Acronyms
1xEV | 1x Evolution |
1xEV-DO | 1x Evolution Data Only |
1xEV-DV | 1x Evolution Data Voice |
3GPP | 3rd Generation Partnership Project |
ADCCP | Advanced Data Communication Control Procedures |
AES | Advanced Encryption Standard (Rijndael) |
AH | Authentication Header |
AMPS | Advanced Mobile Phone System |
ANSI | American National Standards Institute |
ARP | Address Resolution Protocol |
AS | Autonomous System |
ASN.1 | Abstract Syntax Notation One |
ATM | Asynchronous Transfer Mode |
BER | Basic Encoding Rules |
BGP | Border Gateway Protocol |
CA | Certification Authority |
CBC | Cipher Block Chaining |
CDMF | Commercial Data Masking Facility |
CDPD | Cellular Digital Packet Data, North American Protocol |
CERT | Center for Emergency Response Team |
CGI | Common Gateway Interface |
CIDR | Classless Inter-Domain Routing |
CLNS | Connectionless Network Service |
CMS | Cryptographic Message Syntax |
CRC | Cyclic Redundancy Check |
CRL | Certificate Revocation List |
CSMA/CD | Carrier Sense Multiple Access with Collision Detection |
DAC | Discretionary Access Control |
DARPA | Defense Advanced Research Projects Agency |
DDoS | Distributed Denial of Service |
DDP | Datagram-Delivery Protocol |
DER | Distinguished Encoding Rules |
DES | Data Encryption Standard |
DH | Diffie–Hellman |
DIT | Directory Information Tree |
DMDC | DES-like Message Digest Computation |
DMZ | Demilitarized Zone |
DN | Distinguished Name |
DNS | Domain Name Service or Domain Name System |
DOI | Domain of Interpretation |
DS | Dual Signature |
DSA | Digital Signature Algorithm |
DSS | Digital Signature Standard |
DVMRP | Distance Vector Multicast Routing Protocol |
EBCDIC | Extended Binary Coded Decimal Interchange Code |
EC | Elliptic Curve |
ECC | Elliptic Curve Cryptosystem |
ECDSA | Elliptic Curve Digital Signature Algorithm |
ECSD | Enhanced Circuit-Switched Data |
EDGE | Enhanced Data Rate for GSM Evolution or Enhanced Data Rate for Global Evolution |
EFT | Electronic Funds Transfer |
ESP | Encapsulating Security Payload |
ESP | Encrypted Security Payload |
FDDI | Fiber Distributed Data Interface |
FIPS | Federal Information Processing Standards |
FTP | File Transfer Protocol |
GASAPI | Generic Audit Service Application Program Interface |
GPRS | General Packet Radio Service |
GSM | Global System for Mobile Communications |
GSSAPI | Generic Security Service Application Program Interface |
HDLC | High-Level Data Link Control |
HIDS | Host-Based Intrusion Detection System |
HMAC | Hashed Message AuthenticationCodes |
HMAC | Hashing Message Authentication Code |
HSCSD | High-Speed Circuit-Switched Data |
HSDPA | High-Speed Downlink Packet Access |
HTML | Hypertext Markup Language |
HTTP | Hypertext Transfer Protocol |
IAB | Internet Activities Board |
IAB | Internet Architecture Board |
IANA | Internet Assigned Numbers Authority |
ICB | International Cooperation Board |
ICCB | Internet Configuration Control Board |
ICMP | Internet Control Message Protocol |
ICV | Integrity Check Value |
IDEA | International Data Encryption Algorithm |
iDEN | Integrated Digital Enhanced Network |
IDS | Intrusion Detection System |
IESG | Internet Engineering Steering Group |
IETF | Internet Engineering Task Force |
IGMP | Internet Group Management Protocol |
IMAP | Internet Message Access Protocol |
Inter NIC | Internet Network Information Centre |
IP | Internet Protocol |
IPRA | Internet Policy Registration Authority |
IPsec | Internet Protocol Security |
IPX | Novell Internet Packet Exchange |
IRTF | Internet Research Task Force |
ISAKMP | Internet Security Association Key Management Protocol |
ISN | Initial Sequence Number |
ISO | International Organization for Standardization |
ITU-T | International Telecommunication Union-Telecommunication Section |
IV | Initialization Vector |
KDC | Key Distribution Center |
LAN | Local Area Network |
LDAP | Lightweight Directory Access Protocol |
LEAF | Law Enforcement Access Field |
LLC | Logical Link Control |
LTE | Long Term Evolution |
MAC | Media Access Control |
MAC | Message Authentication Code |
MBONE | Multicast Backbone |
MD5 | Message Digest, version 5 |
MIC | Message Integrity Code or Message Integrity Check |
MIME | Multipurpose Internet Mail Extension |
MIMO | Multiple Input Multiple Output |
MOSPF | Multicast Open Shortest Path First |
MSP | Message Security Protocol |
MTU | Maximum Transfer Unit |
NBAS | Network Behavior Analysis System |
NBS | National Bureau of Standards |
NCSA | National Computer Security Association |
NFS | Network File System |
NIC | Network Interface Card |
NIDS | Network-Based Intrusion Detection System |
NIST | National Institute of Standards and Technology |
NMS | Network Management System |
NMT | Nordic Mobile Telephone |
NNTP | Network News Transfer Protocol |
NSA | National Security Agency |
NSAP | Network Service Access Point |
NVT | Network Virtual Terminal |
OFDMA | Orthogonal Frequency Division Multiple Access |
OM | Order Message |
ORA | Organizational Registration Authority |
OSI | Open Systems Interconnect |
OSPF | Open Shortest Path First |
PAA | Policy Approval Authority |
PCA | Policy Certification Authority |
PCMCIA | Personal Computer Memory Card International Association |
PCT | Private Communication Technology |
PDC | Personal Digital Cellular |
PEM | Privacy Enhanced Mail |
PGP | Pretty Good Privacy |
PKCS | Public-Key Cryptography Standards |
PKC | Public-Key Certificate |
PKI | Public-Key Infrastructure |
PM | Payment Message |
POP | Post Office Protocol |
PPD | Port Protection Devices |
PPP | Point-to-Point Protocol |
PRBS | Pseudo-Random Binary Sequence |
PSRG | Privacy and Security Research Group |
QR | Quadratic Residue |
RA | Registration Authority |
RARP | Reverse Address Resolution Protocol |
RDN | Relative Distinguished Name |
RFC | Request for Comments |
RIP | Routing Information Protocol |
RPC | Remote Procedure Call |
RSA | Rivest, Shamir, and Adleman |
SA | Security Association |
SAD | Security Association Database |
SAGE | Security AlgorithmsGroup of Experts |
SATAN | Security Administrator Tool for Analog Network |
SDLC | Synchronous Data Link Control |
SEAL | Screening External Access Link |
SET | Secure Electronic Transaction |
SHA | Secure Hash Algorithm |
SHS | Secure Hash Standard |
S-HTTP | Secure HyperText Transfer Protocol |
SLIP | Serial Line Internet Protocol |
SMI | Structure of Management Information |
S/MIME | Secure/Multipurpose Internet Mail Extension |
SMTP | Simple Mail Transfer Protocol |
SNMP | Simple Network Management Protocol |
SNS | Social Network Services |
SPD | Security Policy Database |
SPE | System Packet Exchange |
SPI | Security Parameter Index |
SPKI | Simple Public-Key Infrastructure |
SSL | Secure Sockets Layer |
TACS | Total Access Communications System |
TCP | Transmission Control Protocol |
TFTP | Trivial File Transfer Protocol |
TIS | Trusted Information System |
TLS | Transport Layer Security |
TS | Timestamp |
UDP | User Datagram Protocol |
UMB | Ultra Mobile Broadband |
UMTS | Universal Mobile Telecommunication System |
URI | Uniform Resource Identifier |
URL | Uniform Resource Locator |
VPN | Virtual Private Network |
WAIS | Wide Area Information Service |
WAN | Wide Area Network |
WAP | Wireless Application Protocol |
WiBro | Wireless Broadband |
WIDS | Wireless Intrusion Detection System |
WiMAX | Worldwide Interoperability for Microwave Access |
WWW | World Wide Web |
XOR | eXclusive OR |
3.138.174.174