This HTML5 document contains 49 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
dctermshttp://purl.org/dc/terms/
dbohttp://dbpedia.org/ontology/
foafhttp://xmlns.com/foaf/0.1/
n13https://global.dbpedia.org/id/
yagohttp://dbpedia.org/class/yago/
dbpedia-ruhttp://ru.dbpedia.org/resource/
dbthttp://dbpedia.org/resource/Template:
rdfshttp://www.w3.org/2000/01/rdf-schema#
freebasehttp://rdf.freebase.com/ns/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
owlhttp://www.w3.org/2002/07/owl#
dbpedia-ithttp://it.dbpedia.org/resource/
wikipedia-enhttp://en.wikipedia.org/wiki/
provhttp://www.w3.org/ns/prov#
dbphttp://dbpedia.org/property/
dbchttp://dbpedia.org/resource/Category:
xsdhhttp://www.w3.org/2001/XMLSchema#
wikidatahttp://www.wikidata.org/entity/
dbrhttp://dbpedia.org/resource/

Statements

Subject Item
dbr:Woo–Lam
rdf:type
yago:Protocol106665108 yago:WikicatCryptographicProtocols yago:Abstraction100002137 yago:Cognition100023271 yago:Method105660268 yago:Communication100033020 yago:Direction106786629 yago:PsychologicalFeature100023100 yago:Ability105616246 yago:Know-how105616786 yago:WikicatAuthenticationMethods yago:Rule106652242 yago:Message106598915
rdfs:label
Протокол Ву — Лама Protocollo Woo-Lam Woo–Lam
rdfs:comment
In cryptography, Woo–Lam refers to various computer network authentication protocols designed by Simon S. Lam and Thomas Woo. The protocols enable two communicating parties to authenticate each other's identity and to exchange session keys, and involve the use of a trusted key distribution center (KDC) to negotiate between the parties. Both symmetric-key and public-key variants have been described. However, the protocols suffer from various security flaws, and in part have been described as being inefficient compared to alternative authentication protocols. Протокол Ву — Лама — протокол аутентификации и обмена ключами. Как и в случае протокола DASS промежуточная сторона — Трент — поддерживает базу данных всех ключей. Il protocollo Woo-Lam rappresenta un protocollo di comunicazione progettato per permettere comunicazioni cifrate su reti non sicure. Questo fu dovuto a e nella metà degli anni ottanta. Il protocollo si basa su due concetti: * Uso della crittografia simmetrica, quindi di un'unica chiave per la fase di codifica e decodifica; * Uso del TTP (Trusted Third Party), ossia un organo fidato che contiene tutte le chiavi degli utenti che vogliono effettuare le comunicazioni.
dcterms:subject
dbc:Authentication_methods dbc:Computer_network_security
dbo:wikiPageID
31722495
dbo:wikiPageRevisionID
959909572
dbo:wikiPageWikiLink
dbr:Digital_signature dbr:Key_distribution_center dbr:Cryptography dbc:Authentication_methods dbc:Computer_network_security dbr:Cryptographic_nonce dbr:Kerberos_(protocol) dbr:Simon_S._Lam dbr:Public-key_encryption dbr:Needham–Schroeder_protocol dbr:Otway–Rees_protocol dbr:Authentication
owl:sameAs
wikidata:Q3924285 n13:3e1g3 freebase:m.0gmdy3x dbpedia-ru:Протокол_Ву_—_Лама dbpedia-it:Protocollo_Woo-Lam
dbp:wikiPageUsesTemplate
dbt:Authentication_APIs dbt:Reflist dbt:Crypto-stub
dbo:abstract
In cryptography, Woo–Lam refers to various computer network authentication protocols designed by Simon S. Lam and Thomas Woo. The protocols enable two communicating parties to authenticate each other's identity and to exchange session keys, and involve the use of a trusted key distribution center (KDC) to negotiate between the parties. Both symmetric-key and public-key variants have been described. However, the protocols suffer from various security flaws, and in part have been described as being inefficient compared to alternative authentication protocols. Il protocollo Woo-Lam rappresenta un protocollo di comunicazione progettato per permettere comunicazioni cifrate su reti non sicure. Questo fu dovuto a e nella metà degli anni ottanta. Il protocollo si basa su due concetti: * Uso della crittografia simmetrica, quindi di un'unica chiave per la fase di codifica e decodifica; * Uso del TTP (Trusted Third Party), ossia un organo fidato che contiene tutte le chiavi degli utenti che vogliono effettuare le comunicazioni. Протокол Ву — Лама — протокол аутентификации и обмена ключами. Как и в случае протокола DASS промежуточная сторона — Трент — поддерживает базу данных всех ключей.
prov:wasDerivedFrom
wikipedia-en:Woo–Lam?oldid=959909572&ns=0
dbo:wikiPageLength
3381
foaf:isPrimaryTopicOf
wikipedia-en:Woo–Lam