Примери за използване на Cryptographic protocol на Английски и техните преводи на Български
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Ecclesiastic
-
Computer
Design and analysis of cryptographic protocols.
This is a cryptographic protocol for secure exchange of information over the Internet.
Coins are created and transferred based on an open source cryptographic protocol, which is not managed by a central authority.
The majority of contemporary cryptographic protocols, which ensure the safety of all financial online transactions, are potentially vulnerable to the computing capacities of this computer.
Crypto: Challenges of this type focus on finding andusing vulnerabilities in a cryptographic protocol, primitive or a particular implementation.
SSL(Secure Sockets Layer)is a cryptographic protocol created by Netscape to provide communication security over the Internet.
DigiCash transactions were unique in that they were anonymous due to a number of cryptographic protocols developed by its founder.
Litecoin is based on an opensource cryptographic protocol and thus it is not managed by any central authority.
In order to solve the problems that could threaten the secure transmission of confidentialinformation on the Internet, different cryptographic protocols have been created.
For example, Transport Layer Security(TLS)is a cryptographic protocol that is used to secure web(HTTP) connections.
Notwithstanding whether you have subscribed to the Website pursuant to the General Conditions for Use or subsequently when using the Servicevia a Client Domain, the connection between your browser and us will be through a Secure Sockets Layer(SSL) cryptographic protocol.
This term is linked to a change in the cryptographic protocol that is not comparable to older versions of the digital coin.
This means the creation and transfer of coins is based on an open-source cryptographic protocol and is not managed by any central authority.
This term is linked to a change in the cryptographic protocol that is not comparable to older versions of the digital coin.
Creation& transfer of coins are based on an open source cryptographic protocol and is not managed by any central authority.
WSPay uses 256-bit SSL encryption and TLS 1.2 cryptographic protocol as the highest protection standards for data entry and transfer.
Creation and transfer of this coin are based on the open source cryptographic protocol and it is not managed by any of the central authority.
The creation of the coin is based on the open source cryptographic protocol and thus it is not managed by any central authority.
Coins creation and transfer are based on an open source cryptographic protocol, and what is important, it is not managed by any kind of central authority.
WSPay uses 256-bit encryption SSL certificate nd TLS 1.2 cryptographic protocol as the highest degree of data protection and data security.
WSPay uses the 256-bitencryption SSL certificate and the TLS 1.2 cryptographic protocol as the highest levels of protection for data input and transfer.
Any person orthe organization can't control or manipulate bitcoin protocol because it cryptographic is protected.
I ran the whole transaction through a randomized cryptographic extension at the protocol level, then through a two-tiered secure laundry service.
The Swarm blockchain allows real world objects to be“tokenized” using the SRC20 protocol, a cryptographic standard for security tokens, and a world first.
IPsec, or IP Security, is a collection of protocols for IPv4(“normal” IP) andIPv6 that allow for cryptographic security at the network protocol level.
BabelApp combines the best cryptographic algorithms and protocols, including blockchain, to protect your communication and information against both active and passive cyber-attacks.
Both are the secure hash algorithms required by law for use in certain U.S. Government applications,along with use within other cryptographic algorithms and protocols.
SHA-1 and SHA-2 are safe algorithms required by law to be used in some applications(e.g. the United States government uses cryptographic algorithms and protocols to protect sensitive information).
SHA-1 and SHA-2 are the Secure Hash Algorithms required by law for use incertain U.S. Government applications, including use within other cryptographic algorithms and protocols, for the protection of sensitive unclassified information.
SHA-1 and SHA-2 are the secure hash algorithms required by law for use in certain U.S. government applications,including use within other cryptographic algorithms and protocols, for the protection of sensitive, unclassified information.