| ACPI | Advanced Configuration and Power Interface |
| AES | Advanced Encryption Standard |
| CA | Certification Authority |
| DH | Diffie–Hellman |
| DHE | Ephemeral Diffie–Hellman |
| DSA | Digital Signature Algorithm |
| DTLS | Datagram Transport Layer Security |
| ECC | Elliptic Curve Cryptography |
| ECDHE | Elliptic Curve Diffie–Hellman Ephemeral |
| ECDSA | Elliptic Curve Digital Signature Algorithm |
| FTPS | File Transfer Protocol over SSL |
| GCM | Galois/Counter Mode |
| HMAC | Hash Message Authentication Code |
| IMAPS | Internet Message Access Protocol over SSL |
| IoT | Internet of Things |
| KDF | Key Derivation Function |
| MAC | Message Authentication Code |
| MitM | Man-in-the-Middle Attack |
| NIST | National Institute of Standards and Technology |
| PFS | Perfect Forward Secrecy |
| PUF | Physical Unclonable Functions |
| RSA | Rivest–Shamir–Adleman |
| RTSP | Real Time Streaming Protocol |
| SBC | Single Board Computer |
| SHA | Secure Hash Algorithm |
| SMTPS | Simple Mail Transfer Protocol Secure |
| SSL | Secure Socket Layer |
| TDES | Triple Data Encryption Standard |
| TDEA | Triple Data Encryption Algorithm |
| TLS | Transport Layer Security |
| WSN | Wireless Sensor Network |