- key distribution protocol
- протокол распределения ключей
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Quantum key distribution network — Quantum Key Distribution Networks are future networks that are capable to provide QKD in passive optical networks. These networks will be integrated within the nowadays classical networks with the minor impact in the optical infrastructures. The… … Wikipedia
Protocol for Carrying Authentication for Network Access — PANA (Protocol for Carrying Authentication for Network Access) is an IP based protocol that allows a device to authenticate itself with a network to be granted access. PANA will not define any new authentication protocol, key distribution, key… … Wikipedia
Key (cryptography) — In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher. Without a key, the algorithm would produce no useful result. In encryption, a key specifies the… … Wikipedia
Firefly (protocol) — Firefly is the name of the key exchange protocol, or cooperative key technology , used in the STU III secure telephone.Firefly is an NSA key distribution protocol based on public key cryptography. Firefly keys are distributed by NSA s Electronic… … Wikipedia
Simple Key-Management for Internet Protocol — or SKIP is a protocol developed by the IETF Security Working Group for the sharing of encryption keys.Skip is hybrid Key distribution protocol Simple Key Management for Internet Protocols (SKIP) is similar to SSL, except that it requires no prior … Wikipedia
Key server (cryptographic) — In computer security, a key server is a computer mdash; typically running special software mdash; which provides cryptographic keys to users or other programs. The users programs can be working on the same network as the key server or on another… … Wikipedia
Distribution mangagement system — SCADA systems have been a part of utility automation for at least 15 years and contributing to the decision making process of the control rooms. However, majority of the existing solutions are closely related to distribution network data… … Wikipedia
Protocol converter — A Protocol Converter is a device used to convert standard or proprietary protocol of one device to the protocol suitable for the other device or tools to achieve the interoperability. There are varieties of protocols used in different fields like … Wikipedia
Key Survey — Infobox Website name = Key Survey url = http://www.keysurvey.com key people = Cal Brown, CEO Co founder Stan Liachev, CTO Co founder commercial = Yes type = Online Survey creation and distribution language = registration = owner = WorldAPP, Inc.… … Wikipedia
Diffie–Hellman key exchange — (D–H)[nb 1] is a specific method of exchanging keys. It is one of the earliest practical examples of key exchange implemented within the field of cryptography. The Diffie–Hellman key exchange method allows two parties that have no prior knowledge … Wikipedia
Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key … Wikipedia