- session key protocol
- <08> протокол выработки сеансовых ключей
Сборный англо-русский словарь. Академик.ру. 2011.
Сборный англо-русский словарь. Академик.ру. 2011.
Session Description Protocol — (SDP) is a format for describing streaming media initialization parameters in an ASCII string. The IETF published the original specification as an IETF Proposed Standard in April 1998 [ cite web|url=http://tools.ietf.org/html/rfc2327 |title=SDP:… … Wikipedia
Session Description Protocol — SDP (Session Description Protocol) Familie: Internetprotokollfamilie Einsatzgebiet: Beschreibung von Multimedia Sitzungen im Rahmen der Aushandlung von Medienformaten SDP im TCP/IP‑Protokollstapel: Anwendung SDP Transport … Deutsch Wikipedia
Offline private key protocol — The offline private key protocol (OPKP) is a cryptographic protocol to prevent unauthorized access to back up or archive data. The protocol results in a public key that can be used to encrypt data and an offline private key that can later be used … Wikipedia
Key Wrap — constructions are a class of symmetric encryption algorithms designed to encapsulate (encrypt) cryptographic key material. The Key Wrap algorithms are intended for applications such as (a) protecting keys while in untrusted storage, or (b)… … Wikipedia
Session Border Controller — A Session Border Controller is a device used in some VoIP networks to exert control over the signaling and usually also the media streams involved in setting up, conducting, and tearing down calls. Within the context of VoIP, the word Session in… … Wikipedia
Session hijacking — The term session hijacking refers to the exploitation of a valid computer session sometimes also called a session key to gain unauthorized access to information or services in a computer system. In particular, it is used to refer to the theft of… … Wikipedia
Key (cryptography) — In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher. Without a key, the algorithm would produce no useful result. In encryption, a key specifies the… … Wikipedia
Kerberos (protocol) — Kerberos is a computer network authentication protocol, which allows individuals communicating over a non secure network to prove their identity to one another in a secure manner. It is also a suite of free software published by Massachusetts… … Wikipedia
Skype Protocol — Skype uses a proprietary Internet telephony (VoIP) network. The protocol has not been made publicly available by Skype and official applications using the protocol are closed source. The main difference between Skype and VoIP clients is that… … Wikipedia
Secure Real-time Transport Protocol — The Secure Real time Transport Protocol (or SRTP) defines a profile of RTP (Real time Transport Protocol), intended to provide encryption, message authentication and integrity, and replay protection to the RTP data in both unicast and multicast… … Wikipedia
Station-to-Station protocol — The Station to Station (STS) protocol is a cryptographic key agreement scheme based on classic Diffie Hellman that provides mutual key and entity authentication.In addition to protecting the established key from an attacker, the STS protocol uses … Wikipedia