. . . . "959909572"^^ . . . . . . . "In cryptography, Woo\u2013Lam refers to various computer network authentication protocols designed by Simon S. Lam and Thomas Woo. The protocols enable two communicating parties to authenticate each other's identity and to exchange session keys, and involve the use of a trusted key distribution center (KDC) to negotiate between the parties. Both symmetric-key and public-key variants have been described. However, the protocols suffer from various security flaws, and in part have been described as being inefficient compared to alternative authentication protocols."@en . "In cryptography, Woo\u2013Lam refers to various computer network authentication protocols designed by Simon S. Lam and Thomas Woo. The protocols enable two communicating parties to authenticate each other's identity and to exchange session keys, and involve the use of a trusted key distribution center (KDC) to negotiate between the parties. Both symmetric-key and public-key variants have been described. However, the protocols suffer from various security flaws, and in part have been described as being inefficient compared to alternative authentication protocols."@en . "\u041F\u0440\u043E\u0442\u043E\u043A\u043E\u043B \u0412\u0443 \u2014 \u041B\u0430\u043C\u0430"@ru . . . . "\u041F\u0440\u043E\u0442\u043E\u043A\u043E\u043B \u0412\u0443 \u2014 \u041B\u0430\u043C\u0430 \u2014 \u043F\u0440\u043E\u0442\u043E\u043A\u043E\u043B \u0430\u0443\u0442\u0435\u043D\u0442\u0438\u0444\u0438\u043A\u0430\u0446\u0438\u0438 \u0438 \u043E\u0431\u043C\u0435\u043D\u0430 \u043A\u043B\u044E\u0447\u0430\u043C\u0438. \u041A\u0430\u043A \u0438 \u0432 \u0441\u043B\u0443\u0447\u0430\u0435 \u043F\u0440\u043E\u0442\u043E\u043A\u043E\u043B\u0430 DASS \u043F\u0440\u043E\u043C\u0435\u0436\u0443\u0442\u043E\u0447\u043D\u0430\u044F \u0441\u0442\u043E\u0440\u043E\u043D\u0430 \u2014 \u0422\u0440\u0435\u043D\u0442 \u2014 \u043F\u043E\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u0442 \u0431\u0430\u0437\u0443 \u0434\u0430\u043D\u043D\u044B\u0445 \u0432\u0441\u0435\u0445 \u043A\u043B\u044E\u0447\u0435\u0439."@ru . . . . . "3381"^^ . . "Il protocollo Woo-Lam rappresenta un protocollo di comunicazione progettato per permettere comunicazioni cifrate su reti non sicure. Questo fu dovuto a e nella met\u00E0 degli anni ottanta. Il protocollo si basa su due concetti: \n* Uso della crittografia simmetrica, quindi di un'unica chiave per la fase di codifica e decodifica; \n* Uso del TTP (Trusted Third Party), ossia un organo fidato che contiene tutte le chiavi degli utenti che vogliono effettuare le comunicazioni."@it . . "Protocollo Woo-Lam"@it . . . . . . . . . . . . . "Il protocollo Woo-Lam rappresenta un protocollo di comunicazione progettato per permettere comunicazioni cifrate su reti non sicure. Questo fu dovuto a e nella met\u00E0 degli anni ottanta. Il protocollo si basa su due concetti: \n* Uso della crittografia simmetrica, quindi di un'unica chiave per la fase di codifica e decodifica; \n* Uso del TTP (Trusted Third Party), ossia un organo fidato che contiene tutte le chiavi degli utenti che vogliono effettuare le comunicazioni."@it . "31722495"^^ . "\u041F\u0440\u043E\u0442\u043E\u043A\u043E\u043B \u0412\u0443 \u2014 \u041B\u0430\u043C\u0430 \u2014 \u043F\u0440\u043E\u0442\u043E\u043A\u043E\u043B \u0430\u0443\u0442\u0435\u043D\u0442\u0438\u0444\u0438\u043A\u0430\u0446\u0438\u0438 \u0438 \u043E\u0431\u043C\u0435\u043D\u0430 \u043A\u043B\u044E\u0447\u0430\u043C\u0438. \u041A\u0430\u043A \u0438 \u0432 \u0441\u043B\u0443\u0447\u0430\u0435 \u043F\u0440\u043E\u0442\u043E\u043A\u043E\u043B\u0430 DASS \u043F\u0440\u043E\u043C\u0435\u0436\u0443\u0442\u043E\u0447\u043D\u0430\u044F \u0441\u0442\u043E\u0440\u043E\u043D\u0430 \u2014 \u0422\u0440\u0435\u043D\u0442 \u2014 \u043F\u043E\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u0442 \u0431\u0430\u0437\u0443 \u0434\u0430\u043D\u043D\u044B\u0445 \u0432\u0441\u0435\u0445 \u043A\u043B\u044E\u0447\u0435\u0439."@ru . . . . "Woo\u2013Lam"@en . . . .