next up previous contents
Next: A. NO Resource Records Up: Network Application Security Using Previous: Bibliography   Contents


Index

Abstract Syntax Notation
see ASN.1
administrative requirements
4.2
America on line AIM
2.5
ASN.1
2.5.6 | 4.4.3
asymmetric cipher
2.1
asymmetric ciphers
2.1
authentication
2.1
authentication mode
2.1
CA
see certificate authority
certificate
generate requests
3.2
sign
3.2
certificate authority
2.3 | 2.5.3
verification process
2.3
certificates
2.1
credential based
4.2.1
identity based
4.2.1
locating
4.2
samples
B.
size
4.4.5
updating
4.3
cipher
2.1
ciphertext
2.1
Client Configuration
4.2.2
CMS
see Cryptographic Message
Syntax
complexity
2.1
confidentiality
2.1
Cryptographic Message Syntax
2.5.6
cryptography
2.1
data integrity
4.2
data mining
5
data non-existence
chain problem
5.1.2
in DNS
5.1.1
naive implementation
5.1.1
NO implementation
5.2
NXT implementation
5.1.1
proofs
5.1.1
data origin authentication
4.2
in DNS
5.1
decryption
2.1
DES
2.1
digital signature
2.1
distinguished name
2.5.3 | 4.2.1
domain name system
2.2 | 2.2 | 2.4
ASCII representation
3.2
caching
4.4.1
internal
4.2.3.1
locating directory
4.2.3
protocol
4.4.2
publishing certificates
3.2
secure DNS
5
design goals
5.1
eavesdropper
2.1
electronic mail
2.2 | 2.5
encryption
2.1
ethics of information
5
Fermat's small theorem
2.1
Fidonet
2.5
graphein
2.1
GSS alogorithm for TSIG
4.3.2
hashed message authentication codes
2.1 | 4.3.2
HTTP
2.2 | 2.5.2
HyperText Transfer
Protocol
see HTTP
ICQ
2.5
IETF
2.1 | 2.5.3 | 2.5.6
IMAP
2.5.2
instant messaging
2.5
integrity
2.1 | 2.1
integrity check values
2.1
internet
2.2
Internet Engineering Task Force
see IETF
Internet Mail Message
Format
see RFC 822
internet protocol
version 4
4.4.5
version 6
4.4.5
internet relay chat (IRC)
2.5
IP
2.2
ISO X.500
2.2
kerberos
4.3.1
key distribution
in DNS
5.1
key-space
2.1
keyed hash function
2.1
keys
2.1
RSA
3.2
KOM
2.5
kryptos
2.1
Latency
see Round Trips
LDAP
4.4.3
add request
4.4.3
add response
4.4.3
bind request
4.4.3
bind response
4.4.3
locating directory
4.2.2
modify request
4.4.3
modify response
4.4.3
protocol
4.4.3
publishing certificates
3.2
SASL credentials
4.4.3
search request
4.4.3
search result done
4.4.3
search result entry
4.4.3
LDAP referrals
4.2.2
LDIF
3.2
Lightweight Directory Access
Protocol
see LDAP
mailer
2.5.1
man in the middle
2.1
MEMO
2.5
message authentication codes
2.1
message integrity check
2.1
message transfer agents (MTA)
2.5.1
messages
2.1
MIME
2.5.1 | 2.5.2
meta language
3.1
PGP
2.5.4
secure
2.5.6
secure multi-parts
2.5.5
MOSS
2.5.1 | 2.5.5
Multipurpose Internet Mail
Extensions
see MIME
NO resource record
5.3 | A.
nonrepudiation
2.1
NXT chaining
5.1
one-way hash value
2.1
OpenPGP
2.5.1
originator
2.5.1
packet size
4.4.5
password based authentication
4.3.1
PEM
2.5.1
PGP
2.5.1
PGP/MIME
2.5.5
phone book
2.2
PKCS #7
2.5.6
pki
see public key infrastructure
PKI hosting
4.2.3.1
plaintext
2.1
policy registration
authority (PCA)
2.5.3
pretty good privacy (PGP)
2.5.4
privacy abuse
5
privacy enhanced mail (PEM)
2.5.3
public chat groups
2.5
public discussion forums
2.5
public key
2.1
public key cryptography
2.1
public key infrastructure
2.1 | 2.3
public-key certificates
2.1
RA
see registration authority
receivers
2.1
recipients
2.5.1
registration authority
2.3
request authentication
in DNS
5.1
RFC 822
2.5.2
round trips
4.4.4
comparison between
DNS and LDAP
4.4.4.3
in DNS
4.4.4.1
in LDAP
4.4.4.2
in TCP
4.4.4
in UDP
4.4.4
RSA
2.1
S/MIME
2.5.1 | 2.5.5 | 2.5.6
secret writing
2.1
Secure MIME
see MIME
Security Multiparts for MIME
2.5.1
senders
2.1
SGML
3.1
shared secret key
2.1
sign
2.1
signature
2.1
signature generation
2.1
simple distributed security
infrastructure (SDSI)
4.2.1
simple mail transfer protocol
2.2
simple public key infrastructure
4.2.1
SMS
2.5
SRV records
4.2.2
symmetric cipher
2.1
TCP
2.2
round trips in
4.4.4
transaction authentication
in DNS
5.1
Transmission Control
Protocol
see TCP
trusted third party
2.1
UDP
round trips in
4.4.4
up-to-date information
4.2
updating certificates
see certificatesupdating
user agents
2.5.1
User Datagram Protocol
see UDP
users
2.5.1
verification procedure
2.1
verify
2.1
VeriSign
4.4.5
well known DNS aliases
4.2.2
white-pages
4.2
X.400
2.5
X.500
4.2.1
attributes
4.2.1
DAP
4.2.2
DIT
4.2.1
entries
4.2.1
XML
3.1



2002-01-07