Persistent Threats....92

Synonyms....92

Definition....92

Background....92

Common Characteristics of APT Attack Campaigns....93

Open Problems and Future Directions....94

References....94

Adversarial and Trustworthy AI....94

Synonyms....94

Definition....94

Background....94

Evasion Attacks....95

Adversarial Inputs....95

Universal Perturbations....95

Data Poisoning Attacks....95

Trustworthy AI....96

Robust ML....96

Open Problems and Future Directions....96

References....97

Adversarial Artificial Intelligence (AI)....97

Adversarial Machine Learning (AML)....97

Synonyms....97

Definition....97

Background....97

Theory and Application....98

Open Problems and Future Directions....99

Cross-References....99

References....99

Adversarial/External Knowledge (Privacy in the Presence of)....100

Definition....100

Background....101

Theory....101

Open Problems....103

Cross-References....103

Recommended Reading....104

Adware....104

AES....104

Aggregate Signatures....104

Definition....104

Applications....105

Recommended Reading....105

Agility....105

Aging of Biometric Traits....105

Definition....105

Background....106

Theory....106

Open Problems and Future Directions....107

Summary....107

Cross-References....108

References....108

AHS Competition/SHA-3....108

Synonyms....108

Definition....108

Background....108

Applications....108

Cross-References....110

Recommended Reading....110

AI Act....111

AI and Big Data Analytics for Network Security....111

Definition....111

Background (Historical Data Optional)....111

Applications and Use Cases....112

Open Problems and Future Directions....113

Description of New Trends/Unsolved Problems....113

References....114

AI Approaches in Steganalysis Research....114

Definition....114

Background....114

Theory....115

Open Problems and Future Directions....116

References....117

AI Data Poisoning....118

AI in Intrusion Detection....118

AI: Artificial Intelligence....118

Air Traffic Management Security....118

Alberti Encryption....118

Definition....118

Cross-References....120

Recommended Reading....120

Algebraic Immunity of Boolean Functions....120

Synonyms....120

Definition....120

Background....120

Theory....120

Open Problems....121

Cross-References....122

Recommended Reading....122

Algebraic Number Field....122

Algebraic Side-Channel Attack....122

Synonyms....122

Definitions....122

Background....122

Application....123

Open Problems and Future Directions....123

Cross-References....123

References....123

Algorithmic Complexity Attacks....123

Algorithmic DoS....123

Synonyms....123

Definition....124

Background....124

Theory....124

Impact....124

Solutions....125

Applications....125

Recommended Reading....125

Algorithm-Substitution Attack....125

Alias....125

Alphabet....125

Definition....125

Background....125

Cross-References....126

Recommended Reading....126

Amplification DoS Attacks....126

Synonyms....126

Definitions....127

Theory and Application....127

Open Problems and Future Directions....128

Cross-References....128

References....128

An Economic View of Privacy Paradox....128

Anamorphic Cryptography....128

Definitions....128

Background....128

Theory....129

Open Problems and Future Directions....129

Cross-References....130

References....130

Android's Security Framework–Understanding the Security of Mobile Phone Platforms....130

Synonyms....130

Definition....130

Background....130

Application....131

Runtime Environment....131

Permission Model....132

Application Storage....133

Cross-References....134

References....134

Anomalous Binary Curves....134

Anomaly Detection....134

Anomaly Detection for CPS....134

Anonymity....134

Definition....134

Theory....134

Applications....136

Cross-References....136

References....136

Anonymity in Data Mining....137

Anonymity in OSNs....137

Synonyms....137

Definitions....137

Theory....137

Application....138

Open Problems and Future Directions....138

Cross-References....138

References....138

Anonymization of Aggregated Location Information....139

Anonymization of Aggregated Mobility Data....139

Anonymization of Personal Data (Legal Perspective)....139

Definition....139

Background....139

Theory....140

Open Problems and Future Directions....141

Cross-References....141

References....141

Anonymous Attribute-Based Encryption....141

Anonymous Communications over Delay Tolerant Networks....141

Definition....141

Background....141

Theory....141

Applications....143

Cross-References....143

References....143

Anonymous Communications over Blockchain Technology....143

Synonyms....143

Definitions....143

Background....144

Application....144

Mixing Services....145

Noninteractive Zero-Knowledge Proof....145

Ring Signature....145

Open Problems and Future Directions....146

Cross-References....146

References....146

Anonymous Web Browsing and Publishing....146

Definition....146

Theory....146

Applications....147

Open Problems....148

Experimental Results....148

Cross-References....148

Recommended Reading....148

Anthropometric Authentication....149

Anthropometrics....149

Anthropometry....149

Anti-DoS Cookies....149

Anti-jamming Strategy....149

Antispam Based on Sender Reputation....149

Antivirus....149

Application Permissions....149

Application-Level Denial of Service....149

Synonyms....149

Definition....149

Background....149

Theory and Application....150

Open Problems....151

Cross-References....151

References....151

Applications....152

Applications of Formal Methods to Intrusion Detection....152

Definition....152

Background....152

Applications....152

Open Problems....153

Cross-References....153

Recommended Reading....153

Applications of Formal Methods to Web Application Security....153

Synonyms....153

Definition....153

Background....154

Theory....154

Applications....155

Cross-References....155

References....155

Applications of Rank-Metric Codes....156

Applied Cryptography....156

APT Attack....156

APT Campaigns....156

APT: Advanced Persistent Threat....156

Arguments for Privacy Regulations....156

ARIA....156

Definition....156

Background....156

Theory....156

Open Problems....157

Cross-References....157

Recommended Reading....157

ARP Poison Routing (APR)....157

ARP Poisoning....157

ARP Spoofing....157

Synonyms....157

Definition....158

Background....158

Theory....158

Mitigation....158

External Solutions....159

Cryptographic Solutions....159

Cross-References....159

Recommended Reading....159

Artificial Intelligence....160

Artificial Intelligence (AI) Explainability....160

Artificial Intelligence Act (AI Act) and the GDPR....160

Synonyms....160

Definition....160

Background....160

Theory....160

Title I: General Provisions....161

Title II: Prohibited Artificial Intelligence Practices....161

Title III: High-Risk AI Systems....161

Title IV: Transparency Obligations for Certain AI Systems....163

Title V: Measures in Support of Innovation....163

Title VI: Governance....163

Title VII: EU Database for Stand-Alone High-Risk AI Systems....163

Title VIII: Post-Market Monitoring, Information Sharing, and Market Surveillance....164

Title IX: Codes of Conduct....164

Title X: Confidentiality and Penalties....164

Title XI: Delegation of Power and Committee Procedure....164

Title XII: Final Provisions....164

Open Problems and Future Directions....164

Cross-References....164

References....165

Artificial Intelligence Data Poisoning....165

ASCA....165

Assumptions....165

Definition....165

Theory....165

Unconditional and Quantum Security....165

Conditional Security....165

Cross-References....166

References....166

Asymmetric Cryptosystem....166

Synonyms....166

Definition....166

Theory....166

Application....166

Cross-References....167

Asymmetric Setting for Searchable Encryption....167

Synonyms....167

Definitions....167

Background....167

Theory....167

Parties....167

Algorithms....167

Security Notions....168

Search Capabilities....168

Open Problems and Future Directions....169

Cross-References....169

References....169

Asynchronous Byzantine Fault Tolerance....169

Synonyms....169

Definition....169

Background....169

Theory....170

Open Problems and Future Directions....172

Cross-References....172

References....172

Asynchronous Consensus....173

Asynchronous Stream Cipher....173

Attachment....173

Attack by Summation over a Hypercube....173

Attack Detection for Cyber-Physical Systems....173

Synonyms....173

Definition....173

Introduction....174

Theory or Application....174

Open Problems and Future Directions....175

Cross-References....175

References....176

Attack Evasion....176

Attack Graphs....176

Definitions....176

Background....176

Theory and Application....177

References....178

Attack Response....179

Attack Traceability....179

Synonyms....179

Definitions....179

Background....179

Applications....180

Open Problems and Future Directions....181

Cross-References....181

References....181

Attacker Models for Location Privacy....181

Definition....181

Background....182

Discussion & Open Issues....183

Cross-References....183

References....183

Attacks on Wi-Fi Availability....184

Attestation....184

Synonyms....184

Definition....184

Background....184

Theory and Applications....184

Cross-References....185

Recommended Reading....185

Attribute Based Encryption with Access Policy Hiding....185

Synonyms....185

Definitions....185

Background....185

Theory....186

Applications....187

Open Problems....187

Cross-References....187

References....187

Attribute Certificate....187

Definition....187

Background....188

Theory....188

Applications....188

Cross-References....188

Recommended Reading....188

Attribute-Based Access Control....189

Synonyms....189

Definition....189

Background....189

Theory and Concepts....189

Open Problems and Future Directions....190

Cross-References....191

References....191

Attribute-Based Encryption....191

Synonyms....191

Definitions....191

Background....191

Theory....192

Applications....192

Open Problems and Future Directions....193

References....193

Attribute-Based Encryption with Offline Computation and Outsourced Decryption....193

Definition....193

Access Structures....193

Linear Secret Sharing Schemes....194

Background....194

ABE with Offline Computation....194

KP-ABE with Offline Encryption....195

CP-ABE with Offline Encryption....195

ABE with Outsourced Decryption....196

Open Problems and Future Directions....197

References....197

Attribute-Based Encryption with Searchable Encryption....198

Synonyms....198

Definitions....198

Background....198

Theory....198

Applications....199

Open Problems....199

Cross-References....200

References....200

Attribute-Based Encryption with Updatable Access Policy....200

Synonyms....200

Definitions....200

Background....200

Theory....201

Applications....202

Open Problems....202

Cross-References....202

References....202

Attribute-Based Keyword Search over Encrypted Data....202

Attribute-Based Signatures....202

Auditability....202

Authenticated Data Feed....202

Authenticated Encryption....203

Introduction....203

Background....203

Security....203

Associated Data....204

Provable Security....204

AE Schemes....204

Conventions....204

Generic Composition....204

Security....205

Performance....206

Associated Data....206

Can We Do Better?....206

Single-Pass Combined Modes....207

IAPM....207

Comments on IAPM....207

XCBC and OCB....208

Associated Data....208

Intellectual Property....208

Two-Pass Combined Modes....208

CCM Mode....209

CCM Is Parameterized....209

Comments on CCM....209

EAX Mode....209

CWC Mode....210

AE Primitives....211

Helix....212

SOBER-128....212

Beyond AE and AEAD....212

Cross-References....213

Notes on References....213

Recommended Reading....213

Authentication....214

Authentication (General Methods)....214

Synonyms....214

Definition....215

Background....215

Theory....215

Applications....215

Open Problems and Future Directions....216

Experimental Results....216

Cross-References....216

References....216

Authentication for Cyber-Physical Systems....217

Synonyms....217

Definitions....217

Background....217

Application....218

Sensor Authentication....218

Actuator Authentication....219

Process Authentication....219

PLC Authentication....219

Control Logic Authentication....219

Open Problems and Future Directions....220

References....220

Authentication Token....221

Synonyms....221

Related Concepts and Keywords....221

Definition....221

Theory....222

Applications....222

Open Problems and Future Directions....223

Cross-References....223

References....223

Authentication, from an Information Theoretic Perspective....223

Synonyms....223

Definition....224

Background....224

Theory....224

Recommended Reading....225

Authorization....226

Authorizations....226

Synonyms....226

Definition....226

Background....226

Theory and Application....226

Advanced Authorizations....228

Cross-References....229

References....229

Autocorrelation....229

Definition....229

Application....229

Cross-References....229

Recommended Reading....229

Autograph....230

Autonomous Cyber Response....230

Autotomic Signatures....230

Definition....230

Availability....230

Definition....230

Theory....230

B....231

Bank Card....231

Barrett's Algorithm....231

Definition....231

Recommended Reading....231

Barter....231

Base....231

Beaufort Encryption....232

Definition....232

Cross-References....232

Recommended Reading....232

Behavioral Security....232

Synonyms....232

Definition....232

Background....232

Theory....232

Open Problems and Future Directions....234

Cross-References....235

References....235

Bell–La Padula Model....235

Synonyms....235

Definition....235

Background....235

Theory....236

First Volume: “Secure Computer Systems: Mathematical Foundations” (Bell and La Padula 1973)....236

Second Volume: “Secure Computer Systems: A Mathematical Model” (La Padula and Bell 1973)....237

Third Volume: “Secure Computer Systems: Refinement of the Mathematical Model” (Bell 1973a)....238

Fourth Volume: “Secure Computer Systems: Unified Exposition and MulticsInterpretation” (Bell and La Padula 1975)....239

Later Developments....239

Applications....240

Cross-References....241

Recommended Reading....241

Berlekamp Q-matrix....242

Definition....242

Theory....242

Cross-References....242

Recommended Reading....242

Berlekamp–Massey Algorithm....242

Definition....242

Background....243

Theory....243

Cross-References....243

Recommended Reading....244

Biba Model....244

Synonyms....244

Background....244

Theory....244

Applications....244

Cross-References....245

Recommended Reading....245

Big Number Multiplication....245

Big Number Squaring....245

Bilinear Pairings....245

Binary Euclidean Algorithm....245

Synonyms....245

Definition....245

Background....245

Theory....246

Applications....247

Cross-References....247

Recommended Reading....247

Binary Exponentiation....248

Synonyms....248

Definition....248

Background....248

Theory....248

Applications....249

Cross-References....249

Recommended Reading....249

Binary Functions....249

Binary GCD Algorithm....249

Binding Pattern....249

Binomial Distribution....249

Definition....249

Theory....250

Applications....250

Bioinformatics....250

Biometric Authentication....250

Synonyms....250

Definition....250

Background....251

Theory....251

Applications....252

Open Problems and Future Directions....254

References....254

Biometric Cryptosystems....254

Biometric Detectors....254

Biometric Encryption....255

Synonyms....255

Definitions....255

Background....255

Theory and Application....255

Open Problems and Future Directions....257

Security....257

Data Representation....258

Real-World Performance and Deployment....258

References....258

Biometric Ethics....260

Biometric Fusion....260

Biometric Identification Errors....260

Biometric Identification in Video Surveillance....260

Biometric Information Ethics....260

Biometric Key Generation....261

Biometric Keys....261

Biometric Matching....261

Synonyms....261

Definition....261

Background....261

Theory....261

Open Problems and Future Directions....262

Cross-References....262

References....262

Biometric Passport Security....262

Biometric Performance Evaluation....262

Biometric Performance Measurement....263

Biometric Privacy....263

Synonyms....263

Definitions....263

Background....263

Theory....263

Classification of the Biometric Privacy Risks....263

Best Practice for Privacy Assessment in Biometrics....264

Template Protection....265

Template Transformations....266

Applications....266

Open Problems and Future Directions....266

References....267

Biometric Recognition....267

Biometric Recognition Errors....267

Synonyms....267

Definitions....267

Background....267

Biometric Verification and Identification....268

Evolution....268

Errors of a Biometric System....268

Theory and Application....271

Open Problems and Future Directions....271

Cross-References....271

References....271

Biometric Sample Quality....271

Synonyms....271

Definitions....271

Biometric Sample Quality for Different Biometric Modalities....272

Quality-Based Score Normalisation....273

References....274

Biometric Scanners....275

Biometric Sensors....275

Synonyms....275

Definition....275

Theory....275

Application....277

Open Problems and Future Directions....277

Cross-References....277

References....277

Biometric Social Responsibility and Supply Chain Implications....278

Synonyms....278

Introduction....278

Definition....278

Background....278

Consumer Relationship Management....278

Supply Chain Management (SCM) Trust Aspects....279

Theory of Corporate Social Responsibility (CSR) as Strategy....281

CSR Policy Development....281

Applications and Future Directions....283

References....283

Biometric Spoofing and Its Evaluation....284

Synonyms....284

Definitions....284

Background ....284

Evolution....284

Errors of a Biometric System: Matching and Spoofing Detection....285

Theory and Application....287

Open Problems and Future Directions....287

Cross-References....287

References....287

Biometric Spoofing Evaluation....287

Biometric Standards....287

Definition....287

Background....287

Standards Developing Organizations (SDOs)....288

Application....289

Biometric Systems (INCITS/ISO/IEC 19794-1:2011 2018)....289

Types of Biometric Standards....289

Future Directions....293

References....294

Biometric Systems Evaluation....295

Synonyms....295

Definitions....295

Background ....295

Types of Evaluation....296

Evolution....296

Theory and Application....296

Technology Evaluation....296

Scenario Evaluation....298

Operational Evaluation....298

Open Problems and Future Directions....298

Cross-References....299

References....299

Biometric Testing....299

Biometric Transducers....299

Biometric Verification Errors....300

Biometrics....300

Biometrics (Synthetic, Artificial, Inverse, Recognition, Privacy, Forensics, Social Responsibility)....300

Biometrics Attacks....300

Biometrics for Authentication....300

Biometrics for Enrolment....300

Biometrics for Forensics....300

Synonyms....300

Definition....300

Background....300

Theory....301

Forensic Science....301

Computational Biometrics....301

Applications....301

Open Problems....304

Cross-References....304

Recommended Reading....305

Biometrics for Identity Management....305

Synonyms....305

Definition....305

Background....305

Theory or Application or Both....305

Biometrics in Identity Management....305

Biometrics and Authentication....306

Modalities and Maintenance....307

Storage of Biometric Reference....308

Use Cases....308

Open Problems and Future Directions....308

Cross-References....308

References....309

Biometrics for Wearable Devices....309

Background....309

Application....309

Wearable Constraints....309

Wearable Authentication....310

Case Study with NetHealth Biometric Dataset....310

NetHealth Dataset....310

Feature Engineering and Modeling....310

Case Study Findings....310

Open Problems and Future Directions....311

Summary....311

References....311

Biometrics in Ambient Intelligence....312

Related Concepts....312

Definition....312

Background....312

Application....313

Open Problems and Future Directions....314

Summary....315

Cross-References....315

References....315

Biometrics in Border Control....315

Background....315

Application....316

Open Problems and Future Directions....316

Summary....317

Reference....317

Biometrics in Video Surveillance....317

Synonyms....317

Definition....317

Background....317

Applications....318

Open Problems....319

Noncooperative User Behavior....320

Low Image Resolution....320

Image Blur....320

Interlacing in Video Images....320

Cross-References....320

Recommended Reading....320

Biometrics Security....321

Synonyms....321

Definitions....321

Application....321

Open Problems and Future Directions....322

References....322

Biometrics Vulnerabilities....323

Biometrics: Terms and Definitions....323

Definition....323

Background....323

Theory....323

Biometric Systems....323

Privacy....325

Application....326

Open Problems and Future Directions....327

Summary....327

References....327

BIOS Basic Input Output System....327

Birthday Paradox....327

Definition....327

Applications....328

Cross-References....328

Recommended Reading....328

Bitcoin....328

Definition....328

Background....328

Limitations, Mitigations, and Future directions....329

Cross-References....330

References....330

Black Box Algorithms....331

Black Hat Hacker....331

Blackmailing Attacks....331

Definition....331

Cross-References....331

Recommended Reading....331

Blind Signature....331

Synonyms....331

Definitions....331

Background ....331

Theory and Application....332

Open Problems and Future Directions....332

Cross-References....332

References....332

Blinding....333

Blinding Techniques....333

Synonyms....333

Definitions....333

Theory and Application....333

Cross-References....335

References....335

Block Ciphers....335

Definition....335

Background....335

Theory....335

Recommended Reading....342

Blowfish....342

Cross-References....343

Recommended Reading....343

BLP....343

BLP Model....343

BLS Short Digital Signatures....343

Background....343

Theory....344

Cross-References....344

Recommended Reading....344

Bluetooth Insecurity....345

Bluetooth Security....345

Synonyms....345

Definitions....345

Background....345

Theory....345

Secure Simple Pairing....345

LE Legacy Pairing....346

BR/EDR Legacy Pairing....346

Applications....346

Cross-References....346

References....346

Blum Integer....346

Definition....346

Background....347

Theory....347

Applications....347

Cross-References....347

Recommended Reading....347

Blum–Blum–Shub Pseudorandom Bit Generator....347

Definition....347

Theory....347

Cross-References....348

Recommended Reading....348

Blum–Goldwasser Public Key Encryption System....349

Definition....349

Theory....349

Cross-References....350

References....350

Boolean Functions....350

Synonyms....350

Definition....350

Background....350

Theory....350

Cross-References....354

Recommended Reading....354

Boolean Interrogations on Encrypted Data....354

Boomerang Attack....354

Definition....354

Theory....354

Cross-References....355

Recommended Reading....355

Botnet Detection in Enterprise Networks....355

Background....355

Theory and Applications....356

Open Problems....357

Cross-References....357

Recommended Reading....357

Broadcast Authentication from a Conditional Perspective....358

Synonyms....358

Definition....358

Background....358

Theory....358

Solutions Using Symmetric Cryptography....358

Solutions Using Asymmetric Cryptography....359

Applications....360

Open Problems....360

Cross-References....360

Recommended Reading....360

Broadcast Authentication from an Information Theoretic Perspective....360

Synonyms....360

Definition....361

Background....361

Theory....361

Cross-References....362

References....362

Broadcast Encryption....362

Definition....362

Background....362

Theory....363

Constructions....364

Fiat–Naor Construction....364

Logical Key Hierarchy....365

Subset Difference....365

References....366

Broadcast Stream Authentication....366

Browser Cookie....366

BSP Board Support Package....366

Buffer Overflow Attacks....367

Synonyms....367

Definition....367

Background....367

Application....367

Open Problems....370

Recommended Reading....370

Buffer Overrun....370

Bytecode Verification....370

Definition....370

Background....370

Applications....371

Recommended Reading....372

Byzantine Agreement....372

Synonyms....372

Definition....372

Background....372

Theory....373

Open Problems and Future Directions....376

Cross-References....376

References....376

C....378

C2 – Block Cipher....378

Definition....378

Background....378

Theory....378

Experimental Results....379

Cross-References....379

Recommended Reading....379

C2/CnC: Command and Control....379

Cæsar Cipher....380

Definition....380

Background....380

Cross-References....380

Recommended Reading....380

Camellia....380

Cross-References....382

Recommended Reading....382

Camouflage....382

Cascade Revoke....382

Cast....382

Cross-References....383

Recommended Reading....383

Cayley Hash Functions....383

Definition....383

Background....384

Theory....384

Open Problems....384

Cross-References....384

References....385

CBC-MAC and Variants....385

Definition....385

Background....385

Theory....385

Simple CBC-MAC....385

Variants of CBC-MAC....386

Standardization....388

Cross-References....389

Recommended Reading....389

CCIT2-CodeFriedrich L. Bauer: deceased.....390

Definition....390

Recommended Reading....390

CDH....390

Cellular Network Security....390

Cellular Privacy....390

Synonyms....390

Definition....390

Background....390

Theory....391

Applications....391

Open Problems and Future Directions....393

Cross-References....393

References....393

(Centralized) Multi-authority Attribute-Based Encryption....394

Certificate....394

Definition....394

Background....394

Applications....394

Cross-References....395

References....395

Certificate Management....396

Related Concepts....396

Definition....396

Certificate of Primality....396

Synonyms....396

Definition....396

Cross-References....396

Certificate Revocation....396

Definition....396

Applications....397

Periodic Publication Mechanisms....397

Online Query Mechanisms....398

Other Revocation Options....399

Cross-References....399

References....399

Certificateless Cryptography....400

Definition....400

Background....400

Theory....400

Applications....401

Open Problems and Future Directions....401

Cross-References....401

Recommended Reading....401

Certification Authority....401

Synonyms....401

Definition....401

Background....402

Deployment Results....404

Cross-References....404

References....404

Certified Mail....404

Synonyms....404

Definition....404

Background....404

Theory....404

Cross-References....405

References....405

Chaffing and Winnowing....406

Synonyms....406

Definitions....406

Background....406

Theory....406

Open Problems and Future Directions....407

References....408

Challenge-Response Authentication....408

Challenge-Response Identification....408

Synonyms....408

Related Concepts....408

Definition....408

Background....408

Theory....408

Applications....410

Open Problems and Future Directions....410

Cross-References....410

References....410

Challenge-Response Protocol....410

Chaum Blind Signature Scheme....410

Definitions....410

Theory....410

Cross-References....411

References....411

Chemical Combinatorial Attack....412

Definition....412

Experimental Results....412

Recommended Reading....412

Chinese Remainder Theorem....412

Synonyms....412

Definition....412

Background....412

Theory....412

Applications....413

Cross-References....414

Recommended Reading....414

Chinese Wall....414

Definition....414

Background....414

Theory....414

Applications....416

Cross-References....416

References....416

Chip Card....416

Chosen Ciphertext Attack....416

Definition....416

Cross-References....416

Recommended Reading....416

Chosen Plaintext and Chosen Ciphertext Attack....416

Definition....416

Cross-References....417

Chosen Plaintext Attack....417

Definition....417

Theory....417

Cross-References....417

Recommended Reading....417

Chosen-Prefix Attack....417

Chromosome....417

Chroot Jail....417

Synonyms....417

Definition....417

Background....418

Theory....418

Applications....418

Cross-References....419

Recommended Reading....419

Chroot Prison....419

Ciphertext-Only Attack....419

Definition....419

Cross-References....419

Recommended Reading....419

Ciphertext-Policy ABE....419

Clark and Wilson Model....419

Definition....419

Background....420

Theory....420

Cross-References....421

References....421

Classical Cryptosystem....421

Claw-Free....421

Definition....421

Background....422

Theory....422

Applications....422

Cross-References....422

Recommended Reading....422

CLEFIA....422

Definition....422

Background....422

Theory....422

Cross-References....423

Recommended Reading....423

Client Puzzles....423

Cliptography....423

Clock-Controlled Generator....424

Definition....424

Background....424

Theory....424

Applications....424

Example: The Alternating Step Generator....425

Cross-References....425

Recommended Reading....425

Closest Vector Problem....426

Synonyms....426

Definition....426

Background....426

Theory....426

Applications....427

Open Problems....427

Cross-References....427

Recommended Reading....427

Cloud Security....427

CMAC....428

Definition....428

Background....428

Theory....428

Cross-References....429

Recommended Reading....429

CMVP—Cryptographic Module Validation Program....429

Code Verification....429

Code-Based Cryptography....429

Definition....429

Applications....430

Cross-References....430

References....430

Codebook Attack....430

Definition....430

Applications....430

Cross-References....431

Cognitive Style....431

Collaborative DoS Defenses....431

Definition....431

Background....431

Applications....431

Attack Response Approaches....432

Attack Prevention Approaches....434

Open Problems and Future Directions....434

Cross-References....434

References....434

Collective Behavior....435

Collective Privacy....435

Collective Remote Attestation....435

Collision Attack....435

Definition....435

Background....435

Theory....435

Cross-References....436

References....436

Collision Fault Analysis....437

Collision Resistance....437

Synonyms....437

Definition....437

Background....437

Theory....437

Cross-References....438

References....438

Combination Generator....438

Definition....438

Theory....439

Cross-References....440

Recommended Reading....440

Commercial Off-the-Shelf....440

Commitment....441

Definition....441

Background....441

Theory....441

Cross-References....442

References....443

Commitment Schemes....443

Common Criteria....444

Synonyms....444

Definition....444

Background....444

Theory and Application....444

Acronyms....447

Open Problems....447

Recommended Reading....447

Common Criteria, from a Security Policies Perspective....447

Synonyms....447

Definition....447

Background....447

Theory....448

Evaluated Product....448

Security Requirements....448

Security Evaluation....449

Applications....450

Open Problems....450

References....450

Communication Channel Anonymity....450

Synonyms....450

Definitions....450

Background....451

Theory and Applications....451

Open Problems and Future Directions....452

References....453

Complexity Theory....453

Compliance Fatigue....453

Compositeness Test....453

Compromising Emanations....453

Computational Complexity....453

Synonyms....453

Definition....453

Theory....454

Open Problems....460

Cross-References....460

Recommended Reading....460

Computational Diffie-Hellman Problem....460

Synonyms....460

Definition....460

Background....460

Theory....461

Applications....461

Bit Security of the Diffie-Hellman Secret Key....462

Number Theoretic and Algebraic Properties....463

Cross-References....463

Recommended Reading....463

Computational Puzzles....465

Synonyms....465

Definition....465

Background....465

Theory....465

Applications....466

Recommended Reading....466

Computational Versus Unconditional Security....467

Definition....467

Cross-References....467

Recommended Reading....467

Computationally Sound Proof System....467

Conceptual Design of Secure Databases....467

Synonyms....467

Definition....467

Background....468

Application....468

Open Problems and Future Directions....471

References....471

Conceptual Modeling....471

Conditional k-Anonymity for Multidimensional Data....471

Conditional Lower Bounds for Oblivious RAM....471

Introduction....471

Background....472

The ORAM Model....472

Conditional Lower Bounds....473

The Boyle–Naor Lower Bound: Offline ORAM (Without Balls-and-Bins)....473

The Weiss–Wichs Lower Bound: Online Read-Only ORAM....473

Cross-References....474

References....474

Conference Key Agreement....474

Conference Keying....474

Confidential Data Storage....475

Synonyms....475

Definition....475

Background....475

Application....475

Open Problems and Future Directions....475

Cross-References....476

References....476

Confidential Queries for Encrypted Relational DBMS....476

Synonyms....476

Definitions....476

Private Queries Through Multilayered Encryption....477

Private Queries Through Searchable Symmetric Encryption....477

Private Queries Mediated by Trusted Hardware....478

Cross-References....478

References....478

Confidential Storage....479

Confidentiality....479

Configuration Security....479

Synonyms....479

Definition....479

Background....479

Theory....479

Application....480

Open Problems and Future Directions....481

Cross-References....481

References....481

Confirmer Signatures....481

Consensus....481

Consistency Verification of Security Policy....481

Contactless Cards....481

Definition....481

Background....481

Theory....481

Applications....482

Cross-References....482

Recommended Reading....482

Contactless Palmprint Biometrics....482

Content-Based and View-Based Access Control....482

Definition....482

Background....482

Theory....483

View Authorization....483

Content-Based Authorization....483

Row-Level Security....485

Open Problems....485

Cross-References....486

Recommended Reading....486

Context-Awareness....486

Context-Based Micro-training....486

Definition....486

Background....487

Theory and Application....487

Open Problems and Future Directions....488

Cross-References....489

References....489

Continuous Authentication....489

Synonyms....489

Definitions....489

Background....489

Application ....489

Open Problems and Future Directions....491

Summary....492

Cross-References....492

References....492

Contract Signing....492

Synonyms....492

Definition....492

Background....492

Theory....492

Cross-References....493

References....493

Control Vector....494

Definition....494

Background....494

Theory....494

Applications....494

Open Problems....494

Recommended Reading....494

Controlled Data Sharing in DOSNs....494

Conventional Cryptosystem....495

Cookie....495

Synonyms....495

Definition....495

Background....495

Theory....495

Applications....496

Open Problems and Future Directions....496

Cross-References....496

Recommended Reading....497

Coprime....497

Copy Protection....497

Definition....497

Theory and Applications....497

Open Problems....500

Recommended Reading....501

Corporations....501

Correcting-Block Attack....501

Synonyms....501

Definition....501

Background....501

Theory....501

Applications....502

Cross-References....502

References....502

Correlation Attack for Stream Ciphers....503

Definition....503

Theory....503

Cross-References....505

Recommended Reading....505

Correlation Immune and Resilient Boolean Functions....505

Definition....505

Background....505

Theory....505

Cross-References....507

Recommended Reading....507

Countermeasure Identification....507

Cover Story....507

Definition....507

Background....507

Theory....508

Cross-References....509

References....509

Covert Channels....509

Definition....509

Theory....509

Cross-References....510

References....510

Covert Channels over Wi-Fi....511

Synonyms....511

Definitions....511

Background....511

Theory....511

Application....512

References....512

CPS....513

CPS Forensics....513

CPS, Certificate Practice Statement....513

Definition....513

Background....513

Theory....513

Cross-References....514

Recommended Reading....514

CPU Consumption....514

CPU Denial of Service....514

Synonyms....514

Definition....514

Background....514

Theory....515

Applications....515

Open Problems....515

Recommended Reading....516

CPU Starvation....516

Cramer–Shoup Public-Key System....516

Definition....516

Background....516

Theory....516

Cross-References....517

Recommended Reading....517

Credential Vaulting....518

Synonyms....518

Definition....518

The Application....518

Future Directions....519

References....519

Credential Verification....519

Credential-Based Access Control....520

Definition....520

Background....520

Theory....520

Applications....521

Open Problems and Future Directions....521

Cross-References....522

References....522

Critical Information Infrastructure Protection....522

Critical Infrastructure....522

Cross Site Scripting Attacks....522

Synonyms....522

Definition....522

Theory....522

Recommended Reading....524

Cross-Chains....524

Cross-Correlation....524

Definition....524

Applications....524

Cross-References....524

Recommended Reading....524

CRT....525

Cryptanalysis....525

Definition....525

Applications....525

Statistical Approaches to Classical Cryptosystems....526

Cross-References....528

Recommended Reading....528

Crypto Machines....529

Definition....529

Applications*-7pt....529

Cross-References....531

Recommended Reading....531

Cryptographic Algorithm Evaluation....531

Cryptographic Credentials....531

Definition....531

Theory....531

Applications....534

Cross-References....534

Recommended Reading....534

Cryptographic Obfuscation....535

Cryptographic Protocol Verification....535

Cryptographic Puzzles....535

Cryptographic Subversion Attack....535

Cryptographically Enforced Dynamic Access Control....535

Cryptography on Reconfigurable Devices....535

Cryptology....535

Definition....535

Cross-References....537

Recommended Reading....537

Cryptophthora....537

Synonyms....537

Definition....537

Open Problems....537

Cross-References....537

Recommended Reading....537

Cryptosystem....537

Definition....537

Applications....537

Cross-References....538

Recommended Reading....538

CRYPTREC (Japanese Cryptographic Algorithm Evaluation Project)....538

Synonyms....538

Definition....538

Background....538

Applications....538

Overview....538

History....540

Open Problems (Future Schedules)....541

Other Activities....542

Cross-References....542

Recommended Reading....542

CTI: Cyber Threat Intelligence....542

Cube Attack....542

Synonyms....542

Related Concepts....542

Definition....543

Background....543

Theory....543

Scenario of the Cube Attack....544

Applications....544

References....544

Cut-and-Choose Protocol....545

Definition....545

Background....545

Cross-References....545

Recommended Reading....545

CVE-2017-5715....545

CVE-2017-5753....545

CVE-2017-5754....545

Cyber Attack Insurance/Protection....545

Cyber Awareness....546

Cyber Bonds....546

Cyber Crime....546

Synonyms....546

Definition....546

Background....546

Theory and Application....546

Theft....546

Disruption....547

Manipulation....547

Hybrid Activity....547

Open Problems and Future Directions....548

References....548

Cyber Crime Insurance/Protection....548

Cyber Deception....548

Synonyms....548

Definition....548

Background....548

Theory and Applications....549

Offensive Deception....549

Defensive Deception....549

Deception for Encouragement....549

Deception for Discouragement....550

The Costs of Deception....550

The Ethics of Deception....551

Open Problems and Future Directions....551

Cross-References....551

References....551

Cyber Deception Engineering....551

Synonyms....551

Definition....551

Background....551

Theory....552

Application....553

Open Problems and Future Directions....554

Cross-References....554

References....554

Cyber Derivatives....555

Cyber Forensics for Cyber-Physical Systems....555

Synonyms....555

Definitions....555

Background....555

Application....555

Open Problems and Future Directions....556

References....557

Cyber Insurance....557

Cyber Insurance and Security Investment Strategy....557

Synonyms....557

Definitions....557

Background....557

Theory....558

Modeling Cyber Risks....558

Pricing Cyber Insurance Contracts....559

Cyber Insurance and Security Investment Decisions....560

Open Problems and Future Directions....560

Cross-References....561

References....561

Cyber Insurance: Models and Challenges....561

Synonyms....561

Definition....561

Background....562

Theory and Applications....562

Actuarial Model for Pricing Cyber Insurance....562

Nonactuarial Model for Risk Management....564

Open Problems and Future Directions....564

References....564

Cyber Ransom....565

Cyber Risk Assessment....565

Cyber Risk Insurance, Lessons Learned So Far....565

Synonyms....565

Definition....565

Background....565

Theory and Application....566

Research Trends....567

Open Problems and Future Directions....567

Cross-References....568

References....568

Cyber Risk Measurement....569

Cyber Risk Protection....569

Cyber Risk Quantification....569

Synonyms....569

Definition....569

Theory....569

Open Problems and Future Directions....571

Cross-References....571

References....571

Cyber Risk Transfer....571

Cyber Risk, Risk Transfer, and Financial Innovation....571

Synonyms....571

Definition....571

Background....572

Theory and Application....572

Open Problems and Future Directions....574

Cross-References....574

References....574

Cyber Security Insurance Models....574

Cyber Security Insurance/Protection....574

Cyber Security Liability Insurance/Protection....574

Cyber Situational Awareness....574

Definition....574

Background....575

Theory....575

Cyber SA Data Triaging Systems....575

Desirable Cyber SA Capabilities....576

Open Problems and Future Directions....576

Cross-References....576

References....576

Cyber Threat Intelligence....576

Synonyms....576

Definition....576

Background....577

Theory and Applications....577

Open Problems and Future Directions....578

Cross-References....578

References....578

Cyber Threat Intelligence Sharing....579

Synonyms....579

Definition....579

Background....579

Theory and Applications....579

Open Problems and Future Directions....580

Cross-References....580

References....580

Cyberattacks in Wireless IoT Systems....581

Cyber-Insurance Economics....581

Cyber-Insurance Market....581

Synonyms....581

Definition....581

Historical Background....581

A Techno-Economic Overview....582

Open Problems and Future Directions....583

Cross-References....585

References....585

Cyber-Insurance: Past, Present and Future....586

Definitions....586

Outline....587

Background....587

Advantages....589

Key Challenges....589

References....589

Cyber-Liability Economics....590

Cyber-Physical Range....590

Cyber-Physical System....590

Synonyms....590

Definition....590

Background....590

Theory and Application....590

Open Problems and Future Directions....591

Cross-References....592

References....592

Cyber-Physical Systems Governance....593

Cyber-Physical Systems Security....593

Cyberpsychology....593

Cybersecurity Awareness....593

Synonyms....593

Definition....593

Background....593

Theory and Application....594

Cybersecurity Awareness in Practice....595

Open Problems and Future directions....595

Cross-References....596

References....596

Cybersecurity Capability Maturity Model....596

Cybersecurity Insurance....596

Cybersecurity Knowledge....597

Cybersecurity of the Low-Power Wide Area Networks (LPWAN)....597

Synonyms....597

Definition....597

Background....597

Theory....597

Future Directions....598

Cross-References....598

References....599

Cybersecurity Skills....599

Synonyms....599

Definition....599

Background....599

Theory and Application....600

Technical Skills....600

Domain-Aligned....600

Offensive-v-Defensive Security....600

Cloud-Native Skills....601

Developer Skills....601

Process Skills....601

People Skills....602

Security Awareness....602

Pragmatic Security....602

Executive Reporting and Metrics....602

Open Problems and Future Directions....602

The Cybersecurity Skills Shortage....602

Cross-References....603

References....603

Cyclic Codes....603

Synonyms....603

Definition....603

Background....603

Theory....603

Applications....607

Cross-References....608

Recommended Reading....608

D....609

DAC....609

Data Act....609

Synonyms....609

Definition....609

Background....609

Theory and Application....610

Open Problems and Future Directions....610

Cross-References....610

References....611

Data Anonymization....611

Data Breach....611

Data Breach Impacts....611

Data Encryption....611

Data Encryption Standard (DES)....611

Background....611

Definition....612

Theory....612

Cryptanalysis of DES....613

Extensions of DES....616

Cross-References....617

Recommended Reading....617

Data Exfiltration....618

Synonyms....618

Definitions....618

Background....619

Theory/Application....619

Open Problems and Future Directions....620

Cross-References....620

References....620

Data Extrusion....620

Data Governance Act (DGA)....620

Synonyms....620

Definition....621

Background....621

Theory and Application....621

Open Problems and Future Directions....622

Cross-References....622

References....622

Data Leakage....622

Data Linkage....622

Synonyms....622

Definition....623

Background....623

Theory....623

Applications....625

Cross-References....625

Recommended Reading....625

Data Mining (Privacy in)....626

Synonyms....626

Definition....626

Background....626

Theory and Algorithms....626

Applications....627

Medical Databases....627

Bioterrorism Applications....628

Homeland Security Applications....628

Cross-References....629

Recommended Reading....629

Data Poisoning Attacks in Machine Learning....629

Synonyms....629

Definition....629

Background....629

Theory....630

Threat Model (A subsection of Theory)....630

Data Governance Scenarios (A subsection of Theory)....631

Attack Models (A subsection of Theory)....631

Defense Strategies (A subsection of Theory)....631

Open Problems and Future Directions....632

Cross-References....633

References....633

Data Privacy Regulations....633

Data Protection by Design....633

Data Protection by Design and by Default (DPbDD)....633

Synonyms....633

Definition....633

Background....634

Theory....634

Open Problems and Future Directions....635

Cross-References....635

References....635

Data Protection Impact Assessment (DPIA)....636

Synonyms....636

Definition....636

Background....636

Theory....636

Open Problems and Future directions....637

Cross-References....638

References....638

Data Protection Regulations....638

Data Remanence....638

Definition....638

Application....638

References....639

Data Theft....639

Database Administration Policies....639

Database Encryption....639

Synonyms....639

Definition....639

Theory....639

Encryption Level....640

Encryption Algorithm and Mode of Operation....641

Key Management....642

Open Problems and Future Directions....642

Cross-References....644

Recommended Reading....644

Database Governance Policies....644

Database Management Guidelines....644

Database Operational Policies....644

Database Protection....644

Data-Oblivious Shuffle....644

Davies-Meyer....645

Definition....645

Background....645

Theory....645

Cross-References....646

References....646

DDH Problem....646

De Bruijn Sequence....646

Definition....646

Theory and Application....646

Cross-References....648

Recommended Reading....648

Decentralized (Multi-authority) Attribute-Based Encryption....648

Decentralized Access Control....648

Decentralized Digital Identity....648

Decentralized Identity for IoT Systems....649

Synonyms....649

Definition....649

Background....649

Theory....650

Decentralized Identifiers (DIDs)....651

Example Scenario....651

Open Problems and Future Directions....653

Cross-References....653

References....653

Decentralized Trust Management....654

Deception....654

Deceptive Software and Networks....654

Decisional Diffie–Hellman Problem....654

Synonyms....654

Definition....654

Background....654

Theory....654

Candidate Groups....656

Applications....656

Cross-References....657

Recommended Reading....657

Decoding Algorithms....658

Synonyms....658

Definition....658

Background....658

Theory....658

Application....659

Cross-References....661

Recommended Reading....661

Decryption Exponent....661

Synonyms....661

Definition....662

Cross-References....662

Deduplication of Encrypted Data....662

Synonyms....662

Definition....662

Background....662

Theory....662

Applications....663

Open Problems....663

Cross-References....664

References....664

Deep Learning....664

Deniable Encryption....664

Definition....664

Theory....664

Cross-References....665

References....665

Denial of Service (DoS)....665

Denial-of-Service Detection....666

Synonyms....666

Definition....666

Background....666

Theory....666

Applications....668

Host Monitors....668

Network Monitors....668

Attack Detection Based on Observation of a Single Packet Stream....668

Deployment Issues: LAN Versus Network Edge Versus Tier-1 ISP....669

Collaborative Detection....670

Attacks Targeting Defenses....670

Attacks Targeting Vulnerabilities of Critical Infrastructure....670

Experimental Results....670

Open Problems and Future Directions....671

Recommended Reading....671

Deobfuscating Malware....671

De-obfuscation....671

Dependency Graphs....672

Synonyms....672

Definition....672

Background....672

Theory....672

Application....673

Open Problems and Future Directions....674

Cross-References....674

References....674

Derived Key....674

Synonyms....674

Definition....674

Theory....674

Cross-References....675

Recommended Reading....675

Designated Confirmer Signature....675

Synonyms....675

Definition....675

Theory....675

Applications....676

Open Problems....676

Cross-References....676

Recommended Reading....677

Designated Verifier Proofs....677

Cross-References....678

References....678

De-skewing....678

DES-X (or DESX)....678

Definition....678

Background....678

Theory....678

Cross-References....679

Recommended Reading....679

Detection and Threat-Hunting Approaches for Advanced Persistent Threats....679

Synonyms....679

Definition....679

Background....679

Application....680

APT Detection Mechanisms....681

Forensic Analysis and Threat Hunting of APTs....681

Open Problems and Future Directions....682

References....682

Detection-Based Countermeasure....683

Synonyms....683

Definitions....683

Background....683

Theory....684

Detection-Based Countermeasures....684

Redundancy in Hardware....685

Redundancy in Time....685

Redundancy in Information....686

Open Problems and Future Directions....686

Cross-References....686

References....687

Detector Placement Strategies....687

Synonyms....687

Definition....687

Background....688

Theory and Application....688

Game-Theoretic Approaches....688

Graph-Theoretic Approaches....689

Open Problems and Future Directions....690

Cross-References....690

References....690

Developer-Centred Security....690

Synonyms....690

Definitions....690

Background....690

Theory and Application....691

Open Problems and Future Directions....692

Cross-References....692

References....692

Device Pairing....692

DH Key Agreement....693

DHP....693

Dictionary Attack....693

Definition....693

Application....693

Cross-References....694

References....694

Dictionary Attack (I)....694

Definition....694

Theory....694

Cross-References....694

Differential Cryptanalysis....694

Cross-References....699

Recommended Reading....699

Differential Fault Analysis....699

Synonyms....699

Definitions....700

Background ....700

Analyzing Block Ciphers....700

Analyzing Public-Key Algorithms....701

Countermeasures....701

Cross-References....702

References....702

Differential Power Analysis....703

Synonyms....703

Definitions....703

Background....703

Theory....703

Open Problems and Future Directions....704

Cross-References....705

References....705

Differential Privacy....705

Synonyms....705

Definition....705

Background....706

Theory....706

Achieving Differential Privacy....706

Applications....707

Experimental Results....708

Open Problems and Future Directions....708

Cross-References....708

Recommended Reading....708

Differential Privacy for Location-Based Systems....708

-Differential Privacy....709

Differential–Linear Attack....709

Definition....709

Theory....709

Cross-References....709

Recommended Reading....709

Differentially Oblivious Algorithms....709

Differentially Private Oblivious RAM....709

Differentially Private ORAM....710

Synonyms....710

Definition....710

Theory....710

Open Problems....711

Cross-References....711

References....711

Diffie-Hellman Key Agreement....712

Synonyms....712

Definition....712

Background....712

Theory....712

Applications....713

Cross-References....713

References....714

Diffie–Hellman Key Exchange....714

Diffie-Hellman Problem....714

Digest Authentication....714

Digital Certificate....714

Digital Control....714

Digital Crime....714

Digital Forensic Readiness....714

Digital Forensics for CPS....714

Digital Signature Scheme Based on McEliece....714

Definition....714

Theory....714

General Idea....715

Signature Scheme Using Complete Decoding....715

Signature Scheme Using a Counter....715

Security and Practice....715

Security....715

Signature Size....716

Cross-References....716

Recommended Reading....716

Digital Signature Schemes....716

Definition....716

Theory....717

Cross-References....717

References....717

Digital Signature Schemes from Codes....717

Definition....717

Theory....718

Stern Identification Scheme and Signature....718

General Idea....718

Description....718

The Fiat-Shamir Paradigm....718

Variations on the Scheme....719

The Kababtiansky-Krouk-Smeets Scheme....719

General Idea....719

The Protocol....719

Security....719

Specialized Signatures....719

Identity-Based Signature....719

Ring Signature....719

Cross-References....720

Recommended Reading....720

Digital Signature Standard....720

Background....720

Theory....720

Cross-References....721

Recommended Reading....721

Digital Steganography....722

Definition....722

Background....722

Theory....722

Security Definition....723

Information-Theoretically Secure Steganography....724

Computationally Secure Steganography....725

Public-Key Steganography....726

Cross-References....727

Recommended Reading....727

Dining Cryptographers (DC) Network....727

Definition....727

Background....727

Theory....728

Open Problems....729

Cross-References....729

References....729

Direct Anonymous Attestation....730

Definition....730

Theory....730

Application....732

Open Problems and Future Directions....733

Cross-References....733

References....733

Disclosure Window....734

Discrete Logarithm Problem....734

Synonyms....734

Definition....734

Background....734

Theory....734

Applications....735

Experimental Results....735

Open Problems....735

Cross-References....735

References....735

Discretionary Access Control (DAC) Policies....736

Synonyms....736

Definition....736

Background....736

Theory and Application....736

Vulnerabilities of the Discretionary Policies....737

Cross-References....738

References....738

Distinguishing Attacks....738

Definition....738

Theory....738

Applications....738

Cross-References....739

Recommended Reading....739

Distributed Differential Privacy....739

Distributed Identity....739

Distributed Oblivious RAM....739

Synonyms....739

Definition....739

Background....739

Theory....740

Model and Definition....740

The Hierarchical Approach....740

Tree-Based Schemes....741

Optimizing Communication Using Server-Side Computation....741

References....742

Distributed Oblivious Transfer....742

Definitions....742

Theory....743

Cross-References....743

References....743

Divide-and-Conquer Side-Channel Attacks....744

Definitions....744

Background....744

Theory and Application....744

Diffusion Property....744

Divide-and-Conquer Methodology....745

Attack Output....746

Asymmetric Cryptography....746

Open Problems and Future Directions....747

References and Citations....747

Citations....747

Cross-References....747

References....747

DLP....747

DNA....748

Synonyms....748

*-12pt....748

Background....748

Theory and Applications....750

DNA Fingerprinting....750

Amplified Fragment Length Polymorphism (AFLP)....750

Satellite DNA....750

Enzymes....751

Regulatory Sequence Analysis Tools....751

Public Databases....751

CODIS System....751

GenBank....751

EMBL....751

DDBJ....751

Open Problems....752

The Drawbacks of DNA Profiling....752

Privacy Issues....752

Recommended Reading....752

DNS-Based Botnet Detection....752

Definition....752

Background....752

Theory and Application....752

Cross-References....753

Recommended Reading....753

DoS Attacks in Wi-Fi Networks....753

Synonyms....753

Definitions....754

Background....754

Application....754

Reactive Jamming....754

Channel Estimation Jamming....754

Interleaving Jamming....754

Medium Access Control (MAC) Attacks....754

Rate Adaptation Algorithms (RAA) Attacks....754

Link Layer Attacks....754

Network-Level Cascading Attacks....754

DoS for Evil Twins....754

Friendly Jamming....754

Open Problems and Future Directions....756

Cross-References....756

References....756

DoS Pushback....757

Definition....757

Introduction....757

Theory....757

Pushback Mechanism....757

Open Problems....758

Discussion....758

Recommended Reading....758

Doubly Efficient Private Information Retrieval....758

Definitions....758

Background....759

Theory....759

Formal Definition....759

Syntax....759

Correctness....759

Double Efficiency....759

Security....759

Definitional Variants....759

Public Client....759

Malicious Preprocessing Security....760

Transparent Preprocessing....760

Candidate Constructions....760

Open Problems and Future Directions....760

Cross-References....761

References....761

DPA....761

Duplication....761

Dynamic Access Control Using Identity-Based Encryption....761

Synonyms....761

Definition....761

Background....761

Security Analysis....763

Efficiency....764

Open Problems and Future Directions....765

Cross-References....765

References....765

Dynamic Analysis....766

Synonyms....766

Definition....766

Theory....766

Applications....767

Cross-References....768

Recommended Reading....768

Dynamic Defenses....768

Dynamic Malware Analysis....769

Synonyms....769

Definition....769

Background....769

Theory and Application....769

Cross-References....770

Recommended Reading....770

Dynamic Program Analysis....770

Dynamic Root of Trust....770

Synonyms....770

Definition....770

Background....771

Theory and Applications....771

Cross-References....771

Recommended Reading....771

Dynamic Separation of Duties....771

E....772

E0....772

Definition....772

Background....772

Theory....773

Applications....773

Cross-References....773

Recommended Reading....773

Ear Biometrics....773

Ears in Biometrics and Identity Science....774

Synonyms....774

Definition....774

Background....774

History of Ear Biometrics....774

Ear Anatomy....774

Ear Recognition....774

Holistic Approaches....775

Local Approaches....775

Geometric Approaches....776

Hybrid Approaches....776

Deep Learning....777

Identity Science and Ear Biometrics....779

Gender Classification from Ear Images....779

Other Information....779

Open Problems and Future Directions....779

References....781

Eavesdropping....782

Synonyms....782

Definition....782

Background....782

Applications....783

Open Problems....783

Cross-References....783

Recommended Reading....783

ECC....783

ECG Authentication....783

ECG Biometrics....783

Synonyms....783

Definition....783

Background....783

Theory....784

Applications....785

Open Problems and Future Directions....785

Cross-References....786

References....786

ECG Identification....786

ECG Verification....786

ECM....786

Economics of Cybercrime: Identity Theft and Fraud....787

Synonyms....787

Definitions....787

Background....787

Collection of Identity Theft and Fraud Data....788

Agency Data....788

Surveys....788

Interviews....788

News Stories....788

Reports from Affected Organizations....788

Anecdotal Information....788

Open Problems and Future Directions....788

References....789

Economics of Information Sharing....789

Synonyms....789

Definition....789

Background....790

Theory and Application....790

Information Sharing Among Firms....790

Sharing Security Information....791

Open Problems and Future Directions....792

Cross-References....792

References....792

Economics of Personal Data....793

Definitions....793

Background....793

Theory and Application....793

Personal Data as an Asset....793

Fair Usage of Personal Data....794

Open Problems and Future Directions....794

Cross-References....795

References....795

Economics of Privacy and Personal Data....795

Synonyms....795

Definition....795

Theory and Application....795

Open Problems and Future Directions....797

Cross-References....797

References....797

Economics of Privacy and the Paradox of Privacy....798

Synonyms....798

Definition....798

Background....798

Theory....798

Open Problems and Future Directions....799

Cross-References....800

References....800

Economics of Privacy: Privacy, a Machine Learning Perspective....800

Synonyms....800

Definitions....800

Background....800

Application....801

Economics of Privacy....802

Open Problems and Future Directions....802

References....802

Economics of Software Vulnerability Markets....803

Synonyms....803

Definition....803

Background....803

Theory and Application....803

Standardization....804

Market Characteristics....805

Open Problems and Future Directions....805

References....807

Economics of Surveillance....807

Synonyms....807

Definitions....807

Theory....807

Open Problems and Future Directions....810

Cross-References....810

References....811

ECPP....811

Edwards Coordinates....811

Edwards Curves....811

Synonyms....811

Definition....811

Background....811

Applications....812

Theory....812

Experimental Results....813

Cross-References....813

Recommended Reading....813

EEG Biometrics....814

Definitions....814

Background....814

Theory....816

Open Problems and Future Directions....818

Cross-References....818

References....818

Efficiency of Hyperelliptic Curve Cryptosystems....819

e-Government....819

Electrocardiogram-Based Biometrics....819

Electromagnetic Attack....819

Definition....819

Introduction....819

Background....819

History....819

Theory....820

Principles....820

Advantages....821

Context....821

Countermeasures....821

Conclusion....822

Cross-References....822

Recommended Reading....822

Electro-Magnetic Fingerprinting....823

Electromagnetic Security....823

Electronic Cash....823

Definition....823

Theory....823

Applications....825

Open Problems and Future Directions....825

Cross-References....825

Editorial Note....825

References....825

Electronic Check....825

Synonyms....825

Definition....825

Background....825

Theory....825

Applications....825

Cross-References....826

Recommended Reading....826

Electronic Crime....826

Electronic Payment....826

Definition....826

Background....826

Theory....826

Applications....827

Cross-References....828

References....828

Electronic Postage....828

Definition....828

Background....828

Theory....829

Applications....830

Cross-References....830

Editorial Note....830

Recommended Reading....831

Electronic Purse....831

Electronic Voting Schemes....831

Definition....831

Background....831

Theory....831

Discussion....832

References....833

Electronic Wallet....833

Synonyms....833

Definition....833

Background....833

Theory....833

Applications....835

Cross-References....835

Editorial Note....835

Recommended Reading....835

ElGamal Digital Signature Scheme....835

Background....835

Theory....836

Cross-References....836

Recommended Reading....837

ElGamal Encryption....837

ElGamal Public Key Encryption....837

Synonyms....837

Definition....837

Theory....837

Cross-References....837

References....838

Elliptic Curve Cryptography....838

Synonyms....838

Definition....838

Background....838

Theory....838

Cross-References....839

References....839

Elliptic Curve Discrete Logarithm Problem....839

Definition....839

Background....839

Theory....839

Pollard's Rho Method....839

Index-Calculus Methods....840

Special-Purpose Algorithms....840

Attack on Prime-Field Anomalous Curves....840

Weil and Tate Pairing Attacks....841

Weil Descent....841

Cross-References....841

References....841

Elliptic Curve Isogenies....842

Definition....842

Applications....842

Theory....843

Vélu's Formulas....843

Endomorphism Ring....844

References....844

Elliptic Curve Key Agreement Schemes....845

Definition....845

Background....845

Application....845

Cross-References....846

References....846

Elliptic Curve Keys....846

Definition....846

Background....846

Application....846

Cross-References....847

References....847

Elliptic Curve Method for Factoring....847

Synonyms....847

Definition....847

Background....848

Theory....848

Applications....848

Experimental Results....849

Open Problems....849

Cross-References....849

Recommended Reading....849

Elliptic Curve Point Multiplication Using Halving....849

Definition....849

Background....849

Point Halving....850

Trace computations....850

Solving the quadratic equation....850

Computing square roots....850

Point Multiplication....851

Summary....851

References....853

Elliptic Curve Public-Key Encryption Schemes....853

Definition....853

Background....853

Applications....854

Cross-References....854

Recommended Reading....854

Elliptic Curve Signature Schemes....854

Definition....854

Background....855

Application....855

Cross-References....856

References....856

Elliptic Curve Trace computation....856

Elliptic Curves....856

Definition....856

Background....857

Theory....857

Simplified Weierstrass Equation....857

Group Law....858

Group Law for E/F:y2=x3+ax+b, char(F) ≠2,3....858

Group Law for E/F:y2+xy=x3+ax2+b, char(F) = 2....858

Group Order....859

Group Structure....859

Example....860

Cross-References....860

References....860

Elliptic Curves for Primality Proving....860

Synonyms....860

Definition....860

Background....860

Theory....861

Experimental Results....861

Cross-References....861

Recommended Reading....861

EMV....862

Definition....862

Background....862

Application: The EMV Architecture....863

The Transaction Flow....863

Offline Data Authentication (Offline CAM)....863

Online Card Authentication....863

Cardholder Verification Method....865

Terminal and Card Risk Management....866

Approved Algorithms....866

Cross-References....866

Recommended Reading....866

Encapsulation....867

Encoding....867

Encrypted Data Deduplication....867

Encrypted Data Indexing....867

Encrypted Keyword Index....867

Encrypted Ranked Search....867

Encrypted Relational Databases....867

Definitions....867

Background....867

Design Principles....868

Cross-References....869

References....869

Encrypted Search on Secure Enclaves....870

Encryption....870

Encryption – Historical Perspective....870

Definition....870

Example....870

Cross-References....870

Editorial Note....870

Recommended Reading....870

Encryption Exponent....871

Synonyms....871

Definition....871

Cross-References....871

Endowment Effect....871

Synonyms....871

Definitions....871

Theory....871

Open Problems and Future Directions....872

Cross-References....872

References....872

Enigma....872

Definition....872

Background....872

Theory (of Encryption and Cryptoanalysis)....874

Cross-References....876

Recommended Reading....876

Entity Authentication....877

Synonyms....877

Definition....877

Theory....877

Applications....877

Open Problems and Future Directions....878

Cross-References....878

References....878

Entity Authentication Protocol....878

Entity Resolution....878

Entropy Sources....878

Definition....878

Background....878

Theory....878

Entropy Density....879

Entropy Definition....879

Attack Models....879

Model 1....879

Model 2....880

Entropy Pool Architecture....880

Entropy Compression....880

Entropy Extraction....880

Experimental Results....880

Open Problems and Future Direction....881

Cross-References....881

Recommended Reading....881

ePassport Security....881

Error-Correcting Cyclic Codes....881

Error-Correction Decoding....881

Escrow Service....881

Ethical Aspects of Biometrics....881

Ethical Implications of Biometrics....881

Ethics of Biometrics....881

Synonyms....881

Definition....881

Background....882

Human Dignity....882

Surveillance....883

Privacy and Data Protection....883

Open Problems....884

Summary....885

References....885

Euclidean Algorithm....885

Synonyms....885

Definition....886

Background....886

Theory....886

Applications....889

Cross-References....889

Recommended Reading....889

Euclidean Lattice....889

Euclids Algorithm....889

Euler's Totient Function....889

Synonyms....889

Definition....889

Theory....889

Applications....890

Cross-References....890

Everywhere Second Preimage Resistant Hash Function (ESEC)....890

Evolution of Fault Attacks on Cryptosystems....890

Synonyms....890

Definitions....890

Background....890

Theory....891

Fault-Induced Information Leakage....891

Fault Injection Techniques....892

Countermeasures....892

Automated Tools....893

Open Problems and Future Directions....894

Cross-References....894

References....894

Exhaustive Key Search....896

Introduction....896

History....897

Modern Block Ciphers....898

Countermeasures....898

Frequent Key Changes....898

Eliminate Known Plaintext....898

Different Modes of Encryption....899

Extensive Key Setup....899

All-or-Nothing Encryption....899

Related Attacks....899

Conclusion....900

Cross-References....900

Recommended Reading....900

Existential Forgery of Digital Signatures....900

Definition....900

Applications....900

Recommended Reading....900

Explainable AI....901

Explainable Artificial Intelligence....901

Synonyms....901

Definition....901

Background....901

Theory....901

Open Problems and Future Directions....902

Cross-References....902

References....902

Explaining for the Paradoxical Behavior in Privacy Choices....902

Exploit and Vulnerability Trade....902

Exploit Dependency Graphs....902

Exploit Pricing....903

Exponential Key Exchange....903

Exponential Time....903

Definition....903

Theory....903

Applications....903

Cross-References....903

2k-Ary Exponentiation....903

Synonyms....903

Definition....903

Background....904

Theory....904

Cross-References....905

Recommended Reading....905

Exponentiation Algorithms....905

Definition....905

Background....905

Theory....906

General Exponentiation....906

Fixed-Base Exponentiation....906

Fixed-Exponent Exponentiation....906

Applications....907

Cross-References....907

Exposure....907

Exposure-Resilient Cryptography....907

Extend and Prune Side-Channel Attacks....907

Definitions....907

Background....907

Theory an Application....908

Elliptic Curve Cryptography....908

Extend and Prune Methodology....908

Applications: Attack Literature....910

Open Problems and Future Directions....910

References and Citations....910

Citations....910

Cross-References....911

References....911

Extended Euclidean Algorithm....911

Extension Field....911

Definition....911

Theory....911

Applications....912

Cross-References....912

Eye Region....912

Eye-Based Vascular Biometrics....912

Eye-Based Vascular Patterns....912

Synonyms....912

Definitions....912

Background....913

Commercial Systems....913

Open problems and Future directions....914

Mobile and On-the-Move Acquisition....914

Disease Impact and (Template) Privacy....914

Real-world Performance and Deployment....914

References....915

Eye-Based Vascular Recognition....915

F....916

3D Face....916

Synonyms....916

Definitions....916

Theory and Application....917

3D Face Representation....917

3D Face Acquisition....917

3D Face Recognition Systems....918

Open Problems and Future Directions....919

Summary....920

Cross-References....920

References....920

Face Association....920

Face Depth Map....920

Face Detection....921

Face Identification....921

Face Mesh....921

Face Morphable Model....921

Face Recognition from Still Images and Video....921

Synonyms....921

Definition....921

Background....921

Datasets....921

Face Detection and Alignment....922

Feature Representation....922

Face Association....922

Theory and Applications....923

Loss Function....923

Applications....924

Open Problems....924

References....924

Face Recognition Under Atmospheric Turbulence....926

Face Tracking....926

Face Verification....926

Facial Recognition....926

Factor Base....926

Definition....926

Applications....926

Cross-References....926

Factorization Circuits....926

Definition....926

Theory and Applications....926

Cross-References....928

Recommended Reading....928

Fail-Stop Signature....928

Definition....928

Background....929

Theory....929

Applications....930

Recommended Reading....930

Fair Exchange....930

Synonyms....930

Definition....930

Background....930

Theory....931

Cross-References....932

References....932

Fake Biometrics....932

False Data Filtering....932

False Data Injection Defense....932

Synonyms....932

Definition....932

Background....932

Theory and Application....933

Open Problems....934

Recommended Reading....934

Fast Correlation Attack....934

Definition....934

Theory....934

Applications....935

Cross-References....936

Recommended Reading....936

Fault Analysis....937

Fault Attack....937

Definition....937

Introduction....937

Fault Injection....937

Fault Exploitation....938

Cross-References....939

Recommended Reading....939

Fault Countermeasures....939

Fault Detection....939

Fault Diagnosis in Cyber-Physical Systems....939

Synonyms....939

Definitions....939

Background....939

Theory....940

Open Problems and Future Directions....942

Discrimination of Various Types of Faults....942

Distinguishing Faults from Malicious Attacks....943

Automated Decision-Making for Large-Scale CPS Systems....943

References....943

Fault Identification in Cyber-Physical Systems....944

Fault Injection....944

Fault Injection Attacks....944

Fault Isolation....944

Fault Sensitivity Analysis....944

Definitions....944

Introduction....944

FSA Attack on AES....945

Countermeasure....946

References....946

Fault Tolerance in Cyber-Physical Systems....946

Synonyms....946

Definitions....946

Theory and Application....946

Open Problems and Future Directions....948

Cross-References....948

References....948

FEAL....948

Cross-References....949

Recommended Reading....950

Fear Appeals....950

Feistel Cipher....950

Definition....950

Theory....950

Cross-References....951

Fermat Primality Test....951

Synonyms....951

Definition....951

Background....951

Theory....951

Cross-References....951

Recommended Reading....951

Fermat Test....952

Fermat's Little Theorem....952

Definition....952

Background....952

Theory....952

Cross-References....952

Recommended Reading....952

Field....952

Definition....952

Theory....953

Applications....953

Cross-References....953

File System Permissions....953

Filter Generator....953

Definition....953

Theory....953

Cross-References....955

Recommended Reading....955

Financial Innovation....956

Finger Back Surface Identification....956

Finger Dorsal Patterns Identification....956

Finger Knuckle Patterns Recognition....956

Finger Knuckle Print Recognition....956

Synonyms....956

Definition....956

Background....956

Theory....957

Characteristics of FKP Images....957

Construction of FKP Systems....957

Application....958

2D FKP Recognition....958

3D FKP Recognition....958

Open Problems and Future Directions....959

References....960

Finger Knuckle Surface Authentication....960

Finger Surface Identification....960

Finger Vein....960

Definitions....960

Background....960

Applications....961

Finger Vein Capture Devices....961

Biometric Recognition....961

Presentation Attack Detection....962

Biometric Template Protection....963

Finger Vein Quality....963

Commercial Use....963

Open Problems and Future Directions....964

References....964

Finger Vein Recognition....965

Fingerprint....965

Definition....965

Background....965

Theory....966

Fingerprint Images....966

Fingerprint Analysis....966

Fingerprint Matching....969

Security and Privacy in Fingerprint Recognition Systems....969

Open Problems and Future Directions....970

Summary....970

References....970

3D Fingerprint....971

Synonyms....971

Definitions....971

Background....971

Theory ....971

3D Fingerprint Reconstruction....971

3D Fingerprint Recognition....973

Open Problems and Future Directions....973

Summary....973

References....973

Fingerprint Authentication....974

3D Fingerprint Recognition....974

3D Fingerprint Reconstruction....974

Fingerprinting....974

Definition....974

Background....974

Theory....975

Fingerprinting of Digital Data....975

Fingerprinting of Analog Data....977

Cross-References....977

Recommended Reading....977

Finite Field....978

Definition....978

Theory....978

Applications....978

Open Problems....979

Cross-References....979

Recommended Reading....979

FIPS 140-2....979

Synonyms....979

Definition....979

Background....979

Theory and Applications....979

Acronyms....982

Cross-References....983

Recommended Reading....983

Firewall....983

Definition....983

Theory....983

Additional Definitions....986

Recommended Reading....986

Firewall Policy Analysis....987

Firewalls....987

Synonyms....987

Definition....987

Background....987

Complexity of Managing Network Access Control Polices....987

Network Access Control Background....988

Theory and Applications....990

Modeling of Rule Relations....990

Classification of Access-List Conflicts....991

Intra-Policy Access-List Conflicts....991

Inter-Policy Access-List Conflicts....992

Classification of Map-List Conflicts....993

Overlapping-Session Conflicts....994

Multi-Transform Conflicts....995

Open Problems....995

Experimental Results....995

Recommended Reading....996

Fixed Window Exponentiation....996

Fixed-Base Exponentiation....997

Definition....997

Theory....997

Applications....999

Cross-References....999

Recommended Reading....999

Fixed-Exponent Exponentiation....999

Definition....999

Theory....1000

Applications....1001

Cross-References....1001

Recommended Reading....1001

Flexible Authorization Framework (FAF)....1002

Definitions....1002

Background....1002

Theory....1002

Open Problems and Future Directions....1004

Cross-References....1005

References....1005

Flow Blocking....1005

Flow Policies....1005

Forensic Psychology....1005

Forensic Readiness....1005

Forensics Analysis for CPS....1005

Forged Resets....1005

Forgery of Digital Signatures....1005

Definition....1005

Theory....1005

References....1007

Formal Analysis of Cryptographic Protocols....1007

Synonyms....1007

Related Concepts....1007

Definition....1007

Background....1007

Applications....1008

Open Problems and Future Directions....1008

References....1009

Formal Analysis of Cryptographic APIs....1009

Related Concepts....1009

Definition....1009

Background....1009

Applications....1010

References....1010

Formal Methods....1010

Formal Methods and Access Control....1010

Definition....1010

Background....1010

Theory and Application....1011

Open Problems and Future Directions....1012

Cross-References....1012

References....1012

Formal Methods for the Orange Book....1013

Synonyms....1013

Definition....1013

Background....1013

Applications....1015

Cross-References....1015

Recommended Reading....1016

Formal Methods in Certification and Evaluation....1016

Synonyms....1016

Definition....1016

Background....1016

A Key Distinction Used Is in the Common Criteria....1017

Applications and Experiments....1017

Open Problems....1017

Cross-References....1018

Recommended Reading....1018

Formal Verification of Cryptosystems....1018

Synonyms....1018

Definition....1018

Background....1018

Applications....1019

Open Problems....1020

Cross-References....1020

References....1021

Forward Secrecy....1021

FPGA Field Programmable Gate Array....1021

FPGA Security....1021

Synonyms....1021

Definitions....1021

Background....1022

Theory....1022

Open Problems and Future Directions....1023

Cross-References....1024

References....1024

FPGA Trust....1025

FPGAs in Cryptography....1025

Synonyms....1025

Definition....1025

Background....1025

Applications....1026

Open Problems....1027

Recommended Reading....1028

Fraud....1028

Fresh Re-keying....1028

Definitions....1028

Theory....1028

Application....1029

Time-Memory Trade-Off Attacks....1029

Side-Channel Attacks....1029

The Choice for g....1029

Cross-References....1030

References....1030

Frictionless User Authentication....1031

Synonyms....1031

Definition....1031

Background....1031

Theory and Application....1031

Open Problems and Future Directions....1034

Cross-References....1035

References....1035

Function Field Sieve....1035

Definition....1035

Background....1035

Theory....1036

Experimental Results....1036

Cross-References....1036

Recommended Reading....1036

Functional Safety....1037

Fuzzy (Similarity) Search on Encrypted Data....1037

Fuzzy Search on Encrypted Data....1037

Fuzzy Searchable Encryption....1037

Synonyms....1037

Related Concepts....1037

Definition....1037

Background....1037

Solutions....1037

Open Problems....1039

Cross References....1039

References....1039

G....1041

Gait Biometrics....1041

Gait Forensics....1041

Gait Recognition....1041

Synonyms....1041

Definitions....1041

Background....1041

Algorithms....1042

Segmentation....1042

Time Series Features....1043

Global Features....1043

Matching....1043

Benchmark Datasets and Performance....1044

Open Problems and Future Directions....1046

Cross-References....1047

References....1047

Galois Counter Mode....1048

Synonyms....1048

Definition....1048

Background....1048

Theory....1049

Applications....1050

Open Problems....1050

Cross-References....1050

Recommended Reading....1051

Galois Message Authentication Code....1051

Gap....1051

Definition....1051

Applications....1051

Cross-References....1051

Recommended Reading....1051

GCD....1051

GCM....1051

GDPR....1051

Gene....1051

General Data Protection Regulation (GDPR)....1051

Synonyms....1051

Definition....1052

Background....1052

Theory....1052

Chapter I: General provisions....1052

Chapter II: Principles....1053

Chapter III: Rights of the Data Subject....1053

Chapter IV: Controller and Processor....1054

Chapter V: Transfer of Personal Data to Third Countries or Internal Organizations....1054

Chapter VI: Independent Supervisory Authorities....1054

Chapter VII: Cooperation and Consistency....1055

Chapter VIII: Remedies, Liability, and Penalties....1055

Chapter IX: Provisions Relating to Specific Processing Situation....1055

Chapter X: Delegated Acts and Implementing Acts....1055

Chapter XI: Final Provisions....1055

Open Problems and Future Directions....1055

Cross-References....1056

References....1056

Generalized Mersenne Prime....1056

Definition....1056

Applications....1057

Recommended Reading....1058

Generator....1058

Synonyms....1058

Definition....1058

Theory....1058

Applications....1058

Cross-References....1058

Generic Attacks Against DLP....1058

Synonyms....1058

Definition....1058

Background....1059

Theory....1059

Experimental Results....1060

Cross-References....1061

Recommended Reading....1061

Generic Group/Ring Model....1061

Definition....1061

Cross-References....1061

References....1061

Genetic Code....1061

Genome Privacy....1062

Synonyms....1062

Definitions....1062

Background....1062

Theory....1063

Open Problems and Future Directions....1063

Cross-References....1064

References....1064

Genomics....1064

Geo-Indistinguishability....1064

Synonyms....1064

Definitions....1064

Background....1065

Theory....1065

Open Problems and Future Directions....1065

Cross-References....1066

References....1066

Geometry of Numbers....1066

Geoprivacy....1066

Geo-Social Networks (Privacy of)....1066

Geo-Social Networks Privacy....1066

Synonyms....1066

Definitions....1066

Background....1066

Privacy Violations in geoSNs....1067

Theory....1067

Open Problems and Future Directions....1068

Cross-References....1069

References....1069

GMAC....1069

Synonyms....1069

Definition....1069

Background....1069

Theory....1070

Cross-References....1070

Recommended Reading....1070

GMR Signature....1071

Definition....1071

Background....1071

Theory....1071

Recommended Reading....1073

Goldwasser–Micali Encryption Scheme....1073

Definition....1073

Background....1073

Theory....1073

Cross-References....1073

Recommended Reading....1073

Golomb's Randomness Postulates....1074

Definition....1074

Theory and Applications....1074

Cross-References....1074

Recommended Reading....1075

GOST....1075

Cross-References....1075

Recommended Reading....1076

Governance in Cyber-Physical Systems....1076

Synonyms....1076

Definition....1076

Background....1076

Theory....1076

Open Problems and Future Directions....1077

References....1077

GPRS Tunneling Protocol (GTP)....1078

Synonyms....1078

Definition....1078

Background....1078

Application....1078

Cross-References....1080

References....1080

Grant Statement....1080

Definitions....1080

Theory....1080

Cross-References....1081

References....1081

Graph Anonymization....1082

Graphical Authentication....1082

Definition....1082

Background....1082

Theory and Application....1082

Open Problems and Future Directions....1083

Cross-References....1085

References....1085

Greatest Common Divisor....1086

Synonyms....1086

Definition....1086

Background....1086

Theory....1086

Cross-References....1086

Greatest Common Factor....1086

Gröbner Basis....1086

Synonyms....1086

Definition....1086

Open Problems....1087

Cross-References....1087

Recommended Reading....1087

Group....1087

Definition....1087

Theory....1087

Applications....1088

Cross-References....1088

Recommended Reading....1088

Group Attestation....1088

Group Behavior in Cybersecurity....1088

Synonyms....1088

Definition....1088

Background: Group Behavior....1088

Theory: Threshold Models of Collective Behavior....1089

Application: Example in Cybersecurity....1089

Open Problems and Future Directions....1092

Cross-References....1092

References....1092

Group Key Agreement....1092

Synonyms....1092

Definition....1092

Background....1092

Requirements....1093

Private Group Key Agreement for Small Groups....1093

Authenticated Group Key Agreement, Provable Security....1095

Authenticated Group Key Agreement: Robustness Against Insider Attacks....1096

Group Key Agreement for Large Groups....1097

Applications of GKA....1098

Cross-References....1098

Recommended Reading....1098

Group Key Distribution....1099

Group Key Exchange....1099

Group Privacy....1099

Group Signatures....1100

Definition....1100

Background....1100

Theory....1100

Applications....1102

Cross-References....1102

Recommended Reading....1102

H....1104

HABE....1104

Hacking the Human....1104

Hall Sensor Security, The....1104

Synonyms....1104

Definitions....1104

Background....1104

Theory....1104

Hall Sensor Basics....1104

Distinct Types of Batk....1105

Generation of Batk....1105

An Experimental Case Study....1105

Results....1106

Defense....1106

Shielding....1106

Robust Sensors....1107

Open Problems and Future Directions....1107

References....1107

Hand Geometry Biometrics....1108

Hand Geometry Recognition....1108

Synonyms....1108

Definitions....1108

Background....1108

Theory....1109

Applications....1109

Open Problems and Future Directions....1110

Cross-References....1110

References....1110

Hand Shape Biometrics....1111

Hand Vein Recognition....1111

Hand-Based Vascular Biometrics....1111

Hand-Based Vascular Patterns....1111

Synonyms....1111

Definitions....1111

Background....1112

Commercial Systems....1112

Open Problems and Future Directions....1113

Mobile and On-the-Move Acquisition....1113

Disease Impact and (Template) Privacy....1113

Real-World Performance and Deployment....1114

References....1114

Hand-Based Vascular Recognition....1116

Handwriting....1116

Handwriting Analysis....1116

Synonyms....1116

Definition....1116

Background....1116

Theory....1116

Applications....1119

Recommended Reading....1119

Hard-Core Bit....1120

Definition....1120

Theory....1120

Applications....1121

Cross-References....1121

Recommended Reading....1121

Hardware Backdoor....1121

Hardware Considerations for Post-quantum Cryptography....1121

Hardware Implementation Explorations of Post-quantum Cryptographic Primitives....1121

Hardware Intellectual Property Protection....1121

Hardware Intellectual Property Reverse Engineering....1121

Hardware Obfuscation....1121

Hardware Obfuscation and Logic Locking....1122

Synonyms....1122

Definitions....1122

Background....1122

Application....1122

Obfuscation Techniques....1122

Attacks on Obfuscation....1123

Open Problems and Future Directions....1124

Cross-References....1125

References....1125

Hardware Security....1125

Hardware Security in Cyber-Physical Systems....1125

Definitions....1125

Background....1125

Theory....1126

Open Problems and Future Directions....1127

Cross-References....1128

References....1128

Hardware Security in the Age of Machine Learning....1128

Synonyms....1128

Definition....1128

Background....1128

Application....1129

Machine Learning and Hardware for Security....1129

Machine Learning and Security of Hardware....1129

Open Problems and Future Directions....1130

Cross-References....1130

References....1130

Hardware Security Module....1131

Background....1131

Theory....1132

Useful Links....1132

Definitions (Extracted from ISO 15408)....1133

Tamper Evidence Requirement....1133

Tamper Resistance Requirements....1134

Cross-References....1134

Hardware Trojan....1134

Synonyms....1134

Definition....1134

Background....1134

Theory and Application....1135

Open Problems and Future Directions....1135

Cross-References....1136

References....1136

Hardware Trojan Horse....1136

Hardware Trojans....1137

Hardware-Induced Covert Channels in Wireless Networks: Risks and Remedies....1137

Synonyms....1137

Definitions....1137

Background....1137

Covert Channel Attacks in Wireless Networks....1137

Baseband Attack....1137

Analog/RF Trojan....1139

Hardware Trojan Defense Solutions....1141

Channel Noise Profiling....1142

Adaptive Channel Estimation (ACE)....1143

Open Problems and Future Directions....1143

Formal Metric....1143

Extension to Future Wireless Networks....1144

Covert Channel Prevention....1144

References....1144

Hash Agility....1145

Definition....1145

Background....1145

Theory and Applications....1145

Protocols and Applications....1145

Devices....1145

TPMs and Hash Agility....1145

Key Storage....1146

Platform Control Registers....1146

Certificate Chains....1146

Cross-References....1147

Recommended Reading....1147

Hash Chain....1147

Synonyms....1147

Definition....1147

Background....1147

Theory....1147

Application....1148

Open Problems and Future Directions....1148

Cross-References....1149

References....1149

Hash Functions....1149

Introduction....1149

One-Way Hash Function (OWHF)....1150

Collision Resistant Hash Function (CRHF)....1150

Relation Between Definitions....1151

Black-Box Attacks on Hash Functions....1152

Black-Box Attacks on the Compression Function....1153

Attacks Dependent on the Internal Details of the Compression Function....1154

Attacks Dependent on the Interaction with the Signature Scheme....1154

Custom Designed Hash Functions....1155

Hash Functions Based on a Block Cipher....1156

Hash Functions Based on Algebraic Structures....1158

Recommended Reading....1160

Hash Tree....1162

Hash-Based Message Authentication Code....1162

Hash-Based Signatures....1163

Synonyms....1163

Definition....1163

Theory....1163

Applications....1165

Cross-References....1165

Recommended Reading....1165

Header Injections....1165

Header-Based Attacks....1166

Synonyms....1166

Definition....1166

Background....1166

Theory....1166

Header Attacks Below the Application Layer....1166

Header Attacks at the Application Layer Level....1167

Applications....1168

Recommended Reading....1168

Herding Behavior....1168

Heredity....1169

HIBE....1169

Hierarchical Identity-Based Encryption and Attribute-Based Encryption....1169

Synonyms....1169

Definitions....1169

Background....1169

Theory....1169

Open Problems and Future Directions....1171

References....1171

Hierarchical ORAM Constructions....1171

Definition....1171

Background....1172

Theory....1172

Memory Organization....1172

Accessing Virtual Words....1173

Merging and Remapping Layers....1173

Open Problems and Future Directions....1174

Cross-References....1174

References....1174

High Assurance Evaluation Methods....1175

Higher Order Derivative Attack....1175

Hippocratic Database....1175

Synonyms....1175

Definition....1175

Background....1175

Theory....1175

Applications....1177

Open Problems....1177

Recommended Reading....1178

History-Based Separation of Duties....1178

HMAC....1178

Synonyms....1178

Definition....1178

Background....1179

Theory....1179

Applications....1180

Open problems....1180

Cross-References....1180

References....1180

Homomorphic Cryptosystems....1181

Homomorphism....1181

Definition....1181

Theory....1181

Applications....1181

Cross-References....1182

Recommended Reading....1182

Horizontal Scaling....1182

HRU....1182

Background....1182

Definition....1182

Theory....1183

Applications....1183

Open Problems and Future Directions....1183

Cross-References....1183

Recommended Reading....1184

HTTP Authentication....1184

Synonyms....1184

Definition....1184

Background....1184

Applications....1184

Open Problems....1185

Cross-References....1185

Recommended Reading....1185

HTTP Basic Authentication....1185

HTTP Cookie....1185

HTTP Digest Access Authentication Scheme....1185

HTTP Digest Authentication....1185

Synonyms....1185

Definition....1185

Background....1186

Applications....1186

Cross-References....1188

Recommended Reading....1188

HTTP Session Security....1188

Synonyms....1188

Definition....1189

Background....1189

Theory....1189

Open Problems....1190

Cross-References....1190

Recommended Reading....1190

HTTPS, HTTP Over TLS....1190

Definition....1190

Background....1191

Theory....1191

Cross-References....1191

Recommended Reading....1191

Human Factors in Secure Software Development....1192

Human Rights and Cybersecurity....1192

Definition....1192

Theory....1192

Future Directions....1194

Cross-References....1194

References....1194

Human Security Behavior....1194

Hybrid Cyber Range....1195

Synonyms....1195

Definitions....1195

Background....1195

Hybrid Cyber Range Functionalities....1195

Open Problems and Future Directions....1196

References....1196

Hybrid Encryption....1196

Definition....1196

Background....1197

Theory....1197

Another Direction Without Random Oracle....1199

Cross-References....1200

References....1200

Hyperelliptic Curve Discrete Logarithm Problem (HECDLP)....1201

Hyperelliptic Curve Security....1201

Synonyms....1201

Definition....1201

Background....1201

Theory....1201

Generic Methods....1201

Index Calculus Methods....1202

Curves of Large Genus....1202

Curves of Small Genus....1202

Curves Over Field Extensions....1203

Special-Purpose Algorithms....1204

Weil and Tate Pairing Attacks....1204

Weil Descent....1204

Curve Mappings....1204

Cross-References....1205

References....1205

Hyperelliptic Curves....1205

Synonyms....1205

Definition....1206

Theory....1206

General Curve Isomorphisms....1207

Group Law....1207

Group Order and Structure....1208

Examples....1208

First Example....1208

Second Example....1210

Cross-References....1210

References....1210

Hyperelliptic Curves Performance....1210

Synonyms....1210

Definition....1210

Background....1210

Application and Experimental Results....1211

Curves Over Prime Fields....1211

Curves Over Binary Fields....1212

Cross-References....1212

References....1212

I....1214

IBE....1214

IBE: Identity-Based Encryption....1214

IBS: Identity-Based Signature....1214

IC Integrated Circuit....1214

IC-Integrated Circuit....1214

ICS....1214

ID-Based Encryption....1214

Idea....1214

Definition....1214

Background....1215

Theory....1215

Cross-References....1215

Recommended Reading....1216

Identification....1216

Definition....1216

Theory....1216

Identity Uniqueness....1217

Authorities for Naming and Authentication....1217

Cross-References....1218

References....1218

Identifier....1218

Identity Authentication....1218

Identity Management....1218

Related Concepts....1218

Definition....1218

Background....1219

Theory....1219

Applications....1220

Experimental Results....1220

Open Problems and Future Directions....1220

References....1221

Identity Management for Cyber-Physical Systems....1221

Definitions....1221

Background....1221

Application....1221

Open problems and Future directions....1222

Cross-References....1222

References....1223

Identity Proof....1223

Identity Theft....1223

Identity Verification Protocol....1223

Synonyms....1223

Definition....1223

Theory....1223

Applications....1223

Cross-References....1224

References....1225

Identity-Based Cryptosystems....1225

Synonyms....1225

Definition....1225

Background....1225

Theory....1226

Identity-Based Signatures....1226

Generic IBS from Any Signature....1227

The Guillou–Quisquater IBS....1227

The Bellare–Namprempre–Neven IBS....1228

Other IBS Schemes Based on Specific Number Theoretic Assumptions....1229

Identity-Based Encryption from Quadratic Residuosity: The Cocks IBE....1229

Cross-References....1231

Recommended Reading....1231

Identity Based Encryption....1232

Synonyms....1232

Definitions....1232

Background....1232

Theory....1233

Application....1234

References....1234

Identity-Based Encryption: Historical Perspective and Hierarchical Systems....1234

Synonyms....1234

Definition....1235

Background....1235

Theory....1235

Applications....1236

Open Problems....1236

Cross-References....1237

References....1237

IDS Deployment....1237

IDS: Intrusion Detection System....1237

IFA....1237

IIoT....1237

ILS....1237

Impacts of Information Privacy Violations....1237

Synonyms....1237

Definition....1238

Background....1238

Theory and Application....1239

Open Problems and Future Directions....1239

Cross-References....1240

References....1240

Impersonation....1240

Impersonation Attack....1240

Synonyms....1240

Definition....1240

Application....1241

Open Problems and Future Directions....1241

Cross-References....1241

Recommended Reading....1241

Implicit Authentication....1241

Implicit Key Authentication....1241

Impossible Differential Attack....1241

Definition....1241

Background....1241

Theory....1241

Cross-References....1242

Recommended Reading....1242

Incentives for Distributed Ledgers....1242

Definition....1242

Theory....1242

Open Problems and Future Directions....1243

Cross-References....1243

References....1244

Incident Analysis....1245

Index Calculus Method....1245

Definition....1245

Theory....1245

Applications....1245

Implementation Choice and Complexity Estimate....1245

Variants of the Algorithm....1246

Index Calculus Using the Number Field Sieve....1246

Index Calculus and Elliptic Curves....1247

Cross-References....1247

Recommended Reading....1248

Indistinguishability of Encryptions....1248

-Indistinguishability....1248

Industrial Control Network....1248

Industrial Control Systems....1248

Industrial Internet....1248

Industrial Internet of Things....1248

Synonyms....1248

Definition....1248

Background....1248

Application....1249

Open Problems and Future Directions....1250

Cross-References....1251

References....1251

Industry 4.0....1251

Ineffective Fault Attack....1251

Synonyms....1251

Definitions....1251

Background....1251

Theory/Application/Both....1252

Open Problems and Future Directions....1252

Cross-References....1252

References....1252

Infection Risk Prediction and Management....1253

Synonyms....1253

Definitions....1253

Background....1253

Open Problems and Future Directions....1255

Cross-References....1257

References....1257

Infective Countermeasures....1257

Synonyms....1257

Definitions....1257

Background....1258

Theory....1258

Open Problems and Future Directions....1259

Cross-References....1260

References....1260

Inference Attacks....1260

Inference Control....1261

Definitions....1261

Background....1261

Theory....1261

Application....1265

Open Problems and Future Directions....1266

Cross-References....1266

References....1266

Information Assurance....1267

Information Cascades....1267

Information Disclosure....1267

Synonyms....1267

Definitions....1267

Background....1267

Theory....1267

Open problems and Future directions....1269

Cross-References....1269

References....1269

Information Economics....1269

Information Flow and Noninterference....1270

Synonyms....1270

Definitions....1270

Background ....1270

Theory ....1270

The Lattice Model....1270

Noninterference....1270

Transitive and Intransitive Flow....1271

Dealing with Nondeterminism....1271

Verification and Refinement....1272

Other Variants....1272

Application....1273

Open Problems and Future Directions....1273

Cross-References....1273

References....1274

Information Flow Policies....1274

Synonyms....1274

Definitions....1274

Theory....1274

Security Domains and Levels....1275

Specifying Security Requirements....1276

Declassification and Endorsement....1276

Application....1277

Cross-References....1277

References....1277

Information Integrity....1278

Information Leakage....1278

Information Privacy Requirements....1278

Synonyms....1278

Definition....1278

Background....1278

Theory and Application....1278

Open Problems and Future Directions....1279

Cross-References....1280

References....1280

Information Privacy Awareness....1281

Synonyms....1281

Definition....1281

Background....1281

Theory and Application....1281

Open Problems and Future Directions....1282

References....1282

Information Privacy Costs....1283

Information Privacy Law....1283

Information Security (InfoSec)....1283

Information Security Awareness....1283

Synonyms....1283

Definition....1283

Background....1283

Theory and Applications....1284

Open Problems and Future Directions....1284

Cross-References....1285

References....1285

Information Security Culture....1285

Synonyms....1285

Definition....1285

Background....1285

Theory....1286

Definition....1286

Dominant and Subcultures....1287

Factors that Influence the Information Security Culture....1287

Measuring the Information Security Culture....1287

Open Problems and Future Directions....1287

Cross-References....1288

References....1288

Information Security Management System....1288

Information Security Policy Adherence....1288

Information Security Policy Compliance....1289

Synonyms....1289

Definition....1289

Background....1289

Theory and Applications....1289

Open Problems and Future Directions....1290

Cross-References....1290

References....1291

Information Security Policy Compliance Capacities....1291

Information Security Policy Compliance Competences....1291

Synonyms....1291

Definition....1291

Background....1291

Theory and Applications....1292

Open Problems and Future Directions....1292

Cross-References....1293

References....1293

Information Security Policy Compliance Competency....1293

Information Security Risk Treatment....1294

Synonyms....1294

Definition....1294

Theory....1294

References....1295

Information Security Skills....1295

Information Theoretic Model....1295

Information Theory....1295

Shannon's Main Theorem....1296

Cross-References....1296

Recommended Reading....1296

Information-Flow Security....1297

Initial Coin Offering....1297

Synonyms....1297

Definition....1297

Background....1297

Theory and Application....1297

Open Problems and Future Directions....1298

Cross-References....1298

References....1298

Initial Token Distributions....1299

Initial Trust Establishment....1299

Insider Attack....1299

Insider Problem....1299

Insider Threat....1299

Synonyms....1299

Definition....1299

Theory and Application....1300

Prediction....1300

Detection....1300

Open Problems and Future Directions....1301

Cross-References....1301

References....1302

Insider Threat Defense....1302

Definition....1302

Background....1302

Theory....1303

Experimental Results....1303

Open Problems....1305

Recommended Reading....1305

Instant Disclosure....1306

Integer Factoring....1306

Definition....1306

Background....1306

Theory and Applications....1306

Methods for Integer Factorization....1306

Establishing Compositeness....1307

Distinct Factors....1307

Repeated Factors....1307

Trial Division....1307

Pollard's rho Method....1307

Pollard's p − 1 Method....1308

Generalizations of Pollard's p − 1 Method....1308

Usage of “Strong Primes” in RSA....1309

Cycling Attacks Against RSA....1309

Elliptic Curve Method for Factoring....1309

Fermat's Method and Congruence of Squares....1309

The Morrison–Brillhart Approach....1310

Matrix Step....1310

Dixon's Random Squares Method....1310

Continued Fraction Method (CFRAC)....1311

Note on the Size of RSA Moduli....1312

Linear Sieve....1312

Quadratic Sieve....1312

Number Field Sieve....1313

Cross-References....1313

Recommended Reading....1313

Integrated Circuit....1314

Integrated Circuit Card....1314

Integrity and Encryption....1314

Integrity Model....1314

Intellectual Property....1314

Intelligence Distribution to Prevent Attacks....1314

Interactive Argument....1315

Synonyms....1315

Interactive Proof....1315

References....1315

Interactive Proof....1315

Synonyms....1315

Cross-References....1316

References....1316

Interactive Proof Systems....1316

Interactive Theorem Proving and Security....1316

Interactive Verification....1316

Interactive Verification of Security Properties....1316

Synonyms....1316

Definition....1316

Theory....1316

Applications....1317

Open Problems and Future Directions....1318

Cross-References....1318

References....1318

Interception....1318

Interconnection....1318

Interdependent Location Privacy....1319

Synonyms....1319

Definitions....1319

Background....1319

Discussion....1319

Open Problems and Future Directions....1320

Cross-References....1321

References....1321

Interdependent Privacy (IDP)....1321

Synonyms....1321

Definitions....1321

Background....1321

Theory....1322

Statistical Inference....1322

Game Theory....1323

Cryptography and Access Control....1323

Communication Privacy Management (CPM) Theory....1323

Open Problems and Future Directions....1324

Cross-References....1324

References....1324

Internet Fraud....1324

Interpolation Attack....1324

Cross-References....1325

Recommended Reading....1325

Intrusion Detection in Ad Hoc Networks....1325

Definition....1325

Background....1326

Theory....1326

Applications....1327

Experimental Results....1328

Open Problems....1329

Recommended Reading....1329

Intrusion Tolerance....1329

Invasive Attacks....1329

Definition....1329

Background....1329

Smart Card Security....1330

Overview of Attacks on Smart Cards....1330

Social Attacks....1330

Logical Attacks....1331

Invasive Attacks....1331

Access to Silicon....1331

Delayering....1331

Block Localization....1332

Memory Content Extraction....1332

ROM....1332

RAM....1333

EEPROM or FLASH....1333

Bus Localization....1333

Chip Probing....1334

Chip Modification....1334

Protection Against Physical Attacks....1335

Conclusion....1335

Inverse Biometrics: Privacy, Risks, and Trust....1336

Synonyms....1336

Definitions....1337

Background....1337

Theory....1337

Privacy, Risk, and Trust....1337

Applications....1338

Summary....1338

Open Problems....1338

References....1339

Inversion Attack....1339

Definition....1339

Theory....1339

Original Inversion Attack....1339

Generalized Inversion Attack....1340

Cross-References....1341

Recommended Reading....1341

Inversion in Finite Fields and Rings....1341

Synonyms....1341

Definition....1341

Theory....1341

Extended Euclidean Algorithm....1341

Fermat's Little Theorem....1341

Look-Up Tables....1342

Reduction to Subfield Inversion....1342

Direct Inversion....1342

Applications....1342

Cross-References....1343

Recommended Reading....1343

Inversion in Galois Fields....1343

IOC: Indicators of Compromise....1343

iOS Security Framework: Understanding the Security of Mobile Phone Platforms....1343

Synonyms....1343

Definition....1343

Background....1343

Application....1344

App Development....1344

App Runtime....1345

Protecting User Data....1346

Cross-References....1347

References....1347

IP Traceback....1347

Definition....1347

Background....1347

Theory....1347

Return Packets....1347

In-Net State....1348

Packet Marking....1348

Experimental Results....1349

Open Problems....1349

Recommended Reading....1349

IP: Internet Protocol....1350

IPES....1350

Definition....1350

Cross-References....1350

Recommended Reading....1350

IPsec....1350

Definition....1350

Background....1350

Theory....1351

IPsec Components....1351

Packet Processing....1351

Key Exchange....1353

IPsec and NAT....1354

Policy and Configuration....1354

Recommended Reading....1355

IPSec Policy Analysis....1355

Iris Recognition....1355

Definitions....1355

Background....1355

Theory....1355

Applications....1356

Open Problems and Future Directions....1356

References....1357

Irreducible Polynomial....1357

Definition....1357

Theory....1357

Cross-References....1358

ISMS: A Management Framework for Information Security....1358

Synonyms....1358

Definition....1358

Background....1358

Theory....1358

Applications....1359

Recommended Reading....1360

ISO 15408 CC – Common Criteria....1360

ISO 19790 2006 Security Requirements for Cryptographic Modules....1360

ISO/IEC 15408....1360

ISO/IEC 27001....1360

ISO-9796 Signature Standards....1360

Definition....1360

Background....1361

Theory....1361

Applications....1361

Recommended Reading....1361

Issuer....1362

Definition....1362

Recommended Reading....1362

IT Forensic Readiness....1362

Synonyms....1362

Definition....1362

Background....1362

Theory and Application....1362

Open Problems and Future Directions....1364

Cross-References....1364

References....1364

Itoh–Tsujii Inversion AlgorithmWork done while the author was at Philips Research, The Netherlands....1365

Definition....1365

Related Concepts....1365

Theory....1365

Optimizations and Applications....1368

Recommended Reading....1368

IT-Security Capability Maturity Model....1369

J....1370

Jacobi Symbol....1370

Background....1370

Definition....1370

Theory....1370

Applications....1370

Cross-References....1370

Recommended Reading....1370

Jamming Attack Defense....1371

Synonyms....1371

Definitions....1371

Background....1371

Spread spectrum techniques....1371

Theory and Applications....1371

Jamming Attack Defense in the Physical Layer....1372

Power control....1372

Jamming Attack Defense in the Link Layer and Layers Above....1374

Error-correcting code....1374

Link-layer channel adaptation....1374

Spatial retreats....1374

Convert timing channels....1374

Jamming-resilient multipath routing....1374

Open Problems and Future Directions....1377

References....1377

Jamming Resistance....1378

Definition....1378

Background....1378

Theory....1378

Recommended Reading....1379

K....1380

k-Anonymity....1380

Definitions....1380

Background....1380

Theory and Application....1381

Generalization and Suppression....1381

Algorithms for Enforcing k-Anonymity....1383

Open Problems and Future Directions....1383

Cross-References....1384

References....1384

Karatsuba Algorithm....1384

Definition....1384

Theory....1384

Applications....1387

Cross-References....1388

Recommended Reading....1388

Kasumi/Misty1....1388

Cross-References....1389

Recommended Reading....1389

Keeloq....1389

Definition....1389

Background....1390

Theory....1390

Applications....1391

Cross-References....1392

Recommended Reading....1392

Kerberos....1393

Synonyms....1393

Definition....1393

Background....1393

*-10pt....1393

Weaknesses and Limitations....1394

Applications....1394

Cross-References....1394

Recommended Reading....1394

Kerberos Authentication Protocol....1395

Related Concepts....1395

Definition....1395

Background....1395

Applications....1395

References....1395

Kerckhoffs Law....1395

Kerckhoffs' Principle....1395

Synonyms....1395

Definition....1395

Background....1396

Recommended Reading....1396

Key....1396

Definition....1396

Background....1397

Cross-References....1399

Recommended Reading....1399

Key Agreement....1399

Synonyms....1399

Definition....1399

Background....1399

Theory....1399

Applications....1400

Cross-References....1400

References....1400

Key Authentication....1400

Synonyms....1400

Related Concepts....1400

Definition....1400

Theory....1401

Open Problems and Future Directions....1402

Cross-References....1402

References....1402

Key Encrypting Key (KEK)....1402

Key Encryption Key....1402

Definition....1402

Background....1402

Theory....1402

Open Problems....1404

Cross-References....1404

Recommended Reading....1404

Key Enumeration....1404

Synonyms....1404

Definitions....1404

Background....1404

Application....1405

Open Problems and Future Directions....1405

Cross-References....1405

References....1406

Key Escrow....1406

Synonyms....1406

Definition....1406

Background....1406

Theory....1407

Applications....1407

Cross-References....1408

References....1408

Key Generation Using Physical Properties of Wireless Communication....1408

Definition....1408

Background....1408

Theory....1409

Open Problems....1409

Experimental Results....1409

Recommended Reading....1410

Key Life Cycle Management....1410

Key Management....1410

Synonyms....1410

Definition....1410

Background....1410

Theory....1410

Symmetric or Secret Key Cryptography....1411

Background....1411

Initialization....1412

Distribution....1412

Cancellation....1412

Summary and Observations....1413

Asymmetric or Public Key Cryptography....1413

Initialization....1413

Distribution....1414

Cancellation....1415

Summary and Observations....1416

Open Problems....1416

Cross-References....1416

References....1416

Key Recovery....1416

Key Search with Hints....1416

Key Variation....1416

Keyboard Dynamics....1416

Synonyms....1416

Definition....1417

Background....1417

Theory....1417

Applications....1419

Experimental Results....1420

Open Problems and Future Directions....1420

Cross-References....1421

References....1421

Keylogging....1421

Synonyms....1421

Definition....1421

Application....1422

References....1422

Key-Policy ABE....1422

Keystream....1422

Keystroke Biometrics....1422

Keystroke Dynamics....1423

Synonyms....1423

Definitions....1423

Background....1423

Theory....1424

Applications....1427

Open Problems and Future Directions....1427

Cross-References....1428

References....1428

Keystroke Logging....1429

Kleptographic Attack....1429

Kleptography....1429

Synonyms....1429

Definitions....1429

Background....1429

Theory....1430

Applications....1430

Open Problems and Future Directions....1430

Cross-References....1431

References....1431

km-Anonymity....1431

Synonyms....1431

Definitions....1431

Background....1431

Theory....1432

Application....1432

Open Problems and Future Directions....1432

Cross-References....1433

References....1433

Knapsack Cryptographic Schemes....1433

Definition....1433

Relevance to Modern Public Key Systems....1433

Introduction....1434

The Cryptographic Knapsack Scheme: An Introduction....1434

The Encryption in Additive Knapsack Schemes....1434

The Decryption....1435

The Merkle–Hellman Trapdoor....1435

A Survey of the History of the Cryptographic Knapsack....1436

The Trials to Avoid Weaknesses and Attacks for the Class of Usual Knapsacks....1436

The Case of Usual Knapsacks with Other Encryption Functions....1440

The Multiplicative Knapsack Scheme and Its History....1440

The Trapdoor Knapsack Schemes to Protect Signatures and Authenticity....1441

Some Details....1441

The Existence of Infinitely Many Decryption Keys....1441

The LLL Algorithm....1442

The Use of the LLL Algorithm in Brickell's Low Dense Attack....1443

Conclusion....1443

Cross-References....1443

References....1444

Known Plaintext Attack....1445

Definition....1445

Cross-References....1446

Recommended Reading....1446

Koblitz Elliptic Curves....1446

Synonyms....1446

Definition....1446

Background....1446

Application....1446

Cross-References....1447

References....1447

L....1448

Lamport One-Time Signatures....1448

Late Launch....1448

Lattice....1448

Synonyms....1448

Definition....1448

Background....1448

Theory....1448

Applications....1449

Cross-References....1450

Recommended Reading....1450

Lattice Basis Reduction....1450

Lattice Reduction....1450

Synonyms....1450

Definition....1450

Background....1450

Theory....1451

Applications....1452

Open Problems....1452

Experimental Results....1452

Cross-References....1452

Recommended Reading....1452

Lattice-Based Cryptography....1453

Definition....1453

Background....1453

Theory....1454

Applications....1454

Open Problems....1455

Cross-References....1455

Recommended Reading....1455

Layer-2 Protocol....1456

Synonyms....1456

Definitions....1456

Background....1456

Theory....1456

Payment & State Channels....1457

Operator/Client Protocols....1458

Optimistic OCPs....1458

OCPs with Non-Interactive Proofs....1459

Open Problems and Future Directions....1459

Cross-References....1459

References....1459

LCM....1460

-Diversity....1460

Definition....1460

Background....1460

Theory....1461

Open Problems....1463

Cross-References....1463

Recommended Reading....1463

Leakage Resilience....1463

Synonyms....1463

Definitions....1463

Background....1463

Theory....1464

Applications....1464

Open Problems and Future Directions....1464

Cross-References....1464

References....1465

Leakage-Resilient Cryptography....1465

Least Common Multiple....1465

Synonyms....1465

Definition....1465

Theory....1466

Cross-References....1466

Least Privilege....1466

Synonyms....1466

Definition....1466

Theory....1466

Cross-References....1467

References....1467

Ledger Consensus....1467

Legendre Symbol....1467

Background....1467

Definition....1467

Theory....1467

Cross-References....1468

Lemming Effect....1468

Levels of Trust....1468

Synonyms....1468

Definition....1468

Background....1468

Theory....1468

Applications....1470

Level 1 Trust (Very Low Risk of Compromise)....1470

Level 2 Trust (Low Risk of Compromise)....1470

Level 3 Trust (Medium Risk of Compromise)....1470

Level 4 Trust (High Risk of Compromise)....1471

Level 5 Trust (Very High Risk of Compromise)....1471

Open Problems....1472

Cross-References....1472

Recommended Reading....1472

LFSR....1472

Linear Complexity....1472

Definition....1472

Theory....1473

Cross-References....1473

Recommended Reading....1473

Linear Congruential Generator....1473

Definition....1473

Example....1473

Background....1473

Applications....1474

Cross-References....1474

Recommended Reading....1474

Linear Consistency Attack....1474

Definition....1474

Theory....1474

Cross-References....1475

Recommended Reading....1475

Linear Cryptanalysis for Block Ciphers....1475

Definition....1475

Background....1475

Theory....1475

Outline of a Linear Attack....1475

Piling-up Lemma....1476

Matsui's Search for the Best Approximations....1477

Linear Hulls....1477

Provable Security Against Linear Cryptanalysis....1477

Comparison with Differential Cryptanalysis....1478

Extensions....1478

Cross-References....1479

Recommended Reading....1479

Linear Cryptanalysis for Stream Ciphers....1480

Definition....1480

Background....1480

Theory....1480

Cross-References....1480

Recommended Reading....1480

Linear Feedback Shift Register....1481

Synonyms....1481

Definition....1481

Theory....1482

Cross-References....1484

Recommended Reading....1484

Linear Syndrome Attack....1484

Definition....1484

Cross-References....1485

Recommended Reading....1485

List Decoding....1485

Liveness Detection....1485

L Notation....1485

Definition....1485

Theory....1485

Cross-References....1485

Location Information (Privacy of)....1486

Synonyms....1486

Definitions....1486

Background....1486

Theory....1486

Application....1488

Open Problems and Future Directions....1488

Cross-References....1489

References....1489

Location Privacy....1489

Location Privacy in Ride-Hailing Service....1489

Synonyms....1489

Definitions....1490

Background....1490

Theory....1490

Open Problems and Future Directions....1491

References....1492

Location Privacy in Social Networks....1492

Location Privacy in Wireless Networks....1492

Synonyms....1492

Definition....1492

Background....1492

Theory....1493

Applications....1494

Cross-References....1494

Recommended Reading....1495

Location Privacy Metrics....1495

Location Privacy Protection in Ride-Hailing Service....1495

Location Privacy Quantification....1495

Location Semantics....1495

Synonyms....1495

Definitions....1495

Background....1495

Theory....1496

Application....1496

Open Problems and Future Directions....1496

Cross-References....1497

References....1497

Logic Bomb....1497

Definition....1497

Background....1497

Theory and Applications....1497

Cross-References....1497

Recommended Reading....1497

Logic Decryption....1497

Logic Locking....1498

Logic-Based Policy Languages....1498

Related Concepts and Keywords....1498

Definition....1498

Background....1498

Theory....1498

Implementations....1499

Open Problems and Future Directions....1500

References....1500

Longest Chain Protocol....1500

Synonyms....1500

Definition....1500

Background....1500

Theory....1501

Applications....1501

Open Problems and Future Directions....1501

Cross-References....1502

References....1502

Longhand....1503

Lower Bound for the Bandwidth Cost of Oblivious RAMs....1503

Luby-Rackoff Ciphers....1504

Definition....1504

Background....1504

Theory....1504

Cross-References....1505

Recommended Reading....1505

M....1506

MAA....1506

Synonyms....1506

Definition....1506

Background....1506

Theory....1506

Cross-References....1507

References....1507

MAC Algorithms....1507

Introduction....1507

Definition....1508

Security of MAC Algorithms....1508

Forgery Attack....1509

Key Recovery Attack....1509

Brute Force Key Search....1509

MAC Guessing Attack....1510

Internal Collision Attack on Iterated MAC Algorithms....1510

Weaknesses of the Algorithm....1511

Practical MAC Algorithms....1511

Based on Block Ciphers....1511

Based on Cryptographic Hash Functions....1512

Dedicated MAC Algorithms....1513

Cross-References....1514

Recommended Reading....1514

Machine Learning....1515

Machine Learning (Data Mining) for Privacy Policy Summarization....1515

Machine Learning for Attack Detection....1515

Machine Learning for Network Intrusion Detection....1515

Synonyms....1515

Definitions....1515

Background....1516

Theory and Application....1516

Open Problems and Future Directions....1518

References....1518

Machine Learning in Secured Computing....1519

Definitions....1519

Background....1519

Theory and Applications....1519

Classical Machine Learning....1519

Supervised Learning....1519

Unsupervised Learning....1519

Reinforcement Learning....1520

Deep Learning....1520

Emerging Machine Learning Framework....1521

Open Issues and Future Directions....1521

Cross-References....1522

References....1522

Machine Readable Travel Document Security....1523

Macrodata Disclosure Limitation....1523

Macrodata Disclosure Protection....1523

Macrodata Protection....1523

Synonyms....1523

Definition....1523

Background....1523

Theory....1523

Discovering sensitive cells....1524

Protecting sensitive cells....1525

Application....1525

Cross-References....1525

References....1525

Malicious Circuit....1526

Malicious Cryptography....1526

Maliciously Modified Set of Administrative Tools....1526

Malware....1526

Malware Behavior Clustering....1526

Definition....1526

Theory....1526

Cross-References....1528

Recommended Reading....1528

Malware Detection....1528

Synonyms....1528

Definition....1528

Background....1528

Rapid Releases of Malware Variants....1529

Poly- and Metamorphic Malware....1529

Theory and Applications....1529

Signature Matching....1529

Static Analysis....1530

Dynamic Analysis....1531

Cross-References....1532

Recommended Reading....1532

Managing and Monitoring Social Network Privacy Policies....1532

Synonyms....1532

Introduction....1532

Potential Policy Misconfigurations....1533

Proposed Treemap-Based Visualization....1534

Conclusion and Future Directions....1536

References....1536

Mandatory Access Control (MAC) Policies....1536

Definition....1536

Theory....1536

Cross-References....1537

References....1537

Maneuvering....1537

Man-in-the-Middle and Relay Attack....1537

Definition....1537

Theory....1537

Experimental Results....1538

References....1538

Manipulation Detection Code-2....1539

Manipulation Detection Code-4....1539

MARS....1539

Cross-References....1540

Recommended Reading....1540

MASH Hash Functions (Modular Arithmetic Secure Hash)....1541

Definition....1541

Background....1541

Theory....1541

Cross-References....1542

Recommended Reading....1542

Masking Countermeasure....1542

Synonyms....1542

Definition....1542

Theory....1542

Masking in Practice....1544

Open Problems and Future Directions....1544

Cross-References....1545

References....1545

Master Key....1546

Synonyms....1546

Definition....1547

Applications....1547

Open Problems and Future Directions....1547

Cross-References....1547

References....1547

Maurers Algorithm....1547

Maurer's Method....1547

Synonyms....1547

Definition....1547

Background....1547

Theory and Applications....1547

Cross-References....1548

Recommended Reading....1548

Maximal-Length Sequences....1548

Synonyms....1548

Definition....1548

Theory....1548

Applications....1552

Cross-References....1552

Recommended Reading....1552

Maxims....1553

Cross-References....1553

Recommended Reading....1553

McEliece Public Key Cryptosystem....1553

Definition....1553

Theory....1554

General Idea....1554

Description....1554

Security and Practice....1554

Security Reduction....1554

Best Known Attacks....1555

System Implementation....1555

Recommended Reading....1555

MD4 Hash Function....1556

MD4-MD5....1556

Synonyms....1556

Definition....1556

Theory....1556

Description....1556

Applications....1556

Attacks....1557

Attacks on the Short Output Length....1557

Collision Attacks....1557

Preimage Attacks....1558

Attacks on Concatenated Combiners....1558

Open Problems....1558

Cross-References....1558

Recommended Reading....1558

MD5 Hash Function....1559

MDC-2 and MDC-4....1559

Synonyms....1559

Definition....1559

Background....1559

Theory....1559

Open Problems and Future Directions....1561

Cross-References....1561

References....1561

Measurement Models of Software Security....1561

Measuring Location Privacy....1561

Synonyms....1561

Definitions....1562

Background ....1562

Theory....1562

Error-Based Metrics....1562

Uncertainty-Based Metrics....1562

Information Gain Metrics....1563

Success-Based Metrics....1563

Time-/Distance-Based Metrics....1563

Indistinguishability Metrics....1563

Application....1564

Open Problems and Future Directions....1564

Cross-References....1564

References....1564

Mechanized Theorem Proving....1565

Meet-in-the-Middle Attack....1565

Definition....1565

Cross-References....1565

Recommended Reading....1565

Melbourne Shuffle, The....1566

Synonyms....1566

Definitions....1566

Background....1566

Theory....1566

Shuffle Pass....1566

The Melbourne Shuffle....1568

Security....1568

Performance....1568

Further Information....1568

Cross-References....1568

References....1569

Meltdown....1569

Synonyms....1569

Definitions....1569

Background....1569

Theory....1570

Application....1572

Open Problems and Future Directions....1572

Cross-References....1572

References....1572

Meltdown Attack....1573

Membership Inference Attacks in Machine Learning....1573

Synonyms....1573

Definition....1573

Background....1573

Theory....1574

Threat Model....1574

Data Governance Scenarios....1574

Attack Models....1574

Defense Strategies....1575

Open Problems and Future Directions....1576

Cross-References....1576

References....1576

Memory and State Exhaustion Denial of Service....1576

Synonyms....1576

Definition....1577

Background....1577

Theory....1577

Applications....1577

Cross-References....1578

Recommended Reading....1578

Memory and State Exhaustion DoS....1578

Memory Overflow....1578

Merkle Trees....1578

Synonyms....1578

Definitions....1578

Background....1578

Theory....1579

Integrity Verification....1579

Merkle Tree....1579

Applications....1580

Cross-References....1580

References....1580

Merkle-Hash-Trees Signatures....1580

Mersenne Prime....1580

Definition....1580

Background....1580

Applications....1581

Message Authentication Algorithm....1581

Message-Locked Encryption....1581

Metrics of Software Security....1581

Synonyms....1581

Definition....1581

Background....1582

Theory....1582

Measurements and Qualitative Models....1582

Defense Patterns, Attack Patterns, and Related Measurements....1582

Attack Trees....1583

Toward Quantitative Predictive Models....1583

Probability-Based and Reliability-Like Models....1584

Applications....1584

Open Problems and Future Directions....1584

Cross-References....1585

References....1585

Meyer-Schilling Hash Functions....1585

MIA....1585

Microdata Anonymization Techniques....1585

Microdata Disclosure Limitation....1585

Microdata Disclosure Protection....1585

Microdata Masking Techniques....1585

Synonyms....1585

Definition....1586

Theory....1586

Applications....1588

Cross-References....1588

Recommended Reading....1589

Microdata Protection....1589

Synonyms....1589

Definition....1589

Background....1589

Theory....1589

Classification of microdata disclosure protection techniques....1590

Assessing microdata confidentiality and utility....1591

Application....1592

Open problems....1592

Cross-References....1592

References....1592

Microdata Statistical Disclosure Control....1592

Milieu....1592

Miller–Rabin Probabilistic Primality Test....1592

Synonyms....1592

Definition....1592

Background....1593

Theory and Applications....1593

Cross-References....1593

Recommended Reading....1594

Miller-Rabin Test....1594

MILS....1594

Minimal Polynomial....1594

Definition....1594

Cross-References....1594

Minimal Privilege....1594

m-Invariance....1594

Definition....1594

Theory....1594

Cross-References....1597

Recommended Reading....1597

MIPS-Year....1598

Definition....1598

Background....1598

Theory....1598

Applications....1598

Cross-References....1598

Recommended Reading....1598

Miss-in-the-Middle Attack....1599

Definition....1599

Background....1599

Cross-References....1599

Recommended Reading....1599

MITRE ATT&CK: MITRE Adversarial Tactics, Techniques, and Common Knowledge....1599

Mix Networks....1599

Synonyms....1599

Definition....1599

Background....1599

Theory and Application....1600

Cryptographic Unlinkability of Messages....1600

Strategies for Reordering Messages....1601

Anonymous Routing....1601

Open Problems and Future Directions....1602

Tradeoffs Between Anonymity, Latency and Traffic Volume....1602

Statistical Disclosure Attacks....1602

Key Distribution and Management....1602

Unobservability and Undetectability....1603

Applications....1603

Cross-References....1603

References....1603

MixSlice....1603

Definition....1603

Background....1604

Theory....1604

Access Management....1606

Open Problems and Future Directions....1607

Cross-References....1608

References....1608

Mixnets....1608

Mix-Nets....1608

Mix-Zones in Wireless Mobile Networks....1608

Definition....1608

Background....1608

Theory and Applications....1609

Open Problems and Future Directions....1610

Cross-References....1611

References....1611

ML Data Poisoning....1612

ML Membership Inference....1612

ML-Sequence....1612

Mobile Application Security....1612

Mobile Device Security....1612

Mobile Payments....1612

Definition....1612

Background....1612

Theory....1613

Applications....1613

Recommended Reading....1613

Mobile Platform Security....1613

Mobile Wallet....1613

Definition....1613

Theory....1614

Applications....1614

Cross-References....1614

Recommended Reading....1614

Modes of Operation of a Block Cipher....1614

Cross-References....1619

Recommended Reading....1620

Modular Arithmetic....1620

Synonyms....1620

Definition....1621

Background....1621

Theory....1621

Introduction....1621

Modular Arithmetic Operations....1622

Multiplicative Groups and Euler's ϕ Function....1623

Prime Fields....1624

Cross-References....1624

Recommended Reading....1624

Modular Root....1625

Definition....1625

Background....1625

Theory....1625

Open Problems....1625

Cross-References....1625

Modulus....1626

Definition....1626

Background....1626

Cross-References....1626

Monitor Placement Strategy....1626

Monitoring....1626

Monotone Signatures....1626

Definition....1626

Cross-References....1626

Recommended Reading....1626

Montgomery Arithmetic....1626

Definition....1626

Background....1627

Theory....1627

Introduction....1627

Montgomery Exponentiation....1628

Efficient Montgomery Multiplication....1629

Application to Finite Fields....1630

Secure Montgomery Multiplication....1630

Cross-References....1631

Recommended Reading....1631

Moore's Law....1631

Definition....1631

Background....1631

Theory....1631

Applications....1632

Cross-References....1632

Recommended Reading....1632

Moving Target Defense....1632

Synonyms....1632

Definition....1632

Background....1632

Theory....1633

Application....1634

Open Problems and Future Directions....1635

Cross-References....1635

References....1635

Moving Target Techniques....1636

MPKC....1636

MQ....1636

m-sequence....1636

Multi-authority and Decentralized Attribute-Based Encryption....1636

Synonyms....1636

Definition....1636

Background....1636

Theory and Applications....1637

Open Problems and Future Directions....1638

References....1639

Multibiometrics....1639

Synonyms....1639

Definition....1639

Background....1640

Theory....1641

Applications....1642

Open Problems....1644

Cross-References....1645

Recommended Reading....1645

Multicast Authentication....1645

Multicast Stream Authentication....1645

Multi-client Oblivious RAM....1645

Synonyms....1645

Definitions....1645

The Role of Each Entity....1645

Security....1646

Related Notions....1646

Efficiency....1646

Design Challenge....1646

Open Problems and Future Directions....1646

Cross-References....1647

References....1647

Multidimensional Databases....1647

Multi-Exponentiation....1647

Multifactor Authentication....1647

Multilevel DBMS....1647

Definitions....1647

Theory....1647

Application....1649

Cross-References....1650

References....1650

Multilevel Security Policies....1650

Definition....1650

Background....1651

Theory....1651

Cross-References....1652

Recommended Reading....1652

Multiparty ComputationEditors' note: Due to the increased set of applications of privacy enhancing technologies, designing more efficient multiparty computation protocols, improving both fundamental methods and implementations has been an area of extensive research since 2010.....1652

Synonyms....1652

Definition....1652

Background....1652

Theory....1653

Applications....1655

Cross-References....1655

References....1655

Multiparty Privacy....1656

Multiple Encryption....1656

Definition....1656

Cross-References....1656

Multiple Independent Levels of Security....1656

Synonyms....1656

Definition....1656

Background....1656

Applications....1656

MILS Principles....1658

Cross-References....1659

Recommended Reading....1659

Multiplicative Knapsack Cryptosystem....1659

Definition....1659

Open Problems....1660

Cross-References....1660

Recommended Reading....1660

Multiprecision Multiplication....1660

Synonyms....1660

Definition....1660

Background....1660

Theory....1660

Applications....1663

Recommended Reading....1664

Multiprecision Squaring....1664

Synonyms....1664

Definition....1664

Background....1664

Theory....1664

Applications....1665

Cross-References....1665

Recommended Reading....1665

Multi-Reader-Multi-Writer Searchable Encryption....1665

Multi-Reader-Single-Writer Searchable Encryption....1665

Multi-Server Oblivious RAM....1665

Multiset Attack....1665

Definition....1665

Background....1666

Theory....1666

Cross-References....1666

Recommended Reading....1666

Multi-Subject Privacy....1666

Multi-Threaded Implementation for Cryptography and Cryptanalysis....1666

Definition....1666

Background....1667

Theory....1667

Applications....1668

Open Problems....1668

Cross-References....1668

Recommended Reading....1668

Multi-User Keyword Search in Encrypted Database....1669

Multi-User Searchable Encryption....1669

Synonyms....1669

Definition....1669

Background....1669

Theory....1669

Cross-References....1670

References....1671

Multivariate Cryptography....1671

Synonyms....1671

Definition....1671

Background....1672

Theory....1672

Variants (Perturbations)....1673

Applications....1673

C and SFLASH....1673

HFE and QUARTZ....1673

UOV....1674

Rainbow/TTS....1674

“Medium-Sized” Extension Fields and IFS....1674

Implementations....1675

Open Problems....1675

Cross-References....1675

References....1675

Multivariate Quadratic Public-Key Cryptosystem (MQPKC)....1676

N....1677

Naccache–Stern Higher Residues Cryptosystem....1677

Definition....1677

Open Problems....1677

Cross-References....1677

Recommended Reading....1677

Nakamoto Style Consensus Protocol....1678

Near Field Communication....1678

Nearest Vector Problem....1678

Needham–Schroeder Protocols....1678

Definition....1678

Background....1678

Theory....1678

Applications....1679

Cross-References....1679

References....1679

NESSIE Project....1680

Synonyms....1680

Definition....1680

Background....1680

Theory....1680

The NESSIE Call....1680

The Evaluation Process....1681

Security Evaluation....1681

Performance Evaluation....1681

Tools....1682

The NESSIE Submissions....1682

Response to the NESSIE Call....1682

Selection for Phase II....1683

The NESSIE Portfolio....1684

Conclusion....1685

Cross-References....1685

References....1685

Network Attack Graphs....1686

Network Bandwidth Denial of Service (DoS)....1687

Synonyms....1687

Definition....1687

Background....1687

Applications....1687

Open Problems....1690

Cross-References....1690

Network Capabilities....1690

Definition....1690

Background....1690

Theory....1690

Bootstrap....1691

Unforgeable Capabilities....1691

Open Problems....1692

Recommended Reading....1692

Network Diversity....1692

Definitions....1692

Background....1693

Theory and Application....1693

Applications.....1693

Open Problems and Future Directions....1695

Cross-References....1695

References....1695

Network DoS....1695

Network Flooding Attack....1695

Network Hardening....1696

Synonyms....1696

Definitions....1696

Background....1696

Theory....1696

Open Problems and Future Directions....1697

Cross-References....1698

References....1698

Network Intrusion Detection System....1698

Synonyms....1698

Definition....1698

Background....1698

Theory and Application....1698

Open Problems and Future Directions....1699

References....1700

Network Security....1700

Network Tunneling Protocol....1700

Networked Privacy....1700

Neural Trojans....1700

Introduction....1700

Neural Trojan Attacks....1701

Training Data Poisoning....1701

Hiding Trojan Triggers....1702

Altering Training Algorithms....1702

Trojan Insertion via Transfer Learning....1703

Neural Trojans in Hardware....1703

Binary-Level Attacks....1703

Defense Techniques....1704

Neural Network Verification....1704

Trojan Trigger Detection....1704

Conclusion and Discussion....1705

References....1706

New European Schemes for Signature....1707

NFC....1707

Synonyms....1707

Definition....1707

Background....1707

Theory....1707

Applications....1708

Open Problems and Future Directions....1708

Cross-References....1709

Recommended Reading....1709

NFS....1709

NIDS....1709

Niederreiter Encryption Scheme....1709

Definition....1709

Theory....1709

General Idea....1710

Description....1710

Practice and Security....1710

Cross-References....1710

Recommended Reading....1710

NIST Elliptic Curves....1711

Definition....1711

Background....1711

Application....1711

References....1712

Noninteractive Proof....1712

References....1713

Nonintrusive Authentication....1713

Nonlinear Feedback Shift Register....1713

Definition....1713

Background....1713

Example....1713

Theory....1713

Applications....1714

Open Problems and Future Directions....1715

Remarks....1715

Cross-References....1715

Recommended Reading....1715

Nonlinearity of Boolean Functions....1715

Definition....1715

Background....1715

Theory....1715

Cross-References....1716

Recommended Reading....1716

Nonmalleability....1716

Background....1716

*-10pt....1717

Recommended Reading....1720

Nonrepudiable Agreement....1721

Nonrepudiation of Digital Signatures....1721

Definition....1721

Background....1721

Theory....1722

Applications....1723

Open Problems and Future Directions....1723

Recommended Reading....1723

Nonrepudiation Protocol....1723

Nonsecret Encryption....1723

Synonyms....1723

Definition....1723

Background....1723

Retrospection....1724

Theory....1725

Discussion....1726

Cross-References....1726

Recommended Reading....1726

Non-Secure Communication Channels and the Future of Privacy....1727

Definitions....1727

Introduction....1727

Background....1728

Challenges....1729

Open Problems....1730

Cross-References....1730

References....1730

NSS....1731

NTRU....1731

Synonyms....1731

Definition....1731

Background....1731

Theory....1731

Description of the NTRUEncrypt System....1732

Security of the NTRUEncrypt System....1733

NTRUSign....1734

Applications....1734

Background....1734

Cross-References....1734

Recommended Reading....1734

NTRUEncrypt....1735

NTRUSign....1735

Nucleic Acid....1735

Nudging Privacy....1735

Number Field....1735

Synonyms....1735

Definition....1736

Theory....1736

Applications....1736

Cross-References....1736

Number Field Sieve....1736

Number Field Sieve for Factoring....1736

Synonyms....1736

Definition....1736

Background....1737

Theory....1737

Basic Idea of the NFS....1737

Polynomial Selection....1738

Sieving....1739

Linear Algebra....1740

Square Root....1741

Applications....1741

Open Problems....1742

Experimental Results....1742

Cross-References....1743

Recommended Reading....1743

Number Field Sieve for the DLP....1744

Synonyms....1744

Definition....1744

Background....1744

Theory....1746

Number Fields....1746

NFS-DLP Algorithm....1747

Optimal Parameters....1748

Cross-References....1750

Recommended Reading....1750

Number Theory....1751

Definition....1751

Background....1751

Applications....1752

Modular Arithmetic....1752

Prime Numbers....1753

Discrete Logarithms and Integer Factorization....1754

Elliptic Curves....1756

Lattices....1756

Open Problems....1757

Cross-References....1757

Recommended Reading....1757

Nyberg–Rueppel Signature Scheme....1759

Definition....1759

Theory....1759

Cross-References....1759

Recommended Reading....1759

Nym....1759

O....1760

OAEP: Optimal Asymmetric Encryption Padding....1760

Definition....1760

Background....1760

Theory....1760

The RSA–PKCS #1 v1.5 Encryption....1760

The Optimal Asymmetric Encryption Padding....1760

The Random Oracle Model....1760

Description of OAEP....1761

OAEP and Provable Security....1761

Fixing the OAEP Proof of Security....1761

OAEP Alternatives....1762

Cross-References....1762

Recommended Reading....1762

Oblivious Data Structures....1763

Definition....1763

Background....1763

Theory and Application....1763

Formal Definition....1763

Main Techniques....1764

Applications....1764

Open Problems and Future Directions....1764

References....1765

Oblivious Joins....1766

Oblivious Locally Decodable Codes (OLDC)....1766

Oblivious Parallel RAM (OPRAM)....1766

Synonyms....1766

Definition....1766

Background....1766

Theory: Overview of the Construction....1767

Cross-References....1768

References....1768

Oblivious Parallel Random Access Memory....1769

Oblivious RAM (ORAM)....1769

Synonyms....1769

Definitions....1769

Background....1769

Hierarchical Construction....1770

Tree-Based Construction....1771

Applications....1771

Cross-References....1771

References....1772

Oblivious RAM Lower Bound....1772

Synonyms....1772

Definition....1772

Theory....1773

Lower Bound in the Online Setting....1773

Open Problems and Future Directions....1775

Cross-References....1775

References....1775

Oblivious RAM-Based Secure Processors....1775

Definitions....1775

Background....1776

Recent Results....1776

Open Problems and Future Directions....1776

References....1777

Oblivious Random Access Memory....1778

Oblivious Transfer....1778

References....1779

Ocular Region....1779

Off-Chain Protocol....1779

One Time Password, from a Key Management Perspective....1779

Related Concepts....1779

Definition....1779

Applications....1779

References....1780

One-Time Password....1780

Synonyms....1780

Definition....1780

Background....1780

Theory....1780

Cross-References....1782

Recommended Reading....1782

One-Way Chain....1782

One-Way Function....1782

Definition....1782

Background....1782

Theory....1782

Cross-References....1783

Recommended Reading....1783

One-Way Hash Chain....1783

One-Way Property....1783

Online Analytical Processing....1783

O-Notation....1784

Definition....1784

Theory....1784

Applications....1785

Cross-References....1785

Open Web Proxies....1785

Definition....1785

Background....1785

Open Web Proxy Anonymity....1785

Open Web Proxy Behavior, Security, and Privacy Threats....1786

References....1786

Operational Safety....1787

Operational Separation of Duties....1787

Optimal Extension Fields (OEFs)....1787

Definition....1787

Theory....1787

Applications....1789

Cross-References....1789

Recommended Reading....1789

Oracle (Blockchain Concept)....1790

Synonyms....1790

Definition....1790

Applications....1790

Theory....1790

Basic Design and Functionality....1790

Security Goals....1791

A Broader Perspective....1791

Open Problems and Future Directions....1792

Cross-References....1792

References....1792

ORAM....1792

Order....1793

Definition....1793

Theory....1793

Applications....1793

Cross-References....1793

Order-Preserving Encryption....1793

OTP....1793

Outbound Authentication....1793

Outsourced Private Information Retrieval....1794

Introduction....1794

References....1796

Overlay-Based DoS Defenses....1797

Definition....1797

Background....1797

Applications and Experimental Results....1797

First-Generation Overlay-Based DoS Defenses....1797

Second Generation Overlay-Based DoS Defenses....1800

Protection for Web Services....1800

Removing ISP Packet Filtering....1801

Overlay-Based Defenses Against Targeted DoS Attacks....1803

Open Problems....1805

Recommended Reading....1805

Overspender Detection....1806

Definition....1806

Theory....1806

Cross-References....1806

Recommended Reading....1806

Overspending Prevention....1807

Definition....1807

Theory....1807

Cross-References....1807

Recommended Reading....1807

Over-the-Air (OTA) Programming....1807

Ownership....1807

P....1808

P2P....1808

Packet Error Rate....1808

Packet Flooding Attack....1808

Paillier Encryption and Signature Schemes....1808

Definition....1808

Theory....1808

Applications....1809

Cross-References....1809

Recommended Reading....1809

Pairing-Based Key Exchange....1810

Synonyms....1810

Definition....1810

Background....1810

Theory....1810

Applications....1811

Cross-References....1811

Recommended Reading....1811

Pairing-Friendly Elliptic Curves....1811

Definition....1811

Background....1811

Theory....1811

Supersingular Curves....1812

Embedding Degree k=2....1812

Ordinary Curves....1812

MNT Curves....1813

BN Curves....1814

Other Constructions of Pairing-Friendly Ordinary Elliptic Curves....1814

Cross-References....1814

References....1814

Pairings....1815

Synonyms....1815

Definition....1815

Background....1815

Theory....1815

References....1816

Palm Vein Recognition....1816

Palmprint Authentication....1817

Palmprint Recognition....1817

Synonyms....1817

Definitions....1817

Background....1817

Theory....1818

Competitive Code....1819

Ordinal Measure....1820

RLOC....1820

Applications....1821

Experimental Results....1821

Open Problems....1822

References....1822

3D Palmprint....1823

Synonyms....1823

Definitions....1823

Background....1823

Theory....1823

Open Problems....1825

Summary....1826

References....1826

Parallelizable Message Authentication Code....1826

Parent/Child Chains....1827

Passive Physical Attacks....1827

Passport Security....1827

Synonyms....1827

Definition....1827

Background....1827

Theory....1827

Passive Authentication....1828

Active Authentication....1828

Basic Access Control....1828

Secure Messaging....1829

Other Security Mechanisms....1829

Open Problems and Future Directions....1829

Cross-References....1830

References....1830

Password....1830

Definition....1830

Theory....1831

Cross-References....1832

Recommended Reading....1832

Password Nudges....1833

Patch Release....1833

Payment Card....1833

Synonyms....1833

Definition....1833

Theory....1833

Applications....1833

Cross-References....1834

Recommended Reading....1834

Peer Privacy....1834

Peer-to-Peer Systems....1834

Synonyms....1834

Definition....1834

Background....1834

Applications....1835

Open Problems and Future Directions....1835

Cross-References....1836

References....1836

Pegged Sidechains....1836

PEM, Privacy-Enhanced Mail....1836

Synonyms....1836

Definition....1836

Background....1836

Theory....1836

Cross-References....1837

Recommended Reading....1837

Penetration Testing....1837

Definition....1837

Theory....1837

Cross-References....1838

Recommended Reading....1838

Penmanship....1839

Perfect Forward Secrecy....1839

Synonyms....1839

Related concepts and keywords....1839

Definition....1839

Background....1839

Application....1840

References....1840

Perfectly Secure Message Transmission....1841

Background....1841

Definition....1841

Theory....1841

Open Problems....1842

Cross-References....1842

References....1843

Periocular Biometrics....1844

Synonyms....1844

Definitions....1844

Background....1844

Periocular Biometric System....1845

Feature Extraction for Periocular Biometrics....1845

Application....1845

Open Problems and Future Directions....1846

References....1847

Periocular Region....1847

Permissions: Access Control Fundamentals....1847

Synonyms....1847

Definition....1847

Background....1847

Theory....1848

Application....1849

Open Problems and Future Directions....1850

Cross-References....1851

References....1851

Personal Identification Number (PIN)....1851

Definition....1851

References....1851

Personally Identifiable Information....1851

Definitions....1851

Theory and Application....1852

Cross-References....1852

References....1852

Persuasive Communication....1853

Persuasive Security Messages....1853

Synonyms....1853

Definition....1853

Background....1853

Theory and Application....1853

Open Problems and Future Directions....1854

Cross-References....1854

References....1854

PGP....1855

Phenotyping....1855

Synonyms....1855

Definition....1855

Recommended Reading....1855

Phi Function....1855

Photo Privacy....1855

Physical Obfuscated Key....1855

Physical One-Way Function (previously)....1855

Physical Random Function....1855

Physical Random Function (previously)....1855

Physical Security....1855

Definition....1855

Background....1856

Theory....1856

Recommended Reading....1856

Physical Unclonable Functions (PUFs)Work done while the author was at Philips Research, The Netherlands....1857

Synonyms....1857

Definition....1857

Theory....1857

Applications....1861

Cross-References....1862

Recommended Reading....1863

Physical(ly) Unclonable Function (alternate spelling)....1864

Physically Obfuscated Key or POK (variant)....1864

Physically Unclonable Function (PUF)....1865

Synonyms....1865

Definition....1865

Background....1865

Theory....1865

PUF Design....1865

PUF Challenges and Responses....1865

Strong and Weak PUFs, POKs....1866

PUF Quality Metrics....1866

Applications....1866

Constructions....1866

Use Cases....1867

Open Problems and Future Directions....1867

Cross-References....1868

References....1868

PIR with Compressed Queries....1868

Synonyms....1868

Definitions....1868

Background....1869

Large Elements....1869

Sublinear Communication....1869

High Computation Costs....1870

Compressing Queries....1870

Brakerski-Fan-Vercauteren FHE Cryptosystem (BFV)....1870

Encoding the Index....1871

Expanding Queries Obliviously....1871

Optimizations....1872

Future Directions....1872

Cross-References....1872

References....1872

PKCS....1872

Definition....1872

Background....1872

Theory....1873

Cross-References....1873

Recommended Reading....1873

PKI....1873

Synonyms....1873

Definition....1873

Theory....1874

Applications....1874

Cross-References....1874

Recommended Reading....1874

PKI Trust Models....1875

Synonyms....1875

Definition....1875

Background....1875

Theory....1876

Applications....1878

Experimental Results....1878

Open Problems and Future Directions....1878

Cross-References....1878

References....1878

PKI Trust Relationships....1878

PKIX, Public Key Infrastructure (X.509)....1878

Definition....1878

Background....1878

Theory....1879

Recommended Reading....1879

Platform for Privacy Preferences (P3P)....1879

Definition....1879

Background....1880

Applications....1880

References....1880

Playback Attack....1881

Playfair Cipher....1881

Cross-References....1881

Recommended Reading....1881

PMAC....1881

Synonyms....1881

Definition....1881

Background....1882

Theory....1882

Cross-References....1883

Recommended Reading....1883

POI: Point of Interest....1883

Point Counting....1883

Synonyms....1883

Definition....1883

Background....1883

Theory and Application....1883

Cross-References....1884

References....1885

POK....1885

Policy Composition....1885

Definition....1885

Background....1885

Theory and Application....1885

Open Problems and Future Directions....1887

Cross-References....1887

References....1887

Policy Hiding Attribute-Based Encryption....1887

Policy Misconfigurations....1887

Policy Updatable Attribute-Based Encryption....1887

Political Economy....1887

Polybios Square Encryption....1887

Definition....1887

Cross-References....1888

Recommended Reading....1888

Polyinstantiation....1888

Definition....1888

Background....1888

Theory and Application....1888

Cross-References....1890

References....1890

Polynomial Time....1891

Definition....1891

Theory....1891

Applications....1892

Open Problems....1892

Cross-References....1892

Porta Encryption....1892

Definition....1892

Cross-References....1893

Recommended Reading....1893

Post-quantum ABE....1893

Post-quantum Cryptographic Hardware Primitives....1893

Synonyms....1893

Definitions....1893

Background....1893

Theory and Application....1894

Open Problems and Future Directions....1896

Cross-References....1896

References....1896

Post-quantum Cryptography....1897

Definition....1897

Background....1897

Theory and Applications....1898

Cross-References....1898

References....1898

Post-quantum IBE....1899

Post-quantum Identity-Based Encryption and Attribute-Based Encryption....1899

Synonyms....1899

Definitions....1899

Background....1899

IBE and ABE from Lattices....1899

PQ Models and Assumptions....1900

Open Problems....1901

Cross-References....1901

References....1901

Post-Snowden Cryptography....1901

Synonyms....1901

Definitions....1901

Background....1901

Theory....1902

Algorithm Subversion and Countermeasures....1902

Parameter Subversions and Countermeasures....1903

Hardware Subversions and Countermeasures....1903

Open Problems and Future Directions....1903

Cross-References....1904

References....1904

Power/EM Analysis Attacks....1905

Practical E-Cash....1905

Synonyms....1905

Related Concepts....1905

Definition....1905

Background....1905

Theory of E-Cash....1906

Differences Between E-Cash and E-Investments....1906

Open Problems....1907

References....1907

Practical Revocation in Cryptographic Access Control....1907

Preimage Resistance....1907

Synonyms....1907

Definition....1908

Background....1908

Theory....1908

Cross-References....1908

References....1908

-Presence....1909

Definition....1909

Background....1909

Theory....1909

δ-Presence: Generic Definition....1909

Data Publishing Scenario: Enforcing δ-Presence....1910

Open Problems....1911

Cross-References....1912

References....1912

PRESENT – Block Cipher....1913

Definition....1913

Background....1913

Theory....1913

The sBoxLayer....1913

The pLayer....1913

The Key Scheduling....1913

Cryptanalytic Results....1913

Implementation Results....1913

Cross-References....1914

Recommended Reading....1914

Pretty Good Privacy (PGP)....1914

Synonyms....1914

Definition....1915

Background....1915

History....1915

GnuPG....1917

Theory....1917

OpenPGP Standard....1917

Web of Trust Model....1917

Experimental Results....1917

Cross-References....1919

Recommended Reading....1919

Prevention....1919

Primality Proving Algorithm....1919

Definition....1919

Cross-References....1919

Primality Test....1919

Definition....1919

Cross-References....1919

Primary Key....1919

Prime Certificate....1920

Prime Generation....1920

Definition....1920

Theory....1920

Cross-References....1920

Prime Number....1920

Definition....1920

Background....1920

Theory....1921

Primality Tests and Primality Proofs....1922

Primality Test....1923

Primality Proofs....1924

Overview....1925

Cross-References....1926

Recommended Reading....1926

Primitive Element....1927

Definition....1927

Theory....1927

Applications....1928

Cross-References....1928

Privacy....1928

Privacy Assessment....1928

Privacy Attacks Against Relationship on OSNs....1928

Synonyms....1928

Definitions....1928

Background....1928

Telling Relationship from Rich OSN Data....1929

Finding Hidden Relationship in Apps....1929

Compromising Relationship in Data Publishing....1930

References....1930

Privacy Awareness....1931

Privacy Breach Impacts....1931

Privacy by default....1931

Privacy by Design....1931

Privacy Dilemma....1931

Privacy Dilemma, The....1931

Privacy Economics: From Information Theory to Privacy as an Asset....1931

Synonyms....1931

Definitions....1931

Background....1931

Theory....1933

Open Problems and Future Directions....1935

Cross-References....1935

References....1936

Privacy in Data-Driven Circular Economy....1936

Definition....1936

Background....1937

Theory and Application....1937

Open Problems and Future Directions....1938

References....1938

Privacy in Location-Based Data Mining....1938

Definition....1938

Background....1939

Theory....1939

Privacy Attacks....1939

Privacy Protection Schemes....1940

Privacy Protection Through Data Manipulation....1940

Privacy Protection Through the Algorithms and Models....1941

Applications....1942

References....1942

Privacy in Location-Based Social Networks....1943

Privacy in Mobile Crowdsensing....1943

Privacy in Mobile Participatory Sensing....1943

Synonyms....1943

Definition....1943

Background....1943

Threats to Privacy....1944

Theory and Application....1945

Open Problems and Future Directions....1946

Cross-References....1946

References....1946

Privacy in Mobile Sensing Applications....1947

Privacy in Mobile Urban Sensing Applications....1947

Privacy in Participatory Sensing Applications....1947

Privacy Law: Understanding Data Protection Regulations....1947

Synonyms....1947

Definition....1947

Background....1947

Theory....1947

Application....1948

Open Problems and Future Directions....1950

Cross-References....1952

References....1952

Privacy Legislation....1953

Privacy Measurement....1953

Privacy Metrics....1953

Synonyms....1953

Definitions....1953

Theory....1953

Inputs for Privacy Metrics....1953

Properties Measured by Privacy Metrics....1954

Uncertainty Metrics....1954

Information Gain Metrics....1954

Similarity Metrics....1954

Indistinguishability Metrics....1955

Success Metrics....1955

Error Metrics....1955

Time Metrics....1955

Accuracy Metrics....1955

Criteria for Selecting Privacy Metrics....1955

Open Problems and Future Directions....1956

Cross-References....1956

References....1957

Privacy Metrics for Online Social Network Data....1957

Synonyms....1957

Definitions....1957

Theory....1957

k-Anonymity-Based Privacy Metrics....1957

Differential Privacy-Based Metrics....1958

Open Problems and Future Directions....1958

Cross-References....1958

References....1958

Privacy Nudging....1958

Synonyms....1958

Definition....1958

Background....1958

Theory....1959

Open Problems and Future Directions....1960

Cross-References....1960

References....1960

Privacy of Aggregated Location Information....1960

Privacy of Aggregated Mobility Data....1960

Synonyms....1960

Definitions....1960

Background....1960

Theory....1961

Approach 1: Anonymization of Specific Query Results....1962

Syntactic Anonymization....1962

Anonymization with Differential Privacy....1962

Approach 2: Anonymization of the Mobility Dataset....1962

Syntactic Anonymization....1962

Anonymization with Differential Privacy....1963

Approach 3: Anonymization of Spatiotemporal Density....1963

Open Problems and Future Directions....1963

Cross-References....1964

References....1964

Privacy of Outsourced Data....1964

Definitions....1964

Background....1964

Theory....1965

Cloud Adversarial Behavior and Security Requirements/Properties....1965

Honest-but-curious (HBC) adversary....1965

Adversarial view....1965

Malicious adversary....1965

Security properties....1965

Ciphertext indistinguishability....1965

Execution privacy....1965

Security Solutions....1967

Encryption-Based Techniques....1967

Limitations of encryption-based techniques....1967

Systems built using encryption-based techniques....1967

Secret-Sharing-Based Techniques....1968

Limitations....1968

Systems built using secret-sharing-based techniques....1968

Secure Hardware-Based Techniques....1968

Limitations....1968

Systems built using secure hardware-based techniques....1968

Open Problems and Future Directions....1969

Cross-References....1969

References....1969

Privacy of Trace Data....1970

Privacy of Trajectory Data....1970

Synonyms....1970

Definition....1970

Background....1970

Theory....1970

Privacy of a Whole Trajectory....1971

Privacy of Sensitive Place Visits....1972

Open Problems and Future Directions....1972

Cross-References....1973

References....1973

Privacy of Trajectory Micro-data....1973

Privacy Paradox, The....1973

Synonyms....1973

Definition....1973

Background....1973

Theory....1974

Open Problems and Future Directions....1974

Cross-References....1975

References....1975

Privacy Protection in Biometric Systems....1975

Privacy Quantification....1975

Privacy Requirements....1975

Privacy Soft Paternalism....1975

Privacy Violation Impacts....1975

Privacy-Aware Access Control in Decentralized Online Social Networks....1975

Synonyms....1975

Definitions....1975

Background....1975

Theory and Application....1977

Existing Solutions and Future Directions....1977

Cross-References....1978

References....1978

Privacy-Aware Access Control Policies....1979

Definition....1979

Background....1979

Theory....1979

User-Based Privacy Restrictions....1979

Regulation Modeling....1980

Open Problems and Future Directions....1980

Cross-References....1980

References....1980

Privacy-Aware Database....1981

Privacy-Aware Languages....1981

Synonyms....1981

Definition....1981

Background....1981

Theory and Application....1981

Open Problems and Future Directions....1982

Cross-References....1982

References....1982

Privacy-Enabled Database....1983

Privacy-Enhanced Languages....1983

Privacy-Enhanced Technologies....1983

Privacy-Enhancing Technologies (PET)....1983

Synonyms....1983

Definitions....1983

Background....1983

Theory and Applications....1984

Open Problems and Future Directions....1985

Cross-References....1985

References....1985

Privacy-Preserving Authentication in Wireless Access Networks....1986

Synonyms....1986

Definitions....1986

Background....1986

Theory....1986

Application....1987

Open Problems....1988

References....1988

Privacy-Preserving Data Publishing....1988

Synonyms....1988

Definition....1989

Background....1989

Theory....1990

Open Problems and Future Directions....1991

Cross-References....1991

References....1991

Privacy-Preserving Joins over Encrypted Data....1993

Synonyms....1993

Definition....1993

Theory....1993

Open Problems and Future Directions....1995

Cross-References....1995

References....1995

Privacy-Preserving Machine Learning....1995

Privacy-Preserving Outlier Detection....1995

Privacy-Preserving Technologies....1995

Private Boolean Queries on Encrypted Data....1995

Synonyms....1995

Definition....1995

Background....1996

Theory....1996

Application....1997

Open Problems and Future Directions....1997

Cross-References....1997

References....1997

Private Exponent....1998

Private Information Retrieval....1998

Definitions....1998

Background....1998

Theory....1999

Perfect Privacy Constructions....2000

Cross-References....2000

References....2000

Private Information Retrieval with Preprocessing....2001

Synonyms....2001

Definitions....2001

Background....2001

Theory....2002

Formal Definition....2002

Syntax....2002

Semantics....2002

Negative Results....2003

Constructions....2003

Open Problems and Future Directions....2003

Cross-References....2003

References....2003

Private Information Retrieval with Sublinear Online Time....2004

Private Key Cryptosystem....2004

Private Machine Learning....2004

Private Range Queries....2004

Synonyms....2004

Definitions....2004

Theory....2004

Order-Preserving Encryption....2005

Range-Searchable Encryption....2005

Attacks on Private Range Queries....2005

Open Problems and Future Directions....2006

Cross-References....2006

References....2006

Private Stateful Information Retrieval....2006

Definition....2006

Background....2006

Construction....2007

Cross-References....2009

References....2009

Private-Key Constructions for Dynamic Access Control....2009

Privileges in SQL....2009

Definitions....2009

Theory....2009

Cross-References....2011

References....2011

PRNG....2011

Probabilistic Key Sharing....2011

Synonyms....2011

Definition....2011

Background....2011

Theory....2012

Security Improvements....2012

Attacker Model....2013

Applications....2013

Open Problems and Future Directions....2013

References....2014

Probabilistic Primality Test....2014

Synonyms....2014

Definition....2015

Theory....2015

Cross-References....2015

Probabilistic Public-Key Encryption....2015

Definition....2015

Background....2015

Theory....2015

Cross-References....2015

Recommended Reading....2015

Probabilistic Query Integrity....2015

Definitions....2015

Background....2016

Theory and Application....2016

Open Problems and Future Directions....2018

Cross-References....2018

References....2018

Probing Model....2018

Synonyms....2018

Definitions....2018

Background....2018

Theory....2019

Composition....2019

Real-World Leakage....2019

Open Problems and Future Directions....2019

References....2020

Product Cipher, Superencryption....2020

Definition....2020

Theory....2020

Applications....2021

Cross-References....2021

Recommended Reading....2021

Profiling....2021

Program Verification and Security....2021

Synonyms....2021

Definition....2021

Background....2021

Applications and Experiments....2022

Open Problems and Future Directions....2023

Cross-References....2023

References....2023

Project Athena....2024

Proof of Knowledge Versus Proof of Membership....2024

Cross-References....2024

References....2024

Proof of Stake....2024

Definition....2024

Background....2025

Theory....2025

Nakamoto-Style PoS....2026

PoS via Iterated Byzantine Agreement....2026

Cross-References....2027

References....2027

Proof of Work....2027

Synonyms....2027

Definition....2027

Theory....2027

Applications....2028

Open Problems and Future Directions....2028

Cross-References....2028

References....2029

Proof-Carrying Code....2029

Definition....2029

Background....2029

Theory and Applications....2030

Experimental Results....2031

Recommended Reading....2031

Proofs of Proof-of-Work....2032

Definition....2032

Background....2032

Theory....2033

Application....2034

Open Problems and Future Directions....2034

Cross-References....2034

References....2034

Propagation Characteristics of Boolean Functions....2035

Definition....2035

Background....2035

Theory....2035

Cross-References....2035

Recommended Reading....2036

Protection Rings....2036

Definition....2036

Background....2036

Theory....2036

Applications....2037

Challenges....2038

References....2038

Protocol....2038

Synonyms....2038

Definition....2038

References....2039

Protocol Cookies....2039

Synonyms....2039

Definition....2039

Background....2039

Application and Theory....2039

Cross-References....2040

Recommended Reading....2040

-Protocols....2040

Definition....2040

Background....2040

Theory....2041

Applications....2042

Cross-References....2042

Recommended Reading....2042

Proximity Card....2042

Definition....2042

Background....2042

Applications....2043

Cross-References....2043

Recommended Reading....2043

Proxy Re-encryption....2043

Definition....2043

Bilinear Groups....2043

Strong One-Time Signature....2043

Background....2044

Multi-hop Bidirectional PRE....2044

Single-Hop Unidirectional PRE....2045

More on Proxy Re-encryption....2047

Open Problems and Future Directions....2047

References....2047

PSC....2048

Pseudo-Mersenne Prime....2048

Definition....2048

Applications....2048

Recommended Reading....2048

Pseudo-Noise Sequences (PN-Sequences)....2048

Definition....2048

Cross-References....2049

Recommended Reading....2049

Pseudonym....2049

Pseudonymity....2049

Pseudonymity in OSNs....2049

Pseudonymization (Accordingto GDPR)....2049

Definition....2049

Background....2049

Theory....2050

Open Problems and Future Directions....2051

Cross-References....2052

References....2052

Pseudonyms....2052

Synonyms....2052

Definition....2052

Background....2053

Theory....2053

Applications....2054

Cross-References....2054

References....2054

Pseudonyms for Mobile Networks....2054

Synonyms....2054

Definitions....2055

Background....2055

Theory....2055

Open Challenges....2056

Cross-References....2056

References....2057

Pseudoprime....2057

Definition....2057

Applications....2057

Cross-References....2057

Pseudorandom Function....2057

Definition....2057

Theory....2057

Applications....2058

Cross-References....2058

Recommended Reading....2058

Pseudorandom Number Generator....2058

Synonyms....2058

Definition....2058

Background....2058

Theory....2059

Applications....2059

PRNG Structure....2059

PRNG Examples....2059

PRNG Initialization....2059

Experimental Results....2060

Open Problems....2060

Cross-References....2060

Recommended Reading....2060

Psychology of Cybercrime....2060

Synonyms....2060

Definition....2060

Background....2061

Theory and Application....2061

The Online Offender....2061

The Online Victim....2063

Open Problems and Future Directions....2063

Cross-References....2064

References....2064

Public Exponent....2064

Public Key Cryptography....2064

Definition....2064

Background....2064

Theory....2065

Cross-References....2065

Recommended Reading....2065

Public Key Encryption....2065

Public Key Infrastructure....2066

Public Key Proxy Encryption....2066

Definition....2066

Theory....2066

Applications....2068

Cross-References....2068

Recommended Reading....2068

Public Key Proxy Signatures....2068

Definition....2068

Theory....2068

Applications....2070

Cross-References....2070

Recommended Reading....2070

Public-Key Authenticated Encryption....2070

Public-Key Cryptosystem....2070

Public-Key Searchable Encryption Models....2070

Publicly Verifiable Proof-of-Sequential Work....2070

PUF....2071

Pufferfish....2071

Pufferfish Privacy....2071

Synonyms....2071

Definitions....2071

Background....2071

Theory and Application....2071

Open Problems and Future Directions....2072

Cross-References....2072

References....2072

Q....2073

QRP....2073

Quadratic Residue....2073

Definition....2073

Theory....2073

Open Problems....2073

Cross-References....2073

Quadratic Residuosity Problem....2073

Synonyms....2073

Definition....2074

Theory....2074

Applications....2074

Cross-References....2074

Recommended Reading....2074

Quadratic Sieve....2074

Definition....2074

Background....2074

Theory....2074

Generation of Relations....2075

Computation of Polynomial Coefficients....2075

Optimization and Parameter Selection....2075

Cross-References....2076

Recommended Reading....2076

Quality Measures....2077

Quantum Cryptography....2077

Definition....2077

Background....2077

Theory....2077

The Various Uses of Quantum Physics for Cryptography....2077

Quantum Key Distribution....2078

Alternative Quantum Key Distribution Protocols and Implementations....2079

Cryptography on Quantum Data....2080

Recommended Reading....2080

Quantum-Safe Identity and Attribute Based Encryption....2082

Quasi-Identifier....2082

Definition....2082

Background....2082

Theory....2083

Application....2084

Experimental results....2084

Cross-References....2084

References....2084

Queries over Encrypted Relational DBMS....2084

Query Integrity....2085

Definitions....2085

Background....2085

Theory and Application....2085

Open Problems and Future Directions....2086

Cross-References....2086

References....2086

Query Processing on Encrypted Relational Databases....2086

R....2087

Rabin Cryptosystem....2087

Definition....2087

Background....2087

Theory....2087

The Rabin Primitive....2088

Cross-References....2088

Recommended Reading....2088

Rabin Digital Signature Scheme....2088

Background....2088

Theory....2088

Cross-References....2089

Recommended Reading....2089

Radio Fingerprinting....2090

Radio Frequency Attacks....2090

Definition....2090

Background....2090

Theory....2090

Principles and Description....2091

ElectroMagnetic Pulse....2092

Coupling....2092

Damage....2093

Energy....2093

Nonnuclear Techniques....2093

Protection and Countermeasures....2094

Targets and Properties....2095

Properties....2095

Further Reading....2095

Conclusions....2096

Recommended Reading....2097

Radio Interference Attack Defense....2097

Radio-Frequency (RF) Fingerprinting....2098

Radiometric Identification....2098

Radiometrics....2098

Rainbow Tables....2098

Definition....2098

Theory....2098

Cross-References....2099

Recommended Reading....2099

Random Bit Generator....2099

Definition....2099

Background....2099

Theory....2099

Raw Random Bit Sources....2099

SW-Based Generators....2100

HW-Based Generators....2100

Randomness Sources in HW-Based Generators....2100

Post-Processing....2102

Recommended Reading....2103

Random Key Predistribution....2104

Random Number Testing....2104

Definition....2104

Background....2104

Theory/Application....2104

The Monobit or Frequency Test for Entire Sequence....2105

The Runs Test for the Entire Sequence....2105

Test for the Longest-Run-of-Ones in a Block....2105

Frequency Test Within a Block....2105

Open Problems....2105

Cross-References....2105

References....2105

Random Oracle Model....2105

Definition....2105

Theory....2106

Cross-References....2106

Recommended Reading....2106

Randomised Agreement....2107

Range Queries over Encrypted Data....2107

Synonyms....2107

Definitions....2107

Background....2107

Theory....2108

Open Problems and Future Directions....2109

Cross-References....2109

References....2109

Range-Searchable Encryption....2109

Rank Codes....2110

Synonyms....2110

Definition....2110

Background....2110

Theory....2110

Delsarte's Optimal Rank Codes in Matrix Representation....2111

Optimal Rank Codes in Vector Representation....2111

Correcting Rank Errors and Rank Erasures....2112

Open Problems....2112

Cross-References....2112

Recommended Reading....2113

Rank Estimation....2113

Synonyms....2113

Definitions....2113

Background....2113

Application....2114

Open Problems and Future Directions....2114

Cross-References....2114

References....2115

Ranked Search on Encrypted Data....2115

Synonyms....2115

Definitions....2115

Historical Background....2115

General Framework of Ranked Search Over Encrypted Data....2116

Challenges and Future Directions....2117

Key Application....2118

Cross-References....2118

References....2118

Ranking Queries on Encrypted Data....2118

Rank-Metric Codes....2118

Ransomware....2118

Synonyms....2118

Definitions....2118

Background....2119

Application....2119

Open Problems and Future Directions....2120

Cross-References....2120

References....2120

RBAC....2120

RC4....2120

Definition....2120

Background....2121

Theory....2121

Applications....2121

Cross-References....2122

Recommended Reading....2122

RC5....2122

Synonyms....2122

Definition....2122

Background....2123

Theory....2123

Applications....2123

Cross-References....2123

Recommended Reading....2123

RC6....2124

Synonyms....2124

Definition....2124

Background....2124

Theory....2124

Applications....2124

Cross-References....2125

Recommended Reading....2125

Reactive Security....2125

Recipient Anonymity....2125

Definition....2125

Theory....2125

Applications....2127

Open Problems and Future Directions....2127

Cross-References....2128

References....2128

Recognition....2128

Record Linkage....2128

Recursive Revoke....2128

Synonyms....2128

Definition....2128

Theory....2128

Historical Notes....2129

Cross-References....2131

References....2131

Redundancy-Based Countermeasures....2131

Reed–Muller Codes....2131

Synonyms....2131

Definition....2131

Background....2131

Theory....2131

Cross-References....2132

Recommended Reading....2132

Reference Monitor....2133

Definition....2133

Background....2133

Theory....2133

Applications....2134

Open Problems....2134

Cross-References....2135

Recommended Reading....2135

Reflection DoS Attacks....2136

Regulation (EU) 2022/868....2136

Regulation (EU) 2023/2854....2136

Regulation EU 2016/679....2136

Re-identification and Automatic Update for Biometrics....2136

Synonyms....2136

Summary....2136

Definitions....2136

Background....2136

Application....2137

Open Problems and Future Directions....2137

References....2137

Related (not identical) to Doubly Efficient Private Information Retrieval (DEPIR)....2138

Related Key Attack....2138

Definition....2138

Background....2138

Theory....2138

Applications....2138

Cross-References....2138

Recommended Reading....2139

Relationship Anonymity....2139

Relationship on OSNs....2139

Relatively Prime....2139

Synonyms....2139

Definition....2139

Cross-References....2139

Remote Attestation....2139

Remote Attestation in IoT Devices....2139

Definition....2139

Background....2140

Theory....2141

Open Problems and Future Directions....2142

Cross-References....2142

References....2142

Remote Face Recognition....2143

Synonyms....2143

Definitions....2143

Background....2143

Theory....2143

Low Resolution....2143

Blur....2144

Atmospheric Turbulence....2144

Application....2144

Summary....2145

Open Problems and Future Directions....2146

References....2146

Remote Updates....2146

Replay Attack....2147

Synonyms....2147

Definition....2147

Application....2147

Open Problems and Future Directions....2147

Cross-References....2147

References....2147

Residue Arithmetic....2147

Resilience Expenditure....2147

Resilience in Cyber Physical Systems....2147

Resilience in Cyber-Physical Systems....2148

Synonyms....2148

Definition....2148

Background....2148

Theory and Application....2148

Open Problems and Future Directions....2148

Cross-References....2149

References....2149

Resilient Control Systems....2150

Resilient Embedded and Smart Systems....2150

Resistance to the Standard Algebraic Attack....2150

Response....2150

Definition....2150

Cross-References....2150

Response and Reconfiguration Under Attacks in CPS....2150

Synonyms....2150

Definitions....2150

Background ....2150

Attack Detection and the Missing Link to Attack Response....2152

Response and Reconfiguration Under Attacks in CPS....2152

Conclusions....2154

References....2154

Resynchronization Attack....2155

Definition....2155

Applications....2156

Cross-References....2156

Recommended Reading....2156

Retina Recognition....2156

Reverse Engineering of Malware Emulators....2156

Synonyms....2156

Definition....2156

Background....2156

Applications....2156

Open Problems....2157

Recommended Reading....2157

Reverse Public Key Encryption....2157

Definition....2157

Recommended Reading....2157

RFID Security....2158

Synonyms....2158

Definition....2158

Background....2158

Theory....2158

Impersonation....2158

Privacy....2158

Denial of Service....2159

Open Problems and Future Directions....2159

Cross-References....2159

References....2159

Right-to-Left Exponentiation....2159

Definition....2159

Background....2159

Theory....2160

Cross-References....2160

Recommended Reading....2160

Rijndael....2160

Synonyms....2160

Definition....2160

Background....2160

Theory....2160

Structure....2161

The Round Transformation....2161

Key Schedule....2163

Security....2163

Applications....2164

Cross-References....2164

Recommended Reading....2164

Ring....2164

Definition....2164

Theory....2164

Applications....2165

Cross-References....2165

Ring Signatures....2165

RIPEMD Family....2165

Cross-References....2168

Recommended Reading....2168

Risk Communication....2169

Synonyms....2169

Definition....2169

Background....2169

Theory and Application....2170

Open Problems and Future Directions....2171

Cross-References....2171

References....2171

Risk Mitigation....2171

Risk Perception....2171

Risk Prediction....2171

Risk Reduction....2172

Risk Response....2172

Rivest Cipher 5....2172

Rivest Cipher 6....2172

Robust Machine Learning....2172

Robust Private Information Retrieval....2172

Definitions....2172

Theory....2172

References....2174

Role-Based Access Control....2174

Synonyms....2174

Definition....2174

Background....2174

Theory....2175

Applications....2176

Experimental Results....2176

Open Problems and Future Directions....2176

Cross-References....2177

Recommended Reading....2177

Roles in SQL....2177

Synonyms....2177

Definition....2177

Background....2177

Application....2177

Open Problems and Future Directions....2178

Cross-References....2179

References....2179

Rons Code 5....2180

Rons Code 6....2180

Root Cause Analysis....2180

Synonyms....2180

Definition....2180

Theory....2180

Five Why's Technique....2181

Fishbone Diagram....2182

Causal Factors Analysis....2182

Open Problems and Future Directions....2183

Root of Trust....2183

Synonyms....2183

Definition....2183

Background....2183

Hardware Root of Trust....2184

Attributes of a TPM Root of Trust....2184

Attributes of a Secure Processor Root of Trust....2185

Current Research in Secure Processing....2185

Open Problems....2185

Cross-References....2186

Recommended Reading....2186

Rootkits....2186

Synonyms....2186

Definition....2186

Background....2186

Applications....2187

Cross-References....2187

References....2187

RSA Digital Signature Scheme....2187

Definition....2187

Theory....2187

Applications....2190

Cross-References....2191

Recommended Reading....2191

RSA Factoring Challenge....2192

Definition....2192

Background....2192

Applications....2193

Cross-References....2193

Recommended Reading....2193

RSA Problem....2194

Definition....2194

Theory....2194

Relationship to Integer Factoring....2194

Recovering the Private Key....2195

Self-Reducibility....2195

Low Public-Exponent RSA....2195

Strong RSA Assumption....2196

Bit-Security of RSA Encryption....2196

Chosen Ciphertext Attacks....2196

Conclusions....2197

Applications....2197

Open Problems....2197

Cross-References....2197

Recommended Reading....2197

RSA Public-Key Encryption....2198

Definition....2198

Theory....2199

One-Way Permutations....2199

Number Theory....2199

Modular Powers and Roots....2200

The RSA Primitive....2201

The RSA Problem....2201

The Plain RSA Cryptosystem....2201

Security Weaknesses....2201

Multicast Encryption....2201

Small Exponents....2202

Applications....2202

Cross-References....2202

Recommended Reading....2202

RTL Security Verification....2203

Run....2203

Definition....2203

Applications....2203

Cross-References....2203

Recommended Reading....2203

Running-Key....2203

Synonyms....2203

Definition....2203

Cross-References....2203

Runtime Analysis....2203

Run-Time Malware Analysis....2203

S....2204

Safety in Cyber-Physical Systems....2204

Synonyms....2204

Definition....2204

Theory and Applications....2204

Open Problems and Future Directions....2205

Cross-References....2205

References....2206

Salt....2206

Related Concepts....2206

Definition....2206

Applications....2206

Cross-References....2207

References....2207

Sandbox....2207

Definition....2207

Background....2207

Theory....2209

Applications....2210

Open Problems....2211

Cross-References....2211

References....2211

SCADA System....2211

Schemes Based on Rank Codes....2212

Synonyms....2212

Definition....2212

Background....2212

Theory....2212

Optimal Linear Rank Codes....2212

Parallel Channels and Correcting Random Rank Errors and Rank Erasures....2213

Rank Codes as Space-Time Codes....2214

Rank Codes in Network Coding....2214

Public Key Cryptosystems Based on Rank Codes....2215

Open Problems....2215

Recommended Reading....2215

Schnorr Digital Signature Scheme....2216

Background....2216

Theory....2216

Cross-References....2217

Recommended Reading....2217

Schnorr Identification Protocol....2217

Definition....2217

Background....2217

Theory....2217

Applications....2218

Cross-References....2218

References....2218

Sclera Recognition....2218

Score Calibration....2218

Score Normalization....2218

Synonyms....2218

Definitions....2218

Theory....2219

Statistics-based score normalization procedures....2219

Min-max normalization....2219

Z-score normalization....2219

Median-MAD normalization....2219

Generalized logit transform....2220

Class-aware score normalization....2220

F-norm....2220

Tanh-approximator....2220

Score normalization based on the Bayes theorem....2221

The log-likelihood ratio approach....2221

Logistic regression....2221

Logistic regression as a linear approximation to LLR....2221

Double sigmoid function....2221

Open problems....2221

Summary....2222

References....2222

Screaming Channels....2223

Definitions....2223

Background....2223

Radio Transmitters....2223

Mixed-Signal Chips....2223

Theory and Application....2223

A Side Channel over Radio....2223

Overview....2223

Root Problem....2223

Characteristics....2224

Attack....2224

Large Distance....2224

Realistic Target....2224

Future Directions....2225

Attacks....2225

Hardware Encryption....2225

Other Radio Protocols....2225

Defenses....2225

Software....2225

Hardware....2225

Cross-References....2225

References....2225

Script Language Security....2226

Synonyms....2226

Definition....2226

Background....2226

Theory....2226

Browsers Security Measures....2227

Open Problems....2227

Cross-References....2228

References....2228

SEAL....2228

Synonyms....2228

Definition....2228

Background....2228

Applications....2228

Cross-References....2229

Recommended Reading....2229

Sealed Storage....2229

Definition....2229

Sealed Storage in the TPM....2229

Applications....2230

Open Problems....2230

Cross-References....2230

Recommended Reading....2230

Search on Encrypted Multi-writer Tables....2231

Definition....2231

Background....2231

Theory....2231

Applications....2232

Open Problems....2233

Cross-References....2233

References....2233

Search over Ciphertext Datasets Using Partition Computation....2234

Definitions....2234

Background....2234

Theory....2234

Partitioned Computations....2235

Inference Attack in Partitioned Computations....2236

Partitioned Data Security at the Public Cloud....2237

Query Binning....2237

Open Problems....2239

Cross-References....2239

References....2239

Search over Encrypted Data....2239

Definitions....2239

Background ....2239

Theory....2240

Keyword Search over Encrypted Documents....2240

Range Queries over Encrypted Data....2241

Bucketization for Relational Queries....2242

Search Using Secure Hardware....2243

Open Problems....2243

Cross-References....2244

References....2244

Search over Secret-Shared Datasets....2244

Definitions....2244

Background....2244

Theory....2245

String-Matching Using Accumulating Automata....2245

Open Problems and Future Directions....2247

Cross-References....2247

References....2247

Searchable Attribute-Based Encryption....2248

Searchable Encryption....2248

Searchable Encryption with Fine-Grained Access Control....2248

Searchable Symmetric Encryption....2248

Synonyms....2248

Definition....2248

Background....2248

Theory....2248

Open Problems....2250

Cross-References....2250

References....2251

Searchable Symmetric Encryption on Trusted Execution Environments....2251

Synonyms....2251

Definitions....2251

Background....2251

Searchable Symmetric Encryption....2251

Trusted Execution Environments in Encrypted Search....2251

Theory....2251

Attacks on Trusted Hardware....2253

Open Problems and Future Directions....2253

Cross-References....2253

References....2253

Second Preimage Resistance....2254

Synonyms....2254

Definition....2255

Background....2255

Theory....2255

Cross-References....2255

References....2255

Secondary Use Regulations....2255

Definition....2255

Background....2256

Theory and Applications....2256

Secondary Purpose....2256

Secondary Disclosure....2257

Cross-References....2257

Recommended Reading....2257

Secret Key Agreement....2257

Secret Key Cryptosystem....2257

Secret Key Establishment....2257

Secret Key Generation in Sensor Networks....2258

Synonyms....2258

Definitions....2258

Background....2258

Theory....2258

The Process of Secret Key Generation....2258

Application....2259

Radio Signals....2259

Audio Signals....2259

Movements....2259

Human Biometrics....2260

Others....2260

Open Problems and Future Directions....2260

Cross-References....2260

References....2260

Secret Sharing....2261

Secret Sharing and Shamir Threshold Scheme....2261

Background....2261

Definition....2261

Theory....2261

Shamir's Secret Sharing....2262

The Scheme....2262

Security....2262

Properties of Shamir's Scheme....2262

General Adversary Case....2262

Ideal Secret Sharing and Size of Shares....2263

Enhanced Properties....2264

Dealing with Active Adversaries....2264

Dynamic Aspects....2264

Variants....2264

Cross-References....2264

References....2265

Secret Vaulting....2265

Secure and Privacy-Preserving Machine Learning....2266

Synonyms....2266

Definition....2266

Background....2266

Theory....2266

Open Problems and Future Directions....2267

Cross-References....2267

References....2267

Secure and Private Communication....2267

Secure Audit Logs....2267

Synonyms....2267

Definition....2267

Background....2268

Theory....2268

Cross-References....2269

References....2269

Secure Cloud Data Utilization....2270

Secure Code Updates....2270

Secure Communication....2270

Secure Communication Bootstrapping....2270

Secure Computation....2270

Secure Computation of Differentially Private Mechanisms....2270

Synonyms....2270

Definition....2270

Background....2270

Theory....2270

Models....2271

Distributed Noise Generation....2271

Applications....2272

Open Problems and Future Directions....2273

Cross-References....2273

References....2273

Secure Computer System Model....2273

Secure Configuration Management....2273

Secure Coprocessor....2274

Synonyms....2274

Definition....2274

Background....2274

Theory and Applications....2274

Cross-References....2275

Recommended Reading....2275

Secure Data Aggregation....2275

Definition....2275

Background....2275

Theory and Applications....2276

Open Problems....2277

Recommended Reading....2277

Secure Data Deduplication....2277

Secure Data Deduplication Schemes....2278

Synonyms....2278

Definitions....2278

Background ....2278

Theory....2278

Open Problems and Future Directions....2279

Cross-References....2279

References....2280

Secure Data Outsourcing....2280

Synonyms....2280

Definition....2281

Background....2281

Query Correctness....2281

Verifiable Computation....2281

Data Confidentiality....2281

Searching on Encrypted Data....2281

Encrypted Databases....2281

Data Access Privacy....2281

Private Information Retrieval....2281

Oblivious RAM....2281

Theory & Applications....2282

Query Correctness....2282

Verifiable Computation....2282

Data Confidentiality....2282

Data Access Privacy....2282

Open Problems and Future Directions....2282

Cross-References....2282

References....2283

Secure Deduplication....2283

Secure Deletion....2283

Secure Device Pairing....2283

Synonyms....2283

Definitions....2283

Background ....2283

Theory....2284

General Procedure and System Model....2284

Terminology....2285

Threat Models....2285

Device Pairing Methods....2286

Cryptographic Protocols....2286

Pairwise Device Pairing....2286

Extension to a Group of Devices....2287

Applications....2287

Open Problems and Future Directions....2288

Cross-References....2289

References....2289

Secure Element....2289

Definition....2289

Background....2290

Applications....2290

Open Problems and Future Directions....2290

Cross-References....2290

Recommended Reading....2290

Secure Email....2290

Secure Erasure....2290

Secure Firmware Updates....2291

Secure First Connect....2291

Secure Function Evaluation....2291

Secure Hash Algorithm....2291

Secure Index....2291

Synonyms....2291

Definition....2291

Background....2291

Theory....2293

Cross-References....2294

References....2294

Secure Joins....2294

Secure Logging....2294

Secure Machine Learning....2294

Secure Multiparty Computation....2295

Secure Multi-party Computation....2295

Secure Multi-party Computation of Differentially Private Mechanisms....2295

Secure Network Coding for Wireless Mesh Networks....2295

Synonyms....2295

Definitions....2295

Background....2295

Theory....2296

Attacks Against Network Coding....2296

Defenses....2298

Cross-References....2299

References....2299

Secure Networks Design....2300

Secure Routing in Wireless Mesh Networks....2300

Synonyms....2300

Definitions....2300

Background....2300

Theory....2301

Attacks Against Routing....2301

Defenses....2302

Applications....2304

References....2304

Secure Shell....2305

Secure Signatures from the “Strong RSA” Assumption....2305

Background....2305

Theory....2305

Cross-References....2307

References....2307

Secure Socket Layer (SSL)....2307

Synonyms....2307

Definition....2307

Background....2307

History....2307

Theory....2308

Layer Structure....2308

Basic Protocol Sequence....2308

Server Authentication....2309

Client Authentication....2310

Ephemeral Diffie–Hellman Key Agreement....2310

Protocol Resumption....2310

Additional Information....2310

Security Analysis....2310

Cross-References....2311

References....2311

Secure Software Dissemination....2312

Secure Software Updates in IoT Devices....2312

Synonyms....2312

Definition....2312

Background....2312

Theory....2313

Security Properties....2314

Open Problems and Future Directions....2315

Cross-References....2315

References....2315

Secure Time Synchronization....2315

Definition....2315

Background....2315

Theory....2316

Applications....2316

Open Problems....2317

Cross-References....2317

Recommended Reading....2317

Secure Vehicular Communication Systems....2317

Synonyms....2317

Definition....2317

Background....2317

Theory and Applications....2318

Security and Privacy Architecture for VC Systems....2319

Open Problems and Future Directions....2320

Cross-References....2321

References....2321

Secure Wireless Mesh Networks....2322

Secure Wireless Multicast....2322

Security....2322

Security Analytics....2322

Synonyms....2322

Definition....2323

Background....2323

Theory OR Application OR Both....2323

Open Problems and Future Directions....2324

Cross-References....2324

References....2324

Security and Device Aging....2325

Definitions....2325

Background....2325

Aging-Induced Security Concerns....2325

Device Aging in Cryptographic Cores....2327

Open Problems and Future Directions....2328

Cross-References....2328

References....2328

Security and Privacy Aspects in the Dedicated Short-Range Communications (DSRC) Protocol....2328

Synonyms....2328

Definitions....2329

Background....2329

Theory....2329

Open Problems and Future Directions ....2330

References....2330

Security Architecture....2330

Definition....2330

Theory....2330

Applications....2330

Recommended Reading....2331

Security Awareness....2331

Security Budget....2331

Security Capability Maturity Model....2331

Synonyms....2331

Definition....2331

Background....2331

Theory and Application....2332

Open Problems and Future Directions....2333

Cross-References....2333

References....2334

Security Compliance....2334

Security Controls....2334

Security Culture....2334

Security Evaluation Criteria....2334

Definition....2334

Background....2334

Theory/Applications....2335

Cross-References....2336

References....2336

Security Evaluation Tool....2336

Security Fatigue....2336

Synonyms....2336

Definition....2336

Background....2336

Theory and Application....2336

Causes of Fatigue....2337

Assessing Fatigue....2338

Open Problems and Future Directions....2339

Cross-References....2339

References....2339

Security for Mashups....2340

Definition....2340

Background....2340

Theory....2341

Open Problems....2341

Cross-References....2342

Recommended Reading....2342

Security if Web Browser Scripting Languages....2342

Security Implication in Virtualization....2342

Synonyms....2342

Definition....2343

Background....2343

What Is Virtualization?....2343

Virtualization Types....2343

Virtualization Benefits....2343

Virtualization Security Risks....2344

Theory....2344

Operating System-Based Virtualization Methods....2344

Workload Isolation....2344

Workload Consolidation....2345

Workload Migration....2345

Hardware-Based Virtualization....2345

Performance Comparisons....2345

System Architectures for Virtualization....2345

Virtualization Security Overview....2346

Guest OS Isolation....2346

Guest OS Monitoring....2347

Image and Snapshot Management....2347

Access Control Policy-Based Virtualization Security....2347

Trusted Platform Module-Based Virtualization Security....2347

Applications....2347

Overview....2347

Hypervisor Architecture....2348

Secure Hypervisor (sHype) Example....2349

Commercially Available Products....2349

Virtualization Security Tools....2349

Open Problems and Future Directions....2349

Virtualization Security Problems....2351

Future Directions for Virtualization-Based Security....2351

Conclusion....2352

Acronyms and Abbreviations....2352

Cross-References....2352

References....2352

Security Information and Event Management (SIEM)....2353

Synonyms....2353

Definition....2353

Background....2354

Theory and Applications....2354

Open Problems and Future Directions....2355

Cross-References....2355

References....2355

Security Information Event Management (SIEM)....2355

Security Information Sharing....2355

Security Investment....2356

Synonyms....2356

Definitions....2356

Theory....2356

Open Problems and Future Directions....2358

Cross-References....2359

References....2359

Security Investment, Interdependence, Attacking, and Information Sharing....2359

Synonyms....2359

Definition....2359

Background....2359

Introduction....2360

Security Investment....2360

Income Effect....2360

Interdependence....2360

Substitution Effect....2360

Information Sharing....2361

Results....2361

Future Research....2361

References....2361

Security Motivation....2362

Security Nudges....2362

Synonyms....2362

Definition....2362

Background....2362

Theory and Application....2363

Synchronous and Asynchronous Strength Indicators....2363

Password Policy Alignment....2364

Presentation....2364

Evaluating the Effectiveness of Nudges....2365

Moving Image Strength Indicator in the Context of Nudges....2365

Cross-References....2366

References....2366

Security of Cognitive Radios....2367

Definition....2367

Background....2367

Applications....2367

Recommended Reading....2368

Security of Contactless Integrated Circuits....2369

Security of Contactless Microcircuits....2369

Security of Contactless Smartcards....2369

Security of Distance Bounding Protocols....2369

Definition....2369

Background....2369

Theory....2369

Recommended Reading....2370

Security of Group Communication in Wireless Mesh Networks....2370

Synonyms....2370

Definitions....2370

Background....2370

Theory....2371

Approaches to Secure Group Communication....2372

Secure Group Overlay-Based Group Communication in WMNs....2373

Applications....2374

References....2374

Security of Radio Frequency Identification....2375

Security of Wireless Mesh Networks (General Overview)....2375

Synonyms....2375

Definitions....2375

Background....2375

Theory....2377

Applications....2379

Cross-References....2379

References....2379

Security Operations Center (SOC)....2380

Definition....2380

Background....2381

Theory and Applications....2381

Open Problems and Future Directions....2382

Cross-References....2382

References....2382

Security Reduction....2382

Definition....2382

Background....2382

Theory....2383

Applications....2384

Recommended Reading....2384

Security Reputation Metrics....2384

Definitions....2384

Background....2384

Application....2385

Hosting Providers....2385

Top-Level Domains....2386

Internet Service Providers....2387

Open Problems and Future Directions....2387

References....2388

Security Risk Assessment for Cyber-Physical Systems....2389

Definition....2389

Background....2389

Theory and Application....2389

Open Problems and Future Directions....2391

Cross-References....2391

References....2391

Security Standards Activities....2392

Definition....2392

Background....2392

Activities....2392

X.509....2392

PKIX....2393

LDAP....2394

S/MIME....2394

LAMPS....2395

JOSE....2395

COSE....2396

IPsec....2396

IPsecME....2396

TLS....2396

Secure Shell....2397

AAA....2397

OpenPGP....2397

XML Security....2398

IEEE P802....2398

ANSI X9F....2398

FIPS....2399

Influential Activities....2399

US FPKI....2399

References....2399

Security Testbed....2401

Security Token....2401

Security Validation....2401

Security Verification....2401

Security Verification of System-on-Chips (SoCs)....2401

Synonyms....2401

Background....2401

State of the Art....2402

Information Flow Tracking....2402

Theorem Proving....2402

Secure HDL....2402

Assertion-Based Verification....2402

Symbolic Testing....2402

Open Problems and Future Directions....2402

References....2403

Security Visualization....2403

Segregation of Duties....2403

Selective Forgery of Digital Signatures....2404

Definition....2404

Recommended Reading....2404

Self-Defense....2404

Selfie Biometrics....2404

Definitions....2404

Background....2404

Application....2406

Open Problems and Future Directions....2406

Open-set liveness/spoof detection....2406

On-device computation....2406

Fairness analysis....2406

Summary....2407

References....2407

Self-Shrinking Generator....2407

Definition....2407

Background....2407

Example....2407

Theory....2408

Cross-References....2408

Recommended Reading....2408

Self-Sovereign Identity....2408

Definitions....2408

Theory and Applications....2408

Open Problems and Future Directions....2410

Cross-References....2410

References....2410

Self-Synchronizing Stream Cipher....2410

Synonyms....2410

Definition....2410

Background....2411

Example....2411

Theory....2411

Applications....2411

Cross-References....2412

Recommended Reading....2412

Semantic Security....2412

Synonyms....2412

Definition....2412

Theory....2412

Cross-References....2413

Recommended Reading....2413

Sender Anonymity....2413

Synonyms....2413

Definitions....2413

Background ....2413

Theory/Application/Both ....2413

Open Problems and Future Directions....2413

Cross-References....2414

References....2414

Sensitive Privacy: Data Privacy for Analyzing Anomalies....2414

Synonyms....2414

Definitions....2415

Background....2415

Theory & Concepts....2415

How to Achieve Sensitive Privacy....2416

Cross-References....2416

References....2416

Sensor Key Establishment and Maintenance....2417

Sensor Key Management....2417

Synonyms....2417

Definition....2417

Background....2417

Theory....2417

Open Problems....2419

Cross-References....2419

Recommended Reading....2419

SEPA....2419

Synonyms....2419

Definition....2420

Background....2420

Applications....2420

Recommended Reading....2420

Separation of Duties....2420

Synonyms....2420

Definition....2421

Background....2421

Applications....2423

Strong Exclusion (Static Separation of Duty)....2423

Weak Exclusion (Dynamic Separation of Duty)....2423

Open Problems....2424

Experimental Results....2424

Cross-References....2424

Recommended Reading....2424

Sequences....2425

Definition....2425

Theory....2425

Applications....2429

Cross-References....2429

Recommended Reading....2429

Sequential and Combinational Satisfiability Attacks....2429

Synonyms....2429

Definition....2430

Background....2430

Theory and Application....2430

Open Problems and Future Directions....2433

Cross-References....2434

References....2434

SERPENT....2434

Cross-References....2435

Recommended Reading....2435

Session Hijacking Attacks....2435

Definition....2435

Background....2435

Theory....2436

Open Problems....2436

Cross-References....2436

Recommended Reading....2436

SFA....2437

SHA....2437

SHA-0, SHA-1, SHA-2 (Secure Hash Algorithm)....2437

Synonyms....2437

Definition....2437

Background....2437

Theory....2437

Padding....2438

SHA-1 Compression Function....2438

SHA-0....2438

SHA-256 and SHA-512 Compression Functions....2439

SHA-224....2439

SHA-384....2439

Applications....2439

Security Considerations....2440

Open Problems....2440

Cross-References....2441

References....2441

Shamirs Trick....2441

Shannons Maxim....2441

Shannon's Model....2441

Synonyms....2441

Definition....2441

Background....2442

Theory....2442

Applications....2443

Cross-References....2443

Recommended Reading....2443

Sharding....2443

Synonyms....2443

Definitions....2443

Background....2443

Theory....2444

Multiconsensus Architecture....2444

Uniconsensus Architecture....2445

Cross-Shard Transactions....2446

Open Problems and Future Directions....2447

Cross-References....2447

References....2447

Shortest Vector Problem....2448

Definition....2448

Background....2448

Theory....2448

Applications....2449

Open Problems....2449

Cross-References....2449

Recommended Reading....2449

Short-Term Credential....2450

Shrinking Generator....2450

Definition....2450

Example....2450

Theory....2450

Cross-References....2451

Recommended Reading....2451

Shuffle Index....2451

Definition....2451

Background....2452

Theory....2452

Open Problems....2455

Cross-References....2455

References....2455

Sidechains....2455

Synonyms....2455

Definition....2455

Background....2455

Theory....2456

Security of Sidechains....2456

Firewall Property....2456

Cross-Chain Communication....2456

Types of Cross-Chain Communication....2456

Techniques for Cross-Chain Communication....2457

Application....2457

Open Problems and Future Directions....2457

Cross-References....2458

References....2458

Side-Channel Attacks....2458

Synonyms....2458

Definitions....2458

Background....2458

Application....2458

Mitigation....2459

Open Problems....2460

Cross-References....2460

References....2460

Side-Channel Attacks and Countermeasures....2461

Side-Channel Leakage....2461

Side-Channel Security Evaluation Tool....2461

SIDH....2461

SIEM System....2461

SIEM: Security Information and Event Management....2462

Sieving....2462

Definition....2462

Theory....2462

Applications....2462

Cross-References....2462

Sieving in Function Fields....2462

Definition....2462

Applications....2463

Cross-References....2464

Recommended Reading....2464

Signature Biometrics....2464

Synonyms....2464

Definitions....2464

Background....2464

Theory....2465

Applications....2466

Open Problems and Future Directions....2467

Cross-References....2467

References....2467

Signcryption....2468

Synonyms....2468

Definition....2468

Background....2468

Theory....2469

Defining Signcryption....2469

Security of Signcryption....2469

Supporting Long Inputs....2470

Generic Composition Schemes....2471

Schemes from Trapdoor Permutations....2471

Schemes based on Gap Diffie–Hellman....2473

Applications....2473

Cross-References....2474

Recommended Reading....2474

Signed Digit Exponentiation....2474

Synonyms....2474

Definition....2474

Background....2474

Applications....2476

Cross-References....2476

Recommended Reading....2476

Signed Window Exponentiation....2476

SIKE....2476

Silicon Fingerprint (colloquially)....2476

SIM/UICC....2476

Synonyms....2476

Definition....2476

Background....2477

Theory....2477

Applications....2477

References....2478

Simple Power Analysis....2478

Synonyms....2478

Definitions....2478

Background....2478

Theory....2478

Open Problems and Future Directions....2480

References....2480

Simultaneous Exponentiation....2480

Synonyms....2480

Definition....2480

Background....2480

Theory....2481

Applications....2483

Cross-References....2483

Recommended Reading....2483

Simultaneous Transactions....2483

Singe-Reader-Multi-Writer Searchable Encryption....2483

Single Euro Payments Area....2483

Single Wire Protocol....2483

Definition....2483

Background....2483

Cross-References....2484

References....2484

Single-Server Private Information Retrieval....2484

Definitions....2484

Background....2484

Homomorphic Encryption-Based Construction....2484

Future Directions....2485

References....2486

Situational Awareness for Cyber-Physical Systems....2486

Synonyms....2486

Definitions....2486

Background ....2486

Application....2487

Open Problems and Future Directions....2488

References....2488

Skipjack....2489

Definition....2489

Background....2489

Theory....2489

Application....2489

Cross-References....2490

Recommended Reading....2490

Slide Attack....2490

Definition....2490

Theory....2491

Applications....2491

Cross-References....2491

Recommended Reading....2491

Sliding Window Exponentiation....2492

Definition....2492

Background....2492

Theory....2492

Applications....2494

Cross-References....2494

Recommended Reading....2494

Smart Card....2494

Synonyms....2494

Definition....2494

Background....2494

Theory....2494

Applications....2495

Cross-References....2495

Recommended Reading....2495

Smart Contract....2495

Definition....2495

Background....2496

Theory....2496

Application....2497

Open Problems and Future Directions....2497

Cross-References....2497

References....2497

Smart Environment....2497

Smart Grids....2498

Smart/Algorithmic Denial of Service....2498

Smartcard Tamper Resistance....2498

Definition....2498

Theory and Applications....2498

Cross-References....2500

Recommended Reading....2500

Smoothness....2500

Definition....2500

Theory....2500

Cross-References....2501

Recommended Reading....2501

SNARK....2501

Synonyms....2501

Background....2501

Definitions....2502

Types of SNARKs....2502

Applications....2504

Cross-References....2504

References....2505

Social Context in Security and Privacy....2505

Synonyms....2505

Definition....2505

Background....2505

Theory and Application....2505

Open Problems and Future Directions....2506

Cross-References....2506

References....2506

Social Engineering....2506

Synonyms....2506

Definition....2506

Background....2506

Theory....2507

Social Engineering Attack Cycle....2507

Principles of Persuasion and Social Engineering Triggers....2507

Examples of Social Engineering....2508

Addressing Social Engineering....2508

Open Problems and Future Directions....2509

Cross-References....2510

References....2510

Social Environment....2510

Social Network Anonymization....2510

Social Network Data Privacy Definitions....2510

Social Networks....2510

Social Perspectives on Information Privacy....2510

Definition....2510

Theory....2510

Open Problems and Future Directions....2512

Cross-References....2512

Recommended Reading....2512

Sociocultural Factors....2513

Soft Biometrics....2513

Definition....2513

Background....2513

Theory and Application....2513

Taxonomy of Soft Biometrics....2513

Applications....2515

Open Problems and Future Directions....2515

Summary....2516

References....2516

Software Secure Element....2516

Software Vendor....2516

Software-Defined Networks privacy....2517

Definitions....2517

Background ....2517

Theory....2517

Privacy Attacks....2518

Application Plane....2518

Control and Data Plane....2518

References....2520

Software-Optimized Encryption Algorithm....2520

Solitaire....2520

Definition....2520

Background....2520

Cross-References....2520

Recommended Reading....2520

Source Address Validation....2521

Definitions....2521

Background....2521

Application....2522

Open Problems and Future Directions....2523

References....2524

SPA....2524

Space-Time Trade-Off....2524

Spam Detection Using Network-Level Characteristics....2525

Synonyms....2525

Definition....2525

Background....2525

Theory and Applications....2525

Recommended Reading....2525

Spatial Context....2526

Spatial Knowledge....2526

Spatiotemporal Event Privacy....2526

Spatiotemporal Privacy....2526

Synonyms....2526

Definitions....2526

Background....2526

Theory....2526

Open Problems and Future Directions....2528

Cross-References....2528

References....2528

Speaker Biometrics....2528

Speaker Identification and Verification (SIV)....2528

Speaker Recognition....2528

Synonyms....2528

Definition....2528

Background....2528

Speaker Enrollment....2529

Speaker Verification (Authentication)....2529

Speaker Identification....2530

Speaker and Event Classification....2530

Speaker Segmentation, Diarization, Detection, and Tracking....2531

Speaker Verification Modalities....2531

Knowledge-Based Speaker Recognition (Speech Biometrics)....2532

Theory....2532

Gaussian Mixture Model (GMM): Generic Case....2535

Speaker Space....2536

Speaker Embeddings (x-Vectors): Neural Network Kernels....2537

Speaker Diarization....2537

Application....2540

Open Problems....2540

References....2543

Special-Purpose Cryptanalytical Hardware....2544

Definition....2544

Background....2544

Theory....2545

Applications....2545

Cross-References....2546

Recommended Reading....2546

Specific Emitter Identification (SEI)....2546

Specific Emitter Verification (SEV)....2546

Spectre....2546

Synonyms....2546

Definitions....2546

Background....2546

Theory....2547

Spectre Gadgets....2549

Application....2549

Open Problems and Future Directions....2550

Cross-References....2551

References....2551

Spectre Attack....2552

Spectre Variant 1....2552

Spectre Variant 2....2552

SPKI....2552

Source of Names....2553

Group Names....2553

Globally Unique SDSI Names....2554

Canonical S-Expressions (CSEXP)....2554

Recommended Reading....2555

Spontaneous Device Association....2555

Spoofing a Hall Sensor....2555

Spoofing and Antispoofing....2555

Synonyms....2555

Definitions....2555

Background....2555

Application....2556

Open Problems and Future Directions....2556

Summary....2557

References....2557

Spyware....2557

Synonyms....2557

Definition....2557

Background....2557

Theory....2558

Applications....2560

Open Problems....2560

Cross-References....2560

Recommended Reading....2560

SQL Access Control Model....2561

Definitions....2561

Theory and Application....2561

Access Control Enforcement via Views....2562

Cross-References....2563

References....2563

SQL Administration Standards....2563

SQL Control Procedures....2563

SQL Injection Attacks....2563

Definition....2563

Background....2564

Theory....2564

Open Problems....2565

Recommended Reading....2565

Square-and-Multiply Exponentiation....2566

SSE (acronym)....2566

SSH....2566

Synonyms....2566

Definition....2566

Background....2566

Theory....2566

Applications....2566

Recommended Reading....2566

SSL....2566

Stablecoin....2566

Definition....2566

Background....2567

Theory and Application....2567

Open Problems and Future Directions....2569

Cross-References....2570

References....2570

Stack (buffer) Overflow....2571

Stack (buffer) Overrun....2571

Stack/Heap Smashing....2571

Standard Basis....2571

Standard Model....2571

Definition....2571

Open Problems....2571

Cross-References....2571

Recommended Reading....2571

State Machine Replication....2571

Synonyms....2571

Definition....2571

Background....2572

Theory....2572

Application....2573

Open Problems and Future Directions....2574

Cross-References....2574

References....2574

Static Analysis....2575

Synonyms....2575

Definition....2575

Background....2575

Theory....2575

Applications....2577

Cross-References....2577

Recommended Reading....2577

Static Code Analysis....2578

Static Program Analysis....2578

Static Separation of Duties....2578

Station-to-Station protocol....2578

Definition....2578

Theory....2578

References....2579

Statistical Databases....2579

Synonyms....2579

Definition....2579

Background....2579

Applications....2579

Privacy Disclosure Measures....2580

Security Protection Approaches....2580

Conceptual Approach....2580

Query Restriction Approach....2581

Auditing....2581

Perturbation Approach....2582

Notes on Recommended Reading....2583

Cross-References....2583

Recommended Reading....2583

Statistical Fault Attack....2584

Synonyms....2584

Definitions....2584

Background ....2584

Theory/Application/Both ....2584

Open Problems and Future Directions....2585

Cross-References....2585

References....2585

Steins Algorithm....2586

Stream and Multicast Authentication....2586

Synonyms....2586

Definition....2586

Background....2586

Theory....2586

Applications....2589

Cross-References....2590

References....2590

Stream Ciphers....2590

Definition....2590

Background....2591

Theory....2591

Synchronous and Asynchronous Stream Ciphers....2591

Families of Stream Ciphers....2591

Families of Attacks Against Stream Ciphers....2591

Properties of Stream Ciphers....2592

Applications....2592

Cross-References....2592

Recommended Reading....2592

Strong Authentication....2592

Strong Collision Resistance....2593

Strong Exclusion....2593

Strong Prime....2593

Definition....2593

Theory....2593

Cross-References....2593

Recommended Reading....2593

Strong RSA Assumption....2594

Theory....2594

Recommended Reading....2594

Structural Cryptanalysis....2594

Definition....2594

Theory and Application....2594

Structured Encryption....2595

Definition....2595

Related Work....2595

Theory....2595

Leakage....2595

Security....2595

Cross-References....2597

References....2597

Structured Encryption on Trusted Hardware....2597

Subexponential Time....2597

Definition....2597

Theory....2597

Applications....2597

Cross-References....2598

Subgroup....2598

Definition....2598

Theory....2598

Applications....2598

Cross-References....2598

Subgroup Cryptosystems....2598

Subscriber Identity Module....2598

Substitution–Permutation (SP) Network....2599

Definition....2599

Theory....2599

Applications....2599

Cross-References....2599

Recommended Reading....2599

Substitutions and Permutations....2599

Definition....2599

Cross-References....2601

Recommended Reading....2601

Subversion-Resilient Cryptography....2602

Summation Generator....2602

Definition....2602

Theory....2602

Cross-References....2602

Recommended Reading....2602

Supersingular Isogeny Diffie-Hellman....2602

Synonyms....2602

Definition....2603

Applications....2603

Theory....2603

Security....2604

References....2604

Supersingular Isogeny Key Encapsulation....2604

Supervisory Control and Data Acquisition....2605

Synonyms....2605

Definition....2605

Background....2605

Theory and Application....2605

Open Security Problems and Future Directions....2606

Cross-References....2606

References....2607

Survivability....2607

Swarm Attestation....2607

Synonyms....2607

Definition....2607

Background....2607

Verifiers in Swarms....2607

Prover's Attestation in Swarms....2608

Swarm Topology....2608

Exchanged Communication Data Among Provers....2608

Granularity of Attestation Result....2609

Theory....2609

Open Problems and Future Directions....2610

Cross-References....2610

References....2610

Symmetric Cryptosystem....2611

Synonyms....2611

Definition....2611

Applications....2611

Cross-References....2611

SYN Cookie Defense....2611

Synonyms....2611

Definition....2611

Background (Historical Data Optional)....2611

Theory....2612

Application....2613

Open Problems and Future Directions....2613

References....2613

SYN Flood Attack....2613

Synonyms....2613

Definition....2613

Background (Historical Data Optional)....2614

Theory....2614

Application....2614

Open Problems and Future Directions....2615

Cross-References....2615

References....2615

Synchronous Stream Cipher....2615

Definition....2615

Background....2615

Theory....2616

Applications....2616

Cross-References....2616

Recommended Reading....2616

Synthetic Data....2616

Synonyms....2616

Definition....2616

Background....2616

Theory....2617

Traditional Models....2617

Deep Generative Models....2617

Privacy-Preserving Synthetic Data Generation....2618

Open Problems and Future Directions....2618

Cross-References....2618

References....2618

Synthetic Data Generation....2619

Synthetic Mobility Traces....2619

Definitions....2619

Background....2619

Theory....2620

Traditional Approaches for SMT Generation....2620

ML-based Approaches for SMT Generation....2621

Privacy-Preserving SMT Generation....2621

Open problems....2622

Cross-References....2623

References....2623

System Component Graphs....2623

System Hardening....2623

T....2624

Talker Recognition....2624

Tamper Detection....2624

Definition....2624

Theory and Applications....2624

Open Problems....2624

Cross-References....2624

References....2625

Tamper Evidence....2625

Definition....2625

Background....2625

Theory and Application....2625

Cross-References....2625

Recommended Reading....2625

Tamper Resistance....2625

Definition....2625

Theory and Applications....2625

Open Problems....2626

Cross-References....2626

Recommended Reading....2626

Tamper Response....2626

Definition....2626

Theory and Applications....2626

Open Problems....2626

Cross-References....2626

Recommended Reading....2627

Target Collision Resistant Hash function....2627

Targeted Hardware Manipulation....2627

TCG Trusted Computing Group....2627

T-Closeness....2627

Definitions....2627

Background....2627

Theory/Application/Both....2628

Open Problems and Future Directions....2628

Cross-References....2629

References....2629

TCP Modulation Attacks....2629

Definition....2629

Low-Rate TCP Attacks....2629

Background....2629

Applications....2630

Low-Rate Attacks Against TCP Variants....2630

Potential Mitigation Solutions....2630

Limitations of Router-Assisted Defenses....2631

Experimental Results....2631

Mitigation Using Randomization of the Minimum RTO....2631

Recommended Reading....2632

TCP Reset Injection....2632

Synonyms....2632

Definition....2632

Background....2633

Applications....2633

Recommended Reading....2634

TCP SYN Cookie....2634

TCP SYN Flooding....2634

TCP/IP from Network Security Perspective....2634

Synonyms....2634

Definition....2634

Background....2634

Theory....2635

Open Problems and Future Directions....2636

References....2637

TCP/IP Protocol Suite....2637

Technical Data Protection....2637

Temperature Attack....2637

Definition....2637

Experimental Results....2637

Cross-References....2638

Recommended Reading....2638

Tempest....2638

Synonyms....2638

Definitions....2638

Background....2638

Theory....2638

Application....2641

Cross-References....2642

References....2642

Temporal Access Control....2643

Synonyms....2643

Definitions....2643

Background....2644

Theory and Applications....2644

Applications....2645

Open Problems and Future Directions....2645

Cross-References....2645

References....2645

Temporal Authorization Models....2645

Temporary Identity....2645

The Economics of Information Exchange....2646

The Economics of Personal Data....2646

The Fiat-Shamir Identification Protocol and the Feige-Fiat-Shamir Signature Scheme....2646

Definition....2646

Introduction....2646

Preliminary....2646

The Protocol....2646

Parameters....2646

Feige-Fiat-Shamir Signature Scheme....2647

Cross-References....2647

References....2647

Theorem Proving and Security....2647

Synonyms....2647

Definition....2647

Background....2647

Applications....2648

Open Problems and Future Directions....2648

Cross-References....2649

References....2649

Threat Intelligence....2649

Three-Dimensional Palmprint....2649

Three-Factor Authentication....2649

Synonyms....2649

Definition....2649

Background....2649

Applications....2650

Open Problems....2650

Cross-References....2650

Recommended Reading....2650

Threshold Cryptography....2651

Definition....2651

Introduction....2651

Different Approaches....2652

A General Approach....2652

A 2-Out-of-2 Case....2652

Using a Multiplicative Secret Sharing Scheme....2653

Unknown Subset of Participants....2654

Particular Approaches....2654

A Variant of the General Approach....2654

Enhancements....2654

Robustness....2654

No Trusted Dealer....2655

Proactive Security and Its Generalizations....2655

The Multiverse Case....2656

Post-quantum Threshold Cryptosystems....2656

Cross-References....2656

References....2656

Threshold Homomorphic Cryptosystems....2658

Cross-References....2659

References....2659

Threshold Probing Model....2659

Threshold Signature....2659

Definition....2659

Theory....2659

Applications....2661

Cross-References....2662

Editorial Note....2662

References....2662

Throughput of a Distributed Ledger....2663

Definition....2663

Background....2663

Theory....2663

Influential Factors....2663

Further Aspects....2663

Cross-References....2664

References....2664

Tiger....2664

Definition....2664

Background....2664

Theory....2665

Open Problems....2665

Cross-References....2665

Recommended Reading....2665

Time-Based Access Control....2665

Time-Memory Trade-Offs....2665

Synonyms....2665

Definition....2666

Background....2666

Theory....2666

The Original Method....2666

Distinguished Points and Rainbow Tables....2667

Recommended Reading....2667

Time-Stamping....2668

Introduction....2668

Techniques....2668

Hash-and-Sign....2669

Linking....2669

Long-Lived Digital Signatures....2671

Renewability....2672

Standards....2672

References....2672

Timing Attack....2673

Synonyms....2673

Definition....2673

Background....2673

Time Measurement....2673

Timing Analysis....2674

Attack Targets....2674

Countermeasures....2674

Cross-References....2674

References....2675

TLS....2675

Token....2675

Definition....2675

Theory....2675

Cross-References....2676

Recommended Reading....2676

Token Pre-sales....2676

Token Sales....2676

Top-k Query Processing on Encrypted Data....2676

Synonyms....2676

Definition....2676

Theory....2677

Open Problems....2678

Cross-References....2678

References....2678

Top-n Queries on Encrypted Data....2678

Topological Vulnerability Analysis....2678

Synonyms....2678

Definition....2679

Background....2679

Theory....2679

Application....2680

Open Problems and Future Directions....2680

Cross-References....2680

References....2680

Torus-Based Cryptography....2681

Synonyms....2681

Definition....2681

Background....2681

Theory....2681

Applications....2682

Open Problems....2682

Cross-References....2683

Recommended Reading....2683

Touchless Palmprint Biometrics....2683

TPM....2683

Definition....2683

Background....2683

Theory and Applications....2684

Functions: 1.1b....2684

New Functions of the TPM 1.2 Specification....2685

Open Problems....2686

Cross-References....2686

Recommended Reading....2686

TPM Trusted Platform Module....2687

Tracing Traitors....2687

Tracking Cookie....2687

Traffic Analysis....2687

Definition....2687

Background....2687

Theory....2687

Applications....2688

Open Problems and Future Directions....2689

Cross-References....2689

Recommended Reading....2689

Traitor Tracing....2690

Synonyms....2690

Definition....2690

Background....2690

Theory....2691

Public-Key Traitor Tracing....2692

Advanced Schemes....2692

Cross-References....2693

Recommended Reading....2693

Transparent Authentication....2694

Transport Layer Security (TLS)....2694

Synonyms....2694

Definition....2694

Background....2694

Theory....2694

Cross-References....2695

References....2695

Transport-Level Security....2695

Trapdoor One-Way Function....2695

Definition....2695

Background....2696

Theory....2696

Cross-References....2696

Recommended Reading....2696

Treemap Visualization....2696

Tripartite Key Exchange....2696

Triple-DES....2697

Cross-References....2698

References....2698

Trojan....2698

Trojan Horses, Computer Viruses, and Worms....2698

Original Definition....2698

Current Definition....2699

Theory....2699

Computer Viruses....2699

Worms....2699

Cross-References....2699

References....2699

Truncated Differentials....2700

Definitions....2700

Theory....2700

Applications....2700

Cross-References....2700

Recommended Reading....2700

Trust Anchor....2701

Trust Management....2701

Synonyms....2701

Related Concepts....2701

Definition....2701

Background....2701

Theory....2701

Applications....2702

Open Problems and Future Directions....2703

References....2704

Trust Management for Cyber-Physical Systems....2704

Definition....2704

Background....2704

Theory and Application....2705

Open Problems and Future Directions....2709

Cross-References....2709

References....2709

Trust Management in Databases....2710

Definition....2710

Background....2710

Theory....2710

Cross-References....2711

References....2711

Trusted Boot....2712

Synonyms....2712

Definition....2712

Background....2712

Theory....2712

Applications....2713

Open Problems....2713

Cross-References....2713

Recommended Reading....2714

Trusted Computing....2714

Synonyms....2714

Definitions....2714

Background....2714

Theory....2714

Applications....2715

Software Trust....2715

Hardware Trust....2716

Hardware Run-Time Trust....2716

Hardware Design Trust....2716

Open Problems....2717

Cross-References....2717

Recommended Reading....2717

Trusted Computing Group....2717

Definition....2717

Background....2717

Applications....2717

Cross-References....2718

Recommended Reading....2718

Trusted Computing Platform Alliance....2718

Definition....2718

Background....2718

Cross-References....2718

Recommended Reading....2718

Trusted Platform Module....2719

Definition....2719

Background....2719

Applications....2719

Final Remarks....2722

Cross-References....2722

References....2722

Trusted Third Party....2723

Definition....2723

Applications....2723

Open Problems and Future Directions....2723

Cross-References....2723

References....2723

Trustworthy Autonomous Systems....2723

Trustworthy Machine Learning....2723

TSS....2724

Definition....2724

Background....2724

Theory and Applications....2724

Cross-References....2726

Recommended Reading....2726

TTP: Tactics, Techniques, and Procedures....2726

Twin Signatures....2726

Definition....2726

Cross-References....2726

Recommended Reading....2726

TWIRL....2727

Definition....2727

Background....2727

Theory....2727

Experimental Results....2727

Cross-References....2728

Recommended Reading....2728

Two-Factor Authentication....2728

Definition....2728

Theory....2728

Applications....2728

Cross-References....2728

TWOFISH....2729

Cross-References....2730

Recommended Reading....2730

Two-Key Cryptosystem....2730

Type Checking and Security....2730

Definition....2730

Background....2730

Applications....2731

Open Problems and Future Directions....2731

Cross-References....2731

References....2732

Typing Biometrics....2732

Typing Dynamics....2732

Typing Patterns....2732

U....2733

UMTS IC Card....2733

Unconstrained Fingerprint Biometrics....2733

Definitions....2733

Background....2733

Theory....2734

Acquisition and Sensors....2734

Constrained and Semi-constrained....2734

Unconstrained....2735

Fingerprint Segmentation....2735

Fingerphoto....2735

Latent Fingerprints....2735

Fingerprint Feature Extraction....2735

Traditional Fingerprint Descriptors....2735

Non-Minutia Descriptors....2736

Open Problems and Future Research Directions....2736

Summary....2738

References....2738

Unconstrained Palmprint Biometrics....2738

Synonyms....2738

Definitions....2738

Background....2739

Theory....2739

ROI Localization and Alignment....2739

Feature Extraction....2741

Open Problems and Future Directions....2742

Summary....2742

Cross-References....2742

References....2742

Unconstrained Remote Face Recognition....2743

Uncoordinated Direct Sequence Spread Spectrum....2743

Definition....2743

Background....2743

Theory....2744

Applications....2744

Recommended Reading....2744

Uncoordinated Frequency Hopping Spread Spectrum....2744

Definition....2744

Background....2744

Theory....2745

Applications....2745

Cross-References....2745

Recommended Reading....2745

Undeniable Signatures....2746

Definition....2746

Background....2746

Theory....2746

Convertible Undeniable Signatures....2747

Applications....2747

Recommended Reading....2748

Unidentifiable OSN User....2748

Universal Integrated Circuit Card....2748

Universal One-Way Hash Functions (UOWHF)....2748

Synonyms....2748

Definition....2748

Background....2748

Theory....2749

Cross-References....2750

References....2750

Unlinkability....2750

Synonyms....2750

Definitions....2750

Theory and Application....2751

Open Problems and Future Directions....2752

Cross-References....2752

References....2752

Unobservability....2752

Unpacking Malware....2752

Synonyms....2752

Definition....2752

Background....2753

Theory and Application....2753

Recommended Reading....2754

Untraceability....2754

Definitions....2754

Theory....2754

Application....2755

Open Problems and Future Directions....2755

Cross-References....2756

References....2756

Usable Security Application Programming Interfaces (APIs)....2756

User Authentication....2756

Synonyms....2756

Definition....2757

Application....2757

Open Problems and Future Directions....2757

Cross-References....2757

User Revocation....2757

User Revocation in Identity Based Encryption and Attribute Based Encryption....2757

Synonyms....2757

Definitions....2757

Theory....2757

Direct Revocation....2758

Indirect Revocation....2758

Others....2759

Open Problems and Future Directions....2759

References....2759

User Tracking and Reidentification....2760

Definitions....2760

Application....2760

Theory....2761

Cross-References....2762

References....2763

V....2764

Value of Privacy....2764

Value-Based Compliance Theory....2764

Synonyms....2764

Definition....2764

Background....2764

Theory....2765

Open Problems and Future Directions....2767

Cross-References....2767

References....2768

Variant 3....2768

VBC Theory....2768

VDF....2768

Vector Space....2768

Definition....2768

Theory....2768

Applications....2769

Cross-References....2769

Recommended Reading....2769

Vehicular Privacy....2769

Definition....2769

Theory and Application....2770

Cooperative Awareness Systems and Pseudonyms....2770

Location-Based Services....2771

Advanced Driver-Assistance Systems....2771

Driver Behavior Monitoring....2772

Open Issues....2772

Cross-References....2773

References....2773

Verifiable Delay Function....2773

Synonyms....2773

Definition....2773

Theory....2773

Applications....2774

Random Multi-Party Beacon....2774

Beacon from Entropy Source....2775

Resource-Efficient Permissionless Blockchains....2775

Proof of Replication....2775

Open Problems and Future Directions....2775

Cross-References....2775

References....2775

Verifiable Encryption....2776

Definition....2776

Applications....2777

Theory....2777

Recommended Reading....2777

Verifiable Secret Sharing....2777

Cross-References....2779

References....2779

Verification....2779

Vernam Cipher....2779

Definition....2779

Cross-References....2780

Recommended Reading....2780

Vicinity Card....2781

Definition....2781

Background....2781

Applications....2781

Cross-References....2781

Recommended Reading....2781

Video Analysis....2781

Vigenère Encryption....2781

Definition....2781

Cross-References....2782

Recommended Reading....2782

Virtual Black Box....2782

Virtual Machine Introspection....2782

Definition....2782

Background....2783

Applications....2783

Open Problems....2784

Cross-References....2784

Recommended Reading....2784

Virtualization Security....2784

Virtualized Packer....2784

Virus Scanner....2784

Visual Secret Sharing Schemes....2784

Synonyms....2784

Definition....2785

Theory....2785

Cross-References....2786

Recommended Reading....2786

Visual Security Analytics....2786

Synonyms....2786

Definition....2786

Background....2786

Theory and Applications....2787

Open Problems and Future Directions....2787

References....2788

Visualization....2788

VM Protection....2788

Voice Biometrics....2788

Voice Recognition....2788

Voiceprint Recognition....2789

von Neumann Correction....2789

Synonyms....2789

Definition....2789

Experimental Results....2789

Cross-References....2789

Recommended Reading....2789

VSSS....2789

Vulnerability Disclosure....2789

Vulnerability Disclosure Economics....2790

Synonyms....2790

Definitions....2790

Background....2790

Entities Involved in Disclosure....2790

Disclosure Options....2791

Theory of Disclosure....2792

Open Problems and Future Direction....2793

References....2794

Vulnerability Metrics....2794

Synonyms....2794

Definition....2794

Background....2794

The National Vulnerability Database....2795

Common Vulnerability Scoring System....2795

Theory and Application....2795

Open Problems and Future Directions....2796

Cross-References....2797

References....2797

Vulnerability Quantification....2797

Vulnerability Ranking....2797

Vulnerability Scoring....2797

W....2798

Watermarking....2798

Theory....2798

Applications....2799

Cross-References....2799

Recommended Reading....2800

Weak Collision Resistance....2800

Weak Exclusion....2800

Weak Keys....2800

Definition....2800

Theory....2800

Applications....2800

Cross-References....2801

Recommended Reading....2801

Web 2.0 Security and Privacy....2801

Definition....2801

Background....2801

Theory....2801

Cross-References....2802

Recommended Reading....2802

Web Access Control Strategies....2802

Synonyms....2802

Definition....2802

Introduction....2802

Theory....2802

Application....2804

Resource Sharing Using CORS....2804

Access Delegation....2806

IAM Policies....2807

Open Problems and Future Directions....2808

Cross-References....2808

References....2808

Web and Cloud Security....2809

Web Application Security....2809

Web Browser Security and Privacy....2809

Synonyms....2809

Related Concepts....2809

Definition....2809

Background....2809

Theory....2809

Applications....2810

Recommended Reading....2810

Web Cache Poisoning Attacks....2810

Definition....2810

Background....2810

Theory....2811

Recommended Reading....2811

Web Client Security and Privacy....2811

Web Initial Authentication....2811

Web Initial Sign On....2812

Web Penetration Test....2812

Web Security....2812

Web Security Auditing....2812

Synonyms....2812

Definition....2812

Background....2812

Theory....2812

Applications....2812

Cross-References....2813

Recommended Reading....2813

Web Security Policy....2813

Web Service Security....2813

Definition....2813

Background....2814

Theory....2814

OAuth....2814

The WS- Family of Specifications....2815

The XACML Specification....2815

Open Problems....2815

References....2816

Web Session Security....2816

Web Single Sign On and SAML....2816

Synonyms....2816

Definition....2816

Background....2816

Theory....2817

Applications....2820

Open Problems....2822

Cross-References....2822

Recommended Reading....2822

Web SSO and Security Assertion Markup Language....2823

Web Vulnerability Assessment....2823

Web-Based Security Protocols....2823

Synonyms....2823

Definition....2823

Background....2823

Theory....2824

Applications....2824

Cross-References....2825

Recommended Reading....2825

Whirlpool....2825

Definition....2825

Background....2825

Theory....2825

Applications....2826

Experimental Results....2826

Open Problems....2826

Cross-References....2826

Recommended Reading....2826

White-Box Cryptography....2827

Synonyms....2827

Definitions....2827

Background ....2827

Theory....2827

Virtual Black Box....2827

WBC Notions....2828

Application....2829

Early White-Box Designs and Attacks....2829

New Paradigm: Gray-Box Resistance....2830

Relaxing White-Box Cryptography....2831

Open Problems and Future Directions....2832

Cross-References....2832

References....2832

Wiener, Boneh–Durfee, and May Attacks on the RSA Public Key Cryptosystem....2833

Definition....2833

Theory....2834

Recommended Reading....2834

Winternitz One-Time Signatures....2834

Wireless Air Traffic Communications Security....2835

Synonyms....2835

Definition....2835

Background....2835

Modernizing Airspace: Analog to Digital....2835

Application....2835

Challenges in Securing Infrastructure Systems....2836

Open Problems and Future Directions....2836

References....2837

Wireless Avionics Security....2837

Wireless Device Fingerprinting....2837

Synonyms....2837

Definition....2837

Background....2838

Theory....2838

Applications....2839

Experimental Results....2840

Cross-References....2840

Recommended Reading....2840

Wireless Locational Privacy....2840

Wireless Networks....2841

Wireless Steganography....2841

Wiretapping....2841

Witness Hiding....2841

Cross-References....2842

References....2842

Worms in Cellular Networks....2842

Synonyms....2842

Definitions....2842

Background....2842

Theory....2843

Applications....2844

Open Problems and Future Directions....2844

References....2845

X....2846

(X, Y)-Privacy....2846

Synonyms....2846

Definitions....2846

Background....2846

Theory....2847

Cross-References....2848

References....2849

X.509....2849

Synonyms....2849

Definition....2849

Theory and Application....2849

Cross-References....2850

Recommended Reading....2850

XML-Based Access Control Languages....2850

Definitions....2850

Background....2850

Theory....2850

Application....2854

Open Problems and Future Directions....2854

Cross-References....2855

References....2855

XSS....2855

Z....2856

Zero Trust Architecture....2856

Synonyms....2856

Definition....2856

Background....2856

Theory....2857

Application....2858

Open Problems and Future Directions*-12pt....2860

Cross-References....2861

References....2861

Zero Trust Cybersecurity....2861

Zero Trust Network....2861

Zero Trust Threat Model....2861

Zeroization....2861

Definition....2861

Background....2862

Theory and Applications....2862

Cross-References....2862

Recommended Reading....2862

Zero-Knowledge....2862

Definition....2862

Theory....2863

Real Conversations....2863

Simulated Conversations....2863

Cross-References....2864

Reference....2864

Zeta Function Computation....2864

A rich stream of papers and many good books have been written on cryptography, security, and privacy, but most of them assume a scholarly reader who has the time to start at the beginning and work his way through the entire text. The goal of Encyclopedia of Cryptography, Security, and Privacy, Third Edition is to make important notions of cryptography, security, and privacy accessible to readers who have an interest in a particular concept related to these areas, but who lack the time to study one of the many books in these areas. 

The third edition is intended as a replacement of Encyclopedia of Cryptography and Security, Second Edition that was edited by Henk van Tilborg and Sushil Jajodia and published by Springer in 2011. The goal of the third edition is to enhance on the earlier edition in several important and interesting ways. First, entries in the second edition have been updated when needed to keep pace with the advancement of state of the art. Second, as noticeable already from the title of the encyclopedia, coverage has been expanded with special emphasis to the area of privacy. Third, considering the fast pace at which information and communication technology is evolving and has evolved drastically since the last edition, entries have been expanded to provide comprehensive view and include coverage of several newer topics.


Похожее:

Список отзывов:

Нет отзывов к книге.