gptkbp:instanceOf
|
concept
|
gptkbp:category
|
key exchange protocols
authentication protocols
authorization protocols
encryption protocols
integrity protocols
|
gptkbp:example
|
gptkb:EAP
gptkb:SSL/TLS
gptkb:Kerberos
gptkb:WPA2
gptkb:IKE
gptkb:GSS-API
gptkb:IPsec
gptkb:OAuth
gptkb:OpenID_Connect
gptkb:PGP
gptkb:RADIUS
gptkb:S/MIME
gptkb:SASL
gptkb:SPNEGO
gptkb:SRTP
gptkb:DTLS
HTTPS
SSH
Diameter
|
gptkbp:goal
|
gptkb:government_agency
authentication
integrity
confidentiality
non-repudiation
|
https://www.w3.org/2000/01/rdf-schema#label
|
Security Protocols
|
gptkbp:implementedIn
|
gptkb:personal_computer
gptkb:software
|
gptkbp:relatedTo
|
cryptography
network security
|
gptkbp:requires
|
key management
cryptographic algorithms
protocol negotiation
|
gptkbp:standardizedBy
|
gptkb:IEEE
gptkb:IETF
gptkb:ISO
gptkb:ITU-T
|
gptkbp:usedFor
|
data protection
secure communication
|
gptkbp:vulnerableTo
|
man-in-the-middle attack
brute force attack
replay attack
downgrade attack
|
gptkbp:bfsParent
|
gptkb:logic
|
gptkbp:bfsLayer
|
4
|