- Working Key Encryption Key
- Security: WKEK
Универсальный русско-английский словарь. Академик.ру. 2011.
Универсальный русско-английский словарь. Академик.ру. 2011.
Key server (cryptographic) — In computer security, a key server is a computer mdash; typically running special software mdash; which provides cryptographic keys to users or other programs. The users programs can be working on the same network as the key server or on another… … Wikipedia
Related-key attack — In cryptography, a related key attack is any form of cryptanalysis where the attacker can observe the operation of a cipher under several different keys whose values are initially unknown, but where some mathematical relationship connecting the… … Wikipedia
Data Encryption Standard — The Feistel function (F function) of DES General Designers IBM First publis … Wikipedia
Disk encryption theory — Disk encryption is a special case of data at rest protection when the storage media is a sector addressable device (e.g., a hard disk). This article presents cryptographic aspects of the problem. For discussion of different software packages and… … Wikipedia
Public key infrastructure — In cryptography, a public key infrastructure (PKI) is an arrangement that binds public keys with respective user identities by means of a certificate authority (CA). The user identity must be unique for each CA. The binding is established through … Wikipedia
Certificate-based encryption — is a system in which a certificate authority uses ID based cryptography to produce a certificate. This system gives the users both implicit and explicit certification, the certificate can be used as a conventional certificate (for signatures, etc … Wikipedia
RSA Secret-Key Challenge — The RSA Secret Key Challenge was a series of cryptographic contests that were started by RSA Laboratories on January 28, 1997 with the intent of helping to demonstrate the relative security of different encryption algorithms. The RSA Secret Key… … Wikipedia
Password-authenticated key agreement — In cryptography, a password authenticated key agreement method is an interactive method for two or more parties to establish cryptographic keys based on one or more party s knowledge of a password. Contents 1 Types 2 Brief history 3 See also … Wikipedia
Simple Key-Management for Internet Protocol — or SKIP is a protocol developed by the IETF Security Working Group for the sharing of encryption keys.Skip is hybrid Key distribution protocol Simple Key Management for Internet Protocols (SKIP) is similar to SSL, except that it requires no prior … Wikipedia
WKEK — Working Key Encryption Key (Computing » Security) … Abbreviations dictionary
Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer. The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… … Universalium