-
1 key distribution protocol
Security: KDPУниверсальный русско-английский словарь > key distribution protocol
-
2 key distribution protocol
протокол распределения ключейEnglish-Russian cryptological dictionary > key distribution protocol
-
3 key distribution protocol
Англо-русский словарь промышленной и научной лексики > key distribution protocol
-
4 two-party key distribution protocol
протокол распределения ключей между двумя участниками обмена, сообщениями.English-Russian cryptological dictionary > two-party key distribution protocol
-
5 протокол распределения ключей
протокол распределения ключей
ПРК
—
[[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]]Тематики
Синонимы
EN
Русско-английский словарь нормативно-технической терминологии > протокол распределения ключей
-
6 протокол распределения ключей
1) Security: key-distribution protocol2) Cryptography: key agreement protocol, key exchange protocol, key generation protocol, key sharing protocolУниверсальный русско-английский словарь > протокол распределения ключей
-
7 протокол распределения ключей между двумя участниками обмена сообщениями
Русско-английский словарь нормативно-технической терминологии > протокол распределения ключей между двумя участниками обмена сообщениями
-
8 KDP
abbr ПРК (см. key distribution protocol).
См. также в других словарях:
Quantum key distribution network — Quantum Key Distribution Networks are future networks that are capable to provide QKD in passive optical networks. These networks will be integrated within the nowadays classical networks with the minor impact in the optical infrastructures. The… … Wikipedia
Protocol for Carrying Authentication for Network Access — PANA (Protocol for Carrying Authentication for Network Access) is an IP based protocol that allows a device to authenticate itself with a network to be granted access. PANA will not define any new authentication protocol, key distribution, key… … Wikipedia
Key (cryptography) — In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher. Without a key, the algorithm would produce no useful result. In encryption, a key specifies the… … Wikipedia
Firefly (protocol) — Firefly is the name of the key exchange protocol, or cooperative key technology , used in the STU III secure telephone.Firefly is an NSA key distribution protocol based on public key cryptography. Firefly keys are distributed by NSA s Electronic… … Wikipedia
Simple Key-Management for Internet Protocol — or SKIP is a protocol developed by the IETF Security Working Group for the sharing of encryption keys.Skip is hybrid Key distribution protocol Simple Key Management for Internet Protocols (SKIP) is similar to SSL, except that it requires no prior … Wikipedia
Key server (cryptographic) — In computer security, a key server is a computer mdash; typically running special software mdash; which provides cryptographic keys to users or other programs. The users programs can be working on the same network as the key server or on another… … Wikipedia
Distribution mangagement system — SCADA systems have been a part of utility automation for at least 15 years and contributing to the decision making process of the control rooms. However, majority of the existing solutions are closely related to distribution network data… … Wikipedia
Protocol converter — A Protocol Converter is a device used to convert standard or proprietary protocol of one device to the protocol suitable for the other device or tools to achieve the interoperability. There are varieties of protocols used in different fields like … Wikipedia
Key Survey — Infobox Website name = Key Survey url = http://www.keysurvey.com key people = Cal Brown, CEO Co founder Stan Liachev, CTO Co founder commercial = Yes type = Online Survey creation and distribution language = registration = owner = WorldAPP, Inc.… … Wikipedia
Diffie–Hellman key exchange — (D–H)[nb 1] is a specific method of exchanging keys. It is one of the earliest practical examples of key exchange implemented within the field of cryptography. The Diffie–Hellman key exchange method allows two parties that have no prior knowledge … Wikipedia
Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key … Wikipedia