Перевод: со всех языков на все языки

со всех языков на все языки

public key scheme

См. также в других словарях:

  • Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key …   Wikipedia

  • Public key certificate — Diagram of an example usage of digital certificate In cryptography, a public key certificate (also known as a digital certificate or identity certificate) is an electronic document which uses a digital signature to bind a public key with an… …   Wikipedia

  • Public key infrastructure — In cryptography, a public key infrastructure (PKI) is an arrangement that binds public keys with respective user identities by means of a certificate authority (CA). The user identity must be unique for each CA. The binding is established through …   Wikipedia

  • public key encryption —    An encryption scheme that uses two keys. In an e mail transaction, the public key encrypts the data, and a corresponding private key decrypts the data. Because the private key is never transmitted or publicized, the encryption scheme is… …   Dictionary of networking

  • Efficient Probabilistic Public-Key Encryption Scheme — EPOC (Efficient Probabilistic Public Key Encryption) is a probabilistic public key encryption scheme.EPOC was developed in 1999 by T. Okamoto, S. Uchiyama and E. Fujisaki of NTT Labs in Japan. It is based on the random oracle model, in which a… …   Wikipedia

  • Wireless Public Key Infrastructure — (WPKI) is a two factor authentication scheme using mainly the mobile phone and a laptop. Mainly promoted by banks, mobile operators, and mobile network manufacturers. External links * http://www.wpki.net *… …   Wikipedia

  • Key disclosure law — Key disclosure laws, also known as mandatory key disclosure, is legislation that require individuals to surrender cryptographic keys to law enforcement. The purpose is to allow access to material for confiscation or digital forensics purposes and …   Wikipedia

  • Key Addressed Crypto Encapsulation — Key Addressed Crypto Encapsulation, or CAKE is a network protocol that lives on top of the Internet Protocol, SMTP, or any of a wide variety of other protocols. The basic idea of the protocol is to use public key identifiers as the base… …   Wikipedia

  • Key distribution — In symmetric key cryptography, both parties must possess a secret key which they must exchange prior to using any encryption. Distribution of secret keys has been problematic until recently, because it involved face to face meeting, use of a… …   Wikipedia

  • Public Fight to Stop the Sale of Snowy Hydro — The public fight to stop the sale of the Snowy Hydro commenced from November 2005 when a band of notable public, other persons banded together to try and stop its privatisation.The group who first joined together in an attempt to stop the sell… …   Wikipedia

  • Key worker — A key worker is a public sector employee who is considered to provide an essential service. The term is often used in the United Kingdom in the context of those essential workers who may find it difficult to buy property in the area where they… …   Wikipedia

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»