User`s manual
421
DWS-1008 User’s Manual
D-Link Systems, Inc.
Appendix D - Glossary
group transient key
See GTK.
H.323
A set of International Telecommunications Union Telecommunication Standardization Sector
(ITU-T) standards that dene a framework for the transmission of real-time voice signals over
IP packet-switched networks.
hash
A one-way algorithm from whose output the input is computationally infeasible to determine.
With a good hashing algorithm you can produce identical output from two identical inputs, but
nding two different inputs that produce the same output is computationally infeasible. Hash
functions are used widely in authentication algorithms and for key derivation procedures.
HiperLAN
High-performance radio local area network. A set of wireless LAN (WLAN) communication
standards used primarily in European countries and adopted by the European
Telecommunications Standards Institute (ETSI).
HMAC
Hashed message authentication code. A function, dened in RFC 2104, for keyed hashing
for message authentication. HMAC is used with MD5 and the secure hash algorithm (SHA).
hashed message authentication code
See HMAC.
homologation
The process of certifying a product or specication to verify that it meets regulatory
standards.
IAS
Internet Authentication Service. Microsoft’s RADIUS server.
IC
Industry Canada. The Canadian governing body for telecommunications.
ICV
Integrity check value. The output of a message integrity check.
IE
See WPA IE.