Weitere Beispiele werden automatisch zu den Stichwörtern zugeordnet - wir garantieren ihre Korrektheit nicht.
It has thus been described as an anonymous key agreement protocol.
The Byzantine agreement protocol is an essential part of this task.
Many such computer models have been used for projecting the costs of the Kyoto agreement protocol on climate change.
Unauthenticated Diffie-Hellman, as an anonymous key agreement protocol, has long been known to be subject to man in the middle attack.
The Byzantine Agreement protocol is a protocol in distributed computing.
This shows that the quantum implementation of classical Byzantine Agreement protocols is indeed feasible.
The YAK is a public-key authenticated key agreement protocol.
Thus, failure detection by the platform (using timeouts) triggers an internal agreement protocol (within the platform).
He is also a principal designer of the cryptographic key agreement protocol for the Wireless USB standard.
PFS has also been used to describe the analogous property of password-authenticated key agreement protocols where the long-term secret is a (shared) password.
Scientific and cultural agreement protocols have been signed with the universities of the Balkan countries and much of these projects have been put into practice.
The new legislation entered into force on 1 June, and Turkey signed the Ankara Agreement Protocol on 29 July.
Two algorithms are programmed into the chip: A key-exchange algorithm for the key agreement protocol and a symmetric-key algorithm for voice encryption.
Password-authenticated key agreement protocols require the separate establishment of a password (which may be smaller than a key) in a manner that is both private and integrity-assured.
The agreement protocol or consensus protocol is an unforced dynamical system that is governed by the interconnection topology and the initial condition for each agent.
Burton S. Kaliski Jr., An unknown key-share attack on the MQV key agreement protocol.
Any number of users can take part in an agreement by performing iterations of the agreement protocol and exchanging intermediate data (which does not itself need to be kept secret).
The Association's creation was finalised with the ESADE collaboration agreement protocol, and its official recording in the Registry of Associations on October 9, 1989.
In cryptography, the Password Authenticated Key Exchange by Juggling (or J-PAKE) is a password-authenticated key agreement protocol.
A. Menezes, M. Qu, and S. Vanstone, Some new key agreement protocols providing implicit authentication, Preproceedings of Workshops on Selected Areas in Cryptography (1995).
UK/Qatar Double Taxation Agreement Protocol to the UK/Qatar Double Taxation Agreement entered into force on 27 July 2011.
It said that it was going to apply the Agreement Protocol - an annexed statement aimed at ensuring that research on spare embryonic stem cells takes place in very strict conditions governed by ethical considerations.
ITU-T Recommendation X.1035 specifies a password-authenticated key agreement protocol that ensures mutual authentication of two parties by using a Diffie-Hellman key exchange to establish a symmetric cryptographic key.
That position and that recommendation of mine are, therefore, the reason why I have today emphasized certain issues which may improve the framework for the implementation of the Agreement Protocol, whether it be in the short or medium term.
Elliptic curve Diffie-Hellman (ECDH) is an anonymous key agreement protocol that allows two parties, each having an elliptic curve public-private key pair, to establish a shared secret over an insecure channel.