DBpedia – Linked Data Fragments

DBpedia 2016-04

Query DBpedia 2016-04 by triple pattern

Matches in DBpedia 2016-04 for { ?s ?p "Key authentication is used to solve the problem of authenticating the keys of the person (say \"person B\") to whom some other person (\"person A\") is talking to or trying to talk to. In other words, it is the process of assuring that the key of \"person A\" held by \"person B\" does in fact belong to \"person A\" and vice versa.This is usually done after the keys have been shared among the two sides over some secure channel, although some of the algorithms share the keys at the time of authentication also.The simplest solution for this problem is for the two users concerned to meet face-to-face and exchange keys. However, for systems in which there are a large number of users or in which the users do not personally know each other (e.g., Internet shopping) this is not practical. There are various algorithm for both symmetric keys and asymmetric public key cryptography to solve this problem."@en }

Showing triples 1 to 1 of 1 with 100 triples per page.