Next: A. NO Resource Records
Up: Network Application Security Using
Previous: Bibliography
  Contents
- Abstract Syntax Notation
- see ASN.1
- administrative requirements
- 4.2
- America on line AIM
- 2.5
- ASN.1
- 2.5.6
| 4.4.3
- asymmetric cipher
- 2.1
- asymmetric ciphers
- 2.1
- authentication
- 2.1
- authentication mode
- 2.1
- CA
- see certificate authority
- certificate
- generate requests
- 3.2
- sign
- 3.2
- certificate authority
- 2.3
| 2.5.3
- verification process
- 2.3
- certificates
- 2.1
- credential based
- 4.2.1
- identity based
- 4.2.1
- locating
- 4.2
- samples
- B.
- size
- 4.4.5
- updating
- 4.3
- cipher
- 2.1
- ciphertext
- 2.1
- Client Configuration
- 4.2.2
- CMS
- see Cryptographic Message
Syntax
- complexity
- 2.1
- confidentiality
- 2.1
- Cryptographic Message Syntax
- 2.5.6
- cryptography
- 2.1
- data integrity
- 4.2
- data mining
- 5
- data non-existence
- chain problem
- 5.1.2
- in DNS
- 5.1.1
- naive implementation
- 5.1.1
- NO implementation
- 5.2
- NXT implementation
- 5.1.1
- proofs
- 5.1.1
- data origin authentication
- 4.2
- in DNS
- 5.1
- decryption
- 2.1
- DES
- 2.1
- digital signature
- 2.1
- distinguished name
- 2.5.3
| 4.2.1
- domain name system
- 2.2
| 2.2
| 2.4
- ASCII representation
- 3.2
- caching
- 4.4.1
- internal
- 4.2.3.1
- locating directory
- 4.2.3
- protocol
- 4.4.2
- publishing certificates
- 3.2
- secure DNS
- 5
- design goals
- 5.1
- eavesdropper
- 2.1
- electronic mail
- 2.2
| 2.5
- encryption
- 2.1
- ethics of information
- 5
- Fermat's small theorem
- 2.1
- Fidonet
- 2.5
- graphein
- 2.1
- GSS alogorithm for TSIG
- 4.3.2
- hashed message authentication codes
- 2.1
| 4.3.2
- HTTP
- 2.2
| 2.5.2
- HyperText Transfer
Protocol
- see HTTP
- ICQ
- 2.5
- IETF
- 2.1
| 2.5.3
| 2.5.6
- IMAP
- 2.5.2
- instant messaging
- 2.5
- integrity
- 2.1
| 2.1
- integrity check values
- 2.1
- internet
- 2.2
- Internet Engineering Task Force
- see IETF
- Internet Mail Message
Format
- see RFC 822
- internet protocol
- version 4
- 4.4.5
- version 6
- 4.4.5
- internet relay chat (IRC)
- 2.5
- IP
- 2.2
- ISO X.500
- 2.2
- kerberos
- 4.3.1
- key distribution
- in DNS
- 5.1
- key-space
- 2.1
- keyed hash function
- 2.1
- keys
- 2.1
- RSA
- 3.2
- KOM
- 2.5
- kryptos
- 2.1
- Latency
- see Round Trips
- LDAP
- 4.4.3
- add request
- 4.4.3
- add response
- 4.4.3
- bind request
- 4.4.3
- bind response
- 4.4.3
- locating directory
- 4.2.2
- modify request
- 4.4.3
- modify response
- 4.4.3
- protocol
- 4.4.3
- publishing certificates
- 3.2
- SASL credentials
- 4.4.3
- search request
- 4.4.3
- search result done
- 4.4.3
- search result entry
- 4.4.3
- LDAP referrals
- 4.2.2
- LDIF
- 3.2
- Lightweight Directory Access
Protocol
- see LDAP
- mailer
- 2.5.1
- man in the middle
- 2.1
- MEMO
- 2.5
- message authentication codes
- 2.1
- message integrity check
- 2.1
- message transfer agents (MTA)
- 2.5.1
- messages
- 2.1
- MIME
- 2.5.1
| 2.5.2
- meta language
- 3.1
- PGP
- 2.5.4
- secure
- 2.5.6
- secure multi-parts
- 2.5.5
- MOSS
- 2.5.1
| 2.5.5
- Multipurpose Internet Mail
Extensions
- see MIME
- NO resource record
- 5.3
| A.
- nonrepudiation
- 2.1
- NXT chaining
- 5.1
- one-way hash value
- 2.1
- OpenPGP
- 2.5.1
- originator
- 2.5.1
- packet size
- 4.4.5
- password based authentication
- 4.3.1
- PEM
- 2.5.1
- PGP
- 2.5.1
- PGP/MIME
- 2.5.5
- phone book
- 2.2
- PKCS #7
- 2.5.6
- pki
- see public key infrastructure
- PKI hosting
- 4.2.3.1
- plaintext
- 2.1
- policy registration
authority (PCA)
- 2.5.3
- pretty good privacy (PGP)
- 2.5.4
- privacy abuse
- 5
- privacy enhanced mail (PEM)
- 2.5.3
- public chat groups
- 2.5
- public discussion forums
- 2.5
- public key
- 2.1
- public key cryptography
- 2.1
- public key infrastructure
- 2.1
| 2.3
- public-key certificates
- 2.1
- RA
- see registration authority
- receivers
- 2.1
- recipients
- 2.5.1
- registration authority
- 2.3
- request authentication
- in DNS
- 5.1
- RFC 822
- 2.5.2
- round trips
- 4.4.4
- comparison between
DNS and LDAP
- 4.4.4.3
- in DNS
- 4.4.4.1
- in LDAP
- 4.4.4.2
- in TCP
- 4.4.4
- in UDP
- 4.4.4
- RSA
- 2.1
- S/MIME
- 2.5.1
| 2.5.5
| 2.5.6
- secret writing
- 2.1
- Secure MIME
- see MIME
- Security Multiparts for MIME
- 2.5.1
- senders
- 2.1
- SGML
- 3.1
- shared secret key
- 2.1
- sign
- 2.1
- signature
- 2.1
- signature generation
- 2.1
- simple distributed security
infrastructure (SDSI)
- 4.2.1
- simple mail transfer protocol
- 2.2
- simple public key infrastructure
- 4.2.1
- SMS
- 2.5
- SRV records
- 4.2.2
- symmetric cipher
- 2.1
- TCP
- 2.2
- round trips in
- 4.4.4
- transaction authentication
- in DNS
- 5.1
- Transmission Control
Protocol
- see TCP
- trusted third party
- 2.1
- UDP
- round trips in
- 4.4.4
- up-to-date information
- 4.2
- updating certificates
- see certificatesupdating
- user agents
- 2.5.1
- User Datagram Protocol
- see UDP
- users
- 2.5.1
- verification procedure
- 2.1
- verify
- 2.1
- VeriSign
- 4.4.5
- well known DNS aliases
- 4.2.2
- white-pages
- 4.2
- X.400
- 2.5
- X.500
- 4.2.1
- attributes
- 4.2.1
- DAP
- 4.2.2
- DIT
- 4.2.1
- entries
- 4.2.1
- XML
- 3.1
2002-01-07