Примеры использования Cryptographic protocols на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
The SSDs do not use any other cryptographic protocols.
Cryptographic protocols protect the exchange of money between the smart card and the machine.
The Signal Protocol has had an influence on other cryptographic protocols.
Most cryptographic protocols include some form of endpoint authentication specifically to prevent MITM attacks.
We encrypt your data in transit using secure TLS cryptographic protocols.
Cryptographic protocols SSL(Secure Sockets Layer) and TLS(Transport Layer Security) create a secure link between your email server and your computer.
Groups of matrices over F have been used as the platform groups of certain non-commutative cryptographic protocols.
Block ciphers operate as important elementary components in the design of many cryptographic protocols, and are widely used to implement encryption of bulk data.
One of the earliest applications of a non-commutative algebraic structure for cryptographic purposes was the use of braid groups to develop cryptographic protocols.
FTPS includes full support for the TLS and SSL cryptographic protocols, including the use of server-side public key authentication certificates and client-side authorization certificates.
Programming technologies, object-oriented programming, applied cryptology,cryptosystems and cryptographic protocols;
Formal verification can be helpful in proving the correctness of systems such as: cryptographic protocols, combinational circuits, digital circuits with internal memory, and software expressed as source code.
FTPS(also known as FTPES, FTP-SSL, and FTP Secure) is an extension to the commonly used File Transfer Protocol(FTP) that adds support for the Transport Layer Security(TLS) and,formerly, the Secure Sockets Layer(SSL, which is now prohibited by RFC7568) cryptographic protocols.
Subsequent lectures study private key cryptosystems as an example of cryptographic protocols solving the task of privacy.
A number of years the staffs of the department teach to master students subjects such as"Internet Security","Digital forensics","Practical Methods of cryptanalysis," to bachelors"Information Security","Information theory andcoding","Information security of computer systems and networks""Encryption methods","Information security in wireless networks","Cryptographic protocols.
These security guarantees are difficult to establish in a network without persistent connectivity because the network hinders complicated cryptographic protocols, hinders key exchange, and each device must identify other intermittently visible devices.
The software produced by the project MUST use, by default, only cryptographic protocols and algorithms that are publicly published and reviewed by experts if cryptographic protocols and algorithms are used.
The research shows some capabilities to use model checking method for cryptographic protocol verification.
Key words: cryptographic protocol, authentication, model checking, linear temporal logic, automatic verification.
Support of versions 1.1 and 1.2 of cryptographic protocol TLS for client connection.
Keywords: irreducible polynomials, Galois fields, Galois andFibonacci matrix, cryptographic protocol.
Entities using SSL andearly TLS must work toward upgrading to a strong cryptographic protocol as soon as possible.
A cryptographic protocol SSL- is intended for safety of communication and authentication of data password and login of a user.
A worthy cryptographic protocol specification has to be human-readable(declarative and con-cise), executable and formally verified in a sound model.
It can be used as part of a cryptographic protocol to provide end-to-end encryption for instant messaging.
The Signal Protocol(formerly known as the TextSecure Protocol) is a non-federated cryptographic protocol that can be used to provide end-to-end encryption for voice calls, video calls, and instant messaging conversations.
It is often used as a cryptographic protocol that allows two parties to verify the identity of the remote party through the use of a shared secret, avoiding a man-in-the-middle attack without the inconvenience of manually comparing public key fingerprints through an outside channel.
Creation of a cryptographic protocol for secure communication.
Select the version of a cryptographic protocol that you want to use.