Help


[permalink] [id link]
+
Page "SILC (protocol)" ¶ 2
from Wikipedia
Edit
Promote Demote Fragment Fix

Some Related Sentences

SILC and protocol
SILC ( protocol ) •
* SILC ( protocol ) ( Secure Internet Live Conferencing ), a protocol that provides secure conferencing services over the Internet
SILC ( Secure Internet Live Conferencing protocol ) is a protocol that provides secure synchronous conferencing services ( very much like IRC ) over the Internet.
The SILC protocol can be divided in three main parts: SILC Key Exchange ( SKE ) protocol, SILC Authentication protocol and SILC Packet protocol.
The SILC protocol uses this to overcome nickname collision, a problem present in many other protocols.

SILC and are
However, SILC nicknames, in contrast to many other protocols ( e. g. IRC ), are not unique ; a user is able to use any nickname, even if one is already in use.
All messages sent in a SILC network are binary, allowing them to contain any type of data, including text, video, audio, and other multimedia data.
SILC channels ( groups ) are protected by using symmetric channel keys.
Private messages between users in a SILC network are protected with session keys.
When messages are secured with key material generated with the SKE protocol or previously agreed upon key material ( for example, passphrases ) SILC provides security even when the SILC server may be compromised.
At present time, there are several clients, the most advanced being the official SILC client and an irssi plugin.
As described in the SILC FAQ, chats are secured through the generation of symmetric encryption keys.

SILC and used
The SKE protocol is used to establish session key and other security parameters for protecting the SILC Packet protocol.
Colloquy is an open-source IRC, SILC, ICB and XMPP client for Mac OS X. Colloquy uses its own core, known as Chat Core, although in the past it used Irssi as its IRC protocol engine.

SILC and .
Shanghai University has a campus in downtown Jiading, which is where SILC is based.
* EU-SILC or SILC, EU Statistics on Income and Living Conditions, a co-ordinated system of surveys conducted in EU member states, Iceland, Switzerland, Norway and Turkey.
SILC provides channels ( groups ), nicknames, private messages, and other common features.
The SILC Authentication protocol is performed after successful SKE protocol execution to authenticate a client and / or a server.
The authentication may be based on passphrase or on digital signatures, and if successful gives access to the relevant SILC network.
The SILC Packet protocol is intended to be a secure binary packet protocol, assuring that the content of each packet ( consisting of a packet header and packet payload ) is secured and authenticated.
SILC was designed by Pekka Riikonen between 1996 and 1999 and first released in public in summer 2000.

protocol and additionally
The ISO equivalent protocol to X. 25, ISO 8208, is compatible with X. 25, but additionally includes provision for two X. 25 DTEs to be directly connected to each other with no network in between.
The Split multi-link trunking ( SMLT ) protocol allows multiple Ethernet links to be split across multiple switches in a stack, preventing any single point of failure, and additionally allowing all switches to be load balanced across multiple aggregation switches from the single access stack.

protocol and defines
It defines the DNS protocol, a detailed specification of the data structures and communication exchanges used in DNS, as part of the Internet Protocol Suite.
The APN defines the services such as wireless application protocol ( WAP ) access, short message service ( SMS ), multimedia messaging service ( MMS ), and for Internet communication services such as email and World Wide Web access.
Typically this means that they are packaged with the kernel in the boot image, and the kernel supports a bootstrap protocol that defines how the drivers are located and started ; this is the traditional bootstrap procedure of L4 microkernels.
The SCSI protocol defines communication from host to host, host to a peripheral device, peripheral device to a peripheral device.
This XML based protocol consists of three parts: an envelope, which defines what is in the message and how to process it, a set of encoding rules for expressing instances of application-defined datatypes, and a convention for representing procedure calls and responses.
The BGP protocol defines the messages that each peer should exchange in order to change the session from one state to another.
ITU-T defines a virtual terminal protocol based on the OSI application layer protocols.
X. 75, a very similar protocol to X. 25, defines the interface between two X. 25 networks to allow connections to traverse two or more networks.
The NFSv4. 1 protocol defines a method of separating the filesystem meta-data from the location of the file data ; it goes beyond the simple name / data separation by striping the data amongst a set of data servers.
The I. 430 protocol defines 48-bit packets comprising 16 bits from the B1 channel, 16 bits from B2 channel, 4 bits from the D channel, and 12 bits used for synchronization purposes.
The standards document that defines the FOSSIL protocol is maintained by the Fidonet Technical Standards Committee.
The NMEA 0183 standard uses a simple ASCII, serial communications protocol that defines how data is transmitted in a " sentence " from one " talker " to multiple " listeners " at a time.
* WS-Discovery-a technical specification that defines a multicast discovery protocol to locate services on a local network.
* Hague Convention ( III ) in 1907 defines the protocol for starting hostilities
The DCC protocol defines signal levels and timings on the track.
Draft 05 of the IETF Internet Draft defines version 5 of the protocol.
The Advanced Message Queuing Protocol ( AMQP ) is an emerging standard that defines the protocol and formats used in the messaging server and client, so implementations are interoperable.
ISO / IEC 7816-3 defines the transmission protocol between chip cards and readers.
W-CDMA has been developed into a complete set of specifications, a detailed protocol that defines how a mobile phone communicates with the tower, how signals are modulated, how datagrams are structured, and system interfaces are specified allowing free competition on technology elements.
FIPA defines markup for interaction protocol diagrams and several standard interaction protocols, including Dutch auction, English auction and reply-response.
Like RCP, there is no RFC that defines the specifics of the protocol.
The WS-RM protocol defines and supports a number of Delivery Assurances.
The FIX protocol defines meanings for most TAGs, but leaves a range of TAGs reserved for private use between consenting parties.
The FIX protocol also defines sets of fields that make a particular message, within the set of fields some will be mandatory and others optional.
The BACnet protocol defines a number of services that are used to communicate between building devices.

1.159 seconds.