- signature authentication protocol
- протокол установления подлинности подписи (аутентификации подписи)
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Authentication — (from Greek αυθεντικός; real or genuine, from authentes; author) is the act of establishing or confirming something (or someone) as authentic , that is, that claims made by or about the thing are true. This might involve confirming the identity… … Wikipedia
Electronic authentication — (E authentication) is the process of establishing confidence in user identities electronically presented to an information system. E authentication presents a technical challenge when this process involves the remote authentication of individual… … Wikipedia
Digital Signature Transponder — The Texas Instruments Digital Signature Transponder (DST) is a cryptographically enabled radio frequency identification (RFID) device used in a variety of wireless authentication applications. The largest deployments of the DST include the Exxon… … Wikipedia
Digital signature — This article is about secure cryptographic signatures. For simple signatures in digital form, see Electronic signature. A digital signature or digital signature scheme is a mathematical scheme for demonstrating the authenticity of a digital… … Wikipedia
Station-to-Station protocol — The Station to Station (STS) protocol is a cryptographic key agreement scheme based on classic Diffie Hellman that provides mutual key and entity authentication.In addition to protecting the established key from an attacker, the STS protocol uses … Wikipedia
Three-pass protocol — In cryptography, the three pass protocol for sending messages is a framework which allows one party to securely send a message to a second party without the need to exchange or distribute encryption keys. This message protocol should not be… … Wikipedia
E-mail authentication — is the effort to equip messages of the e mail transport system with enough verifiable information, so that recipients can recognize the nature of each incoming message automatically. It is different from content filtering s fuzzy methods.… … Wikipedia
Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in … Wikipedia
Microsoft Notification Protocol — This article is about the technical details of Microsoft s IM protocol. For the service itself, see .NET Messenger Service. Microsoft Notification Protocol (MSNP, also known as the Mobile Status Notification Protocol) is an instant messaging… … Wikipedia
Key-agreement protocol — In cryptography, a key agreement protocol is a protocol whereby two or more parties can agree on a key in such a way that both influence the outcome. If properly done, this precludes undesired third parties from forcing a key choice on the… … Wikipedia
Merkle signature scheme — The Merkle signature scheme is a digital signature scheme based on hash trees (also called Merkle trees) and one time signatures such as the Lamport signature scheme. It was developed by Ralph Merkle in the late 70s and is an alternative to… … Wikipedia