session key protocol

session key protocol
<08> протокол выработки сеансовых ключей

Сборный англо-русский словарь. . 2011.

Игры ⚽ Нужен реферат?

Смотреть что такое "session key protocol" в других словарях:

  • Session Description Protocol — (SDP) is a format for describing streaming media initialization parameters in an ASCII string. The IETF published the original specification as an IETF Proposed Standard in April 1998 [ cite web|url=http://tools.ietf.org/html/rfc2327 |title=SDP:… …   Wikipedia

  • Session Description Protocol — SDP (Session Description Protocol) Familie: Internetprotokollfamilie Einsatzgebiet: Beschreibung von Multimedia Sitzungen im Rahmen der Aushandlung von Medienformaten SDP im TCP/IP‑Protokollstapel: Anwendung SDP Transport …   Deutsch Wikipedia

  • Offline private key protocol — The offline private key protocol (OPKP) is a cryptographic protocol to prevent unauthorized access to back up or archive data. The protocol results in a public key that can be used to encrypt data and an offline private key that can later be used …   Wikipedia

  • Key Wrap — constructions are a class of symmetric encryption algorithms designed to encapsulate (encrypt) cryptographic key material. The Key Wrap algorithms are intended for applications such as (a) protecting keys while in untrusted storage, or (b)… …   Wikipedia

  • Session Border Controller — A Session Border Controller is a device used in some VoIP networks to exert control over the signaling and usually also the media streams involved in setting up, conducting, and tearing down calls. Within the context of VoIP, the word Session in… …   Wikipedia

  • Session hijacking — The term session hijacking refers to the exploitation of a valid computer session sometimes also called a session key to gain unauthorized access to information or services in a computer system. In particular, it is used to refer to the theft of… …   Wikipedia

  • Key (cryptography) — In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher. Without a key, the algorithm would produce no useful result. In encryption, a key specifies the… …   Wikipedia

  • Kerberos (protocol) — Kerberos is a computer network authentication protocol, which allows individuals communicating over a non secure network to prove their identity to one another in a secure manner. It is also a suite of free software published by Massachusetts… …   Wikipedia

  • Skype Protocol — Skype uses a proprietary Internet telephony (VoIP) network. The protocol has not been made publicly available by Skype and official applications using the protocol are closed source. The main difference between Skype and VoIP clients is that… …   Wikipedia

  • Secure Real-time Transport Protocol — The Secure Real time Transport Protocol (or SRTP) defines a profile of RTP (Real time Transport Protocol), intended to provide encryption, message authentication and integrity, and replay protection to the RTP data in both unicast and multicast… …   Wikipedia

  • Station-to-Station protocol — The Station to Station (STS) protocol is a cryptographic key agreement scheme based on classic Diffie Hellman that provides mutual key and entity authentication.In addition to protecting the established key from an attacker, the STS protocol uses …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»