- secret protocol
- таємний протокол
English-Ukrainian law dictionary.
English-Ukrainian law dictionary.
Secret sharing — refers to any method for distributing a secret amongst a group of participants, each of which is allocated a share of the secret. The secret can only be reconstructed when the shares are combined together; individual shares are of no use on their … Wikipedia
Protocol of Sèvres — The Protocols of Sèvres (French, Protocoles de Sèvres ) was a secret agreement reached between the governments of Israel, France and Great Britain during discussions held in Sèvres, France between 22 and 24 October 1956, regarding a joint… … Wikipedia
Secret Internet Protocol Router Network — Das Secret Internet Protocol Router Network (SIPRNet) ist ein Verbund von Computernetzwerken des Außen und Verteidigungsministeriums der USA. Dieses US Regierungsnetz dient dem quasi internen Transport von Dateien/Dokumenten, insbesondere von… … Deutsch Wikipedia
SECRET Internet Protocol Router Network — Worldwide SECRET level packet switch network that uses high speed internet protocol routers and high capacity Defense Information Systems Network circuitry. Also called SIPRNET. See also Defense Information Systems Network … Military dictionary
Kerberos (protocol) — Kerberos is a computer network authentication protocol, which allows individuals communicating over a non secure network to prove their identity to one another in a secure manner. It is also a suite of free software published by Massachusetts… … Wikipedia
Verifiable secret sharing — In cryptography, a secret sharing scheme is verifiable if auxiliary information is included that allows players to verify their shares as consistent. More formally, verifiable secret sharing ensures that even if the dealer is malicious there is a … Wikipedia
Homomorphic secret sharing — In cryptography, homomorphic secret sharing is a form of secret sharing algorithm involving homomorphism.In abstract algebra, a homomorphism is a structure preserving map between two algebraic structures (such as groups, rings, or vector spaces) … Wikipedia
Station-to-Station protocol — The Station to Station (STS) protocol is a cryptographic key agreement scheme based on classic Diffie Hellman that provides mutual key and entity authentication.In addition to protecting the established key from an attacker, the STS protocol uses … Wikipedia
Publicly Verifiable Secret Sharing — In cryptography, a secret sharing scheme is publicly verifiable (PVSS) if it is a verifiable secret sharing scheme and if any party involved can verify the validity of the shares distributed by the dealer.quotation In verifiable secret sharing… … Wikipedia
Key-agreement protocol — In cryptography, a key agreement protocol is a protocol whereby two or more parties can agree on a key in such a way that both influence the outcome. If properly done, this precludes undesired third parties from forcing a key choice on the… … Wikipedia
Skype Protocol — Skype uses a proprietary Internet telephony (VoIP) network. The protocol has not been made publicly available by Skype and official applications using the protocol are closed source. The main difference between Skype and VoIP clients is that… … Wikipedia