Browse Wiki & Semantic Web

Jump to: navigation, search
Http://dbpedia.org/resource/Closed-loop authentication
  This page has no properties.
hide properties that link here 
  No properties link to this page.
 
http://dbpedia.org/resource/Closed-loop_authentication
http://dbpedia.org/ontology/abstract Closed-loop authentication, as applied to Closed-loop authentication, as applied to computer network communication, refers to a mechanism whereby one party verifies the purported identity of another party by requiring them to supply a copy of a token transmitted to the canonical or trusted point of contact for that identity. It is also sometimes used to refer to a system of mutual authentication whereby two parties authenticate one another by signing and passing back and forth a cryptographically signed nonce, each party demonstrating to the other that they control the secret key used to certify their identity.secret key used to certify their identity.
http://dbpedia.org/ontology/wikiPageID 2211700
http://dbpedia.org/ontology/wikiPageLength 3183
http://dbpedia.org/ontology/wikiPageRevisionID 978620800
http://dbpedia.org/ontology/wikiPageWikiLink http://dbpedia.org/resource/Computer_network + , http://dbpedia.org/resource/Secret_key + , http://dbpedia.org/resource/Category:Computer_security + , http://dbpedia.org/resource/Authentication + , http://dbpedia.org/resource/Category:Computer_access_control + , http://dbpedia.org/resource/Cryptography + , http://dbpedia.org/resource/Password + , http://dbpedia.org/resource/Anonymity + , http://dbpedia.org/resource/Pseudonymity + , http://dbpedia.org/resource/Digital_identity + , http://dbpedia.org/resource/Internet_bot + , http://dbpedia.org/resource/Shared_secret + , http://dbpedia.org/resource/Cryptographic_nonce + , http://dbpedia.org/resource/Security_token + , http://dbpedia.org/resource/Information_Security +
http://dbpedia.org/property/wikiPageUsesTemplate http://dbpedia.org/resource/Template:Unreferenced + , http://dbpedia.org/resource/Template:Main +
http://purl.org/dc/terms/subject http://dbpedia.org/resource/Category:Computer_access_control +
http://www.w3.org/ns/prov#wasDerivedFrom http://en.wikipedia.org/wiki/Closed-loop_authentication?oldid=978620800&ns=0 +
http://xmlns.com/foaf/0.1/isPrimaryTopicOf http://en.wikipedia.org/wiki/Closed-loop_authentication +
owl:sameAs http://www.wikidata.org/entity/Q104840668 + , http://rdf.freebase.com/ns/m.06w7wd + , http://yago-knowledge.org/resource/Closed-loop_authentication + , https://global.dbpedia.org/id/7dGtU + , http://dbpedia.org/resource/Closed-loop_authentication +
rdfs:comment Closed-loop authentication, as applied to Closed-loop authentication, as applied to computer network communication, refers to a mechanism whereby one party verifies the purported identity of another party by requiring them to supply a copy of a token transmitted to the canonical or trusted point of contact for that identity. It is also sometimes used to refer to a system of mutual authentication whereby two parties authenticate one another by signing and passing back and forth a cryptographically signed nonce, each party demonstrating to the other that they control the secret key used to certify their identity.secret key used to certify their identity.
rdfs:label Closed-loop authentication
hide properties that link here 
http://dbpedia.org/resource/Authentication + , http://dbpedia.org/resource/Opt-in_email + , http://dbpedia.org/resource/National_Thoroughbred_Racing_Association + , http://dbpedia.org/resource/Certified_Senders_Alliance + , http://dbpedia.org/resource/Closed-loop_Authentication + http://dbpedia.org/ontology/wikiPageWikiLink
http://en.wikipedia.org/wiki/Closed-loop_authentication + http://xmlns.com/foaf/0.1/primaryTopic
http://dbpedia.org/resource/Closed-loop_authentication + owl:sameAs
 

 

Enter the name of the page to start semantic browsing from.