Preface....5
Acknowledgments....6
About the Editors....7
Section Editors....10
List of Contributors....22
A....59
5G....59
A5/1....59
Definition....59
Background....59
Theory....59
Description of the Running-Key Generator....59
Attacks on A5/1....60
Cross-References....60
Recommended Reading....60
ABAC....61
ABE....61
Abuse....61
Abuse of Trust....61
Access and Adversary Structure....61
Definition....61
Theory....61
Cross-References....62
References....62
Access Control....62
Access Control for Cyber-Physical Systems....62
Synonyms....62
Definition....62
Background....62
Traditional Access Control Models....63
Advanced Access Control Models....64
Open Problems and Future Directions....65
References....66
Access Control Policies, Models, and Mechanisms....67
Definition....67
Background....67
Theory....68
Cross-References....69
References....69
Access Control Rules....69
Access Limitation....69
Access Matrix....69
Definition....69
Background....69
Theory and Application....70
Cross-References....72
References....72
Access Pattern....72
Synonyms....72
Definition....72
Background....72
Applications....72
Theory....73
Open Problems....75
Cross-References....75
Recommended Reading....75
Access Rights....76
Accountability....76
Accountability for Cyber-Physical Systems....76
Definition....76
Background....76
Application....77
Open Problems and Future Directions....78
Cross-References....78
References....78
Accountable and Traceable ABE....79
Accountable and Traceable Attribute Based Encryption....79
Synonyms....79
Definitions....79
Background....79
Theory....79
Applications....80
Open Problems and Future Directions....81
References....81
Acquirer....81
Definition....81
Recommended Reading....82
Acronym (DGA)....82
Active Authentication....82
Adaptation....82
Adaptive Chosen Ciphertext Attack....82
Definition....82
Cross-References....82
Recommended Reading....82
Adaptive Chosen Plaintext and Chosen Ciphertext Attack....82
Definition....82
Cross-References....83
Recommended Reading....83
Adaptive Chosen Plaintext Attack....83
Definition....83
Cross-References....83
Adaptive Control Framework (ACF)....83
Adaptive Cyber Defense....83
Synonyms....83
Definition....83
Background....83
Theory and Application....84
Open Problems and Future Directions....87
Cross-References....88
References....88
Administrative Policies....88
Definitions....88
Background ....88
Theory and Application....88
Open Problems and Future Directions....90
Cross-References....90
References....90
Administrative Policies in SQL....90
Synonyms....90
Definition....90
Application....90
Cross-References....92
References....92
Advanced Encryption Standard....92
Advanced Hash Competition....92
Advanced Persistent Threats....92
Synonyms....92
Definition....92
Background....92
Common Characteristics of APT Attack Campaigns....93
Open Problems and Future Directions....94
References....94
Adversarial and Trustworthy AI....94
Synonyms....94
Definition....94
Background....94
Evasion Attacks....95
Adversarial Inputs....95
Universal Perturbations....95
Data Poisoning Attacks....95
Trustworthy AI....96
Robust ML....96
Open Problems and Future Directions....96
References....97
Adversarial Artificial Intelligence (AI)....97
Adversarial Machine Learning (AML)....97
Synonyms....97
Definition....97
Background....97
Theory and Application....98
Open Problems and Future Directions....99
Cross-References....99
References....99
Adversarial/External Knowledge (Privacy in the Presence of)....100
Definition....100
Background....101
Theory....101
Open Problems....103
Cross-References....103
Recommended Reading....104
Adware....104
AES....104
Aggregate Signatures....104
Definition....104
Applications....105
Recommended Reading....105
Agility....105
Aging of Biometric Traits....105
Definition....105
Background....106
Theory....106
Open Problems and Future Directions....107
Summary....107
Cross-References....108
References....108
AHS Competition/SHA-3....108
Synonyms....108
Definition....108
Background....108
Applications....108
Cross-References....110
Recommended Reading....110
AI Act....111
AI and Big Data Analytics for Network Security....111
Definition....111
Background (Historical Data Optional)....111
Applications and Use Cases....112
Open Problems and Future Directions....113
Description of New Trends/Unsolved Problems....113
References....114
AI Approaches in Steganalysis Research....114
Definition....114
Background....114
Theory....115
Open Problems and Future Directions....116
References....117
AI Data Poisoning....118
AI in Intrusion Detection....118
AI: Artificial Intelligence....118
Air Traffic Management Security....118
Alberti Encryption....118
Definition....118
Cross-References....120
Recommended Reading....120
Algebraic Immunity of Boolean Functions....120
Synonyms....120
Definition....120
Background....120
Theory....120
Open Problems....121
Cross-References....122
Recommended Reading....122
Algebraic Number Field....122
Algebraic Side-Channel Attack....122
Synonyms....122
Definitions....122
Background....122
Application....123
Open Problems and Future Directions....123
Cross-References....123
References....123
Algorithmic Complexity Attacks....123
Algorithmic DoS....123
Synonyms....123
Definition....124
Background....124
Theory....124
Impact....124
Solutions....125
Applications....125
Recommended Reading....125
Algorithm-Substitution Attack....125
Alias....125
Alphabet....125
Definition....125
Background....125
Cross-References....126
Recommended Reading....126
Amplification DoS Attacks....126
Synonyms....126
Definitions....127
Theory and Application....127
Open Problems and Future Directions....128
Cross-References....128
References....128
An Economic View of Privacy Paradox....128
Anamorphic Cryptography....128
Definitions....128
Background....128
Theory....129
Open Problems and Future Directions....129
Cross-References....130
References....130
Android's Security Framework–Understanding the Security of Mobile Phone Platforms....130
Synonyms....130
Definition....130
Background....130
Application....131
Runtime Environment....131
Permission Model....132
Application Storage....133
Cross-References....134
References....134
Anomalous Binary Curves....134
Anomaly Detection....134
Anomaly Detection for CPS....134
Anonymity....134
Definition....134
Theory....134
Applications....136
Cross-References....136
References....136
Anonymity in Data Mining....137
Anonymity in OSNs....137
Synonyms....137
Definitions....137
Theory....137
Application....138
Open Problems and Future Directions....138
Cross-References....138
References....138
Anonymization of Aggregated Location Information....139
Anonymization of Aggregated Mobility Data....139
Anonymization of Personal Data (Legal Perspective)....139
Definition....139
Background....139
Theory....140
Open Problems and Future Directions....141
Cross-References....141
References....141
Anonymous Attribute-Based Encryption....141
Anonymous Communications over Delay Tolerant Networks....141
Definition....141
Background....141
Theory....141
Applications....143
Cross-References....143
References....143
Anonymous Communications over Blockchain Technology....143
Synonyms....143
Definitions....143
Background....144
Application....144
Mixing Services....145
Noninteractive Zero-Knowledge Proof....145
Ring Signature....145
Open Problems and Future Directions....146
Cross-References....146
References....146
Anonymous Web Browsing and Publishing....146
Definition....146
Theory....146
Applications....147
Open Problems....148
Experimental Results....148
Cross-References....148
Recommended Reading....148
Anthropometric Authentication....149
Anthropometrics....149
Anthropometry....149
Anti-DoS Cookies....149
Anti-jamming Strategy....149
Antispam Based on Sender Reputation....149
Antivirus....149
Application Permissions....149
Application-Level Denial of Service....149
Synonyms....149
Definition....149
Background....149
Theory and Application....150
Open Problems....151
Cross-References....151
References....151
Applications....152
Applications of Formal Methods to Intrusion Detection....152
Definition....152
Background....152
Applications....152
Open Problems....153
Cross-References....153
Recommended Reading....153
Applications of Formal Methods to Web Application Security....153
Synonyms....153
Definition....153
Background....154
Theory....154
Applications....155
Cross-References....155
References....155
Applications of Rank-Metric Codes....156
Applied Cryptography....156
APT Attack....156
APT Campaigns....156
APT: Advanced Persistent Threat....156
Arguments for Privacy Regulations....156
ARIA....156
Definition....156
Background....156
Theory....156
Open Problems....157
Cross-References....157
Recommended Reading....157
ARP Poison Routing (APR)....157
ARP Poisoning....157
ARP Spoofing....157
Synonyms....157
Definition....158
Background....158
Theory....158
Mitigation....158
External Solutions....159
Cryptographic Solutions....159
Cross-References....159
Recommended Reading....159
Artificial Intelligence....160
Artificial Intelligence (AI) Explainability....160
Artificial Intelligence Act (AI Act) and the GDPR....160
Synonyms....160
Definition....160
Background....160
Theory....160
Title I: General Provisions....161
Title II: Prohibited Artificial Intelligence Practices....161
Title III: High-Risk AI Systems....161
Title IV: Transparency Obligations for Certain AI Systems....163
Title V: Measures in Support of Innovation....163
Title VI: Governance....163
Title VII: EU Database for Stand-Alone High-Risk AI Systems....163
Title VIII: Post-Market Monitoring, Information Sharing, and Market Surveillance....164
Title IX: Codes of Conduct....164
Title X: Confidentiality and Penalties....164
Title XI: Delegation of Power and Committee Procedure....164
Title XII: Final Provisions....164
Open Problems and Future Directions....164
Cross-References....164
References....165
Artificial Intelligence Data Poisoning....165
ASCA....165
Assumptions....165
Definition....165
Theory....165
Unconditional and Quantum Security....165
Conditional Security....165
Cross-References....166
References....166
Asymmetric Cryptosystem....166
Synonyms....166
Definition....166
Theory....166
Application....166
Cross-References....167
Asymmetric Setting for Searchable Encryption....167
Synonyms....167
Definitions....167
Background....167
Theory....167
Parties....167
Algorithms....167
Security Notions....168
Search Capabilities....168
Open Problems and Future Directions....169
Cross-References....169
References....169
Asynchronous Byzantine Fault Tolerance....169
Synonyms....169
Definition....169
Background....169
Theory....170
Open Problems and Future Directions....172
Cross-References....172
References....172
Asynchronous Consensus....173
Asynchronous Stream Cipher....173
Attachment....173
Attack by Summation over a Hypercube....173
Attack Detection for Cyber-Physical Systems....173
Synonyms....173
Definition....173
Introduction....174
Theory or Application....174
Open Problems and Future Directions....175
Cross-References....175
References....176
Attack Evasion....176
Attack Graphs....176
Definitions....176
Background....176
Theory and Application....177
References....178
Attack Response....179
Attack Traceability....179
Synonyms....179
Definitions....179
Background....179
Applications....180
Open Problems and Future Directions....181
Cross-References....181
References....181
Attacker Models for Location Privacy....181
Definition....181
Background....182
Discussion & Open Issues....183
Cross-References....183
References....183
Attacks on Wi-Fi Availability....184
Attestation....184
Synonyms....184
Definition....184
Background....184
Theory and Applications....184
Cross-References....185
Recommended Reading....185
Attribute Based Encryption with Access Policy Hiding....185
Synonyms....185
Definitions....185
Background....185
Theory....186
Applications....187
Open Problems....187
Cross-References....187
References....187
Attribute Certificate....187
Definition....187
Background....188
Theory....188
Applications....188
Cross-References....188
Recommended Reading....188
Attribute-Based Access Control....189
Synonyms....189
Definition....189
Background....189
Theory and Concepts....189
Open Problems and Future Directions....190
Cross-References....191
References....191
Attribute-Based Encryption....191
Synonyms....191
Definitions....191
Background....191
Theory....192
Applications....192
Open Problems and Future Directions....193
References....193
Attribute-Based Encryption with Offline Computation and Outsourced Decryption....193
Definition....193
Access Structures....193
Linear Secret Sharing Schemes....194
Background....194
ABE with Offline Computation....194
KP-ABE with Offline Encryption....195
CP-ABE with Offline Encryption....195
ABE with Outsourced Decryption....196
Open Problems and Future Directions....197
References....197
Attribute-Based Encryption with Searchable Encryption....198
Synonyms....198
Definitions....198
Background....198
Theory....198
Applications....199
Open Problems....199
Cross-References....200
References....200
Attribute-Based Encryption with Updatable Access Policy....200
Synonyms....200
Definitions....200
Background....200
Theory....201
Applications....202
Open Problems....202
Cross-References....202
References....202
Attribute-Based Keyword Search over Encrypted Data....202
Attribute-Based Signatures....202
Auditability....202
Authenticated Data Feed....202
Authenticated Encryption....203
Introduction....203
Background....203
Security....203
Associated Data....204
Provable Security....204
AE Schemes....204
Conventions....204
Generic Composition....204
Security....205
Performance....206
Associated Data....206
Can We Do Better?....206
Single-Pass Combined Modes....207
IAPM....207
Comments on IAPM....207
XCBC and OCB....208
Associated Data....208
Intellectual Property....208
Two-Pass Combined Modes....208
CCM Mode....209
CCM Is Parameterized....209
Comments on CCM....209
EAX Mode....209
CWC Mode....210
AE Primitives....211
Helix....212
SOBER-128....212
Beyond AE and AEAD....212
Cross-References....213
Notes on References....213
Recommended Reading....213
Authentication....214
Authentication (General Methods)....214
Synonyms....214
Definition....215
Background....215
Theory....215
Applications....215
Open Problems and Future Directions....216
Experimental Results....216
Cross-References....216
References....216
Authentication for Cyber-Physical Systems....217
Synonyms....217
Definitions....217
Background....217
Application....218
Sensor Authentication....218
Actuator Authentication....219
Process Authentication....219
PLC Authentication....219
Control Logic Authentication....219
Open Problems and Future Directions....220
References....220
Authentication Token....221
Synonyms....221
Related Concepts and Keywords....221
Definition....221
Theory....222
Applications....222
Open Problems and Future Directions....223
Cross-References....223
References....223
Authentication, from an Information Theoretic Perspective....223
Synonyms....223
Definition....224
Background....224
Theory....224
Recommended Reading....225
Authorization....226
Authorizations....226
Synonyms....226
Definition....226
Background....226
Theory and Application....226
Advanced Authorizations....228
Cross-References....229
References....229
Autocorrelation....229
Definition....229
Application....229
Cross-References....229
Recommended Reading....229
Autograph....230
Autonomous Cyber Response....230
Autotomic Signatures....230
Definition....230
Availability....230
Definition....230
Theory....230
B....231
Bank Card....231
Barrett's Algorithm....231
Definition....231
Recommended Reading....231
Barter....231
Base....231
Beaufort Encryption....232
Definition....232
Cross-References....232
Recommended Reading....232
Behavioral Security....232
Synonyms....232
Definition....232
Background....232
Theory....232
Open Problems and Future Directions....234
Cross-References....235
References....235
Bell–La Padula Model....235
Synonyms....235
Definition....235
Background....235
Theory....236
First Volume: “Secure Computer Systems: Mathematical Foundations” (Bell and La Padula 1973)....236
Second Volume: “Secure Computer Systems: A Mathematical Model” (La Padula and Bell 1973)....237
Third Volume: “Secure Computer Systems: Refinement of the Mathematical Model” (Bell 1973a)....238
Fourth Volume: “Secure Computer Systems: Unified Exposition and MulticsInterpretation” (Bell and La Padula 1975)....239
Later Developments....239
Applications....240
Cross-References....241
Recommended Reading....241
Berlekamp Q-matrix....242
Definition....242
Theory....242
Cross-References....242
Recommended Reading....242
Berlekamp–Massey Algorithm....242
Definition....242
Background....243
Theory....243
Cross-References....243
Recommended Reading....244
Biba Model....244
Synonyms....244
Background....244
Theory....244
Applications....244
Cross-References....245
Recommended Reading....245
Big Number Multiplication....245
Big Number Squaring....245
Bilinear Pairings....245
Binary Euclidean Algorithm....245
Synonyms....245
Definition....245
Background....245
Theory....246
Applications....247
Cross-References....247
Recommended Reading....247
Binary Exponentiation....248
Synonyms....248
Definition....248
Background....248
Theory....248
Applications....249
Cross-References....249
Recommended Reading....249
Binary Functions....249
Binary GCD Algorithm....249
Binding Pattern....249
Binomial Distribution....249
Definition....249
Theory....250
Applications....250
Bioinformatics....250
Biometric Authentication....250
Synonyms....250
Definition....250
Background....251
Theory....251
Applications....252
Open Problems and Future Directions....254
References....254
Biometric Cryptosystems....254
Biometric Detectors....254
Biometric Encryption....255
Synonyms....255
Definitions....255
Background....255
Theory and Application....255
Open Problems and Future Directions....257
Security....257
Data Representation....258
Real-World Performance and Deployment....258
References....258
Biometric Ethics....260
Biometric Fusion....260
Biometric Identification Errors....260
Biometric Identification in Video Surveillance....260
Biometric Information Ethics....260
Biometric Key Generation....261
Biometric Keys....261
Biometric Matching....261
Synonyms....261
Definition....261
Background....261
Theory....261
Open Problems and Future Directions....262
Cross-References....262
References....262
Biometric Passport Security....262
Biometric Performance Evaluation....262
Biometric Performance Measurement....263
Biometric Privacy....263
Synonyms....263
Definitions....263
Background....263
Theory....263
Classification of the Biometric Privacy Risks....263
Best Practice for Privacy Assessment in Biometrics....264
Template Protection....265
Template Transformations....266
Applications....266
Open Problems and Future Directions....266
References....267
Biometric Recognition....267
Biometric Recognition Errors....267
Synonyms....267
Definitions....267
Background....267
Biometric Verification and Identification....268
Evolution....268
Errors of a Biometric System....268
Theory and Application....271
Open Problems and Future Directions....271
Cross-References....271
References....271
Biometric Sample Quality....271
Synonyms....271
Definitions....271
Biometric Sample Quality for Different Biometric Modalities....272
Quality-Based Score Normalisation....273
References....274
Biometric Scanners....275
Biometric Sensors....275
Synonyms....275
Definition....275
Theory....275
Application....277
Open Problems and Future Directions....277
Cross-References....277
References....277
Biometric Social Responsibility and Supply Chain Implications....278
Synonyms....278
Introduction....278
Definition....278
Background....278
Consumer Relationship Management....278
Supply Chain Management (SCM) Trust Aspects....279
Theory of Corporate Social Responsibility (CSR) as Strategy....281
CSR Policy Development....281
Applications and Future Directions....283
References....283
Biometric Spoofing and Its Evaluation....284
Synonyms....284
Definitions....284
Background ....284
Evolution....284
Errors of a Biometric System: Matching and Spoofing Detection....285
Theory and Application....287
Open Problems and Future Directions....287
Cross-References....287
References....287
Biometric Spoofing Evaluation....287
Biometric Standards....287
Definition....287
Background....287
Standards Developing Organizations (SDOs)....288
Application....289
Biometric Systems (INCITS/ISO/IEC 19794-1:2011 2018)....289
Types of Biometric Standards....289
Future Directions....293
References....294
Biometric Systems Evaluation....295
Synonyms....295
Definitions....295
Background ....295
Types of Evaluation....296
Evolution....296
Theory and Application....296
Technology Evaluation....296
Scenario Evaluation....298
Operational Evaluation....298
Open Problems and Future Directions....298
Cross-References....299
References....299
Biometric Testing....299
Biometric Transducers....299
Biometric Verification Errors....300
Biometrics....300
Biometrics (Synthetic, Artificial, Inverse, Recognition, Privacy, Forensics, Social Responsibility)....300
Biometrics Attacks....300
Biometrics for Authentication....300
Biometrics for Enrolment....300
Biometrics for Forensics....300
Synonyms....300
Definition....300
Background....300
Theory....301
Forensic Science....301
Computational Biometrics....301
Applications....301
Open Problems....304
Cross-References....304
Recommended Reading....305
Biometrics for Identity Management....305
Synonyms....305
Definition....305
Background....305
Theory or Application or Both....305
Biometrics in Identity Management....305
Biometrics and Authentication....306
Modalities and Maintenance....307
Storage of Biometric Reference....308
Use Cases....308
Open Problems and Future Directions....308
Cross-References....308
References....309
Biometrics for Wearable Devices....309
Background....309
Application....309
Wearable Constraints....309
Wearable Authentication....310
Case Study with NetHealth Biometric Dataset....310
NetHealth Dataset....310
Feature Engineering and Modeling....310
Case Study Findings....310
Open Problems and Future Directions....311
Summary....311
References....311
Biometrics in Ambient Intelligence....312
Related Concepts....312
Definition....312
Background....312
Application....313
Open Problems and Future Directions....314
Summary....315
Cross-References....315
References....315
Biometrics in Border Control....315
Background....315
Application....316
Open Problems and Future Directions....316
Summary....317
Reference....317
Biometrics in Video Surveillance....317
Synonyms....317
Definition....317
Background....317
Applications....318
Open Problems....319
Noncooperative User Behavior....320
Low Image Resolution....320
Image Blur....320
Interlacing in Video Images....320
Cross-References....320
Recommended Reading....320
Biometrics Security....321
Synonyms....321
Definitions....321
Application....321
Open Problems and Future Directions....322
References....322
Biometrics Vulnerabilities....323
Biometrics: Terms and Definitions....323
Definition....323
Background....323
Theory....323
Biometric Systems....323
Privacy....325
Application....326
Open Problems and Future Directions....327
Summary....327
References....327
BIOS Basic Input Output System....327
Birthday Paradox....327
Definition....327
Applications....328
Cross-References....328
Recommended Reading....328
Bitcoin....328
Definition....328
Background....328
Limitations, Mitigations, and Future directions....329
Cross-References....330
References....330
Black Box Algorithms....331
Black Hat Hacker....331
Blackmailing Attacks....331
Definition....331
Cross-References....331
Recommended Reading....331
Blind Signature....331
Synonyms....331
Definitions....331
Background ....331
Theory and Application....332
Open Problems and Future Directions....332
Cross-References....332
References....332
Blinding....333
Blinding Techniques....333
Synonyms....333
Definitions....333
Theory and Application....333
Cross-References....335
References....335
Block Ciphers....335
Definition....335
Background....335
Theory....335
Recommended Reading....342
Blowfish....342
Cross-References....343
Recommended Reading....343
BLP....343
BLP Model....343
BLS Short Digital Signatures....343
Background....343
Theory....344
Cross-References....344
Recommended Reading....344
Bluetooth Insecurity....345
Bluetooth Security....345
Synonyms....345
Definitions....345
Background....345
Theory....345
Secure Simple Pairing....345
LE Legacy Pairing....346
BR/EDR Legacy Pairing....346
Applications....346
Cross-References....346
References....346
Blum Integer....346
Definition....346
Background....347
Theory....347
Applications....347
Cross-References....347
Recommended Reading....347
Blum–Blum–Shub Pseudorandom Bit Generator....347
Definition....347
Theory....347
Cross-References....348
Recommended Reading....348
Blum–Goldwasser Public Key Encryption System....349
Definition....349
Theory....349
Cross-References....350
References....350
Boolean Functions....350
Synonyms....350
Definition....350
Background....350
Theory....350
Cross-References....354
Recommended Reading....354
Boolean Interrogations on Encrypted Data....354
Boomerang Attack....354
Definition....354
Theory....354
Cross-References....355
Recommended Reading....355
Botnet Detection in Enterprise Networks....355
Background....355
Theory and Applications....356
Open Problems....357
Cross-References....357
Recommended Reading....357
Broadcast Authentication from a Conditional Perspective....358
Synonyms....358
Definition....358
Background....358
Theory....358
Solutions Using Symmetric Cryptography....358
Solutions Using Asymmetric Cryptography....359
Applications....360
Open Problems....360
Cross-References....360
Recommended Reading....360
Broadcast Authentication from an Information Theoretic Perspective....360
Synonyms....360
Definition....361
Background....361
Theory....361
Cross-References....362
References....362
Broadcast Encryption....362
Definition....362
Background....362
Theory....363
Constructions....364
Fiat–Naor Construction....364
Logical Key Hierarchy....365
Subset Difference....365
References....366
Broadcast Stream Authentication....366
Browser Cookie....366
BSP Board Support Package....366
Buffer Overflow Attacks....367
Synonyms....367
Definition....367
Background....367
Application....367
Open Problems....370
Recommended Reading....370
Buffer Overrun....370
Bytecode Verification....370
Definition....370
Background....370
Applications....371
Recommended Reading....372
Byzantine Agreement....372
Synonyms....372
Definition....372
Background....372
Theory....373
Open Problems and Future Directions....376
Cross-References....376
References....376
C....378
C2 – Block Cipher....378
Definition....378
Background....378
Theory....378
Experimental Results....379
Cross-References....379
Recommended Reading....379
C2/CnC: Command and Control....379
Cæsar Cipher....380
Definition....380
Background....380
Cross-References....380
Recommended Reading....380
Camellia....380
Cross-References....382
Recommended Reading....382
Camouflage....382
Cascade Revoke....382
Cast....382
Cross-References....383
Recommended Reading....383
Cayley Hash Functions....383
Definition....383
Background....384
Theory....384
Open Problems....384
Cross-References....384
References....385
CBC-MAC and Variants....385
Definition....385
Background....385
Theory....385
Simple CBC-MAC....385
Variants of CBC-MAC....386
Standardization....388
Cross-References....389
Recommended Reading....389
CCIT2-CodeFriedrich L. Bauer: deceased.....390
Definition....390
Recommended Reading....390
CDH....390
Cellular Network Security....390
Cellular Privacy....390
Synonyms....390
Definition....390
Background....390
Theory....391
Applications....391
Open Problems and Future Directions....393
Cross-References....393
References....393
(Centralized) Multi-authority Attribute-Based Encryption....394
Certificate....394
Definition....394
Background....394
Applications....394
Cross-References....395
References....395
Certificate Management....396
Related Concepts....396
Definition....396
Certificate of Primality....396
Synonyms....396
Definition....396
Cross-References....396
Certificate Revocation....396
Definition....396
Applications....397
Periodic Publication Mechanisms....397
Online Query Mechanisms....398
Other Revocation Options....399
Cross-References....399
References....399
Certificateless Cryptography....400
Definition....400
Background....400
Theory....400
Applications....401
Open Problems and Future Directions....401
Cross-References....401
Recommended Reading....401
Certification Authority....401
Synonyms....401
Definition....401
Background....402
Deployment Results....404
Cross-References....404
References....404
Certified Mail....404
Synonyms....404
Definition....404
Background....404
Theory....404
Cross-References....405
References....405
Chaffing and Winnowing....406
Synonyms....406
Definitions....406
Background....406
Theory....406
Open Problems and Future Directions....407
References....408
Challenge-Response Authentication....408
Challenge-Response Identification....408
Synonyms....408
Related Concepts....408
Definition....408
Background....408
Theory....408
Applications....410
Open Problems and Future Directions....410
Cross-References....410
References....410
Challenge-Response Protocol....410
Chaum Blind Signature Scheme....410
Definitions....410
Theory....410
Cross-References....411
References....411
Chemical Combinatorial Attack....412
Definition....412
Experimental Results....412
Recommended Reading....412
Chinese Remainder Theorem....412
Synonyms....412
Definition....412
Background....412
Theory....412
Applications....413
Cross-References....414
Recommended Reading....414
Chinese Wall....414
Definition....414
Background....414
Theory....414
Applications....416
Cross-References....416
References....416
Chip Card....416
Chosen Ciphertext Attack....416
Definition....416
Cross-References....416
Recommended Reading....416
Chosen Plaintext and Chosen Ciphertext Attack....416
Definition....416
Cross-References....417
Chosen Plaintext Attack....417
Definition....417
Theory....417
Cross-References....417
Recommended Reading....417
Chosen-Prefix Attack....417
Chromosome....417
Chroot Jail....417
Synonyms....417
Definition....417
Background....418
Theory....418
Applications....418
Cross-References....419
Recommended Reading....419
Chroot Prison....419
Ciphertext-Only Attack....419
Definition....419
Cross-References....419
Recommended Reading....419
Ciphertext-Policy ABE....419
Clark and Wilson Model....419
Definition....419
Background....420
Theory....420
Cross-References....421
References....421
Classical Cryptosystem....421
Claw-Free....421
Definition....421
Background....422
Theory....422
Applications....422
Cross-References....422
Recommended Reading....422
CLEFIA....422
Definition....422
Background....422
Theory....422
Cross-References....423
Recommended Reading....423
Client Puzzles....423
Cliptography....423
Clock-Controlled Generator....424
Definition....424
Background....424
Theory....424
Applications....424
Example: The Alternating Step Generator....425
Cross-References....425
Recommended Reading....425
Closest Vector Problem....426
Synonyms....426
Definition....426
Background....426
Theory....426
Applications....427
Open Problems....427
Cross-References....427
Recommended Reading....427
Cloud Security....427
CMAC....428
Definition....428
Background....428
Theory....428
Cross-References....429
Recommended Reading....429
CMVP—Cryptographic Module Validation Program....429
Code Verification....429
Code-Based Cryptography....429
Definition....429
Applications....430
Cross-References....430
References....430
Codebook Attack....430
Definition....430
Applications....430
Cross-References....431
Cognitive Style....431
Collaborative DoS Defenses....431
Definition....431
Background....431
Applications....431
Attack Response Approaches....432
Attack Prevention Approaches....434
Open Problems and Future Directions....434
Cross-References....434
References....434
Collective Behavior....435
Collective Privacy....435
Collective Remote Attestation....435
Collision Attack....435
Definition....435
Background....435
Theory....435
Cross-References....436
References....436
Collision Fault Analysis....437
Collision Resistance....437
Synonyms....437
Definition....437
Background....437
Theory....437
Cross-References....438
References....438
Combination Generator....438
Definition....438
Theory....439
Cross-References....440
Recommended Reading....440
Commercial Off-the-Shelf....440
Commitment....441
Definition....441
Background....441
Theory....441
Cross-References....442
References....443
Commitment Schemes....443
Common Criteria....444
Synonyms....444
Definition....444
Background....444
Theory and Application....444
Acronyms....447
Open Problems....447
Recommended Reading....447
Common Criteria, from a Security Policies Perspective....447
Synonyms....447
Definition....447
Background....447
Theory....448
Evaluated Product....448
Security Requirements....448
Security Evaluation....449
Applications....450
Open Problems....450
References....450
Communication Channel Anonymity....450
Synonyms....450
Definitions....450
Background....451
Theory and Applications....451
Open Problems and Future Directions....452
References....453
Complexity Theory....453
Compliance Fatigue....453
Compositeness Test....453
Compromising Emanations....453
Computational Complexity....453
Synonyms....453
Definition....453
Theory....454
Open Problems....460
Cross-References....460
Recommended Reading....460
Computational Diffie-Hellman Problem....460
Synonyms....460
Definition....460
Background....460
Theory....461
Applications....461
Bit Security of the Diffie-Hellman Secret Key....462
Number Theoretic and Algebraic Properties....463
Cross-References....463
Recommended Reading....463
Computational Puzzles....465
Synonyms....465
Definition....465
Background....465
Theory....465
Applications....466
Recommended Reading....466
Computational Versus Unconditional Security....467
Definition....467
Cross-References....467
Recommended Reading....467
Computationally Sound Proof System....467
Conceptual Design of Secure Databases....467
Synonyms....467
Definition....467
Background....468
Application....468
Open Problems and Future Directions....471
References....471
Conceptual Modeling....471
Conditional k-Anonymity for Multidimensional Data....471
Conditional Lower Bounds for Oblivious RAM....471
Introduction....471
Background....472
The ORAM Model....472
Conditional Lower Bounds....473
The Boyle–Naor Lower Bound: Offline ORAM (Without Balls-and-Bins)....473
The Weiss–Wichs Lower Bound: Online Read-Only ORAM....473
Cross-References....474
References....474
Conference Key Agreement....474
Conference Keying....474
Confidential Data Storage....475
Synonyms....475
Definition....475
Background....475
Application....475
Open Problems and Future Directions....475
Cross-References....476
References....476
Confidential Queries for Encrypted Relational DBMS....476
Synonyms....476
Definitions....476
Private Queries Through Multilayered Encryption....477
Private Queries Through Searchable Symmetric Encryption....477
Private Queries Mediated by Trusted Hardware....478
Cross-References....478
References....478
Confidential Storage....479
Confidentiality....479
Configuration Security....479
Synonyms....479
Definition....479
Background....479
Theory....479
Application....480
Open Problems and Future Directions....481
Cross-References....481
References....481
Confirmer Signatures....481
Consensus....481
Consistency Verification of Security Policy....481
Contactless Cards....481
Definition....481
Background....481
Theory....481
Applications....482
Cross-References....482
Recommended Reading....482
Contactless Palmprint Biometrics....482
Content-Based and View-Based Access Control....482
Definition....482
Background....482
Theory....483
View Authorization....483
Content-Based Authorization....483
Row-Level Security....485
Open Problems....485
Cross-References....486
Recommended Reading....486
Context-Awareness....486
Context-Based Micro-training....486
Definition....486
Background....487
Theory and Application....487
Open Problems and Future Directions....488
Cross-References....489
References....489
Continuous Authentication....489
Synonyms....489
Definitions....489
Background....489
Application ....489
Open Problems and Future Directions....491
Summary....492
Cross-References....492
References....492
Contract Signing....492
Synonyms....492
Definition....492
Background....492
Theory....492
Cross-References....493
References....493
Control Vector....494
Definition....494
Background....494
Theory....494
Applications....494
Open Problems....494
Recommended Reading....494
Controlled Data Sharing in DOSNs....494
Conventional Cryptosystem....495
Cookie....495
Synonyms....495
Definition....495
Background....495
Theory....495
Applications....496
Open Problems and Future Directions....496
Cross-References....496
Recommended Reading....497
Coprime....497
Copy Protection....497
Definition....497
Theory and Applications....497
Open Problems....500
Recommended Reading....501
Corporations....501
Correcting-Block Attack....501
Synonyms....501
Definition....501
Background....501
Theory....501
Applications....502
Cross-References....502
References....502
Correlation Attack for Stream Ciphers....503
Definition....503
Theory....503
Cross-References....505
Recommended Reading....505
Correlation Immune and Resilient Boolean Functions....505
Definition....505
Background....505
Theory....505
Cross-References....507
Recommended Reading....507
Countermeasure Identification....507
Cover Story....507
Definition....507
Background....507
Theory....508
Cross-References....509
References....509
Covert Channels....509
Definition....509
Theory....509
Cross-References....510
References....510
Covert Channels over Wi-Fi....511
Synonyms....511
Definitions....511
Background....511
Theory....511
Application....512
References....512
CPS....513
CPS Forensics....513
CPS, Certificate Practice Statement....513
Definition....513
Background....513
Theory....513
Cross-References....514
Recommended Reading....514
CPU Consumption....514
CPU Denial of Service....514
Synonyms....514
Definition....514
Background....514
Theory....515
Applications....515
Open Problems....515
Recommended Reading....516
CPU Starvation....516
Cramer–Shoup Public-Key System....516
Definition....516
Background....516
Theory....516
Cross-References....517
Recommended Reading....517
Credential Vaulting....518
Synonyms....518
Definition....518
The Application....518
Future Directions....519
References....519
Credential Verification....519
Credential-Based Access Control....520
Definition....520
Background....520
Theory....520
Applications....521
Open Problems and Future Directions....521
Cross-References....522
References....522
Critical Information Infrastructure Protection....522
Critical Infrastructure....522
Cross Site Scripting Attacks....522
Synonyms....522
Definition....522
Theory....522
Recommended Reading....524
Cross-Chains....524
Cross-Correlation....524
Definition....524
Applications....524
Cross-References....524
Recommended Reading....524
CRT....525
Cryptanalysis....525
Definition....525
Applications....525
Statistical Approaches to Classical Cryptosystems....526
Cross-References....528
Recommended Reading....528
Crypto Machines....529
Definition....529
Applications*-7pt....529
Cross-References....531
Recommended Reading....531
Cryptographic Algorithm Evaluation....531
Cryptographic Credentials....531
Definition....531
Theory....531
Applications....534
Cross-References....534
Recommended Reading....534
Cryptographic Obfuscation....535
Cryptographic Protocol Verification....535
Cryptographic Puzzles....535
Cryptographic Subversion Attack....535
Cryptographically Enforced Dynamic Access Control....535
Cryptography on Reconfigurable Devices....535
Cryptology....535
Definition....535
Cross-References....537
Recommended Reading....537
Cryptophthora....537
Synonyms....537
Definition....537
Open Problems....537
Cross-References....537
Recommended Reading....537
Cryptosystem....537
Definition....537
Applications....537
Cross-References....538
Recommended Reading....538
CRYPTREC (Japanese Cryptographic Algorithm Evaluation Project)....538
Synonyms....538
Definition....538
Background....538
Applications....538
Overview....538
History....540
Open Problems (Future Schedules)....541
Other Activities....542
Cross-References....542
Recommended Reading....542
CTI: Cyber Threat Intelligence....542
Cube Attack....542
Synonyms....542
Related Concepts....542
Definition....543
Background....543
Theory....543
Scenario of the Cube Attack....544
Applications....544
References....544
Cut-and-Choose Protocol....545
Definition....545
Background....545
Cross-References....545
Recommended Reading....545
CVE-2017-5715....545
CVE-2017-5753....545
CVE-2017-5754....545
Cyber Attack Insurance/Protection....545
Cyber Awareness....546
Cyber Bonds....546
Cyber Crime....546
Synonyms....546
Definition....546
Background....546
Theory and Application....546
Theft....546
Disruption....547
Manipulation....547
Hybrid Activity....547
Open Problems and Future Directions....548
References....548
Cyber Crime Insurance/Protection....548
Cyber Deception....548
Synonyms....548
Definition....548
Background....548
Theory and Applications....549
Offensive Deception....549
Defensive Deception....549
Deception for Encouragement....549
Deception for Discouragement....550
The Costs of Deception....550
The Ethics of Deception....551
Open Problems and Future Directions....551
Cross-References....551
References....551
Cyber Deception Engineering....551
Synonyms....551
Definition....551
Background....551
Theory....552
Application....553
Open Problems and Future Directions....554
Cross-References....554
References....554
Cyber Derivatives....555
Cyber Forensics for Cyber-Physical Systems....555
Synonyms....555
Definitions....555
Background....555
Application....555
Open Problems and Future Directions....556
References....557
Cyber Insurance....557
Cyber Insurance and Security Investment Strategy....557
Synonyms....557
Definitions....557
Background....557
Theory....558
Modeling Cyber Risks....558
Pricing Cyber Insurance Contracts....559
Cyber Insurance and Security Investment Decisions....560
Open Problems and Future Directions....560
Cross-References....561
References....561
Cyber Insurance: Models and Challenges....561
Synonyms....561
Definition....561
Background....562
Theory and Applications....562
Actuarial Model for Pricing Cyber Insurance....562
Nonactuarial Model for Risk Management....564
Open Problems and Future Directions....564
References....564
Cyber Ransom....565
Cyber Risk Assessment....565
Cyber Risk Insurance, Lessons Learned So Far....565
Synonyms....565
Definition....565
Background....565
Theory and Application....566
Research Trends....567
Open Problems and Future Directions....567
Cross-References....568
References....568
Cyber Risk Measurement....569
Cyber Risk Protection....569
Cyber Risk Quantification....569
Synonyms....569
Definition....569
Theory....569
Open Problems and Future Directions....571
Cross-References....571
References....571
Cyber Risk Transfer....571
Cyber Risk, Risk Transfer, and Financial Innovation....571
Synonyms....571
Definition....571
Background....572
Theory and Application....572
Open Problems and Future Directions....574
Cross-References....574
References....574
Cyber Security Insurance Models....574
Cyber Security Insurance/Protection....574
Cyber Security Liability Insurance/Protection....574
Cyber Situational Awareness....574
Definition....574
Background....575
Theory....575
Cyber SA Data Triaging Systems....575
Desirable Cyber SA Capabilities....576
Open Problems and Future Directions....576
Cross-References....576
References....576
Cyber Threat Intelligence....576
Synonyms....576
Definition....576
Background....577
Theory and Applications....577
Open Problems and Future Directions....578
Cross-References....578
References....578
Cyber Threat Intelligence Sharing....579
Synonyms....579
Definition....579
Background....579
Theory and Applications....579
Open Problems and Future Directions....580
Cross-References....580
References....580
Cyberattacks in Wireless IoT Systems....581
Cyber-Insurance Economics....581
Cyber-Insurance Market....581
Synonyms....581
Definition....581
Historical Background....581
A Techno-Economic Overview....582
Open Problems and Future Directions....583
Cross-References....585
References....585
Cyber-Insurance: Past, Present and Future....586
Definitions....586
Outline....587
Background....587
Advantages....589
Key Challenges....589
References....589
Cyber-Liability Economics....590
Cyber-Physical Range....590
Cyber-Physical System....590
Synonyms....590
Definition....590
Background....590
Theory and Application....590
Open Problems and Future Directions....591
Cross-References....592
References....592
Cyber-Physical Systems Governance....593
Cyber-Physical Systems Security....593
Cyberpsychology....593
Cybersecurity Awareness....593
Synonyms....593
Definition....593
Background....593
Theory and Application....594
Cybersecurity Awareness in Practice....595
Open Problems and Future directions....595
Cross-References....596
References....596
Cybersecurity Capability Maturity Model....596
Cybersecurity Insurance....596
Cybersecurity Knowledge....597
Cybersecurity of the Low-Power Wide Area Networks (LPWAN)....597
Synonyms....597
Definition....597
Background....597
Theory....597
Future Directions....598
Cross-References....598
References....599
Cybersecurity Skills....599
Synonyms....599
Definition....599
Background....599
Theory and Application....600
Technical Skills....600
Domain-Aligned....600
Offensive-v-Defensive Security....600
Cloud-Native Skills....601
Developer Skills....601
Process Skills....601
People Skills....602
Security Awareness....602
Pragmatic Security....602
Executive Reporting and Metrics....602
Open Problems and Future Directions....602
The Cybersecurity Skills Shortage....602
Cross-References....603
References....603
Cyclic Codes....603
Synonyms....603
Definition....603
Background....603
Theory....603
Applications....607
Cross-References....608
Recommended Reading....608
D....609
DAC....609
Data Act....609
Synonyms....609
Definition....609
Background....609
Theory and Application....610
Open Problems and Future Directions....610
Cross-References....610
References....611
Data Anonymization....611
Data Breach....611
Data Breach Impacts....611
Data Encryption....611
Data Encryption Standard (DES)....611
Background....611
Definition....612
Theory....612
Cryptanalysis of DES....613
Extensions of DES....616
Cross-References....617
Recommended Reading....617
Data Exfiltration....618
Synonyms....618
Definitions....618
Background....619
Theory/Application....619
Open Problems and Future Directions....620
Cross-References....620
References....620
Data Extrusion....620
Data Governance Act (DGA)....620
Synonyms....620
Definition....621
Background....621
Theory and Application....621
Open Problems and Future Directions....622
Cross-References....622
References....622
Data Leakage....622
Data Linkage....622
Synonyms....622
Definition....623
Background....623
Theory....623
Applications....625
Cross-References....625
Recommended Reading....625
Data Mining (Privacy in)....626
Synonyms....626
Definition....626
Background....626
Theory and Algorithms....626
Applications....627
Medical Databases....627
Bioterrorism Applications....628
Homeland Security Applications....628
Cross-References....629
Recommended Reading....629
Data Poisoning Attacks in Machine Learning....629
Synonyms....629
Definition....629
Background....629
Theory....630
Threat Model (A subsection of Theory)....630
Data Governance Scenarios (A subsection of Theory)....631
Attack Models (A subsection of Theory)....631
Defense Strategies (A subsection of Theory)....631
Open Problems and Future Directions....632
Cross-References....633
References....633
Data Privacy Regulations....633
Data Protection by Design....633
Data Protection by Design and by Default (DPbDD)....633
Synonyms....633
Definition....633
Background....634
Theory....634
Open Problems and Future Directions....635
Cross-References....635
References....635
Data Protection Impact Assessment (DPIA)....636
Synonyms....636
Definition....636
Background....636
Theory....636
Open Problems and Future directions....637
Cross-References....638
References....638
Data Protection Regulations....638
Data Remanence....638
Definition....638
Application....638
References....639
Data Theft....639
Database Administration Policies....639
Database Encryption....639
Synonyms....639
Definition....639
Theory....639
Encryption Level....640
Encryption Algorithm and Mode of Operation....641
Key Management....642
Open Problems and Future Directions....642
Cross-References....644
Recommended Reading....644
Database Governance Policies....644
Database Management Guidelines....644
Database Operational Policies....644
Database Protection....644
Data-Oblivious Shuffle....644
Davies-Meyer....645
Definition....645
Background....645
Theory....645
Cross-References....646
References....646
DDH Problem....646
De Bruijn Sequence....646
Definition....646
Theory and Application....646
Cross-References....648
Recommended Reading....648
Decentralized (Multi-authority) Attribute-Based Encryption....648
Decentralized Access Control....648
Decentralized Digital Identity....648
Decentralized Identity for IoT Systems....649
Synonyms....649
Definition....649
Background....649
Theory....650
Decentralized Identifiers (DIDs)....651
Example Scenario....651
Open Problems and Future Directions....653
Cross-References....653
References....653
Decentralized Trust Management....654
Deception....654
Deceptive Software and Networks....654
Decisional Diffie–Hellman Problem....654
Synonyms....654
Definition....654
Background....654
Theory....654
Candidate Groups....656
Applications....656
Cross-References....657
Recommended Reading....657
Decoding Algorithms....658
Synonyms....658
Definition....658
Background....658
Theory....658
Application....659
Cross-References....661
Recommended Reading....661
Decryption Exponent....661
Synonyms....661
Definition....662
Cross-References....662
Deduplication of Encrypted Data....662
Synonyms....662
Definition....662
Background....662
Theory....662
Applications....663
Open Problems....663
Cross-References....664
References....664
Deep Learning....664
Deniable Encryption....664
Definition....664
Theory....664
Cross-References....665
References....665
Denial of Service (DoS)....665
Denial-of-Service Detection....666
Synonyms....666
Definition....666
Background....666
Theory....666
Applications....668
Host Monitors....668
Network Monitors....668
Attack Detection Based on Observation of a Single Packet Stream....668
Deployment Issues: LAN Versus Network Edge Versus Tier-1 ISP....669
Collaborative Detection....670
Attacks Targeting Defenses....670
Attacks Targeting Vulnerabilities of Critical Infrastructure....670
Experimental Results....670
Open Problems and Future Directions....671
Recommended Reading....671
Deobfuscating Malware....671
De-obfuscation....671
Dependency Graphs....672
Synonyms....672
Definition....672
Background....672
Theory....672
Application....673
Open Problems and Future Directions....674
Cross-References....674
References....674
Derived Key....674
Synonyms....674
Definition....674
Theory....674
Cross-References....675
Recommended Reading....675
Designated Confirmer Signature....675
Synonyms....675
Definition....675
Theory....675
Applications....676
Open Problems....676
Cross-References....676
Recommended Reading....677
Designated Verifier Proofs....677
Cross-References....678
References....678
De-skewing....678
DES-X (or DESX)....678
Definition....678
Background....678
Theory....678
Cross-References....679
Recommended Reading....679
Detection and Threat-Hunting Approaches for Advanced Persistent Threats....679
Synonyms....679
Definition....679
Background....679
Application....680
APT Detection Mechanisms....681
Forensic Analysis and Threat Hunting of APTs....681
Open Problems and Future Directions....682
References....682
Detection-Based Countermeasure....683
Synonyms....683
Definitions....683
Background....683
Theory....684
Detection-Based Countermeasures....684
Redundancy in Hardware....685
Redundancy in Time....685
Redundancy in Information....686
Open Problems and Future Directions....686
Cross-References....686
References....687
Detector Placement Strategies....687
Synonyms....687
Definition....687
Background....688
Theory and Application....688
Game-Theoretic Approaches....688
Graph-Theoretic Approaches....689
Open Problems and Future Directions....690
Cross-References....690
References....690
Developer-Centred Security....690
Synonyms....690
Definitions....690
Background....690
Theory and Application....691
Open Problems and Future Directions....692
Cross-References....692
References....692
Device Pairing....692
DH Key Agreement....693
DHP....693
Dictionary Attack....693
Definition....693
Application....693
Cross-References....694
References....694
Dictionary Attack (I)....694
Definition....694
Theory....694
Cross-References....694
Differential Cryptanalysis....694
Cross-References....699
Recommended Reading....699
Differential Fault Analysis....699
Synonyms....699
Definitions....700
Background ....700
Analyzing Block Ciphers....700
Analyzing Public-Key Algorithms....701
Countermeasures....701
Cross-References....702
References....702
Differential Power Analysis....703
Synonyms....703
Definitions....703
Background....703
Theory....703
Open Problems and Future Directions....704
Cross-References....705
References....705
Differential Privacy....705
Synonyms....705
Definition....705
Background....706
Theory....706
Achieving Differential Privacy....706
Applications....707
Experimental Results....708
Open Problems and Future Directions....708
Cross-References....708
Recommended Reading....708
Differential Privacy for Location-Based Systems....708
-Differential Privacy....709
Differential–Linear Attack....709
Definition....709
Theory....709
Cross-References....709
Recommended Reading....709
Differentially Oblivious Algorithms....709
Differentially Private Oblivious RAM....709
Differentially Private ORAM....710
Synonyms....710
Definition....710
Theory....710
Open Problems....711
Cross-References....711
References....711
Diffie-Hellman Key Agreement....712
Synonyms....712
Definition....712
Background....712
Theory....712
Applications....713
Cross-References....713
References....714
Diffie–Hellman Key Exchange....714
Diffie-Hellman Problem....714
Digest Authentication....714
Digital Certificate....714
Digital Control....714
Digital Crime....714
Digital Forensic Readiness....714
Digital Forensics for CPS....714
Digital Signature Scheme Based on McEliece....714
Definition....714
Theory....714
General Idea....715
Signature Scheme Using Complete Decoding....715
Signature Scheme Using a Counter....715
Security and Practice....715
Security....715
Signature Size....716
Cross-References....716
Recommended Reading....716
Digital Signature Schemes....716
Definition....716
Theory....717
Cross-References....717
References....717
Digital Signature Schemes from Codes....717
Definition....717
Theory....718
Stern Identification Scheme and Signature....718
General Idea....718
Description....718
The Fiat-Shamir Paradigm....718
Variations on the Scheme....719
The Kababtiansky-Krouk-Smeets Scheme....719
General Idea....719
The Protocol....719
Security....719
Specialized Signatures....719
Identity-Based Signature....719
Ring Signature....719
Cross-References....720
Recommended Reading....720
Digital Signature Standard....720
Background....720
Theory....720
Cross-References....721
Recommended Reading....721
Digital Steganography....722
Definition....722
Background....722
Theory....722
Security Definition....723
Information-Theoretically Secure Steganography....724
Computationally Secure Steganography....725
Public-Key Steganography....726
Cross-References....727
Recommended Reading....727
Dining Cryptographers (DC) Network....727
Definition....727
Background....727
Theory....728
Open Problems....729
Cross-References....729
References....729
Direct Anonymous Attestation....730
Definition....730
Theory....730
Application....732
Open Problems and Future Directions....733
Cross-References....733
References....733
Disclosure Window....734
Discrete Logarithm Problem....734
Synonyms....734
Definition....734
Background....734
Theory....734
Applications....735
Experimental Results....735
Open Problems....735
Cross-References....735
References....735
Discretionary Access Control (DAC) Policies....736
Synonyms....736
Definition....736
Background....736
Theory and Application....736
Vulnerabilities of the Discretionary Policies....737
Cross-References....738
References....738
Distinguishing Attacks....738
Definition....738
Theory....738
Applications....738
Cross-References....739
Recommended Reading....739
Distributed Differential Privacy....739
Distributed Identity....739
Distributed Oblivious RAM....739
Synonyms....739
Definition....739
Background....739
Theory....740
Model and Definition....740
The Hierarchical Approach....740
Tree-Based Schemes....741
Optimizing Communication Using Server-Side Computation....741
References....742
Distributed Oblivious Transfer....742
Definitions....742
Theory....743
Cross-References....743
References....743
Divide-and-Conquer Side-Channel Attacks....744
Definitions....744
Background....744
Theory and Application....744
Diffusion Property....744
Divide-and-Conquer Methodology....745
Attack Output....746
Asymmetric Cryptography....746
Open Problems and Future Directions....747
References and Citations....747
Citations....747
Cross-References....747
References....747
DLP....747
DNA....748
Synonyms....748
*-12pt....748
Background....748
Theory and Applications....750
DNA Fingerprinting....750
Amplified Fragment Length Polymorphism (AFLP)....750
Satellite DNA....750
Enzymes....751
Regulatory Sequence Analysis Tools....751
Public Databases....751
CODIS System....751
GenBank....751
EMBL....751
DDBJ....751
Open Problems....752
The Drawbacks of DNA Profiling....752
Privacy Issues....752
Recommended Reading....752
DNS-Based Botnet Detection....752
Definition....752
Background....752
Theory and Application....752
Cross-References....753
Recommended Reading....753
DoS Attacks in Wi-Fi Networks....753
Synonyms....753
Definitions....754
Background....754
Application....754
Reactive Jamming....754
Channel Estimation Jamming....754
Interleaving Jamming....754
Medium Access Control (MAC) Attacks....754
Rate Adaptation Algorithms (RAA) Attacks....754
Link Layer Attacks....754
Network-Level Cascading Attacks....754
DoS for Evil Twins....754
Friendly Jamming....754
Open Problems and Future Directions....756
Cross-References....756
References....756
DoS Pushback....757
Definition....757
Introduction....757
Theory....757
Pushback Mechanism....757
Open Problems....758
Discussion....758
Recommended Reading....758
Doubly Efficient Private Information Retrieval....758
Definitions....758
Background....759
Theory....759
Formal Definition....759
Syntax....759
Correctness....759
Double Efficiency....759
Security....759
Definitional Variants....759
Public Client....759
Malicious Preprocessing Security....760
Transparent Preprocessing....760
Candidate Constructions....760
Open Problems and Future Directions....760
Cross-References....761
References....761
DPA....761
Duplication....761
Dynamic Access Control Using Identity-Based Encryption....761
Synonyms....761
Definition....761
Background....761
Security Analysis....763
Efficiency....764
Open Problems and Future Directions....765
Cross-References....765
References....765
Dynamic Analysis....766
Synonyms....766
Definition....766
Theory....766
Applications....767
Cross-References....768
Recommended Reading....768
Dynamic Defenses....768
Dynamic Malware Analysis....769
Synonyms....769
Definition....769
Background....769
Theory and Application....769
Cross-References....770
Recommended Reading....770
Dynamic Program Analysis....770
Dynamic Root of Trust....770
Synonyms....770
Definition....770
Background....771
Theory and Applications....771
Cross-References....771
Recommended Reading....771
Dynamic Separation of Duties....771
E....772
E0....772
Definition....772
Background....772
Theory....773
Applications....773
Cross-References....773
Recommended Reading....773
Ear Biometrics....773
Ears in Biometrics and Identity Science....774
Synonyms....774
Definition....774
Background....774
History of Ear Biometrics....774
Ear Anatomy....774
Ear Recognition....774
Holistic Approaches....775
Local Approaches....775
Geometric Approaches....776
Hybrid Approaches....776
Deep Learning....777
Identity Science and Ear Biometrics....779
Gender Classification from Ear Images....779
Other Information....779
Open Problems and Future Directions....779
References....781
Eavesdropping....782
Synonyms....782
Definition....782
Background....782
Applications....783
Open Problems....783
Cross-References....783
Recommended Reading....783
ECC....783
ECG Authentication....783
ECG Biometrics....783
Synonyms....783
Definition....783
Background....783
Theory....784
Applications....785
Open Problems and Future Directions....785
Cross-References....786
References....786
ECG Identification....786
ECG Verification....786
ECM....786
Economics of Cybercrime: Identity Theft and Fraud....787
Synonyms....787
Definitions....787
Background....787
Collection of Identity Theft and Fraud Data....788
Agency Data....788
Surveys....788
Interviews....788
News Stories....788
Reports from Affected Organizations....788
Anecdotal Information....788
Open Problems and Future Directions....788
References....789
Economics of Information Sharing....789
Synonyms....789
Definition....789
Background....790
Theory and Application....790
Information Sharing Among Firms....790
Sharing Security Information....791
Open Problems and Future Directions....792
Cross-References....792
References....792
Economics of Personal Data....793
Definitions....793
Background....793
Theory and Application....793
Personal Data as an Asset....793
Fair Usage of Personal Data....794
Open Problems and Future Directions....794
Cross-References....795
References....795
Economics of Privacy and Personal Data....795
Synonyms....795
Definition....795
Theory and Application....795
Open Problems and Future Directions....797
Cross-References....797
References....797
Economics of Privacy and the Paradox of Privacy....798
Synonyms....798
Definition....798
Background....798
Theory....798
Open Problems and Future Directions....799
Cross-References....800
References....800
Economics of Privacy: Privacy, a Machine Learning Perspective....800
Synonyms....800
Definitions....800
Background....800
Application....801
Economics of Privacy....802
Open Problems and Future Directions....802
References....802
Economics of Software Vulnerability Markets....803
Synonyms....803
Definition....803
Background....803
Theory and Application....803
Standardization....804
Market Characteristics....805
Open Problems and Future Directions....805
References....807
Economics of Surveillance....807
Synonyms....807
Definitions....807
Theory....807
Open Problems and Future Directions....810
Cross-References....810
References....811
ECPP....811
Edwards Coordinates....811
Edwards Curves....811
Synonyms....811
Definition....811
Background....811
Applications....812
Theory....812
Experimental Results....813
Cross-References....813
Recommended Reading....813
EEG Biometrics....814
Definitions....814
Background....814
Theory....816
Open Problems and Future Directions....818
Cross-References....818
References....818
Efficiency of Hyperelliptic Curve Cryptosystems....819
e-Government....819
Electrocardiogram-Based Biometrics....819
Electromagnetic Attack....819
Definition....819
Introduction....819
Background....819
History....819
Theory....820
Principles....820
Advantages....821
Context....821
Countermeasures....821
Conclusion....822
Cross-References....822
Recommended Reading....822
Electro-Magnetic Fingerprinting....823
Electromagnetic Security....823
Electronic Cash....823
Definition....823
Theory....823
Applications....825
Open Problems and Future Directions....825
Cross-References....825
Editorial Note....825
References....825
Electronic Check....825
Synonyms....825
Definition....825
Background....825
Theory....825
Applications....825
Cross-References....826
Recommended Reading....826
Electronic Crime....826
Electronic Payment....826
Definition....826
Background....826
Theory....826
Applications....827
Cross-References....828
References....828
Electronic Postage....828
Definition....828
Background....828
Theory....829
Applications....830
Cross-References....830
Editorial Note....830
Recommended Reading....831
Electronic Purse....831
Electronic Voting Schemes....831
Definition....831
Background....831
Theory....831
Discussion....832
References....833
Electronic Wallet....833
Synonyms....833
Definition....833
Background....833
Theory....833
Applications....835
Cross-References....835
Editorial Note....835
Recommended Reading....835
ElGamal Digital Signature Scheme....835
Background....835
Theory....836
Cross-References....836
Recommended Reading....837
ElGamal Encryption....837
ElGamal Public Key Encryption....837
Synonyms....837
Definition....837
Theory....837
Cross-References....837
References....838
Elliptic Curve Cryptography....838
Synonyms....838
Definition....838
Background....838
Theory....838
Cross-References....839
References....839
Elliptic Curve Discrete Logarithm Problem....839
Definition....839
Background....839
Theory....839
Pollard's Rho Method....839
Index-Calculus Methods....840
Special-Purpose Algorithms....840
Attack on Prime-Field Anomalous Curves....840
Weil and Tate Pairing Attacks....841
Weil Descent....841
Cross-References....841
References....841
Elliptic Curve Isogenies....842
Definition....842
Applications....842
Theory....843
Vélu's Formulas....843
Endomorphism Ring....844
References....844
Elliptic Curve Key Agreement Schemes....845
Definition....845
Background....845
Application....845
Cross-References....846
References....846
Elliptic Curve Keys....846
Definition....846
Background....846
Application....846
Cross-References....847
References....847
Elliptic Curve Method for Factoring....847
Synonyms....847
Definition....847
Background....848
Theory....848
Applications....848
Experimental Results....849
Open Problems....849
Cross-References....849
Recommended Reading....849
Elliptic Curve Point Multiplication Using Halving....849
Definition....849
Background....849
Point Halving....850
Trace computations....850
Solving the quadratic equation....850
Computing square roots....850
Point Multiplication....851
Summary....851
References....853
Elliptic Curve Public-Key Encryption Schemes....853
Definition....853
Background....853
Applications....854
Cross-References....854
Recommended Reading....854
Elliptic Curve Signature Schemes....854
Definition....854
Background....855
Application....855
Cross-References....856
References....856
Elliptic Curve Trace computation....856
Elliptic Curves....856
Definition....856
Background....857
Theory....857
Simplified Weierstrass Equation....857
Group Law....858
Group Law for E/F:y2=x3+ax+b, char(F) ≠2,3....858
Group Law for E/F:y2+xy=x3+ax2+b, char(F) = 2....858
Group Order....859
Group Structure....859
Example....860
Cross-References....860
References....860
Elliptic Curves for Primality Proving....860
Synonyms....860
Definition....860
Background....860
Theory....861
Experimental Results....861
Cross-References....861
Recommended Reading....861
EMV....862
Definition....862
Background....862
Application: The EMV Architecture....863
The Transaction Flow....863
Offline Data Authentication (Offline CAM)....863
Online Card Authentication....863
Cardholder Verification Method....865
Terminal and Card Risk Management....866
Approved Algorithms....866
Cross-References....866
Recommended Reading....866
Encapsulation....867
Encoding....867
Encrypted Data Deduplication....867
Encrypted Data Indexing....867
Encrypted Keyword Index....867
Encrypted Ranked Search....867
Encrypted Relational Databases....867
Definitions....867
Background....867
Design Principles....868
Cross-References....869
References....869
Encrypted Search on Secure Enclaves....870
Encryption....870
Encryption – Historical Perspective....870
Definition....870
Example....870
Cross-References....870
Editorial Note....870
Recommended Reading....870
Encryption Exponent....871
Synonyms....871
Definition....871
Cross-References....871
Endowment Effect....871
Synonyms....871
Definitions....871
Theory....871
Open Problems and Future Directions....872
Cross-References....872
References....872
Enigma....872
Definition....872
Background....872
Theory (of Encryption and Cryptoanalysis)....874
Cross-References....876
Recommended Reading....876
Entity Authentication....877
Synonyms....877
Definition....877
Theory....877
Applications....877
Open Problems and Future Directions....878
Cross-References....878
References....878
Entity Authentication Protocol....878
Entity Resolution....878
Entropy Sources....878
Definition....878
Background....878
Theory....878
Entropy Density....879
Entropy Definition....879
Attack Models....879
Model 1....879
Model 2....880
Entropy Pool Architecture....880
Entropy Compression....880
Entropy Extraction....880
Experimental Results....880
Open Problems and Future Direction....881
Cross-References....881
Recommended Reading....881
ePassport Security....881
Error-Correcting Cyclic Codes....881
Error-Correction Decoding....881
Escrow Service....881
Ethical Aspects of Biometrics....881
Ethical Implications of Biometrics....881
Ethics of Biometrics....881
Synonyms....881
Definition....881
Background....882
Human Dignity....882
Surveillance....883
Privacy and Data Protection....883
Open Problems....884
Summary....885
References....885
Euclidean Algorithm....885
Synonyms....885
Definition....886
Background....886
Theory....886
Applications....889
Cross-References....889
Recommended Reading....889
Euclidean Lattice....889
Euclids Algorithm....889
Euler's Totient Function....889
Synonyms....889
Definition....889
Theory....889
Applications....890
Cross-References....890
Everywhere Second Preimage Resistant Hash Function (ESEC)....890
Evolution of Fault Attacks on Cryptosystems....890
Synonyms....890
Definitions....890
Background....890
Theory....891
Fault-Induced Information Leakage....891
Fault Injection Techniques....892
Countermeasures....892
Automated Tools....893
Open Problems and Future Directions....894
Cross-References....894
References....894
Exhaustive Key Search....896
Introduction....896
History....897
Modern Block Ciphers....898
Countermeasures....898
Frequent Key Changes....898
Eliminate Known Plaintext....898
Different Modes of Encryption....899
Extensive Key Setup....899
All-or-Nothing Encryption....899
Related Attacks....899
Conclusion....900
Cross-References....900
Recommended Reading....900
Existential Forgery of Digital Signatures....900
Definition....900
Applications....900
Recommended Reading....900
Explainable AI....901
Explainable Artificial Intelligence....901
Synonyms....901
Definition....901
Background....901
Theory....901
Open Problems and Future Directions....902
Cross-References....902
References....902
Explaining for the Paradoxical Behavior in Privacy Choices....902
Exploit and Vulnerability Trade....902
Exploit Dependency Graphs....902
Exploit Pricing....903
Exponential Key Exchange....903
Exponential Time....903
Definition....903
Theory....903
Applications....903
Cross-References....903
2k-Ary Exponentiation....903
Synonyms....903
Definition....903
Background....904
Theory....904
Cross-References....905
Recommended Reading....905
Exponentiation Algorithms....905
Definition....905
Background....905
Theory....906
General Exponentiation....906
Fixed-Base Exponentiation....906
Fixed-Exponent Exponentiation....906
Applications....907
Cross-References....907
Exposure....907
Exposure-Resilient Cryptography....907
Extend and Prune Side-Channel Attacks....907
Definitions....907
Background....907
Theory an Application....908
Elliptic Curve Cryptography....908
Extend and Prune Methodology....908
Applications: Attack Literature....910
Open Problems and Future Directions....910
References and Citations....910
Citations....910
Cross-References....911
References....911
Extended Euclidean Algorithm....911
Extension Field....911
Definition....911
Theory....911
Applications....912
Cross-References....912
Eye Region....912
Eye-Based Vascular Biometrics....912
Eye-Based Vascular Patterns....912
Synonyms....912
Definitions....912
Background....913
Commercial Systems....913
Open problems and Future directions....914
Mobile and On-the-Move Acquisition....914
Disease Impact and (Template) Privacy....914
Real-world Performance and Deployment....914
References....915
Eye-Based Vascular Recognition....915
F....916
3D Face....916
Synonyms....916
Definitions....916
Theory and Application....917
3D Face Representation....917
3D Face Acquisition....917
3D Face Recognition Systems....918
Open Problems and Future Directions....919
Summary....920
Cross-References....920
References....920
Face Association....920
Face Depth Map....920
Face Detection....921
Face Identification....921
Face Mesh....921
Face Morphable Model....921
Face Recognition from Still Images and Video....921
Synonyms....921
Definition....921
Background....921
Datasets....921
Face Detection and Alignment....922
Feature Representation....922
Face Association....922
Theory and Applications....923
Loss Function....923
Applications....924
Open Problems....924
References....924
Face Recognition Under Atmospheric Turbulence....926
Face Tracking....926
Face Verification....926
Facial Recognition....926
Factor Base....926
Definition....926
Applications....926
Cross-References....926
Factorization Circuits....926
Definition....926
Theory and Applications....926
Cross-References....928
Recommended Reading....928
Fail-Stop Signature....928
Definition....928
Background....929
Theory....929
Applications....930
Recommended Reading....930
Fair Exchange....930
Synonyms....930
Definition....930
Background....930
Theory....931
Cross-References....932
References....932
Fake Biometrics....932
False Data Filtering....932
False Data Injection Defense....932
Synonyms....932
Definition....932
Background....932
Theory and Application....933
Open Problems....934
Recommended Reading....934
Fast Correlation Attack....934
Definition....934
Theory....934
Applications....935
Cross-References....936
Recommended Reading....936
Fault Analysis....937
Fault Attack....937
Definition....937
Introduction....937
Fault Injection....937
Fault Exploitation....938
Cross-References....939
Recommended Reading....939
Fault Countermeasures....939
Fault Detection....939
Fault Diagnosis in Cyber-Physical Systems....939
Synonyms....939
Definitions....939
Background....939
Theory....940
Open Problems and Future Directions....942
Discrimination of Various Types of Faults....942
Distinguishing Faults from Malicious Attacks....943
Automated Decision-Making for Large-Scale CPS Systems....943
References....943
Fault Identification in Cyber-Physical Systems....944
Fault Injection....944
Fault Injection Attacks....944
Fault Isolation....944
Fault Sensitivity Analysis....944
Definitions....944
Introduction....944
FSA Attack on AES....945
Countermeasure....946
References....946
Fault Tolerance in Cyber-Physical Systems....946
Synonyms....946
Definitions....946
Theory and Application....946
Open Problems and Future Directions....948
Cross-References....948
References....948
FEAL....948
Cross-References....949
Recommended Reading....950
Fear Appeals....950
Feistel Cipher....950
Definition....950
Theory....950
Cross-References....951
Fermat Primality Test....951
Synonyms....951
Definition....951
Background....951
Theory....951
Cross-References....951
Recommended Reading....951
Fermat Test....952
Fermat's Little Theorem....952
Definition....952
Background....952
Theory....952
Cross-References....952
Recommended Reading....952
Field....952
Definition....952
Theory....953
Applications....953
Cross-References....953
File System Permissions....953
Filter Generator....953
Definition....953
Theory....953
Cross-References....955
Recommended Reading....955
Financial Innovation....956
Finger Back Surface Identification....956
Finger Dorsal Patterns Identification....956
Finger Knuckle Patterns Recognition....956
Finger Knuckle Print Recognition....956
Synonyms....956
Definition....956
Background....956
Theory....957
Characteristics of FKP Images....957
Construction of FKP Systems....957
Application....958
2D FKP Recognition....958
3D FKP Recognition....958
Open Problems and Future Directions....959
References....960
Finger Knuckle Surface Authentication....960
Finger Surface Identification....960
Finger Vein....960
Definitions....960
Background....960
Applications....961
Finger Vein Capture Devices....961
Biometric Recognition....961
Presentation Attack Detection....962
Biometric Template Protection....963
Finger Vein Quality....963
Commercial Use....963
Open Problems and Future Directions....964
References....964
Finger Vein Recognition....965
Fingerprint....965
Definition....965
Background....965
Theory....966
Fingerprint Images....966
Fingerprint Analysis....966
Fingerprint Matching....969
Security and Privacy in Fingerprint Recognition Systems....969
Open Problems and Future Directions....970
Summary....970
References....970
3D Fingerprint....971
Synonyms....971
Definitions....971
Background....971
Theory ....971
3D Fingerprint Reconstruction....971
3D Fingerprint Recognition....973
Open Problems and Future Directions....973
Summary....973
References....973
Fingerprint Authentication....974
3D Fingerprint Recognition....974
3D Fingerprint Reconstruction....974
Fingerprinting....974
Definition....974
Background....974
Theory....975
Fingerprinting of Digital Data....975
Fingerprinting of Analog Data....977
Cross-References....977
Recommended Reading....977
Finite Field....978
Definition....978
Theory....978
Applications....978
Open Problems....979
Cross-References....979
Recommended Reading....979
FIPS 140-2....979
Synonyms....979
Definition....979
Background....979
Theory and Applications....979
Acronyms....982
Cross-References....983
Recommended Reading....983
Firewall....983
Definition....983
Theory....983
Additional Definitions....986
Recommended Reading....986
Firewall Policy Analysis....987
Firewalls....987
Synonyms....987
Definition....987
Background....987
Complexity of Managing Network Access Control Polices....987
Network Access Control Background....988
Theory and Applications....990
Modeling of Rule Relations....990
Classification of Access-List Conflicts....991
Intra-Policy Access-List Conflicts....991
Inter-Policy Access-List Conflicts....992
Classification of Map-List Conflicts....993
Overlapping-Session Conflicts....994
Multi-Transform Conflicts....995
Open Problems....995
Experimental Results....995
Recommended Reading....996
Fixed Window Exponentiation....996
Fixed-Base Exponentiation....997
Definition....997
Theory....997
Applications....999
Cross-References....999
Recommended Reading....999
Fixed-Exponent Exponentiation....999
Definition....999
Theory....1000
Applications....1001
Cross-References....1001
Recommended Reading....1001
Flexible Authorization Framework (FAF)....1002
Definitions....1002
Background....1002
Theory....1002
Open Problems and Future Directions....1004
Cross-References....1005
References....1005
Flow Blocking....1005
Flow Policies....1005
Forensic Psychology....1005
Forensic Readiness....1005
Forensics Analysis for CPS....1005
Forged Resets....1005
Forgery of Digital Signatures....1005
Definition....1005
Theory....1005
References....1007
Formal Analysis of Cryptographic Protocols....1007
Synonyms....1007
Related Concepts....1007
Definition....1007
Background....1007
Applications....1008
Open Problems and Future Directions....1008
References....1009
Formal Analysis of Cryptographic APIs....1009
Related Concepts....1009
Definition....1009
Background....1009
Applications....1010
References....1010
Formal Methods....1010
Formal Methods and Access Control....1010
Definition....1010
Background....1010
Theory and Application....1011
Open Problems and Future Directions....1012
Cross-References....1012
References....1012
Formal Methods for the Orange Book....1013
Synonyms....1013
Definition....1013
Background....1013
Applications....1015
Cross-References....1015
Recommended Reading....1016
Formal Methods in Certification and Evaluation....1016
Synonyms....1016
Definition....1016
Background....1016
A Key Distinction Used Is in the Common Criteria....1017
Applications and Experiments....1017
Open Problems....1017
Cross-References....1018
Recommended Reading....1018
Formal Verification of Cryptosystems....1018
Synonyms....1018
Definition....1018
Background....1018
Applications....1019
Open Problems....1020
Cross-References....1020
References....1021
Forward Secrecy....1021
FPGA Field Programmable Gate Array....1021
FPGA Security....1021
Synonyms....1021
Definitions....1021
Background....1022
Theory....1022
Open Problems and Future Directions....1023
Cross-References....1024
References....1024
FPGA Trust....1025
FPGAs in Cryptography....1025
Synonyms....1025
Definition....1025
Background....1025
Applications....1026
Open Problems....1027
Recommended Reading....1028
Fraud....1028
Fresh Re-keying....1028
Definitions....1028
Theory....1028
Application....1029
Time-Memory Trade-Off Attacks....1029
Side-Channel Attacks....1029
The Choice for g....1029
Cross-References....1030
References....1030
Frictionless User Authentication....1031
Synonyms....1031
Definition....1031
Background....1031
Theory and Application....1031
Open Problems and Future Directions....1034
Cross-References....1035
References....1035
Function Field Sieve....1035
Definition....1035
Background....1035
Theory....1036
Experimental Results....1036
Cross-References....1036
Recommended Reading....1036
Functional Safety....1037
Fuzzy (Similarity) Search on Encrypted Data....1037
Fuzzy Search on Encrypted Data....1037
Fuzzy Searchable Encryption....1037
Synonyms....1037
Related Concepts....1037
Definition....1037
Background....1037
Solutions....1037
Open Problems....1039
Cross References....1039
References....1039
G....1041
Gait Biometrics....1041
Gait Forensics....1041
Gait Recognition....1041
Synonyms....1041
Definitions....1041
Background....1041
Algorithms....1042
Segmentation....1042
Time Series Features....1043
Global Features....1043
Matching....1043
Benchmark Datasets and Performance....1044
Open Problems and Future Directions....1046
Cross-References....1047
References....1047
Galois Counter Mode....1048
Synonyms....1048
Definition....1048
Background....1048
Theory....1049
Applications....1050
Open Problems....1050
Cross-References....1050
Recommended Reading....1051
Galois Message Authentication Code....1051
Gap....1051
Definition....1051
Applications....1051
Cross-References....1051
Recommended Reading....1051
GCD....1051
GCM....1051
GDPR....1051
Gene....1051
General Data Protection Regulation (GDPR)....1051
Synonyms....1051
Definition....1052
Background....1052
Theory....1052
Chapter I: General provisions....1052
Chapter II: Principles....1053
Chapter III: Rights of the Data Subject....1053
Chapter IV: Controller and Processor....1054
Chapter V: Transfer of Personal Data to Third Countries or Internal Organizations....1054
Chapter VI: Independent Supervisory Authorities....1054
Chapter VII: Cooperation and Consistency....1055
Chapter VIII: Remedies, Liability, and Penalties....1055
Chapter IX: Provisions Relating to Specific Processing Situation....1055
Chapter X: Delegated Acts and Implementing Acts....1055
Chapter XI: Final Provisions....1055
Open Problems and Future Directions....1055
Cross-References....1056
References....1056
Generalized Mersenne Prime....1056
Definition....1056
Applications....1057
Recommended Reading....1058
Generator....1058
Synonyms....1058
Definition....1058
Theory....1058
Applications....1058
Cross-References....1058
Generic Attacks Against DLP....1058
Synonyms....1058
Definition....1058
Background....1059
Theory....1059
Experimental Results....1060
Cross-References....1061
Recommended Reading....1061
Generic Group/Ring Model....1061
Definition....1061
Cross-References....1061
References....1061
Genetic Code....1061
Genome Privacy....1062
Synonyms....1062
Definitions....1062
Background....1062
Theory....1063
Open Problems and Future Directions....1063
Cross-References....1064
References....1064
Genomics....1064
Geo-Indistinguishability....1064
Synonyms....1064
Definitions....1064
Background....1065
Theory....1065
Open Problems and Future Directions....1065
Cross-References....1066
References....1066
Geometry of Numbers....1066
Geoprivacy....1066
Geo-Social Networks (Privacy of)....1066
Geo-Social Networks Privacy....1066
Synonyms....1066
Definitions....1066
Background....1066
Privacy Violations in geoSNs....1067
Theory....1067
Open Problems and Future Directions....1068
Cross-References....1069
References....1069
GMAC....1069
Synonyms....1069
Definition....1069
Background....1069
Theory....1070
Cross-References....1070
Recommended Reading....1070
GMR Signature....1071
Definition....1071
Background....1071
Theory....1071
Recommended Reading....1073
Goldwasser–Micali Encryption Scheme....1073
Definition....1073
Background....1073
Theory....1073
Cross-References....1073
Recommended Reading....1073
Golomb's Randomness Postulates....1074
Definition....1074
Theory and Applications....1074
Cross-References....1074
Recommended Reading....1075
GOST....1075
Cross-References....1075
Recommended Reading....1076
Governance in Cyber-Physical Systems....1076
Synonyms....1076
Definition....1076
Background....1076
Theory....1076
Open Problems and Future Directions....1077
References....1077
GPRS Tunneling Protocol (GTP)....1078
Synonyms....1078
Definition....1078
Background....1078
Application....1078
Cross-References....1080
References....1080
Grant Statement....1080
Definitions....1080
Theory....1080
Cross-References....1081
References....1081
Graph Anonymization....1082
Graphical Authentication....1082
Definition....1082
Background....1082
Theory and Application....1082
Open Problems and Future Directions....1083
Cross-References....1085
References....1085
Greatest Common Divisor....1086
Synonyms....1086
Definition....1086
Background....1086
Theory....1086
Cross-References....1086
Greatest Common Factor....1086
Gröbner Basis....1086
Synonyms....1086
Definition....1086
Open Problems....1087
Cross-References....1087
Recommended Reading....1087
Group....1087
Definition....1087
Theory....1087
Applications....1088
Cross-References....1088
Recommended Reading....1088
Group Attestation....1088
Group Behavior in Cybersecurity....1088
Synonyms....1088
Definition....1088
Background: Group Behavior....1088
Theory: Threshold Models of Collective Behavior....1089
Application: Example in Cybersecurity....1089
Open Problems and Future Directions....1092
Cross-References....1092
References....1092
Group Key Agreement....1092
Synonyms....1092
Definition....1092
Background....1092
Requirements....1093
Private Group Key Agreement for Small Groups....1093
Authenticated Group Key Agreement, Provable Security....1095
Authenticated Group Key Agreement: Robustness Against Insider Attacks....1096
Group Key Agreement for Large Groups....1097
Applications of GKA....1098
Cross-References....1098
Recommended Reading....1098
Group Key Distribution....1099
Group Key Exchange....1099
Group Privacy....1099
Group Signatures....1100
Definition....1100
Background....1100
Theory....1100
Applications....1102
Cross-References....1102
Recommended Reading....1102
H....1104
HABE....1104
Hacking the Human....1104
Hall Sensor Security, The....1104
Synonyms....1104
Definitions....1104
Background....1104
Theory....1104
Hall Sensor Basics....1104
Distinct Types of Batk....1105
Generation of Batk....1105
An Experimental Case Study....1105
Results....1106
Defense....1106
Shielding....1106
Robust Sensors....1107
Open Problems and Future Directions....1107
References....1107
Hand Geometry Biometrics....1108
Hand Geometry Recognition....1108
Synonyms....1108
Definitions....1108
Background....1108
Theory....1109
Applications....1109
Open Problems and Future Directions....1110
Cross-References....1110
References....1110
Hand Shape Biometrics....1111
Hand Vein Recognition....1111
Hand-Based Vascular Biometrics....1111
Hand-Based Vascular Patterns....1111
Synonyms....1111
Definitions....1111
Background....1112
Commercial Systems....1112
Open Problems and Future Directions....1113
Mobile and On-the-Move Acquisition....1113
Disease Impact and (Template) Privacy....1113
Real-World Performance and Deployment....1114
References....1114
Hand-Based Vascular Recognition....1116
Handwriting....1116
Handwriting Analysis....1116
Synonyms....1116
Definition....1116
Background....1116
Theory....1116
Applications....1119
Recommended Reading....1119
Hard-Core Bit....1120
Definition....1120
Theory....1120
Applications....1121
Cross-References....1121
Recommended Reading....1121
Hardware Backdoor....1121
Hardware Considerations for Post-quantum Cryptography....1121
Hardware Implementation Explorations of Post-quantum Cryptographic Primitives....1121
Hardware Intellectual Property Protection....1121
Hardware Intellectual Property Reverse Engineering....1121
Hardware Obfuscation....1121
Hardware Obfuscation and Logic Locking....1122
Synonyms....1122
Definitions....1122
Background....1122
Application....1122
Obfuscation Techniques....1122
Attacks on Obfuscation....1123
Open Problems and Future Directions....1124
Cross-References....1125
References....1125
Hardware Security....1125
Hardware Security in Cyber-Physical Systems....1125
Definitions....1125
Background....1125
Theory....1126
Open Problems and Future Directions....1127
Cross-References....1128
References....1128
Hardware Security in the Age of Machine Learning....1128
Synonyms....1128
Definition....1128
Background....1128
Application....1129
Machine Learning and Hardware for Security....1129
Machine Learning and Security of Hardware....1129
Open Problems and Future Directions....1130
Cross-References....1130
References....1130
Hardware Security Module....1131
Background....1131
Theory....1132
Useful Links....1132
Definitions (Extracted from ISO 15408)....1133
Tamper Evidence Requirement....1133
Tamper Resistance Requirements....1134
Cross-References....1134
Hardware Trojan....1134
Synonyms....1134
Definition....1134
Background....1134
Theory and Application....1135
Open Problems and Future Directions....1135
Cross-References....1136
References....1136
Hardware Trojan Horse....1136
Hardware Trojans....1137
Hardware-Induced Covert Channels in Wireless Networks: Risks and Remedies....1137
Synonyms....1137
Definitions....1137
Background....1137
Covert Channel Attacks in Wireless Networks....1137
Baseband Attack....1137
Analog/RF Trojan....1139
Hardware Trojan Defense Solutions....1141
Channel Noise Profiling....1142
Adaptive Channel Estimation (ACE)....1143
Open Problems and Future Directions....1143
Formal Metric....1143
Extension to Future Wireless Networks....1144
Covert Channel Prevention....1144
References....1144
Hash Agility....1145
Definition....1145
Background....1145
Theory and Applications....1145
Protocols and Applications....1145
Devices....1145
TPMs and Hash Agility....1145
Key Storage....1146
Platform Control Registers....1146
Certificate Chains....1146
Cross-References....1147
Recommended Reading....1147
Hash Chain....1147
Synonyms....1147
Definition....1147
Background....1147
Theory....1147
Application....1148
Open Problems and Future Directions....1148
Cross-References....1149
References....1149
Hash Functions....1149
Introduction....1149
One-Way Hash Function (OWHF)....1150
Collision Resistant Hash Function (CRHF)....1150
Relation Between Definitions....1151
Black-Box Attacks on Hash Functions....1152
Black-Box Attacks on the Compression Function....1153
Attacks Dependent on the Internal Details of the Compression Function....1154
Attacks Dependent on the Interaction with the Signature Scheme....1154
Custom Designed Hash Functions....1155
Hash Functions Based on a Block Cipher....1156
Hash Functions Based on Algebraic Structures....1158
Recommended Reading....1160
Hash Tree....1162
Hash-Based Message Authentication Code....1162
Hash-Based Signatures....1163
Synonyms....1163
Definition....1163
Theory....1163
Applications....1165
Cross-References....1165
Recommended Reading....1165
Header Injections....1165
Header-Based Attacks....1166
Synonyms....1166
Definition....1166
Background....1166
Theory....1166
Header Attacks Below the Application Layer....1166
Header Attacks at the Application Layer Level....1167
Applications....1168
Recommended Reading....1168
Herding Behavior....1168
Heredity....1169
HIBE....1169
Hierarchical Identity-Based Encryption and Attribute-Based Encryption....1169
Synonyms....1169
Definitions....1169
Background....1169
Theory....1169
Open Problems and Future Directions....1171
References....1171
Hierarchical ORAM Constructions....1171
Definition....1171
Background....1172
Theory....1172
Memory Organization....1172
Accessing Virtual Words....1173
Merging and Remapping Layers....1173
Open Problems and Future Directions....1174
Cross-References....1174
References....1174
High Assurance Evaluation Methods....1175
Higher Order Derivative Attack....1175
Hippocratic Database....1175
Synonyms....1175
Definition....1175
Background....1175
Theory....1175
Applications....1177
Open Problems....1177
Recommended Reading....1178
History-Based Separation of Duties....1178
HMAC....1178
Synonyms....1178
Definition....1178
Background....1179
Theory....1179
Applications....1180
Open problems....1180
Cross-References....1180
References....1180
Homomorphic Cryptosystems....1181
Homomorphism....1181
Definition....1181
Theory....1181
Applications....1181
Cross-References....1182
Recommended Reading....1182
Horizontal Scaling....1182
HRU....1182
Background....1182
Definition....1182
Theory....1183
Applications....1183
Open Problems and Future Directions....1183
Cross-References....1183
Recommended Reading....1184
HTTP Authentication....1184
Synonyms....1184
Definition....1184
Background....1184
Applications....1184
Open Problems....1185
Cross-References....1185
Recommended Reading....1185
HTTP Basic Authentication....1185
HTTP Cookie....1185
HTTP Digest Access Authentication Scheme....1185
HTTP Digest Authentication....1185
Synonyms....1185
Definition....1185
Background....1186
Applications....1186
Cross-References....1188
Recommended Reading....1188
HTTP Session Security....1188
Synonyms....1188
Definition....1189
Background....1189
Theory....1189
Open Problems....1190
Cross-References....1190
Recommended Reading....1190
HTTPS, HTTP Over TLS....1190
Definition....1190
Background....1191
Theory....1191
Cross-References....1191
Recommended Reading....1191
Human Factors in Secure Software Development....1192
Human Rights and Cybersecurity....1192
Definition....1192
Theory....1192
Future Directions....1194
Cross-References....1194
References....1194
Human Security Behavior....1194
Hybrid Cyber Range....1195
Synonyms....1195
Definitions....1195
Background....1195
Hybrid Cyber Range Functionalities....1195
Open Problems and Future Directions....1196
References....1196
Hybrid Encryption....1196
Definition....1196
Background....1197
Theory....1197
Another Direction Without Random Oracle....1199
Cross-References....1200
References....1200
Hyperelliptic Curve Discrete Logarithm Problem (HECDLP)....1201
Hyperelliptic Curve Security....1201
Synonyms....1201
Definition....1201
Background....1201
Theory....1201
Generic Methods....1201
Index Calculus Methods....1202
Curves of Large Genus....1202
Curves of Small Genus....1202
Curves Over Field Extensions....1203
Special-Purpose Algorithms....1204
Weil and Tate Pairing Attacks....1204
Weil Descent....1204
Curve Mappings....1204
Cross-References....1205
References....1205
Hyperelliptic Curves....1205
Synonyms....1205
Definition....1206
Theory....1206
General Curve Isomorphisms....1207
Group Law....1207
Group Order and Structure....1208
Examples....1208
First Example....1208
Second Example....1210
Cross-References....1210
References....1210
Hyperelliptic Curves Performance....1210
Synonyms....1210
Definition....1210
Background....1210
Application and Experimental Results....1211
Curves Over Prime Fields....1211
Curves Over Binary Fields....1212
Cross-References....1212
References....1212
I....1214
IBE....1214
IBE: Identity-Based Encryption....1214
IBS: Identity-Based Signature....1214
IC Integrated Circuit....1214
IC-Integrated Circuit....1214
ICS....1214
ID-Based Encryption....1214
Idea....1214
Definition....1214
Background....1215
Theory....1215
Cross-References....1215
Recommended Reading....1216
Identification....1216
Definition....1216
Theory....1216
Identity Uniqueness....1217
Authorities for Naming and Authentication....1217
Cross-References....1218
References....1218
Identifier....1218
Identity Authentication....1218
Identity Management....1218
Related Concepts....1218
Definition....1218
Background....1219
Theory....1219
Applications....1220
Experimental Results....1220
Open Problems and Future Directions....1220
References....1221
Identity Management for Cyber-Physical Systems....1221
Definitions....1221
Background....1221
Application....1221
Open problems and Future directions....1222
Cross-References....1222
References....1223
Identity Proof....1223
Identity Theft....1223
Identity Verification Protocol....1223
Synonyms....1223
Definition....1223
Theory....1223
Applications....1223
Cross-References....1224
References....1225
Identity-Based Cryptosystems....1225
Synonyms....1225
Definition....1225
Background....1225
Theory....1226
Identity-Based Signatures....1226
Generic IBS from Any Signature....1227
The Guillou–Quisquater IBS....1227
The Bellare–Namprempre–Neven IBS....1228
Other IBS Schemes Based on Specific Number Theoretic Assumptions....1229
Identity-Based Encryption from Quadratic Residuosity: The Cocks IBE....1229
Cross-References....1231
Recommended Reading....1231
Identity Based Encryption....1232
Synonyms....1232
Definitions....1232
Background....1232
Theory....1233
Application....1234
References....1234
Identity-Based Encryption: Historical Perspective and Hierarchical Systems....1234
Synonyms....1234
Definition....1235
Background....1235
Theory....1235
Applications....1236
Open Problems....1236
Cross-References....1237
References....1237
IDS Deployment....1237
IDS: Intrusion Detection System....1237
IFA....1237
IIoT....1237
ILS....1237
Impacts of Information Privacy Violations....1237
Synonyms....1237
Definition....1238
Background....1238
Theory and Application....1239
Open Problems and Future Directions....1239
Cross-References....1240
References....1240
Impersonation....1240
Impersonation Attack....1240
Synonyms....1240
Definition....1240
Application....1241
Open Problems and Future Directions....1241
Cross-References....1241
Recommended Reading....1241
Implicit Authentication....1241
Implicit Key Authentication....1241
Impossible Differential Attack....1241
Definition....1241
Background....1241
Theory....1241
Cross-References....1242
Recommended Reading....1242
Incentives for Distributed Ledgers....1242
Definition....1242
Theory....1242
Open Problems and Future Directions....1243
Cross-References....1243
References....1244
Incident Analysis....1245
Index Calculus Method....1245
Definition....1245
Theory....1245
Applications....1245
Implementation Choice and Complexity Estimate....1245
Variants of the Algorithm....1246
Index Calculus Using the Number Field Sieve....1246
Index Calculus and Elliptic Curves....1247
Cross-References....1247
Recommended Reading....1248
Indistinguishability of Encryptions....1248
-Indistinguishability....1248
Industrial Control Network....1248
Industrial Control Systems....1248
Industrial Internet....1248
Industrial Internet of Things....1248
Synonyms....1248
Definition....1248
Background....1248
Application....1249
Open Problems and Future Directions....1250
Cross-References....1251
References....1251
Industry 4.0....1251
Ineffective Fault Attack....1251
Synonyms....1251
Definitions....1251
Background....1251
Theory/Application/Both....1252
Open Problems and Future Directions....1252
Cross-References....1252
References....1252
Infection Risk Prediction and Management....1253
Synonyms....1253
Definitions....1253
Background....1253
Open Problems and Future Directions....1255
Cross-References....1257
References....1257
Infective Countermeasures....1257
Synonyms....1257
Definitions....1257
Background....1258
Theory....1258
Open Problems and Future Directions....1259
Cross-References....1260
References....1260
Inference Attacks....1260
Inference Control....1261
Definitions....1261
Background....1261
Theory....1261
Application....1265
Open Problems and Future Directions....1266
Cross-References....1266
References....1266
Information Assurance....1267
Information Cascades....1267
Information Disclosure....1267
Synonyms....1267
Definitions....1267
Background....1267
Theory....1267
Open problems and Future directions....1269
Cross-References....1269
References....1269
Information Economics....1269
Information Flow and Noninterference....1270
Synonyms....1270
Definitions....1270
Background ....1270
Theory ....1270
The Lattice Model....1270
Noninterference....1270
Transitive and Intransitive Flow....1271
Dealing with Nondeterminism....1271
Verification and Refinement....1272
Other Variants....1272
Application....1273
Open Problems and Future Directions....1273
Cross-References....1273
References....1274
Information Flow Policies....1274
Synonyms....1274
Definitions....1274
Theory....1274
Security Domains and Levels....1275
Specifying Security Requirements....1276
Declassification and Endorsement....1276
Application....1277
Cross-References....1277
References....1277
Information Integrity....1278
Information Leakage....1278
Information Privacy Requirements....1278
Synonyms....1278
Definition....1278
Background....1278
Theory and Application....1278
Open Problems and Future Directions....1279
Cross-References....1280
References....1280
Information Privacy Awareness....1281
Synonyms....1281
Definition....1281
Background....1281
Theory and Application....1281
Open Problems and Future Directions....1282
References....1282
Information Privacy Costs....1283
Information Privacy Law....1283
Information Security (InfoSec)....1283
Information Security Awareness....1283
Synonyms....1283
Definition....1283
Background....1283
Theory and Applications....1284
Open Problems and Future Directions....1284
Cross-References....1285
References....1285
Information Security Culture....1285
Synonyms....1285
Definition....1285
Background....1285
Theory....1286
Definition....1286
Dominant and Subcultures....1287
Factors that Influence the Information Security Culture....1287
Measuring the Information Security Culture....1287
Open Problems and Future Directions....1287
Cross-References....1288
References....1288
Information Security Management System....1288
Information Security Policy Adherence....1288
Information Security Policy Compliance....1289
Synonyms....1289
Definition....1289
Background....1289
Theory and Applications....1289
Open Problems and Future Directions....1290
Cross-References....1290
References....1291
Information Security Policy Compliance Capacities....1291
Information Security Policy Compliance Competences....1291
Synonyms....1291
Definition....1291
Background....1291
Theory and Applications....1292
Open Problems and Future Directions....1292
Cross-References....1293
References....1293
Information Security Policy Compliance Competency....1293
Information Security Risk Treatment....1294
Synonyms....1294
Definition....1294
Theory....1294
References....1295
Information Security Skills....1295
Information Theoretic Model....1295
Information Theory....1295
Shannon's Main Theorem....1296
Cross-References....1296
Recommended Reading....1296
Information-Flow Security....1297
Initial Coin Offering....1297
Synonyms....1297
Definition....1297
Background....1297
Theory and Application....1297
Open Problems and Future Directions....1298
Cross-References....1298
References....1298
Initial Token Distributions....1299
Initial Trust Establishment....1299
Insider Attack....1299
Insider Problem....1299
Insider Threat....1299
Synonyms....1299
Definition....1299
Theory and Application....1300
Prediction....1300
Detection....1300
Open Problems and Future Directions....1301
Cross-References....1301
References....1302
Insider Threat Defense....1302
Definition....1302
Background....1302
Theory....1303
Experimental Results....1303
Open Problems....1305
Recommended Reading....1305
Instant Disclosure....1306
Integer Factoring....1306
Definition....1306
Background....1306
Theory and Applications....1306
Methods for Integer Factorization....1306
Establishing Compositeness....1307
Distinct Factors....1307
Repeated Factors....1307
Trial Division....1307
Pollard's rho Method....1307
Pollard's p − 1 Method....1308
Generalizations of Pollard's p − 1 Method....1308
Usage of “Strong Primes” in RSA....1309
Cycling Attacks Against RSA....1309
Elliptic Curve Method for Factoring....1309
Fermat's Method and Congruence of Squares....1309
The Morrison–Brillhart Approach....1310
Matrix Step....1310
Dixon's Random Squares Method....1310
Continued Fraction Method (CFRAC)....1311
Note on the Size of RSA Moduli....1312
Linear Sieve....1312
Quadratic Sieve....1312
Number Field Sieve....1313
Cross-References....1313
Recommended Reading....1313
Integrated Circuit....1314
Integrated Circuit Card....1314
Integrity and Encryption....1314
Integrity Model....1314
Intellectual Property....1314
Intelligence Distribution to Prevent Attacks....1314
Interactive Argument....1315
Synonyms....1315
Interactive Proof....1315
References....1315
Interactive Proof....1315
Synonyms....1315
Cross-References....1316
References....1316
Interactive Proof Systems....1316
Interactive Theorem Proving and Security....1316
Interactive Verification....1316
Interactive Verification of Security Properties....1316
Synonyms....1316
Definition....1316
Theory....1316
Applications....1317
Open Problems and Future Directions....1318
Cross-References....1318
References....1318
Interception....1318
Interconnection....1318
Interdependent Location Privacy....1319
Synonyms....1319
Definitions....1319
Background....1319
Discussion....1319
Open Problems and Future Directions....1320
Cross-References....1321
References....1321
Interdependent Privacy (IDP)....1321
Synonyms....1321
Definitions....1321
Background....1321
Theory....1322
Statistical Inference....1322
Game Theory....1323
Cryptography and Access Control....1323
Communication Privacy Management (CPM) Theory....1323
Open Problems and Future Directions....1324
Cross-References....1324
References....1324
Internet Fraud....1324
Interpolation Attack....1324
Cross-References....1325
Recommended Reading....1325
Intrusion Detection in Ad Hoc Networks....1325
Definition....1325
Background....1326
Theory....1326
Applications....1327
Experimental Results....1328
Open Problems....1329
Recommended Reading....1329
Intrusion Tolerance....1329
Invasive Attacks....1329
Definition....1329
Background....1329
Smart Card Security....1330
Overview of Attacks on Smart Cards....1330
Social Attacks....1330
Logical Attacks....1331
Invasive Attacks....1331
Access to Silicon....1331
Delayering....1331
Block Localization....1332
Memory Content Extraction....1332
ROM....1332
RAM....1333
EEPROM or FLASH....1333
Bus Localization....1333
Chip Probing....1334
Chip Modification....1334
Protection Against Physical Attacks....1335
Conclusion....1335
Inverse Biometrics: Privacy, Risks, and Trust....1336
Synonyms....1336
Definitions....1337
Background....1337
Theory....1337
Privacy, Risk, and Trust....1337
Applications....1338
Summary....1338
Open Problems....1338
References....1339
Inversion Attack....1339
Definition....1339
Theory....1339
Original Inversion Attack....1339
Generalized Inversion Attack....1340
Cross-References....1341
Recommended Reading....1341
Inversion in Finite Fields and Rings....1341
Synonyms....1341
Definition....1341
Theory....1341
Extended Euclidean Algorithm....1341
Fermat's Little Theorem....1341
Look-Up Tables....1342
Reduction to Subfield Inversion....1342
Direct Inversion....1342
Applications....1342
Cross-References....1343
Recommended Reading....1343
Inversion in Galois Fields....1343
IOC: Indicators of Compromise....1343
iOS Security Framework: Understanding the Security of Mobile Phone Platforms....1343
Synonyms....1343
Definition....1343
Background....1343
Application....1344
App Development....1344
App Runtime....1345
Protecting User Data....1346
Cross-References....1347
References....1347
IP Traceback....1347
Definition....1347
Background....1347
Theory....1347
Return Packets....1347
In-Net State....1348
Packet Marking....1348
Experimental Results....1349
Open Problems....1349
Recommended Reading....1349
IP: Internet Protocol....1350
IPES....1350
Definition....1350
Cross-References....1350
Recommended Reading....1350
IPsec....1350
Definition....1350
Background....1350
Theory....1351
IPsec Components....1351
Packet Processing....1351
Key Exchange....1353
IPsec and NAT....1354
Policy and Configuration....1354
Recommended Reading....1355
IPSec Policy Analysis....1355
Iris Recognition....1355
Definitions....1355
Background....1355
Theory....1355
Applications....1356
Open Problems and Future Directions....1356
References....1357
Irreducible Polynomial....1357
Definition....1357
Theory....1357
Cross-References....1358
ISMS: A Management Framework for Information Security....1358
Synonyms....1358
Definition....1358
Background....1358
Theory....1358
Applications....1359
Recommended Reading....1360
ISO 15408 CC – Common Criteria....1360
ISO 19790 2006 Security Requirements for Cryptographic Modules....1360
ISO/IEC 15408....1360
ISO/IEC 27001....1360
ISO-9796 Signature Standards....1360
Definition....1360
Background....1361
Theory....1361
Applications....1361
Recommended Reading....1361
Issuer....1362
Definition....1362
Recommended Reading....1362
IT Forensic Readiness....1362
Synonyms....1362
Definition....1362
Background....1362
Theory and Application....1362
Open Problems and Future Directions....1364
Cross-References....1364
References....1364
Itoh–Tsujii Inversion AlgorithmWork done while the author was at Philips Research, The Netherlands....1365
Definition....1365
Related Concepts....1365
Theory....1365
Optimizations and Applications....1368
Recommended Reading....1368
IT-Security Capability Maturity Model....1369
J....1370
Jacobi Symbol....1370
Background....1370
Definition....1370
Theory....1370
Applications....1370
Cross-References....1370
Recommended Reading....1370
Jamming Attack Defense....1371
Synonyms....1371
Definitions....1371
Background....1371
Spread spectrum techniques....1371
Theory and Applications....1371
Jamming Attack Defense in the Physical Layer....1372
Power control....1372
Jamming Attack Defense in the Link Layer and Layers Above....1374
Error-correcting code....1374
Link-layer channel adaptation....1374
Spatial retreats....1374
Convert timing channels....1374
Jamming-resilient multipath routing....1374
Open Problems and Future Directions....1377
References....1377
Jamming Resistance....1378
Definition....1378
Background....1378
Theory....1378
Recommended Reading....1379
K....1380
k-Anonymity....1380
Definitions....1380
Background....1380
Theory and Application....1381
Generalization and Suppression....1381
Algorithms for Enforcing k-Anonymity....1383
Open Problems and Future Directions....1383
Cross-References....1384
References....1384
Karatsuba Algorithm....1384
Definition....1384
Theory....1384
Applications....1387
Cross-References....1388
Recommended Reading....1388
Kasumi/Misty1....1388
Cross-References....1389
Recommended Reading....1389
Keeloq....1389
Definition....1389
Background....1390
Theory....1390
Applications....1391
Cross-References....1392
Recommended Reading....1392
Kerberos....1393
Synonyms....1393
Definition....1393
Background....1393
*-10pt....1393
Weaknesses and Limitations....1394
Applications....1394
Cross-References....1394
Recommended Reading....1394
Kerberos Authentication Protocol....1395
Related Concepts....1395
Definition....1395
Background....1395
Applications....1395
References....1395
Kerckhoffs Law....1395
Kerckhoffs' Principle....1395
Synonyms....1395
Definition....1395
Background....1396
Recommended Reading....1396
Key....1396
Definition....1396
Background....1397
Cross-References....1399
Recommended Reading....1399
Key Agreement....1399
Synonyms....1399
Definition....1399
Background....1399
Theory....1399
Applications....1400
Cross-References....1400
References....1400
Key Authentication....1400
Synonyms....1400
Related Concepts....1400
Definition....1400
Theory....1401
Open Problems and Future Directions....1402
Cross-References....1402
References....1402
Key Encrypting Key (KEK)....1402
Key Encryption Key....1402
Definition....1402
Background....1402
Theory....1402
Open Problems....1404
Cross-References....1404
Recommended Reading....1404
Key Enumeration....1404
Synonyms....1404
Definitions....1404
Background....1404
Application....1405
Open Problems and Future Directions....1405
Cross-References....1405
References....1406
Key Escrow....1406
Synonyms....1406
Definition....1406
Background....1406
Theory....1407
Applications....1407
Cross-References....1408
References....1408
Key Generation Using Physical Properties of Wireless Communication....1408
Definition....1408
Background....1408
Theory....1409
Open Problems....1409
Experimental Results....1409
Recommended Reading....1410
Key Life Cycle Management....1410
Key Management....1410
Synonyms....1410
Definition....1410
Background....1410
Theory....1410
Symmetric or Secret Key Cryptography....1411
Background....1411
Initialization....1412
Distribution....1412
Cancellation....1412
Summary and Observations....1413
Asymmetric or Public Key Cryptography....1413
Initialization....1413
Distribution....1414
Cancellation....1415
Summary and Observations....1416
Open Problems....1416
Cross-References....1416
References....1416
Key Recovery....1416
Key Search with Hints....1416
Key Variation....1416
Keyboard Dynamics....1416
Synonyms....1416
Definition....1417
Background....1417
Theory....1417
Applications....1419
Experimental Results....1420
Open Problems and Future Directions....1420
Cross-References....1421
References....1421
Keylogging....1421
Synonyms....1421
Definition....1421
Application....1422
References....1422
Key-Policy ABE....1422
Keystream....1422
Keystroke Biometrics....1422
Keystroke Dynamics....1423
Synonyms....1423
Definitions....1423
Background....1423
Theory....1424
Applications....1427
Open Problems and Future Directions....1427
Cross-References....1428
References....1428
Keystroke Logging....1429
Kleptographic Attack....1429
Kleptography....1429
Synonyms....1429
Definitions....1429
Background....1429
Theory....1430
Applications....1430
Open Problems and Future Directions....1430
Cross-References....1431
References....1431
km-Anonymity....1431
Synonyms....1431
Definitions....1431
Background....1431
Theory....1432
Application....1432
Open Problems and Future Directions....1432
Cross-References....1433
References....1433
Knapsack Cryptographic Schemes....1433
Definition....1433
Relevance to Modern Public Key Systems....1433
Introduction....1434
The Cryptographic Knapsack Scheme: An Introduction....1434
The Encryption in Additive Knapsack Schemes....1434
The Decryption....1435
The Merkle–Hellman Trapdoor....1435
A Survey of the History of the Cryptographic Knapsack....1436
The Trials to Avoid Weaknesses and Attacks for the Class of Usual Knapsacks....1436
The Case of Usual Knapsacks with Other Encryption Functions....1440
The Multiplicative Knapsack Scheme and Its History....1440
The Trapdoor Knapsack Schemes to Protect Signatures and Authenticity....1441
Some Details....1441
The Existence of Infinitely Many Decryption Keys....1441
The LLL Algorithm....1442
The Use of the LLL Algorithm in Brickell's Low Dense Attack....1443
Conclusion....1443
Cross-References....1443
References....1444
Known Plaintext Attack....1445
Definition....1445
Cross-References....1446
Recommended Reading....1446
Koblitz Elliptic Curves....1446
Synonyms....1446
Definition....1446
Background....1446
Application....1446
Cross-References....1447
References....1447
L....1448
Lamport One-Time Signatures....1448
Late Launch....1448
Lattice....1448
Synonyms....1448
Definition....1448
Background....1448
Theory....1448
Applications....1449
Cross-References....1450
Recommended Reading....1450
Lattice Basis Reduction....1450
Lattice Reduction....1450
Synonyms....1450
Definition....1450
Background....1450
Theory....1451
Applications....1452
Open Problems....1452
Experimental Results....1452
Cross-References....1452
Recommended Reading....1452
Lattice-Based Cryptography....1453
Definition....1453
Background....1453
Theory....1454
Applications....1454
Open Problems....1455
Cross-References....1455
Recommended Reading....1455
Layer-2 Protocol....1456
Synonyms....1456
Definitions....1456
Background....1456
Theory....1456
Payment & State Channels....1457
Operator/Client Protocols....1458
Optimistic OCPs....1458
OCPs with Non-Interactive Proofs....1459
Open Problems and Future Directions....1459
Cross-References....1459
References....1459
LCM....1460
-Diversity....1460
Definition....1460
Background....1460
Theory....1461
Open Problems....1463
Cross-References....1463
Recommended Reading....1463
Leakage Resilience....1463
Synonyms....1463
Definitions....1463
Background....1463
Theory....1464
Applications....1464
Open Problems and Future Directions....1464
Cross-References....1464
References....1465
Leakage-Resilient Cryptography....1465
Least Common Multiple....1465
Synonyms....1465
Definition....1465
Theory....1466
Cross-References....1466
Least Privilege....1466
Synonyms....1466
Definition....1466
Theory....1466
Cross-References....1467
References....1467
Ledger Consensus....1467
Legendre Symbol....1467
Background....1467
Definition....1467
Theory....1467
Cross-References....1468
Lemming Effect....1468
Levels of Trust....1468
Synonyms....1468
Definition....1468
Background....1468
Theory....1468
Applications....1470
Level 1 Trust (Very Low Risk of Compromise)....1470
Level 2 Trust (Low Risk of Compromise)....1470
Level 3 Trust (Medium Risk of Compromise)....1470
Level 4 Trust (High Risk of Compromise)....1471
Level 5 Trust (Very High Risk of Compromise)....1471
Open Problems....1472
Cross-References....1472
Recommended Reading....1472
LFSR....1472
Linear Complexity....1472
Definition....1472
Theory....1473
Cross-References....1473
Recommended Reading....1473
Linear Congruential Generator....1473
Definition....1473
Example....1473
Background....1473
Applications....1474
Cross-References....1474
Recommended Reading....1474
Linear Consistency Attack....1474
Definition....1474
Theory....1474
Cross-References....1475
Recommended Reading....1475
Linear Cryptanalysis for Block Ciphers....1475
Definition....1475
Background....1475
Theory....1475
Outline of a Linear Attack....1475
Piling-up Lemma....1476
Matsui's Search for the Best Approximations....1477
Linear Hulls....1477
Provable Security Against Linear Cryptanalysis....1477
Comparison with Differential Cryptanalysis....1478
Extensions....1478
Cross-References....1479
Recommended Reading....1479
Linear Cryptanalysis for Stream Ciphers....1480
Definition....1480
Background....1480
Theory....1480
Cross-References....1480
Recommended Reading....1480
Linear Feedback Shift Register....1481
Synonyms....1481
Definition....1481
Theory....1482
Cross-References....1484
Recommended Reading....1484
Linear Syndrome Attack....1484
Definition....1484
Cross-References....1485
Recommended Reading....1485
List Decoding....1485
Liveness Detection....1485
L Notation....1485
Definition....1485
Theory....1485
Cross-References....1485
Location Information (Privacy of)....1486
Synonyms....1486
Definitions....1486
Background....1486
Theory....1486
Application....1488
Open Problems and Future Directions....1488
Cross-References....1489
References....1489
Location Privacy....1489
Location Privacy in Ride-Hailing Service....1489
Synonyms....1489
Definitions....1490
Background....1490
Theory....1490
Open Problems and Future Directions....1491
References....1492
Location Privacy in Social Networks....1492
Location Privacy in Wireless Networks....1492
Synonyms....1492
Definition....1492
Background....1492
Theory....1493
Applications....1494
Cross-References....1494
Recommended Reading....1495
Location Privacy Metrics....1495
Location Privacy Protection in Ride-Hailing Service....1495
Location Privacy Quantification....1495
Location Semantics....1495
Synonyms....1495
Definitions....1495
Background....1495
Theory....1496
Application....1496
Open Problems and Future Directions....1496
Cross-References....1497
References....1497
Logic Bomb....1497
Definition....1497
Background....1497
Theory and Applications....1497
Cross-References....1497
Recommended Reading....1497
Logic Decryption....1497
Logic Locking....1498
Logic-Based Policy Languages....1498
Related Concepts and Keywords....1498
Definition....1498
Background....1498
Theory....1498
Implementations....1499
Open Problems and Future Directions....1500
References....1500
Longest Chain Protocol....1500
Synonyms....1500
Definition....1500
Background....1500
Theory....1501
Applications....1501
Open Problems and Future Directions....1501
Cross-References....1502
References....1502
Longhand....1503
Lower Bound for the Bandwidth Cost of Oblivious RAMs....1503
Luby-Rackoff Ciphers....1504
Definition....1504
Background....1504
Theory....1504
Cross-References....1505
Recommended Reading....1505
M....1506
MAA....1506
Synonyms....1506
Definition....1506
Background....1506
Theory....1506
Cross-References....1507
References....1507
MAC Algorithms....1507
Introduction....1507
Definition....1508
Security of MAC Algorithms....1508
Forgery Attack....1509
Key Recovery Attack....1509
Brute Force Key Search....1509
MAC Guessing Attack....1510
Internal Collision Attack on Iterated MAC Algorithms....1510
Weaknesses of the Algorithm....1511
Practical MAC Algorithms....1511
Based on Block Ciphers....1511
Based on Cryptographic Hash Functions....1512
Dedicated MAC Algorithms....1513
Cross-References....1514
Recommended Reading....1514
Machine Learning....1515
Machine Learning (Data Mining) for Privacy Policy Summarization....1515
Machine Learning for Attack Detection....1515
Machine Learning for Network Intrusion Detection....1515
Synonyms....1515
Definitions....1515
Background....1516
Theory and Application....1516
Open Problems and Future Directions....1518
References....1518
Machine Learning in Secured Computing....1519
Definitions....1519
Background....1519
Theory and Applications....1519
Classical Machine Learning....1519
Supervised Learning....1519
Unsupervised Learning....1519
Reinforcement Learning....1520
Deep Learning....1520
Emerging Machine Learning Framework....1521
Open Issues and Future Directions....1521
Cross-References....1522
References....1522
Machine Readable Travel Document Security....1523
Macrodata Disclosure Limitation....1523
Macrodata Disclosure Protection....1523
Macrodata Protection....1523
Synonyms....1523
Definition....1523
Background....1523
Theory....1523
Discovering sensitive cells....1524
Protecting sensitive cells....1525
Application....1525
Cross-References....1525
References....1525
Malicious Circuit....1526
Malicious Cryptography....1526
Maliciously Modified Set of Administrative Tools....1526
Malware....1526
Malware Behavior Clustering....1526
Definition....1526
Theory....1526
Cross-References....1528
Recommended Reading....1528
Malware Detection....1528
Synonyms....1528
Definition....1528
Background....1528
Rapid Releases of Malware Variants....1529
Poly- and Metamorphic Malware....1529
Theory and Applications....1529
Signature Matching....1529
Static Analysis....1530
Dynamic Analysis....1531
Cross-References....1532
Recommended Reading....1532
Managing and Monitoring Social Network Privacy Policies....1532
Synonyms....1532
Introduction....1532
Potential Policy Misconfigurations....1533
Proposed Treemap-Based Visualization....1534
Conclusion and Future Directions....1536
References....1536
Mandatory Access Control (MAC) Policies....1536
Definition....1536
Theory....1536
Cross-References....1537
References....1537
Maneuvering....1537
Man-in-the-Middle and Relay Attack....1537
Definition....1537
Theory....1537
Experimental Results....1538
References....1538
Manipulation Detection Code-2....1539
Manipulation Detection Code-4....1539
MARS....1539
Cross-References....1540
Recommended Reading....1540
MASH Hash Functions (Modular Arithmetic Secure Hash)....1541
Definition....1541
Background....1541
Theory....1541
Cross-References....1542
Recommended Reading....1542
Masking Countermeasure....1542
Synonyms....1542
Definition....1542
Theory....1542
Masking in Practice....1544
Open Problems and Future Directions....1544
Cross-References....1545
References....1545
Master Key....1546
Synonyms....1546
Definition....1547
Applications....1547
Open Problems and Future Directions....1547
Cross-References....1547
References....1547
Maurers Algorithm....1547
Maurer's Method....1547
Synonyms....1547
Definition....1547
Background....1547
Theory and Applications....1547
Cross-References....1548
Recommended Reading....1548
Maximal-Length Sequences....1548
Synonyms....1548
Definition....1548
Theory....1548
Applications....1552
Cross-References....1552
Recommended Reading....1552
Maxims....1553
Cross-References....1553
Recommended Reading....1553
McEliece Public Key Cryptosystem....1553
Definition....1553
Theory....1554
General Idea....1554
Description....1554
Security and Practice....1554
Security Reduction....1554
Best Known Attacks....1555
System Implementation....1555
Recommended Reading....1555
MD4 Hash Function....1556
MD4-MD5....1556
Synonyms....1556
Definition....1556
Theory....1556
Description....1556
Applications....1556
Attacks....1557
Attacks on the Short Output Length....1557
Collision Attacks....1557
Preimage Attacks....1558
Attacks on Concatenated Combiners....1558
Open Problems....1558
Cross-References....1558
Recommended Reading....1558
MD5 Hash Function....1559
MDC-2 and MDC-4....1559
Synonyms....1559
Definition....1559
Background....1559
Theory....1559
Open Problems and Future Directions....1561
Cross-References....1561
References....1561
Measurement Models of Software Security....1561
Measuring Location Privacy....1561
Synonyms....1561
Definitions....1562
Background ....1562
Theory....1562
Error-Based Metrics....1562
Uncertainty-Based Metrics....1562
Information Gain Metrics....1563
Success-Based Metrics....1563
Time-/Distance-Based Metrics....1563
Indistinguishability Metrics....1563
Application....1564
Open Problems and Future Directions....1564
Cross-References....1564
References....1564
Mechanized Theorem Proving....1565
Meet-in-the-Middle Attack....1565
Definition....1565
Cross-References....1565
Recommended Reading....1565
Melbourne Shuffle, The....1566
Synonyms....1566
Definitions....1566
Background....1566
Theory....1566
Shuffle Pass....1566
The Melbourne Shuffle....1568
Security....1568
Performance....1568
Further Information....1568
Cross-References....1568
References....1569
Meltdown....1569
Synonyms....1569
Definitions....1569
Background....1569
Theory....1570
Application....1572
Open Problems and Future Directions....1572
Cross-References....1572
References....1572
Meltdown Attack....1573
Membership Inference Attacks in Machine Learning....1573
Synonyms....1573
Definition....1573
Background....1573
Theory....1574
Threat Model....1574
Data Governance Scenarios....1574
Attack Models....1574
Defense Strategies....1575
Open Problems and Future Directions....1576
Cross-References....1576
References....1576
Memory and State Exhaustion Denial of Service....1576
Synonyms....1576
Definition....1577
Background....1577
Theory....1577
Applications....1577
Cross-References....1578
Recommended Reading....1578
Memory and State Exhaustion DoS....1578
Memory Overflow....1578
Merkle Trees....1578
Synonyms....1578
Definitions....1578
Background....1578
Theory....1579
Integrity Verification....1579
Merkle Tree....1579
Applications....1580
Cross-References....1580
References....1580
Merkle-Hash-Trees Signatures....1580
Mersenne Prime....1580
Definition....1580
Background....1580
Applications....1581
Message Authentication Algorithm....1581
Message-Locked Encryption....1581
Metrics of Software Security....1581
Synonyms....1581
Definition....1581
Background....1582
Theory....1582
Measurements and Qualitative Models....1582
Defense Patterns, Attack Patterns, and Related Measurements....1582
Attack Trees....1583
Toward Quantitative Predictive Models....1583
Probability-Based and Reliability-Like Models....1584
Applications....1584
Open Problems and Future Directions....1584
Cross-References....1585
References....1585
Meyer-Schilling Hash Functions....1585
MIA....1585
Microdata Anonymization Techniques....1585
Microdata Disclosure Limitation....1585
Microdata Disclosure Protection....1585
Microdata Masking Techniques....1585
Synonyms....1585
Definition....1586
Theory....1586
Applications....1588
Cross-References....1588
Recommended Reading....1589
Microdata Protection....1589
Synonyms....1589
Definition....1589
Background....1589
Theory....1589
Classification of microdata disclosure protection techniques....1590
Assessing microdata confidentiality and utility....1591
Application....1592
Open problems....1592
Cross-References....1592
References....1592
Microdata Statistical Disclosure Control....1592
Milieu....1592
Miller–Rabin Probabilistic Primality Test....1592
Synonyms....1592
Definition....1592
Background....1593
Theory and Applications....1593
Cross-References....1593
Recommended Reading....1594
Miller-Rabin Test....1594
MILS....1594
Minimal Polynomial....1594
Definition....1594
Cross-References....1594
Minimal Privilege....1594
m-Invariance....1594
Definition....1594
Theory....1594
Cross-References....1597
Recommended Reading....1597
MIPS-Year....1598
Definition....1598
Background....1598
Theory....1598
Applications....1598
Cross-References....1598
Recommended Reading....1598
Miss-in-the-Middle Attack....1599
Definition....1599
Background....1599
Cross-References....1599
Recommended Reading....1599
MITRE ATT&CK: MITRE Adversarial Tactics, Techniques, and Common Knowledge....1599
Mix Networks....1599
Synonyms....1599
Definition....1599
Background....1599
Theory and Application....1600
Cryptographic Unlinkability of Messages....1600
Strategies for Reordering Messages....1601
Anonymous Routing....1601
Open Problems and Future Directions....1602
Tradeoffs Between Anonymity, Latency and Traffic Volume....1602
Statistical Disclosure Attacks....1602
Key Distribution and Management....1602
Unobservability and Undetectability....1603
Applications....1603
Cross-References....1603
References....1603
MixSlice....1603
Definition....1603
Background....1604
Theory....1604
Access Management....1606
Open Problems and Future Directions....1607
Cross-References....1608
References....1608
Mixnets....1608
Mix-Nets....1608
Mix-Zones in Wireless Mobile Networks....1608
Definition....1608
Background....1608
Theory and Applications....1609
Open Problems and Future Directions....1610
Cross-References....1611
References....1611
ML Data Poisoning....1612
ML Membership Inference....1612
ML-Sequence....1612
Mobile Application Security....1612
Mobile Device Security....1612
Mobile Payments....1612
Definition....1612
Background....1612
Theory....1613
Applications....1613
Recommended Reading....1613
Mobile Platform Security....1613
Mobile Wallet....1613
Definition....1613
Theory....1614
Applications....1614
Cross-References....1614
Recommended Reading....1614
Modes of Operation of a Block Cipher....1614
Cross-References....1619
Recommended Reading....1620
Modular Arithmetic....1620
Synonyms....1620
Definition....1621
Background....1621
Theory....1621
Introduction....1621
Modular Arithmetic Operations....1622
Multiplicative Groups and Euler's ϕ Function....1623
Prime Fields....1624
Cross-References....1624
Recommended Reading....1624
Modular Root....1625
Definition....1625
Background....1625
Theory....1625
Open Problems....1625
Cross-References....1625
Modulus....1626
Definition....1626
Background....1626
Cross-References....1626
Monitor Placement Strategy....1626
Monitoring....1626
Monotone Signatures....1626
Definition....1626
Cross-References....1626
Recommended Reading....1626
Montgomery Arithmetic....1626
Definition....1626
Background....1627
Theory....1627
Introduction....1627
Montgomery Exponentiation....1628
Efficient Montgomery Multiplication....1629
Application to Finite Fields....1630
Secure Montgomery Multiplication....1630
Cross-References....1631
Recommended Reading....1631
Moore's Law....1631
Definition....1631
Background....1631
Theory....1631
Applications....1632
Cross-References....1632
Recommended Reading....1632
Moving Target Defense....1632
Synonyms....1632
Definition....1632
Background....1632
Theory....1633
Application....1634
Open Problems and Future Directions....1635
Cross-References....1635
References....1635
Moving Target Techniques....1636
MPKC....1636
MQ....1636
m-sequence....1636
Multi-authority and Decentralized Attribute-Based Encryption....1636
Synonyms....1636
Definition....1636
Background....1636
Theory and Applications....1637
Open Problems and Future Directions....1638
References....1639
Multibiometrics....1639
Synonyms....1639
Definition....1639
Background....1640
Theory....1641
Applications....1642
Open Problems....1644
Cross-References....1645
Recommended Reading....1645
Multicast Authentication....1645
Multicast Stream Authentication....1645
Multi-client Oblivious RAM....1645
Synonyms....1645
Definitions....1645
The Role of Each Entity....1645
Security....1646
Related Notions....1646
Efficiency....1646
Design Challenge....1646
Open Problems and Future Directions....1646
Cross-References....1647
References....1647
Multidimensional Databases....1647
Multi-Exponentiation....1647
Multifactor Authentication....1647
Multilevel DBMS....1647
Definitions....1647
Theory....1647
Application....1649
Cross-References....1650
References....1650
Multilevel Security Policies....1650
Definition....1650
Background....1651
Theory....1651
Cross-References....1652
Recommended Reading....1652
Multiparty ComputationEditors' note: Due to the increased set of applications of privacy enhancing technologies, designing more efficient multiparty computation protocols, improving both fundamental methods and implementations has been an area of extensive research since 2010.....1652
Synonyms....1652
Definition....1652
Background....1652
Theory....1653
Applications....1655
Cross-References....1655
References....1655
Multiparty Privacy....1656
Multiple Encryption....1656
Definition....1656
Cross-References....1656
Multiple Independent Levels of Security....1656
Synonyms....1656
Definition....1656
Background....1656
Applications....1656
MILS Principles....1658
Cross-References....1659
Recommended Reading....1659
Multiplicative Knapsack Cryptosystem....1659
Definition....1659
Open Problems....1660
Cross-References....1660
Recommended Reading....1660
Multiprecision Multiplication....1660
Synonyms....1660
Definition....1660
Background....1660
Theory....1660
Applications....1663
Recommended Reading....1664
Multiprecision Squaring....1664
Synonyms....1664
Definition....1664
Background....1664
Theory....1664
Applications....1665
Cross-References....1665
Recommended Reading....1665
Multi-Reader-Multi-Writer Searchable Encryption....1665
Multi-Reader-Single-Writer Searchable Encryption....1665
Multi-Server Oblivious RAM....1665
Multiset Attack....1665
Definition....1665
Background....1666
Theory....1666
Cross-References....1666
Recommended Reading....1666
Multi-Subject Privacy....1666
Multi-Threaded Implementation for Cryptography and Cryptanalysis....1666
Definition....1666
Background....1667
Theory....1667
Applications....1668
Open Problems....1668
Cross-References....1668
Recommended Reading....1668
Multi-User Keyword Search in Encrypted Database....1669
Multi-User Searchable Encryption....1669
Synonyms....1669
Definition....1669
Background....1669
Theory....1669
Cross-References....1670
References....1671
Multivariate Cryptography....1671
Synonyms....1671
Definition....1671
Background....1672
Theory....1672
Variants (Perturbations)....1673
Applications....1673
C and SFLASH....1673
HFE and QUARTZ....1673
UOV....1674
Rainbow/TTS....1674
“Medium-Sized” Extension Fields and IFS....1674
Implementations....1675
Open Problems....1675
Cross-References....1675
References....1675
Multivariate Quadratic Public-Key Cryptosystem (MQPKC)....1676
N....1677
Naccache–Stern Higher Residues Cryptosystem....1677
Definition....1677
Open Problems....1677
Cross-References....1677
Recommended Reading....1677
Nakamoto Style Consensus Protocol....1678
Near Field Communication....1678
Nearest Vector Problem....1678
Needham–Schroeder Protocols....1678
Definition....1678
Background....1678
Theory....1678
Applications....1679
Cross-References....1679
References....1679
NESSIE Project....1680
Synonyms....1680
Definition....1680
Background....1680
Theory....1680
The NESSIE Call....1680
The Evaluation Process....1681
Security Evaluation....1681
Performance Evaluation....1681
Tools....1682
The NESSIE Submissions....1682
Response to the NESSIE Call....1682
Selection for Phase II....1683
The NESSIE Portfolio....1684
Conclusion....1685
Cross-References....1685
References....1685
Network Attack Graphs....1686
Network Bandwidth Denial of Service (DoS)....1687
Synonyms....1687
Definition....1687
Background....1687
Applications....1687
Open Problems....1690
Cross-References....1690
Network Capabilities....1690
Definition....1690
Background....1690
Theory....1690
Bootstrap....1691
Unforgeable Capabilities....1691
Open Problems....1692
Recommended Reading....1692
Network Diversity....1692
Definitions....1692
Background....1693
Theory and Application....1693
Applications.....1693
Open Problems and Future Directions....1695
Cross-References....1695
References....1695
Network DoS....1695
Network Flooding Attack....1695
Network Hardening....1696
Synonyms....1696
Definitions....1696
Background....1696
Theory....1696
Open Problems and Future Directions....1697
Cross-References....1698
References....1698
Network Intrusion Detection System....1698
Synonyms....1698
Definition....1698
Background....1698
Theory and Application....1698
Open Problems and Future Directions....1699
References....1700
Network Security....1700
Network Tunneling Protocol....1700
Networked Privacy....1700
Neural Trojans....1700
Introduction....1700
Neural Trojan Attacks....1701
Training Data Poisoning....1701
Hiding Trojan Triggers....1702
Altering Training Algorithms....1702
Trojan Insertion via Transfer Learning....1703
Neural Trojans in Hardware....1703
Binary-Level Attacks....1703
Defense Techniques....1704
Neural Network Verification....1704
Trojan Trigger Detection....1704
Conclusion and Discussion....1705
References....1706
New European Schemes for Signature....1707
NFC....1707
Synonyms....1707
Definition....1707
Background....1707
Theory....1707
Applications....1708
Open Problems and Future Directions....1708
Cross-References....1709
Recommended Reading....1709
NFS....1709
NIDS....1709
Niederreiter Encryption Scheme....1709
Definition....1709
Theory....1709
General Idea....1710
Description....1710
Practice and Security....1710
Cross-References....1710
Recommended Reading....1710
NIST Elliptic Curves....1711
Definition....1711
Background....1711
Application....1711
References....1712
Noninteractive Proof....1712
References....1713
Nonintrusive Authentication....1713
Nonlinear Feedback Shift Register....1713
Definition....1713
Background....1713
Example....1713
Theory....1713
Applications....1714
Open Problems and Future Directions....1715
Remarks....1715
Cross-References....1715
Recommended Reading....1715
Nonlinearity of Boolean Functions....1715
Definition....1715
Background....1715
Theory....1715
Cross-References....1716
Recommended Reading....1716
Nonmalleability....1716
Background....1716
*-10pt....1717
Recommended Reading....1720
Nonrepudiable Agreement....1721
Nonrepudiation of Digital Signatures....1721
Definition....1721
Background....1721
Theory....1722
Applications....1723
Open Problems and Future Directions....1723
Recommended Reading....1723
Nonrepudiation Protocol....1723
Nonsecret Encryption....1723
Synonyms....1723
Definition....1723
Background....1723
Retrospection....1724
Theory....1725
Discussion....1726
Cross-References....1726
Recommended Reading....1726
Non-Secure Communication Channels and the Future of Privacy....1727
Definitions....1727
Introduction....1727
Background....1728
Challenges....1729
Open Problems....1730
Cross-References....1730
References....1730
NSS....1731
NTRU....1731
Synonyms....1731
Definition....1731
Background....1731
Theory....1731
Description of the NTRUEncrypt System....1732
Security of the NTRUEncrypt System....1733
NTRUSign....1734
Applications....1734
Background....1734
Cross-References....1734
Recommended Reading....1734
NTRUEncrypt....1735
NTRUSign....1735
Nucleic Acid....1735
Nudging Privacy....1735
Number Field....1735
Synonyms....1735
Definition....1736
Theory....1736
Applications....1736
Cross-References....1736
Number Field Sieve....1736
Number Field Sieve for Factoring....1736
Synonyms....1736
Definition....1736
Background....1737
Theory....1737
Basic Idea of the NFS....1737
Polynomial Selection....1738
Sieving....1739
Linear Algebra....1740
Square Root....1741
Applications....1741
Open Problems....1742
Experimental Results....1742
Cross-References....1743
Recommended Reading....1743
Number Field Sieve for the DLP....1744
Synonyms....1744
Definition....1744
Background....1744
Theory....1746
Number Fields....1746
NFS-DLP Algorithm....1747
Optimal Parameters....1748
Cross-References....1750
Recommended Reading....1750
Number Theory....1751
Definition....1751
Background....1751
Applications....1752
Modular Arithmetic....1752
Prime Numbers....1753
Discrete Logarithms and Integer Factorization....1754
Elliptic Curves....1756
Lattices....1756
Open Problems....1757
Cross-References....1757
Recommended Reading....1757
Nyberg–Rueppel Signature Scheme....1759
Definition....1759
Theory....1759
Cross-References....1759
Recommended Reading....1759
Nym....1759
O....1760
OAEP: Optimal Asymmetric Encryption Padding....1760
Definition....1760
Background....1760
Theory....1760
The RSA–PKCS #1 v1.5 Encryption....1760
The Optimal Asymmetric Encryption Padding....1760
The Random Oracle Model....1760
Description of OAEP....1761
OAEP and Provable Security....1761
Fixing the OAEP Proof of Security....1761
OAEP Alternatives....1762
Cross-References....1762
Recommended Reading....1762
Oblivious Data Structures....1763
Definition....1763
Background....1763
Theory and Application....1763
Formal Definition....1763
Main Techniques....1764
Applications....1764
Open Problems and Future Directions....1764
References....1765
Oblivious Joins....1766
Oblivious Locally Decodable Codes (OLDC)....1766
Oblivious Parallel RAM (OPRAM)....1766
Synonyms....1766
Definition....1766
Background....1766
Theory: Overview of the Construction....1767
Cross-References....1768
References....1768
Oblivious Parallel Random Access Memory....1769
Oblivious RAM (ORAM)....1769
Synonyms....1769
Definitions....1769
Background....1769
Hierarchical Construction....1770
Tree-Based Construction....1771
Applications....1771
Cross-References....1771
References....1772
Oblivious RAM Lower Bound....1772
Synonyms....1772
Definition....1772
Theory....1773
Lower Bound in the Online Setting....1773
Open Problems and Future Directions....1775
Cross-References....1775
References....1775
Oblivious RAM-Based Secure Processors....1775
Definitions....1775
Background....1776
Recent Results....1776
Open Problems and Future Directions....1776
References....1777
Oblivious Random Access Memory....1778
Oblivious Transfer....1778
References....1779
Ocular Region....1779
Off-Chain Protocol....1779
One Time Password, from a Key Management Perspective....1779
Related Concepts....1779
Definition....1779
Applications....1779
References....1780
One-Time Password....1780
Synonyms....1780
Definition....1780
Background....1780
Theory....1780
Cross-References....1782
Recommended Reading....1782
One-Way Chain....1782
One-Way Function....1782
Definition....1782
Background....1782
Theory....1782
Cross-References....1783
Recommended Reading....1783
One-Way Hash Chain....1783
One-Way Property....1783
Online Analytical Processing....1783
O-Notation....1784
Definition....1784
Theory....1784
Applications....1785
Cross-References....1785
Open Web Proxies....1785
Definition....1785
Background....1785
Open Web Proxy Anonymity....1785
Open Web Proxy Behavior, Security, and Privacy Threats....1786
References....1786
Operational Safety....1787
Operational Separation of Duties....1787
Optimal Extension Fields (OEFs)....1787
Definition....1787
Theory....1787
Applications....1789
Cross-References....1789
Recommended Reading....1789
Oracle (Blockchain Concept)....1790
Synonyms....1790
Definition....1790
Applications....1790
Theory....1790
Basic Design and Functionality....1790
Security Goals....1791
A Broader Perspective....1791
Open Problems and Future Directions....1792
Cross-References....1792
References....1792
ORAM....1792
Order....1793
Definition....1793
Theory....1793
Applications....1793
Cross-References....1793
Order-Preserving Encryption....1793
OTP....1793
Outbound Authentication....1793
Outsourced Private Information Retrieval....1794
Introduction....1794
References....1796
Overlay-Based DoS Defenses....1797
Definition....1797
Background....1797
Applications and Experimental Results....1797
First-Generation Overlay-Based DoS Defenses....1797
Second Generation Overlay-Based DoS Defenses....1800
Protection for Web Services....1800
Removing ISP Packet Filtering....1801
Overlay-Based Defenses Against Targeted DoS Attacks....1803
Open Problems....1805
Recommended Reading....1805
Overspender Detection....1806
Definition....1806
Theory....1806
Cross-References....1806
Recommended Reading....1806
Overspending Prevention....1807
Definition....1807
Theory....1807
Cross-References....1807
Recommended Reading....1807
Over-the-Air (OTA) Programming....1807
Ownership....1807
P....1808
P2P....1808
Packet Error Rate....1808
Packet Flooding Attack....1808
Paillier Encryption and Signature Schemes....1808
Definition....1808
Theory....1808
Applications....1809
Cross-References....1809
Recommended Reading....1809
Pairing-Based Key Exchange....1810
Synonyms....1810
Definition....1810
Background....1810
Theory....1810
Applications....1811
Cross-References....1811
Recommended Reading....1811
Pairing-Friendly Elliptic Curves....1811
Definition....1811
Background....1811
Theory....1811
Supersingular Curves....1812
Embedding Degree k=2....1812
Ordinary Curves....1812
MNT Curves....1813
BN Curves....1814
Other Constructions of Pairing-Friendly Ordinary Elliptic Curves....1814
Cross-References....1814
References....1814
Pairings....1815
Synonyms....1815
Definition....1815
Background....1815
Theory....1815
References....1816
Palm Vein Recognition....1816
Palmprint Authentication....1817
Palmprint Recognition....1817
Synonyms....1817
Definitions....1817
Background....1817
Theory....1818
Competitive Code....1819
Ordinal Measure....1820
RLOC....1820
Applications....1821
Experimental Results....1821
Open Problems....1822
References....1822
3D Palmprint....1823
Synonyms....1823
Definitions....1823
Background....1823
Theory....1823
Open Problems....1825
Summary....1826
References....1826
Parallelizable Message Authentication Code....1826
Parent/Child Chains....1827
Passive Physical Attacks....1827
Passport Security....1827
Synonyms....1827
Definition....1827
Background....1827
Theory....1827
Passive Authentication....1828
Active Authentication....1828
Basic Access Control....1828
Secure Messaging....1829
Other Security Mechanisms....1829
Open Problems and Future Directions....1829
Cross-References....1830
References....1830
Password....1830
Definition....1830
Theory....1831
Cross-References....1832
Recommended Reading....1832
Password Nudges....1833
Patch Release....1833
Payment Card....1833
Synonyms....1833
Definition....1833
Theory....1833
Applications....1833
Cross-References....1834
Recommended Reading....1834
Peer Privacy....1834
Peer-to-Peer Systems....1834
Synonyms....1834
Definition....1834
Background....1834
Applications....1835
Open Problems and Future Directions....1835
Cross-References....1836
References....1836
Pegged Sidechains....1836
PEM, Privacy-Enhanced Mail....1836
Synonyms....1836
Definition....1836
Background....1836
Theory....1836
Cross-References....1837
Recommended Reading....1837
Penetration Testing....1837
Definition....1837
Theory....1837
Cross-References....1838
Recommended Reading....1838
Penmanship....1839
Perfect Forward Secrecy....1839
Synonyms....1839
Related concepts and keywords....1839
Definition....1839
Background....1839
Application....1840
References....1840
Perfectly Secure Message Transmission....1841
Background....1841
Definition....1841
Theory....1841
Open Problems....1842
Cross-References....1842
References....1843
Periocular Biometrics....1844
Synonyms....1844
Definitions....1844
Background....1844
Periocular Biometric System....1845
Feature Extraction for Periocular Biometrics....1845
Application....1845
Open Problems and Future Directions....1846
References....1847
Periocular Region....1847
Permissions: Access Control Fundamentals....1847
Synonyms....1847
Definition....1847
Background....1847
Theory....1848
Application....1849
Open Problems and Future Directions....1850
Cross-References....1851
References....1851
Personal Identification Number (PIN)....1851
Definition....1851
References....1851
Personally Identifiable Information....1851
Definitions....1851
Theory and Application....1852
Cross-References....1852
References....1852
Persuasive Communication....1853
Persuasive Security Messages....1853
Synonyms....1853
Definition....1853
Background....1853
Theory and Application....1853
Open Problems and Future Directions....1854
Cross-References....1854
References....1854
PGP....1855
Phenotyping....1855
Synonyms....1855
Definition....1855
Recommended Reading....1855
Phi Function....1855
Photo Privacy....1855
Physical Obfuscated Key....1855
Physical One-Way Function (previously)....1855
Physical Random Function....1855
Physical Random Function (previously)....1855
Physical Security....1855
Definition....1855
Background....1856
Theory....1856
Recommended Reading....1856
Physical Unclonable Functions (PUFs)Work done while the author was at Philips Research, The Netherlands....1857
Synonyms....1857
Definition....1857
Theory....1857
Applications....1861
Cross-References....1862
Recommended Reading....1863
Physical(ly) Unclonable Function (alternate spelling)....1864
Physically Obfuscated Key or POK (variant)....1864
Physically Unclonable Function (PUF)....1865
Synonyms....1865
Definition....1865
Background....1865
Theory....1865
PUF Design....1865
PUF Challenges and Responses....1865
Strong and Weak PUFs, POKs....1866
PUF Quality Metrics....1866
Applications....1866
Constructions....1866
Use Cases....1867
Open Problems and Future Directions....1867
Cross-References....1868
References....1868
PIR with Compressed Queries....1868
Synonyms....1868
Definitions....1868
Background....1869
Large Elements....1869
Sublinear Communication....1869
High Computation Costs....1870
Compressing Queries....1870
Brakerski-Fan-Vercauteren FHE Cryptosystem (BFV)....1870
Encoding the Index....1871
Expanding Queries Obliviously....1871
Optimizations....1872
Future Directions....1872
Cross-References....1872
References....1872
PKCS....1872
Definition....1872
Background....1872
Theory....1873
Cross-References....1873
Recommended Reading....1873
PKI....1873
Synonyms....1873
Definition....1873
Theory....1874
Applications....1874
Cross-References....1874
Recommended Reading....1874
PKI Trust Models....1875
Synonyms....1875
Definition....1875
Background....1875
Theory....1876
Applications....1878
Experimental Results....1878
Open Problems and Future Directions....1878
Cross-References....1878
References....1878
PKI Trust Relationships....1878
PKIX, Public Key Infrastructure (X.509)....1878
Definition....1878
Background....1878
Theory....1879
Recommended Reading....1879
Platform for Privacy Preferences (P3P)....1879
Definition....1879
Background....1880
Applications....1880
References....1880
Playback Attack....1881
Playfair Cipher....1881
Cross-References....1881
Recommended Reading....1881
PMAC....1881
Synonyms....1881
Definition....1881
Background....1882
Theory....1882
Cross-References....1883
Recommended Reading....1883
POI: Point of Interest....1883
Point Counting....1883
Synonyms....1883
Definition....1883
Background....1883
Theory and Application....1883
Cross-References....1884
References....1885
POK....1885
Policy Composition....1885
Definition....1885
Background....1885
Theory and Application....1885
Open Problems and Future Directions....1887
Cross-References....1887
References....1887
Policy Hiding Attribute-Based Encryption....1887
Policy Misconfigurations....1887
Policy Updatable Attribute-Based Encryption....1887
Political Economy....1887
Polybios Square Encryption....1887
Definition....1887
Cross-References....1888
Recommended Reading....1888
Polyinstantiation....1888
Definition....1888
Background....1888
Theory and Application....1888
Cross-References....1890
References....1890
Polynomial Time....1891
Definition....1891
Theory....1891
Applications....1892
Open Problems....1892
Cross-References....1892
Porta Encryption....1892
Definition....1892
Cross-References....1893
Recommended Reading....1893
Post-quantum ABE....1893
Post-quantum Cryptographic Hardware Primitives....1893
Synonyms....1893
Definitions....1893
Background....1893
Theory and Application....1894
Open Problems and Future Directions....1896
Cross-References....1896
References....1896
Post-quantum Cryptography....1897
Definition....1897
Background....1897
Theory and Applications....1898
Cross-References....1898
References....1898
Post-quantum IBE....1899
Post-quantum Identity-Based Encryption and Attribute-Based Encryption....1899
Synonyms....1899
Definitions....1899
Background....1899
IBE and ABE from Lattices....1899
PQ Models and Assumptions....1900
Open Problems....1901
Cross-References....1901
References....1901
Post-Snowden Cryptography....1901
Synonyms....1901
Definitions....1901
Background....1901
Theory....1902
Algorithm Subversion and Countermeasures....1902
Parameter Subversions and Countermeasures....1903
Hardware Subversions and Countermeasures....1903
Open Problems and Future Directions....1903
Cross-References....1904
References....1904
Power/EM Analysis Attacks....1905
Practical E-Cash....1905
Synonyms....1905
Related Concepts....1905
Definition....1905
Background....1905
Theory of E-Cash....1906
Differences Between E-Cash and E-Investments....1906
Open Problems....1907
References....1907
Practical Revocation in Cryptographic Access Control....1907
Preimage Resistance....1907
Synonyms....1907
Definition....1908
Background....1908
Theory....1908
Cross-References....1908
References....1908
-Presence....1909
Definition....1909
Background....1909
Theory....1909
δ-Presence: Generic Definition....1909
Data Publishing Scenario: Enforcing δ-Presence....1910
Open Problems....1911
Cross-References....1912
References....1912
PRESENT – Block Cipher....1913
Definition....1913
Background....1913
Theory....1913
The sBoxLayer....1913
The pLayer....1913
The Key Scheduling....1913
Cryptanalytic Results....1913
Implementation Results....1913
Cross-References....1914
Recommended Reading....1914
Pretty Good Privacy (PGP)....1914
Synonyms....1914
Definition....1915
Background....1915
History....1915
GnuPG....1917
Theory....1917
OpenPGP Standard....1917
Web of Trust Model....1917
Experimental Results....1917
Cross-References....1919
Recommended Reading....1919
Prevention....1919
Primality Proving Algorithm....1919
Definition....1919
Cross-References....1919
Primality Test....1919
Definition....1919
Cross-References....1919
Primary Key....1919
Prime Certificate....1920
Prime Generation....1920
Definition....1920
Theory....1920
Cross-References....1920
Prime Number....1920
Definition....1920
Background....1920
Theory....1921
Primality Tests and Primality Proofs....1922
Primality Test....1923
Primality Proofs....1924
Overview....1925
Cross-References....1926
Recommended Reading....1926
Primitive Element....1927
Definition....1927
Theory....1927
Applications....1928
Cross-References....1928
Privacy....1928
Privacy Assessment....1928
Privacy Attacks Against Relationship on OSNs....1928
Synonyms....1928
Definitions....1928
Background....1928
Telling Relationship from Rich OSN Data....1929
Finding Hidden Relationship in Apps....1929
Compromising Relationship in Data Publishing....1930
References....1930
Privacy Awareness....1931
Privacy Breach Impacts....1931
Privacy by default....1931
Privacy by Design....1931
Privacy Dilemma....1931
Privacy Dilemma, The....1931
Privacy Economics: From Information Theory to Privacy as an Asset....1931
Synonyms....1931
Definitions....1931
Background....1931
Theory....1933
Open Problems and Future Directions....1935
Cross-References....1935
References....1936
Privacy in Data-Driven Circular Economy....1936
Definition....1936
Background....1937
Theory and Application....1937
Open Problems and Future Directions....1938
References....1938
Privacy in Location-Based Data Mining....1938
Definition....1938
Background....1939
Theory....1939
Privacy Attacks....1939
Privacy Protection Schemes....1940
Privacy Protection Through Data Manipulation....1940
Privacy Protection Through the Algorithms and Models....1941
Applications....1942
References....1942
Privacy in Location-Based Social Networks....1943
Privacy in Mobile Crowdsensing....1943
Privacy in Mobile Participatory Sensing....1943
Synonyms....1943
Definition....1943
Background....1943
Threats to Privacy....1944
Theory and Application....1945
Open Problems and Future Directions....1946
Cross-References....1946
References....1946
Privacy in Mobile Sensing Applications....1947
Privacy in Mobile Urban Sensing Applications....1947
Privacy in Participatory Sensing Applications....1947
Privacy Law: Understanding Data Protection Regulations....1947
Synonyms....1947
Definition....1947
Background....1947
Theory....1947
Application....1948
Open Problems and Future Directions....1950
Cross-References....1952
References....1952
Privacy Legislation....1953
Privacy Measurement....1953
Privacy Metrics....1953
Synonyms....1953
Definitions....1953
Theory....1953
Inputs for Privacy Metrics....1953
Properties Measured by Privacy Metrics....1954
Uncertainty Metrics....1954
Information Gain Metrics....1954
Similarity Metrics....1954
Indistinguishability Metrics....1955
Success Metrics....1955
Error Metrics....1955
Time Metrics....1955
Accuracy Metrics....1955
Criteria for Selecting Privacy Metrics....1955
Open Problems and Future Directions....1956
Cross-References....1956
References....1957
Privacy Metrics for Online Social Network Data....1957
Synonyms....1957
Definitions....1957
Theory....1957
k-Anonymity-Based Privacy Metrics....1957
Differential Privacy-Based Metrics....1958
Open Problems and Future Directions....1958
Cross-References....1958
References....1958
Privacy Nudging....1958
Synonyms....1958
Definition....1958
Background....1958
Theory....1959
Open Problems and Future Directions....1960
Cross-References....1960
References....1960
Privacy of Aggregated Location Information....1960
Privacy of Aggregated Mobility Data....1960
Synonyms....1960
Definitions....1960
Background....1960
Theory....1961
Approach 1: Anonymization of Specific Query Results....1962
Syntactic Anonymization....1962
Anonymization with Differential Privacy....1962
Approach 2: Anonymization of the Mobility Dataset....1962
Syntactic Anonymization....1962
Anonymization with Differential Privacy....1963
Approach 3: Anonymization of Spatiotemporal Density....1963
Open Problems and Future Directions....1963
Cross-References....1964
References....1964
Privacy of Outsourced Data....1964
Definitions....1964
Background....1964
Theory....1965
Cloud Adversarial Behavior and Security Requirements/Properties....1965
Honest-but-curious (HBC) adversary....1965
Adversarial view....1965
Malicious adversary....1965
Security properties....1965
Ciphertext indistinguishability....1965
Execution privacy....1965
Security Solutions....1967
Encryption-Based Techniques....1967
Limitations of encryption-based techniques....1967
Systems built using encryption-based techniques....1967
Secret-Sharing-Based Techniques....1968
Limitations....1968
Systems built using secret-sharing-based techniques....1968
Secure Hardware-Based Techniques....1968
Limitations....1968
Systems built using secure hardware-based techniques....1968
Open Problems and Future Directions....1969
Cross-References....1969
References....1969
Privacy of Trace Data....1970
Privacy of Trajectory Data....1970
Synonyms....1970
Definition....1970
Background....1970
Theory....1970
Privacy of a Whole Trajectory....1971
Privacy of Sensitive Place Visits....1972
Open Problems and Future Directions....1972
Cross-References....1973
References....1973
Privacy of Trajectory Micro-data....1973
Privacy Paradox, The....1973
Synonyms....1973
Definition....1973
Background....1973
Theory....1974
Open Problems and Future Directions....1974
Cross-References....1975
References....1975
Privacy Protection in Biometric Systems....1975
Privacy Quantification....1975
Privacy Requirements....1975
Privacy Soft Paternalism....1975
Privacy Violation Impacts....1975
Privacy-Aware Access Control in Decentralized Online Social Networks....1975
Synonyms....1975
Definitions....1975
Background....1975
Theory and Application....1977
Existing Solutions and Future Directions....1977
Cross-References....1978
References....1978
Privacy-Aware Access Control Policies....1979
Definition....1979
Background....1979
Theory....1979
User-Based Privacy Restrictions....1979
Regulation Modeling....1980
Open Problems and Future Directions....1980
Cross-References....1980
References....1980
Privacy-Aware Database....1981
Privacy-Aware Languages....1981
Synonyms....1981
Definition....1981
Background....1981
Theory and Application....1981
Open Problems and Future Directions....1982
Cross-References....1982
References....1982
Privacy-Enabled Database....1983
Privacy-Enhanced Languages....1983
Privacy-Enhanced Technologies....1983
Privacy-Enhancing Technologies (PET)....1983
Synonyms....1983
Definitions....1983
Background....1983
Theory and Applications....1984
Open Problems and Future Directions....1985
Cross-References....1985
References....1985
Privacy-Preserving Authentication in Wireless Access Networks....1986
Synonyms....1986
Definitions....1986
Background....1986
Theory....1986
Application....1987
Open Problems....1988
References....1988
Privacy-Preserving Data Publishing....1988
Synonyms....1988
Definition....1989
Background....1989
Theory....1990
Open Problems and Future Directions....1991
Cross-References....1991
References....1991
Privacy-Preserving Joins over Encrypted Data....1993
Synonyms....1993
Definition....1993
Theory....1993
Open Problems and Future Directions....1995
Cross-References....1995
References....1995
Privacy-Preserving Machine Learning....1995
Privacy-Preserving Outlier Detection....1995
Privacy-Preserving Technologies....1995
Private Boolean Queries on Encrypted Data....1995
Synonyms....1995
Definition....1995
Background....1996
Theory....1996
Application....1997
Open Problems and Future Directions....1997
Cross-References....1997
References....1997
Private Exponent....1998
Private Information Retrieval....1998
Definitions....1998
Background....1998
Theory....1999
Perfect Privacy Constructions....2000
Cross-References....2000
References....2000
Private Information Retrieval with Preprocessing....2001
Synonyms....2001
Definitions....2001
Background....2001
Theory....2002
Formal Definition....2002
Syntax....2002
Semantics....2002
Negative Results....2003
Constructions....2003
Open Problems and Future Directions....2003
Cross-References....2003
References....2003
Private Information Retrieval with Sublinear Online Time....2004
Private Key Cryptosystem....2004
Private Machine Learning....2004
Private Range Queries....2004
Synonyms....2004
Definitions....2004
Theory....2004
Order-Preserving Encryption....2005
Range-Searchable Encryption....2005
Attacks on Private Range Queries....2005
Open Problems and Future Directions....2006
Cross-References....2006
References....2006
Private Stateful Information Retrieval....2006
Definition....2006
Background....2006
Construction....2007
Cross-References....2009
References....2009
Private-Key Constructions for Dynamic Access Control....2009
Privileges in SQL....2009
Definitions....2009
Theory....2009
Cross-References....2011
References....2011
PRNG....2011
Probabilistic Key Sharing....2011
Synonyms....2011
Definition....2011
Background....2011
Theory....2012
Security Improvements....2012
Attacker Model....2013
Applications....2013
Open Problems and Future Directions....2013
References....2014
Probabilistic Primality Test....2014
Synonyms....2014
Definition....2015
Theory....2015
Cross-References....2015
Probabilistic Public-Key Encryption....2015
Definition....2015
Background....2015
Theory....2015
Cross-References....2015
Recommended Reading....2015
Probabilistic Query Integrity....2015
Definitions....2015
Background....2016
Theory and Application....2016
Open Problems and Future Directions....2018
Cross-References....2018
References....2018
Probing Model....2018
Synonyms....2018
Definitions....2018
Background....2018
Theory....2019
Composition....2019
Real-World Leakage....2019
Open Problems and Future Directions....2019
References....2020
Product Cipher, Superencryption....2020
Definition....2020
Theory....2020
Applications....2021
Cross-References....2021
Recommended Reading....2021
Profiling....2021
Program Verification and Security....2021
Synonyms....2021
Definition....2021
Background....2021
Applications and Experiments....2022
Open Problems and Future Directions....2023
Cross-References....2023
References....2023
Project Athena....2024
Proof of Knowledge Versus Proof of Membership....2024
Cross-References....2024
References....2024
Proof of Stake....2024
Definition....2024
Background....2025
Theory....2025
Nakamoto-Style PoS....2026
PoS via Iterated Byzantine Agreement....2026
Cross-References....2027
References....2027
Proof of Work....2027
Synonyms....2027
Definition....2027
Theory....2027
Applications....2028
Open Problems and Future Directions....2028
Cross-References....2028
References....2029
Proof-Carrying Code....2029
Definition....2029
Background....2029
Theory and Applications....2030
Experimental Results....2031
Recommended Reading....2031
Proofs of Proof-of-Work....2032
Definition....2032
Background....2032
Theory....2033
Application....2034
Open Problems and Future Directions....2034
Cross-References....2034
References....2034
Propagation Characteristics of Boolean Functions....2035
Definition....2035
Background....2035
Theory....2035
Cross-References....2035
Recommended Reading....2036
Protection Rings....2036
Definition....2036
Background....2036
Theory....2036
Applications....2037
Challenges....2038
References....2038
Protocol....2038
Synonyms....2038
Definition....2038
References....2039
Protocol Cookies....2039
Synonyms....2039
Definition....2039
Background....2039
Application and Theory....2039
Cross-References....2040
Recommended Reading....2040
-Protocols....2040
Definition....2040
Background....2040
Theory....2041
Applications....2042
Cross-References....2042
Recommended Reading....2042
Proximity Card....2042
Definition....2042
Background....2042
Applications....2043
Cross-References....2043
Recommended Reading....2043
Proxy Re-encryption....2043
Definition....2043
Bilinear Groups....2043
Strong One-Time Signature....2043
Background....2044
Multi-hop Bidirectional PRE....2044
Single-Hop Unidirectional PRE....2045
More on Proxy Re-encryption....2047
Open Problems and Future Directions....2047
References....2047
PSC....2048
Pseudo-Mersenne Prime....2048
Definition....2048
Applications....2048
Recommended Reading....2048
Pseudo-Noise Sequences (PN-Sequences)....2048
Definition....2048
Cross-References....2049
Recommended Reading....2049
Pseudonym....2049
Pseudonymity....2049
Pseudonymity in OSNs....2049
Pseudonymization (Accordingto GDPR)....2049
Definition....2049
Background....2049
Theory....2050
Open Problems and Future Directions....2051
Cross-References....2052
References....2052
Pseudonyms....2052
Synonyms....2052
Definition....2052
Background....2053
Theory....2053
Applications....2054
Cross-References....2054
References....2054
Pseudonyms for Mobile Networks....2054
Synonyms....2054
Definitions....2055
Background....2055
Theory....2055
Open Challenges....2056
Cross-References....2056
References....2057
Pseudoprime....2057
Definition....2057
Applications....2057
Cross-References....2057
Pseudorandom Function....2057
Definition....2057
Theory....2057
Applications....2058
Cross-References....2058
Recommended Reading....2058
Pseudorandom Number Generator....2058
Synonyms....2058
Definition....2058
Background....2058
Theory....2059
Applications....2059
PRNG Structure....2059
PRNG Examples....2059
PRNG Initialization....2059
Experimental Results....2060
Open Problems....2060
Cross-References....2060
Recommended Reading....2060
Psychology of Cybercrime....2060
Synonyms....2060
Definition....2060
Background....2061
Theory and Application....2061
The Online Offender....2061
The Online Victim....2063
Open Problems and Future Directions....2063
Cross-References....2064
References....2064
Public Exponent....2064
Public Key Cryptography....2064
Definition....2064
Background....2064
Theory....2065
Cross-References....2065
Recommended Reading....2065
Public Key Encryption....2065
Public Key Infrastructure....2066
Public Key Proxy Encryption....2066
Definition....2066
Theory....2066
Applications....2068
Cross-References....2068
Recommended Reading....2068
Public Key Proxy Signatures....2068
Definition....2068
Theory....2068
Applications....2070
Cross-References....2070
Recommended Reading....2070
Public-Key Authenticated Encryption....2070
Public-Key Cryptosystem....2070
Public-Key Searchable Encryption Models....2070
Publicly Verifiable Proof-of-Sequential Work....2070
PUF....2071
Pufferfish....2071
Pufferfish Privacy....2071
Synonyms....2071
Definitions....2071
Background....2071
Theory and Application....2071
Open Problems and Future Directions....2072
Cross-References....2072
References....2072
Q....2073
QRP....2073
Quadratic Residue....2073
Definition....2073
Theory....2073
Open Problems....2073
Cross-References....2073
Quadratic Residuosity Problem....2073
Synonyms....2073
Definition....2074
Theory....2074
Applications....2074
Cross-References....2074
Recommended Reading....2074
Quadratic Sieve....2074
Definition....2074
Background....2074
Theory....2074
Generation of Relations....2075
Computation of Polynomial Coefficients....2075
Optimization and Parameter Selection....2075
Cross-References....2076
Recommended Reading....2076
Quality Measures....2077
Quantum Cryptography....2077
Definition....2077
Background....2077
Theory....2077
The Various Uses of Quantum Physics for Cryptography....2077
Quantum Key Distribution....2078
Alternative Quantum Key Distribution Protocols and Implementations....2079
Cryptography on Quantum Data....2080
Recommended Reading....2080
Quantum-Safe Identity and Attribute Based Encryption....2082
Quasi-Identifier....2082
Definition....2082
Background....2082
Theory....2083
Application....2084
Experimental results....2084
Cross-References....2084
References....2084
Queries over Encrypted Relational DBMS....2084
Query Integrity....2085
Definitions....2085
Background....2085
Theory and Application....2085
Open Problems and Future Directions....2086
Cross-References....2086
References....2086
Query Processing on Encrypted Relational Databases....2086
R....2087
Rabin Cryptosystem....2087
Definition....2087
Background....2087
Theory....2087
The Rabin Primitive....2088
Cross-References....2088
Recommended Reading....2088
Rabin Digital Signature Scheme....2088
Background....2088
Theory....2088
Cross-References....2089
Recommended Reading....2089
Radio Fingerprinting....2090
Radio Frequency Attacks....2090
Definition....2090
Background....2090
Theory....2090
Principles and Description....2091
ElectroMagnetic Pulse....2092
Coupling....2092
Damage....2093
Energy....2093
Nonnuclear Techniques....2093
Protection and Countermeasures....2094
Targets and Properties....2095
Properties....2095
Further Reading....2095
Conclusions....2096
Recommended Reading....2097
Radio Interference Attack Defense....2097
Radio-Frequency (RF) Fingerprinting....2098
Radiometric Identification....2098
Radiometrics....2098
Rainbow Tables....2098
Definition....2098
Theory....2098
Cross-References....2099
Recommended Reading....2099
Random Bit Generator....2099
Definition....2099
Background....2099
Theory....2099
Raw Random Bit Sources....2099
SW-Based Generators....2100
HW-Based Generators....2100
Randomness Sources in HW-Based Generators....2100
Post-Processing....2102
Recommended Reading....2103
Random Key Predistribution....2104
Random Number Testing....2104
Definition....2104
Background....2104
Theory/Application....2104
The Monobit or Frequency Test for Entire Sequence....2105
The Runs Test for the Entire Sequence....2105
Test for the Longest-Run-of-Ones in a Block....2105
Frequency Test Within a Block....2105
Open Problems....2105
Cross-References....2105
References....2105
Random Oracle Model....2105
Definition....2105
Theory....2106
Cross-References....2106
Recommended Reading....2106
Randomised Agreement....2107
Range Queries over Encrypted Data....2107
Synonyms....2107
Definitions....2107
Background....2107
Theory....2108
Open Problems and Future Directions....2109
Cross-References....2109
References....2109
Range-Searchable Encryption....2109
Rank Codes....2110
Synonyms....2110
Definition....2110
Background....2110
Theory....2110
Delsarte's Optimal Rank Codes in Matrix Representation....2111
Optimal Rank Codes in Vector Representation....2111
Correcting Rank Errors and Rank Erasures....2112
Open Problems....2112
Cross-References....2112
Recommended Reading....2113
Rank Estimation....2113
Synonyms....2113
Definitions....2113
Background....2113
Application....2114
Open Problems and Future Directions....2114
Cross-References....2114
References....2115
Ranked Search on Encrypted Data....2115
Synonyms....2115
Definitions....2115
Historical Background....2115
General Framework of Ranked Search Over Encrypted Data....2116
Challenges and Future Directions....2117
Key Application....2118
Cross-References....2118
References....2118
Ranking Queries on Encrypted Data....2118
Rank-Metric Codes....2118
Ransomware....2118
Synonyms....2118
Definitions....2118
Background....2119
Application....2119
Open Problems and Future Directions....2120
Cross-References....2120
References....2120
RBAC....2120
RC4....2120
Definition....2120
Background....2121
Theory....2121
Applications....2121
Cross-References....2122
Recommended Reading....2122
RC5....2122
Synonyms....2122
Definition....2122
Background....2123
Theory....2123
Applications....2123
Cross-References....2123
Recommended Reading....2123
RC6....2124
Synonyms....2124
Definition....2124
Background....2124
Theory....2124
Applications....2124
Cross-References....2125
Recommended Reading....2125
Reactive Security....2125
Recipient Anonymity....2125
Definition....2125
Theory....2125
Applications....2127
Open Problems and Future Directions....2127
Cross-References....2128
References....2128
Recognition....2128
Record Linkage....2128
Recursive Revoke....2128
Synonyms....2128
Definition....2128
Theory....2128
Historical Notes....2129
Cross-References....2131
References....2131
Redundancy-Based Countermeasures....2131
Reed–Muller Codes....2131
Synonyms....2131
Definition....2131
Background....2131
Theory....2131
Cross-References....2132
Recommended Reading....2132
Reference Monitor....2133
Definition....2133
Background....2133
Theory....2133
Applications....2134
Open Problems....2134
Cross-References....2135
Recommended Reading....2135
Reflection DoS Attacks....2136
Regulation (EU) 2022/868....2136
Regulation (EU) 2023/2854....2136
Regulation EU 2016/679....2136
Re-identification and Automatic Update for Biometrics....2136
Synonyms....2136
Summary....2136
Definitions....2136
Background....2136
Application....2137
Open Problems and Future Directions....2137
References....2137
Related (not identical) to Doubly Efficient Private Information Retrieval (DEPIR)....2138
Related Key Attack....2138
Definition....2138
Background....2138
Theory....2138
Applications....2138
Cross-References....2138
Recommended Reading....2139
Relationship Anonymity....2139
Relationship on OSNs....2139
Relatively Prime....2139
Synonyms....2139
Definition....2139
Cross-References....2139
Remote Attestation....2139
Remote Attestation in IoT Devices....2139
Definition....2139
Background....2140
Theory....2141
Open Problems and Future Directions....2142
Cross-References....2142
References....2142
Remote Face Recognition....2143
Synonyms....2143
Definitions....2143
Background....2143
Theory....2143
Low Resolution....2143
Blur....2144
Atmospheric Turbulence....2144
Application....2144
Summary....2145
Open Problems and Future Directions....2146
References....2146
Remote Updates....2146
Replay Attack....2147
Synonyms....2147
Definition....2147
Application....2147
Open Problems and Future Directions....2147
Cross-References....2147
References....2147
Residue Arithmetic....2147
Resilience Expenditure....2147
Resilience in Cyber Physical Systems....2147
Resilience in Cyber-Physical Systems....2148
Synonyms....2148
Definition....2148
Background....2148
Theory and Application....2148
Open Problems and Future Directions....2148
Cross-References....2149
References....2149
Resilient Control Systems....2150
Resilient Embedded and Smart Systems....2150
Resistance to the Standard Algebraic Attack....2150
Response....2150
Definition....2150
Cross-References....2150
Response and Reconfiguration Under Attacks in CPS....2150
Synonyms....2150
Definitions....2150
Background ....2150
Attack Detection and the Missing Link to Attack Response....2152
Response and Reconfiguration Under Attacks in CPS....2152
Conclusions....2154
References....2154
Resynchronization Attack....2155
Definition....2155
Applications....2156
Cross-References....2156
Recommended Reading....2156
Retina Recognition....2156
Reverse Engineering of Malware Emulators....2156
Synonyms....2156
Definition....2156
Background....2156
Applications....2156
Open Problems....2157
Recommended Reading....2157
Reverse Public Key Encryption....2157
Definition....2157
Recommended Reading....2157
RFID Security....2158
Synonyms....2158
Definition....2158
Background....2158
Theory....2158
Impersonation....2158
Privacy....2158
Denial of Service....2159
Open Problems and Future Directions....2159
Cross-References....2159
References....2159
Right-to-Left Exponentiation....2159
Definition....2159
Background....2159
Theory....2160
Cross-References....2160
Recommended Reading....2160
Rijndael....2160
Synonyms....2160
Definition....2160
Background....2160
Theory....2160
Structure....2161
The Round Transformation....2161
Key Schedule....2163
Security....2163
Applications....2164
Cross-References....2164
Recommended Reading....2164
Ring....2164
Definition....2164
Theory....2164
Applications....2165
Cross-References....2165
Ring Signatures....2165
RIPEMD Family....2165
Cross-References....2168
Recommended Reading....2168
Risk Communication....2169
Synonyms....2169
Definition....2169
Background....2169
Theory and Application....2170
Open Problems and Future Directions....2171
Cross-References....2171
References....2171
Risk Mitigation....2171
Risk Perception....2171
Risk Prediction....2171
Risk Reduction....2172
Risk Response....2172
Rivest Cipher 5....2172
Rivest Cipher 6....2172
Robust Machine Learning....2172
Robust Private Information Retrieval....2172
Definitions....2172
Theory....2172
References....2174
Role-Based Access Control....2174
Synonyms....2174
Definition....2174
Background....2174
Theory....2175
Applications....2176
Experimental Results....2176
Open Problems and Future Directions....2176
Cross-References....2177
Recommended Reading....2177
Roles in SQL....2177
Synonyms....2177
Definition....2177
Background....2177
Application....2177
Open Problems and Future Directions....2178
Cross-References....2179
References....2179
Rons Code 5....2180
Rons Code 6....2180
Root Cause Analysis....2180
Synonyms....2180
Definition....2180
Theory....2180
Five Why's Technique....2181
Fishbone Diagram....2182
Causal Factors Analysis....2182
Open Problems and Future Directions....2183
Root of Trust....2183
Synonyms....2183
Definition....2183
Background....2183
Hardware Root of Trust....2184
Attributes of a TPM Root of Trust....2184
Attributes of a Secure Processor Root of Trust....2185
Current Research in Secure Processing....2185
Open Problems....2185
Cross-References....2186
Recommended Reading....2186
Rootkits....2186
Synonyms....2186
Definition....2186
Background....2186
Applications....2187
Cross-References....2187
References....2187
RSA Digital Signature Scheme....2187
Definition....2187
Theory....2187
Applications....2190
Cross-References....2191
Recommended Reading....2191
RSA Factoring Challenge....2192
Definition....2192
Background....2192
Applications....2193
Cross-References....2193
Recommended Reading....2193
RSA Problem....2194
Definition....2194
Theory....2194
Relationship to Integer Factoring....2194
Recovering the Private Key....2195
Self-Reducibility....2195
Low Public-Exponent RSA....2195
Strong RSA Assumption....2196
Bit-Security of RSA Encryption....2196
Chosen Ciphertext Attacks....2196
Conclusions....2197
Applications....2197
Open Problems....2197
Cross-References....2197
Recommended Reading....2197
RSA Public-Key Encryption....2198
Definition....2198
Theory....2199
One-Way Permutations....2199
Number Theory....2199
Modular Powers and Roots....2200
The RSA Primitive....2201
The RSA Problem....2201
The Plain RSA Cryptosystem....2201
Security Weaknesses....2201
Multicast Encryption....2201
Small Exponents....2202
Applications....2202
Cross-References....2202
Recommended Reading....2202
RTL Security Verification....2203
Run....2203
Definition....2203
Applications....2203
Cross-References....2203
Recommended Reading....2203
Running-Key....2203
Synonyms....2203
Definition....2203
Cross-References....2203
Runtime Analysis....2203
Run-Time Malware Analysis....2203
S....2204
Safety in Cyber-Physical Systems....2204
Synonyms....2204
Definition....2204
Theory and Applications....2204
Open Problems and Future Directions....2205
Cross-References....2205
References....2206
Salt....2206
Related Concepts....2206
Definition....2206
Applications....2206
Cross-References....2207
References....2207
Sandbox....2207
Definition....2207
Background....2207
Theory....2209
Applications....2210
Open Problems....2211
Cross-References....2211
References....2211
SCADA System....2211
Schemes Based on Rank Codes....2212
Synonyms....2212
Definition....2212
Background....2212
Theory....2212
Optimal Linear Rank Codes....2212
Parallel Channels and Correcting Random Rank Errors and Rank Erasures....2213
Rank Codes as Space-Time Codes....2214
Rank Codes in Network Coding....2214
Public Key Cryptosystems Based on Rank Codes....2215
Open Problems....2215
Recommended Reading....2215
Schnorr Digital Signature Scheme....2216
Background....2216
Theory....2216
Cross-References....2217
Recommended Reading....2217
Schnorr Identification Protocol....2217
Definition....2217
Background....2217
Theory....2217
Applications....2218
Cross-References....2218
References....2218
Sclera Recognition....2218
Score Calibration....2218
Score Normalization....2218
Synonyms....2218
Definitions....2218
Theory....2219
Statistics-based score normalization procedures....2219
Min-max normalization....2219
Z-score normalization....2219
Median-MAD normalization....2219
Generalized logit transform....2220
Class-aware score normalization....2220
F-norm....2220
Tanh-approximator....2220
Score normalization based on the Bayes theorem....2221
The log-likelihood ratio approach....2221
Logistic regression....2221
Logistic regression as a linear approximation to LLR....2221
Double sigmoid function....2221
Open problems....2221
Summary....2222
References....2222
Screaming Channels....2223
Definitions....2223
Background....2223
Radio Transmitters....2223
Mixed-Signal Chips....2223
Theory and Application....2223
A Side Channel over Radio....2223
Overview....2223
Root Problem....2223
Characteristics....2224
Attack....2224
Large Distance....2224
Realistic Target....2224
Future Directions....2225
Attacks....2225
Hardware Encryption....2225
Other Radio Protocols....2225
Defenses....2225
Software....2225
Hardware....2225
Cross-References....2225
References....2225
Script Language Security....2226
Synonyms....2226
Definition....2226
Background....2226
Theory....2226
Browsers Security Measures....2227
Open Problems....2227
Cross-References....2228
References....2228
SEAL....2228
Synonyms....2228
Definition....2228
Background....2228
Applications....2228
Cross-References....2229
Recommended Reading....2229
Sealed Storage....2229
Definition....2229
Sealed Storage in the TPM....2229
Applications....2230
Open Problems....2230
Cross-References....2230
Recommended Reading....2230
Search on Encrypted Multi-writer Tables....2231
Definition....2231
Background....2231
Theory....2231
Applications....2232
Open Problems....2233
Cross-References....2233
References....2233
Search over Ciphertext Datasets Using Partition Computation....2234
Definitions....2234
Background....2234
Theory....2234
Partitioned Computations....2235
Inference Attack in Partitioned Computations....2236
Partitioned Data Security at the Public Cloud....2237
Query Binning....2237
Open Problems....2239
Cross-References....2239
References....2239
Search over Encrypted Data....2239
Definitions....2239
Background ....2239
Theory....2240
Keyword Search over Encrypted Documents....2240
Range Queries over Encrypted Data....2241
Bucketization for Relational Queries....2242
Search Using Secure Hardware....2243
Open Problems....2243
Cross-References....2244
References....2244
Search over Secret-Shared Datasets....2244
Definitions....2244
Background....2244
Theory....2245
String-Matching Using Accumulating Automata....2245
Open Problems and Future Directions....2247
Cross-References....2247
References....2247
Searchable Attribute-Based Encryption....2248
Searchable Encryption....2248
Searchable Encryption with Fine-Grained Access Control....2248
Searchable Symmetric Encryption....2248
Synonyms....2248
Definition....2248
Background....2248
Theory....2248
Open Problems....2250
Cross-References....2250
References....2251
Searchable Symmetric Encryption on Trusted Execution Environments....2251
Synonyms....2251
Definitions....2251
Background....2251
Searchable Symmetric Encryption....2251
Trusted Execution Environments in Encrypted Search....2251
Theory....2251
Attacks on Trusted Hardware....2253
Open Problems and Future Directions....2253
Cross-References....2253
References....2253
Second Preimage Resistance....2254
Synonyms....2254
Definition....2255
Background....2255
Theory....2255
Cross-References....2255
References....2255
Secondary Use Regulations....2255
Definition....2255
Background....2256
Theory and Applications....2256
Secondary Purpose....2256
Secondary Disclosure....2257
Cross-References....2257
Recommended Reading....2257
Secret Key Agreement....2257
Secret Key Cryptosystem....2257
Secret Key Establishment....2257
Secret Key Generation in Sensor Networks....2258
Synonyms....2258
Definitions....2258
Background....2258
Theory....2258
The Process of Secret Key Generation....2258
Application....2259
Radio Signals....2259
Audio Signals....2259
Movements....2259
Human Biometrics....2260
Others....2260
Open Problems and Future Directions....2260
Cross-References....2260
References....2260
Secret Sharing....2261
Secret Sharing and Shamir Threshold Scheme....2261
Background....2261
Definition....2261
Theory....2261
Shamir's Secret Sharing....2262
The Scheme....2262
Security....2262
Properties of Shamir's Scheme....2262
General Adversary Case....2262
Ideal Secret Sharing and Size of Shares....2263
Enhanced Properties....2264
Dealing with Active Adversaries....2264
Dynamic Aspects....2264
Variants....2264
Cross-References....2264
References....2265
Secret Vaulting....2265
Secure and Privacy-Preserving Machine Learning....2266
Synonyms....2266
Definition....2266
Background....2266
Theory....2266
Open Problems and Future Directions....2267
Cross-References....2267
References....2267
Secure and Private Communication....2267
Secure Audit Logs....2267
Synonyms....2267
Definition....2267
Background....2268
Theory....2268
Cross-References....2269
References....2269
Secure Cloud Data Utilization....2270
Secure Code Updates....2270
Secure Communication....2270
Secure Communication Bootstrapping....2270
Secure Computation....2270
Secure Computation of Differentially Private Mechanisms....2270
Synonyms....2270
Definition....2270
Background....2270
Theory....2270
Models....2271
Distributed Noise Generation....2271
Applications....2272
Open Problems and Future Directions....2273
Cross-References....2273
References....2273
Secure Computer System Model....2273
Secure Configuration Management....2273
Secure Coprocessor....2274
Synonyms....2274
Definition....2274
Background....2274
Theory and Applications....2274
Cross-References....2275
Recommended Reading....2275
Secure Data Aggregation....2275
Definition....2275
Background....2275
Theory and Applications....2276
Open Problems....2277
Recommended Reading....2277
Secure Data Deduplication....2277
Secure Data Deduplication Schemes....2278
Synonyms....2278
Definitions....2278
Background ....2278
Theory....2278
Open Problems and Future Directions....2279
Cross-References....2279
References....2280
Secure Data Outsourcing....2280
Synonyms....2280
Definition....2281
Background....2281
Query Correctness....2281
Verifiable Computation....2281
Data Confidentiality....2281
Searching on Encrypted Data....2281
Encrypted Databases....2281
Data Access Privacy....2281
Private Information Retrieval....2281
Oblivious RAM....2281
Theory & Applications....2282
Query Correctness....2282
Verifiable Computation....2282
Data Confidentiality....2282
Data Access Privacy....2282
Open Problems and Future Directions....2282
Cross-References....2282
References....2283
Secure Deduplication....2283
Secure Deletion....2283
Secure Device Pairing....2283
Synonyms....2283
Definitions....2283
Background ....2283
Theory....2284
General Procedure and System Model....2284
Terminology....2285
Threat Models....2285
Device Pairing Methods....2286
Cryptographic Protocols....2286
Pairwise Device Pairing....2286
Extension to a Group of Devices....2287
Applications....2287
Open Problems and Future Directions....2288
Cross-References....2289
References....2289
Secure Element....2289
Definition....2289
Background....2290
Applications....2290
Open Problems and Future Directions....2290
Cross-References....2290
Recommended Reading....2290
Secure Email....2290
Secure Erasure....2290
Secure Firmware Updates....2291
Secure First Connect....2291
Secure Function Evaluation....2291
Secure Hash Algorithm....2291
Secure Index....2291
Synonyms....2291
Definition....2291
Background....2291
Theory....2293
Cross-References....2294
References....2294
Secure Joins....2294
Secure Logging....2294
Secure Machine Learning....2294
Secure Multiparty Computation....2295
Secure Multi-party Computation....2295
Secure Multi-party Computation of Differentially Private Mechanisms....2295
Secure Network Coding for Wireless Mesh Networks....2295
Synonyms....2295
Definitions....2295
Background....2295
Theory....2296
Attacks Against Network Coding....2296
Defenses....2298
Cross-References....2299
References....2299
Secure Networks Design....2300
Secure Routing in Wireless Mesh Networks....2300
Synonyms....2300
Definitions....2300
Background....2300
Theory....2301
Attacks Against Routing....2301
Defenses....2302
Applications....2304
References....2304
Secure Shell....2305
Secure Signatures from the “Strong RSA” Assumption....2305
Background....2305
Theory....2305
Cross-References....2307
References....2307
Secure Socket Layer (SSL)....2307
Synonyms....2307
Definition....2307
Background....2307
History....2307
Theory....2308
Layer Structure....2308
Basic Protocol Sequence....2308
Server Authentication....2309
Client Authentication....2310
Ephemeral Diffie–Hellman Key Agreement....2310
Protocol Resumption....2310
Additional Information....2310
Security Analysis....2310
Cross-References....2311
References....2311
Secure Software Dissemination....2312
Secure Software Updates in IoT Devices....2312
Synonyms....2312
Definition....2312
Background....2312
Theory....2313
Security Properties....2314
Open Problems and Future Directions....2315
Cross-References....2315
References....2315
Secure Time Synchronization....2315
Definition....2315
Background....2315
Theory....2316
Applications....2316
Open Problems....2317
Cross-References....2317
Recommended Reading....2317
Secure Vehicular Communication Systems....2317
Synonyms....2317
Definition....2317
Background....2317
Theory and Applications....2318
Security and Privacy Architecture for VC Systems....2319
Open Problems and Future Directions....2320
Cross-References....2321
References....2321
Secure Wireless Mesh Networks....2322
Secure Wireless Multicast....2322
Security....2322
Security Analytics....2322
Synonyms....2322
Definition....2323
Background....2323
Theory OR Application OR Both....2323
Open Problems and Future Directions....2324
Cross-References....2324
References....2324
Security and Device Aging....2325
Definitions....2325
Background....2325
Aging-Induced Security Concerns....2325
Device Aging in Cryptographic Cores....2327
Open Problems and Future Directions....2328
Cross-References....2328
References....2328
Security and Privacy Aspects in the Dedicated Short-Range Communications (DSRC) Protocol....2328
Synonyms....2328
Definitions....2329
Background....2329
Theory....2329
Open Problems and Future Directions ....2330
References....2330
Security Architecture....2330
Definition....2330
Theory....2330
Applications....2330
Recommended Reading....2331
Security Awareness....2331
Security Budget....2331
Security Capability Maturity Model....2331
Synonyms....2331
Definition....2331
Background....2331
Theory and Application....2332
Open Problems and Future Directions....2333
Cross-References....2333
References....2334
Security Compliance....2334
Security Controls....2334
Security Culture....2334
Security Evaluation Criteria....2334
Definition....2334
Background....2334
Theory/Applications....2335
Cross-References....2336
References....2336
Security Evaluation Tool....2336
Security Fatigue....2336
Synonyms....2336
Definition....2336
Background....2336
Theory and Application....2336
Causes of Fatigue....2337
Assessing Fatigue....2338
Open Problems and Future Directions....2339
Cross-References....2339
References....2339
Security for Mashups....2340
Definition....2340
Background....2340
Theory....2341
Open Problems....2341
Cross-References....2342
Recommended Reading....2342
Security if Web Browser Scripting Languages....2342
Security Implication in Virtualization....2342
Synonyms....2342
Definition....2343
Background....2343
What Is Virtualization?....2343
Virtualization Types....2343
Virtualization Benefits....2343
Virtualization Security Risks....2344
Theory....2344
Operating System-Based Virtualization Methods....2344
Workload Isolation....2344
Workload Consolidation....2345
Workload Migration....2345
Hardware-Based Virtualization....2345
Performance Comparisons....2345
System Architectures for Virtualization....2345
Virtualization Security Overview....2346
Guest OS Isolation....2346
Guest OS Monitoring....2347
Image and Snapshot Management....2347
Access Control Policy-Based Virtualization Security....2347
Trusted Platform Module-Based Virtualization Security....2347
Applications....2347
Overview....2347
Hypervisor Architecture....2348
Secure Hypervisor (sHype) Example....2349
Commercially Available Products....2349
Virtualization Security Tools....2349
Open Problems and Future Directions....2349
Virtualization Security Problems....2351
Future Directions for Virtualization-Based Security....2351
Conclusion....2352
Acronyms and Abbreviations....2352
Cross-References....2352
References....2352
Security Information and Event Management (SIEM)....2353
Synonyms....2353
Definition....2353
Background....2354
Theory and Applications....2354
Open Problems and Future Directions....2355
Cross-References....2355
References....2355
Security Information Event Management (SIEM)....2355
Security Information Sharing....2355
Security Investment....2356
Synonyms....2356
Definitions....2356
Theory....2356
Open Problems and Future Directions....2358
Cross-References....2359
References....2359
Security Investment, Interdependence, Attacking, and Information Sharing....2359
Synonyms....2359
Definition....2359
Background....2359
Introduction....2360
Security Investment....2360
Income Effect....2360
Interdependence....2360
Substitution Effect....2360
Information Sharing....2361
Results....2361
Future Research....2361
References....2361
Security Motivation....2362
Security Nudges....2362
Synonyms....2362
Definition....2362
Background....2362
Theory and Application....2363
Synchronous and Asynchronous Strength Indicators....2363
Password Policy Alignment....2364
Presentation....2364
Evaluating the Effectiveness of Nudges....2365
Moving Image Strength Indicator in the Context of Nudges....2365
Cross-References....2366
References....2366
Security of Cognitive Radios....2367
Definition....2367
Background....2367
Applications....2367
Recommended Reading....2368
Security of Contactless Integrated Circuits....2369
Security of Contactless Microcircuits....2369
Security of Contactless Smartcards....2369
Security of Distance Bounding Protocols....2369
Definition....2369
Background....2369
Theory....2369
Recommended Reading....2370
Security of Group Communication in Wireless Mesh Networks....2370
Synonyms....2370
Definitions....2370
Background....2370
Theory....2371
Approaches to Secure Group Communication....2372
Secure Group Overlay-Based Group Communication in WMNs....2373
Applications....2374
References....2374
Security of Radio Frequency Identification....2375
Security of Wireless Mesh Networks (General Overview)....2375
Synonyms....2375
Definitions....2375
Background....2375
Theory....2377
Applications....2379
Cross-References....2379
References....2379
Security Operations Center (SOC)....2380
Definition....2380
Background....2381
Theory and Applications....2381
Open Problems and Future Directions....2382
Cross-References....2382
References....2382
Security Reduction....2382
Definition....2382
Background....2382
Theory....2383
Applications....2384
Recommended Reading....2384
Security Reputation Metrics....2384
Definitions....2384
Background....2384
Application....2385
Hosting Providers....2385
Top-Level Domains....2386
Internet Service Providers....2387
Open Problems and Future Directions....2387
References....2388
Security Risk Assessment for Cyber-Physical Systems....2389
Definition....2389
Background....2389
Theory and Application....2389
Open Problems and Future Directions....2391
Cross-References....2391
References....2391
Security Standards Activities....2392
Definition....2392
Background....2392
Activities....2392
X.509....2392
PKIX....2393
LDAP....2394
S/MIME....2394
LAMPS....2395
JOSE....2395
COSE....2396
IPsec....2396
IPsecME....2396
TLS....2396
Secure Shell....2397
AAA....2397
OpenPGP....2397
XML Security....2398
IEEE P802....2398
ANSI X9F....2398
FIPS....2399
Influential Activities....2399
US FPKI....2399
References....2399
Security Testbed....2401
Security Token....2401
Security Validation....2401
Security Verification....2401
Security Verification of System-on-Chips (SoCs)....2401
Synonyms....2401
Background....2401
State of the Art....2402
Information Flow Tracking....2402
Theorem Proving....2402
Secure HDL....2402
Assertion-Based Verification....2402
Symbolic Testing....2402
Open Problems and Future Directions....2402
References....2403
Security Visualization....2403
Segregation of Duties....2403
Selective Forgery of Digital Signatures....2404
Definition....2404
Recommended Reading....2404
Self-Defense....2404
Selfie Biometrics....2404
Definitions....2404
Background....2404
Application....2406
Open Problems and Future Directions....2406
Open-set liveness/spoof detection....2406
On-device computation....2406
Fairness analysis....2406
Summary....2407
References....2407
Self-Shrinking Generator....2407
Definition....2407
Background....2407
Example....2407
Theory....2408
Cross-References....2408
Recommended Reading....2408
Self-Sovereign Identity....2408
Definitions....2408
Theory and Applications....2408
Open Problems and Future Directions....2410
Cross-References....2410
References....2410
Self-Synchronizing Stream Cipher....2410
Synonyms....2410
Definition....2410
Background....2411
Example....2411
Theory....2411
Applications....2411
Cross-References....2412
Recommended Reading....2412
Semantic Security....2412
Synonyms....2412
Definition....2412
Theory....2412
Cross-References....2413
Recommended Reading....2413
Sender Anonymity....2413
Synonyms....2413
Definitions....2413
Background ....2413
Theory/Application/Both ....2413
Open Problems and Future Directions....2413
Cross-References....2414
References....2414
Sensitive Privacy: Data Privacy for Analyzing Anomalies....2414
Synonyms....2414
Definitions....2415
Background....2415
Theory & Concepts....2415
How to Achieve Sensitive Privacy....2416
Cross-References....2416
References....2416
Sensor Key Establishment and Maintenance....2417
Sensor Key Management....2417
Synonyms....2417
Definition....2417
Background....2417
Theory....2417
Open Problems....2419
Cross-References....2419
Recommended Reading....2419
SEPA....2419
Synonyms....2419
Definition....2420
Background....2420
Applications....2420
Recommended Reading....2420
Separation of Duties....2420
Synonyms....2420
Definition....2421
Background....2421
Applications....2423
Strong Exclusion (Static Separation of Duty)....2423
Weak Exclusion (Dynamic Separation of Duty)....2423
Open Problems....2424
Experimental Results....2424
Cross-References....2424
Recommended Reading....2424
Sequences....2425
Definition....2425
Theory....2425
Applications....2429
Cross-References....2429
Recommended Reading....2429
Sequential and Combinational Satisfiability Attacks....2429
Synonyms....2429
Definition....2430
Background....2430
Theory and Application....2430
Open Problems and Future Directions....2433
Cross-References....2434
References....2434
SERPENT....2434
Cross-References....2435
Recommended Reading....2435
Session Hijacking Attacks....2435
Definition....2435
Background....2435
Theory....2436
Open Problems....2436
Cross-References....2436
Recommended Reading....2436
SFA....2437
SHA....2437
SHA-0, SHA-1, SHA-2 (Secure Hash Algorithm)....2437
Synonyms....2437
Definition....2437
Background....2437
Theory....2437
Padding....2438
SHA-1 Compression Function....2438
SHA-0....2438
SHA-256 and SHA-512 Compression Functions....2439
SHA-224....2439
SHA-384....2439
Applications....2439
Security Considerations....2440
Open Problems....2440
Cross-References....2441
References....2441
Shamirs Trick....2441
Shannons Maxim....2441
Shannon's Model....2441
Synonyms....2441
Definition....2441
Background....2442
Theory....2442
Applications....2443
Cross-References....2443
Recommended Reading....2443
Sharding....2443
Synonyms....2443
Definitions....2443
Background....2443
Theory....2444
Multiconsensus Architecture....2444
Uniconsensus Architecture....2445
Cross-Shard Transactions....2446
Open Problems and Future Directions....2447
Cross-References....2447
References....2447
Shortest Vector Problem....2448
Definition....2448
Background....2448
Theory....2448
Applications....2449
Open Problems....2449
Cross-References....2449
Recommended Reading....2449
Short-Term Credential....2450
Shrinking Generator....2450
Definition....2450
Example....2450
Theory....2450
Cross-References....2451
Recommended Reading....2451
Shuffle Index....2451
Definition....2451
Background....2452
Theory....2452
Open Problems....2455
Cross-References....2455
References....2455
Sidechains....2455
Synonyms....2455
Definition....2455
Background....2455
Theory....2456
Security of Sidechains....2456
Firewall Property....2456
Cross-Chain Communication....2456
Types of Cross-Chain Communication....2456
Techniques for Cross-Chain Communication....2457
Application....2457
Open Problems and Future Directions....2457
Cross-References....2458
References....2458
Side-Channel Attacks....2458
Synonyms....2458
Definitions....2458
Background....2458
Application....2458
Mitigation....2459
Open Problems....2460
Cross-References....2460
References....2460
Side-Channel Attacks and Countermeasures....2461
Side-Channel Leakage....2461
Side-Channel Security Evaluation Tool....2461
SIDH....2461
SIEM System....2461
SIEM: Security Information and Event Management....2462
Sieving....2462
Definition....2462
Theory....2462
Applications....2462
Cross-References....2462
Sieving in Function Fields....2462
Definition....2462
Applications....2463
Cross-References....2464
Recommended Reading....2464
Signature Biometrics....2464
Synonyms....2464
Definitions....2464
Background....2464
Theory....2465
Applications....2466
Open Problems and Future Directions....2467
Cross-References....2467
References....2467
Signcryption....2468
Synonyms....2468
Definition....2468
Background....2468
Theory....2469
Defining Signcryption....2469
Security of Signcryption....2469
Supporting Long Inputs....2470
Generic Composition Schemes....2471
Schemes from Trapdoor Permutations....2471
Schemes based on Gap Diffie–Hellman....2473
Applications....2473
Cross-References....2474
Recommended Reading....2474
Signed Digit Exponentiation....2474
Synonyms....2474
Definition....2474
Background....2474
Applications....2476
Cross-References....2476
Recommended Reading....2476
Signed Window Exponentiation....2476
SIKE....2476
Silicon Fingerprint (colloquially)....2476
SIM/UICC....2476
Synonyms....2476
Definition....2476
Background....2477
Theory....2477
Applications....2477
References....2478
Simple Power Analysis....2478
Synonyms....2478
Definitions....2478
Background....2478
Theory....2478
Open Problems and Future Directions....2480
References....2480
Simultaneous Exponentiation....2480
Synonyms....2480
Definition....2480
Background....2480
Theory....2481
Applications....2483
Cross-References....2483
Recommended Reading....2483
Simultaneous Transactions....2483
Singe-Reader-Multi-Writer Searchable Encryption....2483
Single Euro Payments Area....2483
Single Wire Protocol....2483
Definition....2483
Background....2483
Cross-References....2484
References....2484
Single-Server Private Information Retrieval....2484
Definitions....2484
Background....2484
Homomorphic Encryption-Based Construction....2484
Future Directions....2485
References....2486
Situational Awareness for Cyber-Physical Systems....2486
Synonyms....2486
Definitions....2486
Background ....2486
Application....2487
Open Problems and Future Directions....2488
References....2488
Skipjack....2489
Definition....2489
Background....2489
Theory....2489
Application....2489
Cross-References....2490
Recommended Reading....2490
Slide Attack....2490
Definition....2490
Theory....2491
Applications....2491
Cross-References....2491
Recommended Reading....2491
Sliding Window Exponentiation....2492
Definition....2492
Background....2492
Theory....2492
Applications....2494
Cross-References....2494
Recommended Reading....2494
Smart Card....2494
Synonyms....2494
Definition....2494
Background....2494
Theory....2494
Applications....2495
Cross-References....2495
Recommended Reading....2495
Smart Contract....2495
Definition....2495
Background....2496
Theory....2496
Application....2497
Open Problems and Future Directions....2497
Cross-References....2497
References....2497
Smart Environment....2497
Smart Grids....2498
Smart/Algorithmic Denial of Service....2498
Smartcard Tamper Resistance....2498
Definition....2498
Theory and Applications....2498
Cross-References....2500
Recommended Reading....2500
Smoothness....2500
Definition....2500
Theory....2500
Cross-References....2501
Recommended Reading....2501
SNARK....2501
Synonyms....2501
Background....2501
Definitions....2502
Types of SNARKs....2502
Applications....2504
Cross-References....2504
References....2505
Social Context in Security and Privacy....2505
Synonyms....2505
Definition....2505
Background....2505
Theory and Application....2505
Open Problems and Future Directions....2506
Cross-References....2506
References....2506
Social Engineering....2506
Synonyms....2506
Definition....2506
Background....2506
Theory....2507
Social Engineering Attack Cycle....2507
Principles of Persuasion and Social Engineering Triggers....2507
Examples of Social Engineering....2508
Addressing Social Engineering....2508
Open Problems and Future Directions....2509
Cross-References....2510
References....2510
Social Environment....2510
Social Network Anonymization....2510
Social Network Data Privacy Definitions....2510
Social Networks....2510
Social Perspectives on Information Privacy....2510
Definition....2510
Theory....2510
Open Problems and Future Directions....2512
Cross-References....2512
Recommended Reading....2512
Sociocultural Factors....2513
Soft Biometrics....2513
Definition....2513
Background....2513
Theory and Application....2513
Taxonomy of Soft Biometrics....2513
Applications....2515
Open Problems and Future Directions....2515
Summary....2516
References....2516
Software Secure Element....2516
Software Vendor....2516
Software-Defined Networks privacy....2517
Definitions....2517
Background ....2517
Theory....2517
Privacy Attacks....2518
Application Plane....2518
Control and Data Plane....2518
References....2520
Software-Optimized Encryption Algorithm....2520
Solitaire....2520
Definition....2520
Background....2520
Cross-References....2520
Recommended Reading....2520
Source Address Validation....2521
Definitions....2521
Background....2521
Application....2522
Open Problems and Future Directions....2523
References....2524
SPA....2524
Space-Time Trade-Off....2524
Spam Detection Using Network-Level Characteristics....2525
Synonyms....2525
Definition....2525
Background....2525
Theory and Applications....2525
Recommended Reading....2525
Spatial Context....2526
Spatial Knowledge....2526
Spatiotemporal Event Privacy....2526
Spatiotemporal Privacy....2526
Synonyms....2526
Definitions....2526
Background....2526
Theory....2526
Open Problems and Future Directions....2528
Cross-References....2528
References....2528
Speaker Biometrics....2528
Speaker Identification and Verification (SIV)....2528
Speaker Recognition....2528
Synonyms....2528
Definition....2528
Background....2528
Speaker Enrollment....2529
Speaker Verification (Authentication)....2529
Speaker Identification....2530
Speaker and Event Classification....2530
Speaker Segmentation, Diarization, Detection, and Tracking....2531
Speaker Verification Modalities....2531
Knowledge-Based Speaker Recognition (Speech Biometrics)....2532
Theory....2532
Gaussian Mixture Model (GMM): Generic Case....2535
Speaker Space....2536
Speaker Embeddings (x-Vectors): Neural Network Kernels....2537
Speaker Diarization....2537
Application....2540
Open Problems....2540
References....2543
Special-Purpose Cryptanalytical Hardware....2544
Definition....2544
Background....2544
Theory....2545
Applications....2545
Cross-References....2546
Recommended Reading....2546
Specific Emitter Identification (SEI)....2546
Specific Emitter Verification (SEV)....2546
Spectre....2546
Synonyms....2546
Definitions....2546
Background....2546
Theory....2547
Spectre Gadgets....2549
Application....2549
Open Problems and Future Directions....2550
Cross-References....2551
References....2551
Spectre Attack....2552
Spectre Variant 1....2552
Spectre Variant 2....2552
SPKI....2552
Source of Names....2553
Group Names....2553
Globally Unique SDSI Names....2554
Canonical S-Expressions (CSEXP)....2554
Recommended Reading....2555
Spontaneous Device Association....2555
Spoofing a Hall Sensor....2555
Spoofing and Antispoofing....2555
Synonyms....2555
Definitions....2555
Background....2555
Application....2556
Open Problems and Future Directions....2556
Summary....2557
References....2557
Spyware....2557
Synonyms....2557
Definition....2557
Background....2557
Theory....2558
Applications....2560
Open Problems....2560
Cross-References....2560
Recommended Reading....2560
SQL Access Control Model....2561
Definitions....2561
Theory and Application....2561
Access Control Enforcement via Views....2562
Cross-References....2563
References....2563
SQL Administration Standards....2563
SQL Control Procedures....2563
SQL Injection Attacks....2563
Definition....2563
Background....2564
Theory....2564
Open Problems....2565
Recommended Reading....2565
Square-and-Multiply Exponentiation....2566
SSE (acronym)....2566
SSH....2566
Synonyms....2566
Definition....2566
Background....2566
Theory....2566
Applications....2566
Recommended Reading....2566
SSL....2566
Stablecoin....2566
Definition....2566
Background....2567
Theory and Application....2567
Open Problems and Future Directions....2569
Cross-References....2570
References....2570
Stack (buffer) Overflow....2571
Stack (buffer) Overrun....2571
Stack/Heap Smashing....2571
Standard Basis....2571
Standard Model....2571
Definition....2571
Open Problems....2571
Cross-References....2571
Recommended Reading....2571
State Machine Replication....2571
Synonyms....2571
Definition....2571
Background....2572
Theory....2572
Application....2573
Open Problems and Future Directions....2574
Cross-References....2574
References....2574
Static Analysis....2575
Synonyms....2575
Definition....2575
Background....2575
Theory....2575
Applications....2577
Cross-References....2577
Recommended Reading....2577
Static Code Analysis....2578
Static Program Analysis....2578
Static Separation of Duties....2578
Station-to-Station protocol....2578
Definition....2578
Theory....2578
References....2579
Statistical Databases....2579
Synonyms....2579
Definition....2579
Background....2579
Applications....2579
Privacy Disclosure Measures....2580
Security Protection Approaches....2580
Conceptual Approach....2580
Query Restriction Approach....2581
Auditing....2581
Perturbation Approach....2582
Notes on Recommended Reading....2583
Cross-References....2583
Recommended Reading....2583
Statistical Fault Attack....2584
Synonyms....2584
Definitions....2584
Background ....2584
Theory/Application/Both ....2584
Open Problems and Future Directions....2585
Cross-References....2585
References....2585
Steins Algorithm....2586
Stream and Multicast Authentication....2586
Synonyms....2586
Definition....2586
Background....2586
Theory....2586
Applications....2589
Cross-References....2590
References....2590
Stream Ciphers....2590
Definition....2590
Background....2591
Theory....2591
Synchronous and Asynchronous Stream Ciphers....2591
Families of Stream Ciphers....2591
Families of Attacks Against Stream Ciphers....2591
Properties of Stream Ciphers....2592
Applications....2592
Cross-References....2592
Recommended Reading....2592
Strong Authentication....2592
Strong Collision Resistance....2593
Strong Exclusion....2593
Strong Prime....2593
Definition....2593
Theory....2593
Cross-References....2593
Recommended Reading....2593
Strong RSA Assumption....2594
Theory....2594
Recommended Reading....2594
Structural Cryptanalysis....2594
Definition....2594
Theory and Application....2594
Structured Encryption....2595
Definition....2595
Related Work....2595
Theory....2595
Leakage....2595
Security....2595
Cross-References....2597
References....2597
Structured Encryption on Trusted Hardware....2597
Subexponential Time....2597
Definition....2597
Theory....2597
Applications....2597
Cross-References....2598
Subgroup....2598
Definition....2598
Theory....2598
Applications....2598
Cross-References....2598
Subgroup Cryptosystems....2598
Subscriber Identity Module....2598
Substitution–Permutation (SP) Network....2599
Definition....2599
Theory....2599
Applications....2599
Cross-References....2599
Recommended Reading....2599
Substitutions and Permutations....2599
Definition....2599
Cross-References....2601
Recommended Reading....2601
Subversion-Resilient Cryptography....2602
Summation Generator....2602
Definition....2602
Theory....2602
Cross-References....2602
Recommended Reading....2602
Supersingular Isogeny Diffie-Hellman....2602
Synonyms....2602
Definition....2603
Applications....2603
Theory....2603
Security....2604
References....2604
Supersingular Isogeny Key Encapsulation....2604
Supervisory Control and Data Acquisition....2605
Synonyms....2605
Definition....2605
Background....2605
Theory and Application....2605
Open Security Problems and Future Directions....2606
Cross-References....2606
References....2607
Survivability....2607
Swarm Attestation....2607
Synonyms....2607
Definition....2607
Background....2607
Verifiers in Swarms....2607
Prover's Attestation in Swarms....2608
Swarm Topology....2608
Exchanged Communication Data Among Provers....2608
Granularity of Attestation Result....2609
Theory....2609
Open Problems and Future Directions....2610
Cross-References....2610
References....2610
Symmetric Cryptosystem....2611
Synonyms....2611
Definition....2611
Applications....2611
Cross-References....2611
SYN Cookie Defense....2611
Synonyms....2611
Definition....2611
Background (Historical Data Optional)....2611
Theory....2612
Application....2613
Open Problems and Future Directions....2613
References....2613
SYN Flood Attack....2613
Synonyms....2613
Definition....2613
Background (Historical Data Optional)....2614
Theory....2614
Application....2614
Open Problems and Future Directions....2615
Cross-References....2615
References....2615
Synchronous Stream Cipher....2615
Definition....2615
Background....2615
Theory....2616
Applications....2616
Cross-References....2616
Recommended Reading....2616
Synthetic Data....2616
Synonyms....2616
Definition....2616
Background....2616
Theory....2617
Traditional Models....2617
Deep Generative Models....2617
Privacy-Preserving Synthetic Data Generation....2618
Open Problems and Future Directions....2618
Cross-References....2618
References....2618
Synthetic Data Generation....2619
Synthetic Mobility Traces....2619
Definitions....2619
Background....2619
Theory....2620
Traditional Approaches for SMT Generation....2620
ML-based Approaches for SMT Generation....2621
Privacy-Preserving SMT Generation....2621
Open problems....2622
Cross-References....2623
References....2623
System Component Graphs....2623
System Hardening....2623
T....2624
Talker Recognition....2624
Tamper Detection....2624
Definition....2624
Theory and Applications....2624
Open Problems....2624
Cross-References....2624
References....2625
Tamper Evidence....2625
Definition....2625
Background....2625
Theory and Application....2625
Cross-References....2625
Recommended Reading....2625
Tamper Resistance....2625
Definition....2625
Theory and Applications....2625
Open Problems....2626
Cross-References....2626
Recommended Reading....2626
Tamper Response....2626
Definition....2626
Theory and Applications....2626
Open Problems....2626
Cross-References....2626
Recommended Reading....2627
Target Collision Resistant Hash function....2627
Targeted Hardware Manipulation....2627
TCG Trusted Computing Group....2627
T-Closeness....2627
Definitions....2627
Background....2627
Theory/Application/Both....2628
Open Problems and Future Directions....2628
Cross-References....2629
References....2629
TCP Modulation Attacks....2629
Definition....2629
Low-Rate TCP Attacks....2629
Background....2629
Applications....2630
Low-Rate Attacks Against TCP Variants....2630
Potential Mitigation Solutions....2630
Limitations of Router-Assisted Defenses....2631
Experimental Results....2631
Mitigation Using Randomization of the Minimum RTO....2631
Recommended Reading....2632
TCP Reset Injection....2632
Synonyms....2632
Definition....2632
Background....2633
Applications....2633
Recommended Reading....2634
TCP SYN Cookie....2634
TCP SYN Flooding....2634
TCP/IP from Network Security Perspective....2634
Synonyms....2634
Definition....2634
Background....2634
Theory....2635
Open Problems and Future Directions....2636
References....2637
TCP/IP Protocol Suite....2637
Technical Data Protection....2637
Temperature Attack....2637
Definition....2637
Experimental Results....2637
Cross-References....2638
Recommended Reading....2638
Tempest....2638
Synonyms....2638
Definitions....2638
Background....2638
Theory....2638
Application....2641
Cross-References....2642
References....2642
Temporal Access Control....2643
Synonyms....2643
Definitions....2643
Background....2644
Theory and Applications....2644
Applications....2645
Open Problems and Future Directions....2645
Cross-References....2645
References....2645
Temporal Authorization Models....2645
Temporary Identity....2645
The Economics of Information Exchange....2646
The Economics of Personal Data....2646
The Fiat-Shamir Identification Protocol and the Feige-Fiat-Shamir Signature Scheme....2646
Definition....2646
Introduction....2646
Preliminary....2646
The Protocol....2646
Parameters....2646
Feige-Fiat-Shamir Signature Scheme....2647
Cross-References....2647
References....2647
Theorem Proving and Security....2647
Synonyms....2647
Definition....2647
Background....2647
Applications....2648
Open Problems and Future Directions....2648
Cross-References....2649
References....2649
Threat Intelligence....2649
Three-Dimensional Palmprint....2649
Three-Factor Authentication....2649
Synonyms....2649
Definition....2649
Background....2649
Applications....2650
Open Problems....2650
Cross-References....2650
Recommended Reading....2650
Threshold Cryptography....2651
Definition....2651
Introduction....2651
Different Approaches....2652
A General Approach....2652
A 2-Out-of-2 Case....2652
Using a Multiplicative Secret Sharing Scheme....2653
Unknown Subset of Participants....2654
Particular Approaches....2654
A Variant of the General Approach....2654
Enhancements....2654
Robustness....2654
No Trusted Dealer....2655
Proactive Security and Its Generalizations....2655
The Multiverse Case....2656
Post-quantum Threshold Cryptosystems....2656
Cross-References....2656
References....2656
Threshold Homomorphic Cryptosystems....2658
Cross-References....2659
References....2659
Threshold Probing Model....2659
Threshold Signature....2659
Definition....2659
Theory....2659
Applications....2661
Cross-References....2662
Editorial Note....2662
References....2662
Throughput of a Distributed Ledger....2663
Definition....2663
Background....2663
Theory....2663
Influential Factors....2663
Further Aspects....2663
Cross-References....2664
References....2664
Tiger....2664
Definition....2664
Background....2664
Theory....2665
Open Problems....2665
Cross-References....2665
Recommended Reading....2665
Time-Based Access Control....2665
Time-Memory Trade-Offs....2665
Synonyms....2665
Definition....2666
Background....2666
Theory....2666
The Original Method....2666
Distinguished Points and Rainbow Tables....2667
Recommended Reading....2667
Time-Stamping....2668
Introduction....2668
Techniques....2668
Hash-and-Sign....2669
Linking....2669
Long-Lived Digital Signatures....2671
Renewability....2672
Standards....2672
References....2672
Timing Attack....2673
Synonyms....2673
Definition....2673
Background....2673
Time Measurement....2673
Timing Analysis....2674
Attack Targets....2674
Countermeasures....2674
Cross-References....2674
References....2675
TLS....2675
Token....2675
Definition....2675
Theory....2675
Cross-References....2676
Recommended Reading....2676
Token Pre-sales....2676
Token Sales....2676
Top-k Query Processing on Encrypted Data....2676
Synonyms....2676
Definition....2676
Theory....2677
Open Problems....2678
Cross-References....2678
References....2678
Top-n Queries on Encrypted Data....2678
Topological Vulnerability Analysis....2678
Synonyms....2678
Definition....2679
Background....2679
Theory....2679
Application....2680
Open Problems and Future Directions....2680
Cross-References....2680
References....2680
Torus-Based Cryptography....2681
Synonyms....2681
Definition....2681
Background....2681
Theory....2681
Applications....2682
Open Problems....2682
Cross-References....2683
Recommended Reading....2683
Touchless Palmprint Biometrics....2683
TPM....2683
Definition....2683
Background....2683
Theory and Applications....2684
Functions: 1.1b....2684
New Functions of the TPM 1.2 Specification....2685
Open Problems....2686
Cross-References....2686
Recommended Reading....2686
TPM Trusted Platform Module....2687
Tracing Traitors....2687
Tracking Cookie....2687
Traffic Analysis....2687
Definition....2687
Background....2687
Theory....2687
Applications....2688
Open Problems and Future Directions....2689
Cross-References....2689
Recommended Reading....2689
Traitor Tracing....2690
Synonyms....2690
Definition....2690
Background....2690
Theory....2691
Public-Key Traitor Tracing....2692
Advanced Schemes....2692
Cross-References....2693
Recommended Reading....2693
Transparent Authentication....2694
Transport Layer Security (TLS)....2694
Synonyms....2694
Definition....2694
Background....2694
Theory....2694
Cross-References....2695
References....2695
Transport-Level Security....2695
Trapdoor One-Way Function....2695
Definition....2695
Background....2696
Theory....2696
Cross-References....2696
Recommended Reading....2696
Treemap Visualization....2696
Tripartite Key Exchange....2696
Triple-DES....2697
Cross-References....2698
References....2698
Trojan....2698
Trojan Horses, Computer Viruses, and Worms....2698
Original Definition....2698
Current Definition....2699
Theory....2699
Computer Viruses....2699
Worms....2699
Cross-References....2699
References....2699
Truncated Differentials....2700
Definitions....2700
Theory....2700
Applications....2700
Cross-References....2700
Recommended Reading....2700
Trust Anchor....2701
Trust Management....2701
Synonyms....2701
Related Concepts....2701
Definition....2701
Background....2701
Theory....2701
Applications....2702
Open Problems and Future Directions....2703
References....2704
Trust Management for Cyber-Physical Systems....2704
Definition....2704
Background....2704
Theory and Application....2705
Open Problems and Future Directions....2709
Cross-References....2709
References....2709
Trust Management in Databases....2710
Definition....2710
Background....2710
Theory....2710
Cross-References....2711
References....2711
Trusted Boot....2712
Synonyms....2712
Definition....2712
Background....2712
Theory....2712
Applications....2713
Open Problems....2713
Cross-References....2713
Recommended Reading....2714
Trusted Computing....2714
Synonyms....2714
Definitions....2714
Background....2714
Theory....2714
Applications....2715
Software Trust....2715
Hardware Trust....2716
Hardware Run-Time Trust....2716
Hardware Design Trust....2716
Open Problems....2717
Cross-References....2717
Recommended Reading....2717
Trusted Computing Group....2717
Definition....2717
Background....2717
Applications....2717
Cross-References....2718
Recommended Reading....2718
Trusted Computing Platform Alliance....2718
Definition....2718
Background....2718
Cross-References....2718
Recommended Reading....2718
Trusted Platform Module....2719
Definition....2719
Background....2719
Applications....2719
Final Remarks....2722
Cross-References....2722
References....2722
Trusted Third Party....2723
Definition....2723
Applications....2723
Open Problems and Future Directions....2723
Cross-References....2723
References....2723
Trustworthy Autonomous Systems....2723
Trustworthy Machine Learning....2723
TSS....2724
Definition....2724
Background....2724
Theory and Applications....2724
Cross-References....2726
Recommended Reading....2726
TTP: Tactics, Techniques, and Procedures....2726
Twin Signatures....2726
Definition....2726
Cross-References....2726
Recommended Reading....2726
TWIRL....2727
Definition....2727
Background....2727
Theory....2727
Experimental Results....2727
Cross-References....2728
Recommended Reading....2728
Two-Factor Authentication....2728
Definition....2728
Theory....2728
Applications....2728
Cross-References....2728
TWOFISH....2729
Cross-References....2730
Recommended Reading....2730
Two-Key Cryptosystem....2730
Type Checking and Security....2730
Definition....2730
Background....2730
Applications....2731
Open Problems and Future Directions....2731
Cross-References....2731
References....2732
Typing Biometrics....2732
Typing Dynamics....2732
Typing Patterns....2732
U....2733
UMTS IC Card....2733
Unconstrained Fingerprint Biometrics....2733
Definitions....2733
Background....2733
Theory....2734
Acquisition and Sensors....2734
Constrained and Semi-constrained....2734
Unconstrained....2735
Fingerprint Segmentation....2735
Fingerphoto....2735
Latent Fingerprints....2735
Fingerprint Feature Extraction....2735
Traditional Fingerprint Descriptors....2735
Non-Minutia Descriptors....2736
Open Problems and Future Research Directions....2736
Summary....2738
References....2738
Unconstrained Palmprint Biometrics....2738
Synonyms....2738
Definitions....2738
Background....2739
Theory....2739
ROI Localization and Alignment....2739
Feature Extraction....2741
Open Problems and Future Directions....2742
Summary....2742
Cross-References....2742
References....2742
Unconstrained Remote Face Recognition....2743
Uncoordinated Direct Sequence Spread Spectrum....2743
Definition....2743
Background....2743
Theory....2744
Applications....2744
Recommended Reading....2744
Uncoordinated Frequency Hopping Spread Spectrum....2744
Definition....2744
Background....2744
Theory....2745
Applications....2745
Cross-References....2745
Recommended Reading....2745
Undeniable Signatures....2746
Definition....2746
Background....2746
Theory....2746
Convertible Undeniable Signatures....2747
Applications....2747
Recommended Reading....2748
Unidentifiable OSN User....2748
Universal Integrated Circuit Card....2748
Universal One-Way Hash Functions (UOWHF)....2748
Synonyms....2748
Definition....2748
Background....2748
Theory....2749
Cross-References....2750
References....2750
Unlinkability....2750
Synonyms....2750
Definitions....2750
Theory and Application....2751
Open Problems and Future Directions....2752
Cross-References....2752
References....2752
Unobservability....2752
Unpacking Malware....2752
Synonyms....2752
Definition....2752
Background....2753
Theory and Application....2753
Recommended Reading....2754
Untraceability....2754
Definitions....2754
Theory....2754
Application....2755
Open Problems and Future Directions....2755
Cross-References....2756
References....2756
Usable Security Application Programming Interfaces (APIs)....2756
User Authentication....2756
Synonyms....2756
Definition....2757
Application....2757
Open Problems and Future Directions....2757
Cross-References....2757
User Revocation....2757
User Revocation in Identity Based Encryption and Attribute Based Encryption....2757
Synonyms....2757
Definitions....2757
Theory....2757
Direct Revocation....2758
Indirect Revocation....2758
Others....2759
Open Problems and Future Directions....2759
References....2759
User Tracking and Reidentification....2760
Definitions....2760
Application....2760
Theory....2761
Cross-References....2762
References....2763
V....2764
Value of Privacy....2764
Value-Based Compliance Theory....2764
Synonyms....2764
Definition....2764
Background....2764
Theory....2765
Open Problems and Future Directions....2767
Cross-References....2767
References....2768
Variant 3....2768
VBC Theory....2768
VDF....2768
Vector Space....2768
Definition....2768
Theory....2768
Applications....2769
Cross-References....2769
Recommended Reading....2769
Vehicular Privacy....2769
Definition....2769
Theory and Application....2770
Cooperative Awareness Systems and Pseudonyms....2770
Location-Based Services....2771
Advanced Driver-Assistance Systems....2771
Driver Behavior Monitoring....2772
Open Issues....2772
Cross-References....2773
References....2773
Verifiable Delay Function....2773
Synonyms....2773
Definition....2773
Theory....2773
Applications....2774
Random Multi-Party Beacon....2774
Beacon from Entropy Source....2775
Resource-Efficient Permissionless Blockchains....2775
Proof of Replication....2775
Open Problems and Future Directions....2775
Cross-References....2775
References....2775
Verifiable Encryption....2776
Definition....2776
Applications....2777
Theory....2777
Recommended Reading....2777
Verifiable Secret Sharing....2777
Cross-References....2779
References....2779
Verification....2779
Vernam Cipher....2779
Definition....2779
Cross-References....2780
Recommended Reading....2780
Vicinity Card....2781
Definition....2781
Background....2781
Applications....2781
Cross-References....2781
Recommended Reading....2781
Video Analysis....2781
Vigenère Encryption....2781
Definition....2781
Cross-References....2782
Recommended Reading....2782
Virtual Black Box....2782
Virtual Machine Introspection....2782
Definition....2782
Background....2783
Applications....2783
Open Problems....2784
Cross-References....2784
Recommended Reading....2784
Virtualization Security....2784
Virtualized Packer....2784
Virus Scanner....2784
Visual Secret Sharing Schemes....2784
Synonyms....2784
Definition....2785
Theory....2785
Cross-References....2786
Recommended Reading....2786
Visual Security Analytics....2786
Synonyms....2786
Definition....2786
Background....2786
Theory and Applications....2787
Open Problems and Future Directions....2787
References....2788
Visualization....2788
VM Protection....2788
Voice Biometrics....2788
Voice Recognition....2788
Voiceprint Recognition....2789
von Neumann Correction....2789
Synonyms....2789
Definition....2789
Experimental Results....2789
Cross-References....2789
Recommended Reading....2789
VSSS....2789
Vulnerability Disclosure....2789
Vulnerability Disclosure Economics....2790
Synonyms....2790
Definitions....2790
Background....2790
Entities Involved in Disclosure....2790
Disclosure Options....2791
Theory of Disclosure....2792
Open Problems and Future Direction....2793
References....2794
Vulnerability Metrics....2794
Synonyms....2794
Definition....2794
Background....2794
The National Vulnerability Database....2795
Common Vulnerability Scoring System....2795
Theory and Application....2795
Open Problems and Future Directions....2796
Cross-References....2797
References....2797
Vulnerability Quantification....2797
Vulnerability Ranking....2797
Vulnerability Scoring....2797
W....2798
Watermarking....2798
Theory....2798
Applications....2799
Cross-References....2799
Recommended Reading....2800
Weak Collision Resistance....2800
Weak Exclusion....2800
Weak Keys....2800
Definition....2800
Theory....2800
Applications....2800
Cross-References....2801
Recommended Reading....2801
Web 2.0 Security and Privacy....2801
Definition....2801
Background....2801
Theory....2801
Cross-References....2802
Recommended Reading....2802
Web Access Control Strategies....2802
Synonyms....2802
Definition....2802
Introduction....2802
Theory....2802
Application....2804
Resource Sharing Using CORS....2804
Access Delegation....2806
IAM Policies....2807
Open Problems and Future Directions....2808
Cross-References....2808
References....2808
Web and Cloud Security....2809
Web Application Security....2809
Web Browser Security and Privacy....2809
Synonyms....2809
Related Concepts....2809
Definition....2809
Background....2809
Theory....2809
Applications....2810
Recommended Reading....2810
Web Cache Poisoning Attacks....2810
Definition....2810
Background....2810
Theory....2811
Recommended Reading....2811
Web Client Security and Privacy....2811
Web Initial Authentication....2811
Web Initial Sign On....2812
Web Penetration Test....2812
Web Security....2812
Web Security Auditing....2812
Synonyms....2812
Definition....2812
Background....2812
Theory....2812
Applications....2812
Cross-References....2813
Recommended Reading....2813
Web Security Policy....2813
Web Service Security....2813
Definition....2813
Background....2814
Theory....2814
OAuth....2814
The WS- Family of Specifications....2815
The XACML Specification....2815
Open Problems....2815
References....2816
Web Session Security....2816
Web Single Sign On and SAML....2816
Synonyms....2816
Definition....2816
Background....2816
Theory....2817
Applications....2820
Open Problems....2822
Cross-References....2822
Recommended Reading....2822
Web SSO and Security Assertion Markup Language....2823
Web Vulnerability Assessment....2823
Web-Based Security Protocols....2823
Synonyms....2823
Definition....2823
Background....2823
Theory....2824
Applications....2824
Cross-References....2825
Recommended Reading....2825
Whirlpool....2825
Definition....2825
Background....2825
Theory....2825
Applications....2826
Experimental Results....2826
Open Problems....2826
Cross-References....2826
Recommended Reading....2826
White-Box Cryptography....2827
Synonyms....2827
Definitions....2827
Background ....2827
Theory....2827
Virtual Black Box....2827
WBC Notions....2828
Application....2829
Early White-Box Designs and Attacks....2829
New Paradigm: Gray-Box Resistance....2830
Relaxing White-Box Cryptography....2831
Open Problems and Future Directions....2832
Cross-References....2832
References....2832
Wiener, Boneh–Durfee, and May Attacks on the RSA Public Key Cryptosystem....2833
Definition....2833
Theory....2834
Recommended Reading....2834
Winternitz One-Time Signatures....2834
Wireless Air Traffic Communications Security....2835
Synonyms....2835
Definition....2835
Background....2835
Modernizing Airspace: Analog to Digital....2835
Application....2835
Challenges in Securing Infrastructure Systems....2836
Open Problems and Future Directions....2836
References....2837
Wireless Avionics Security....2837
Wireless Device Fingerprinting....2837
Synonyms....2837
Definition....2837
Background....2838
Theory....2838
Applications....2839
Experimental Results....2840
Cross-References....2840
Recommended Reading....2840
Wireless Locational Privacy....2840
Wireless Networks....2841
Wireless Steganography....2841
Wiretapping....2841
Witness Hiding....2841
Cross-References....2842
References....2842
Worms in Cellular Networks....2842
Synonyms....2842
Definitions....2842
Background....2842
Theory....2843
Applications....2844
Open Problems and Future Directions....2844
References....2845
X....2846
(X, Y)-Privacy....2846
Synonyms....2846
Definitions....2846
Background....2846
Theory....2847
Cross-References....2848
References....2849
X.509....2849
Synonyms....2849
Definition....2849
Theory and Application....2849
Cross-References....2850
Recommended Reading....2850
XML-Based Access Control Languages....2850
Definitions....2850
Background....2850
Theory....2850
Application....2854
Open Problems and Future Directions....2854
Cross-References....2855
References....2855
XSS....2855
Z....2856
Zero Trust Architecture....2856
Synonyms....2856
Definition....2856
Background....2856
Theory....2857
Application....2858
Open Problems and Future Directions*-12pt....2860
Cross-References....2861
References....2861
Zero Trust Cybersecurity....2861
Zero Trust Network....2861
Zero Trust Threat Model....2861
Zeroization....2861
Definition....2861
Background....2862
Theory and Applications....2862
Cross-References....2862
Recommended Reading....2862
Zero-Knowledge....2862
Definition....2862
Theory....2863
Real Conversations....2863
Simulated Conversations....2863
Cross-References....2864
Reference....2864
Zeta Function Computation....2864
A rich stream of papers and many good books have been written on cryptography, security, and privacy, but most of them assume a scholarly reader who has the time to start at the beginning and work his way through the entire text. The goal of Encyclopedia of Cryptography, Security, and Privacy, Third Edition is to make important notions of cryptography, security, and privacy accessible to readers who have an interest in a particular concept related to these areas, but who lack the time to study one of the many books in these areas.
The third edition is intended as a replacement of Encyclopedia of Cryptography and Security, Second Edition that was edited by Henk van Tilborg and Sushil Jajodia and published by Springer in 2011. The goal of the third edition is to enhance on the earlier edition in several important and interesting ways. First, entries in the second edition have been updated when needed to keep pace with the advancement of state of the art. Second, as noticeable already from the title of the encyclopedia, coverage has been expanded with special emphasis to the area of privacy. Third, considering the fast pace at which information and communication technology is evolving and has evolved drastically since the last edition, entries have been expanded to provide comprehensive view and include coverage of several newer topics.