security protocol

collocation in English

meaningsofsecurityandprotocol

These words are often used together. Click on the links below to explore the meanings. Or,see other collocations withprotocolorsecurity.
security
noun
uk
/sɪˈkjʊə.rə.ti/
us
/səˈkjʊr.ə.t̬i/
protection of a person, building, organization, or country against threats such as crime or attacks by ...
See more atsecurity
protocol
noun
uk
/ˈprəʊ.tə.kɒl/
us
/ˈproʊ.t̬ə.kɑːl/
the system of rules and acceptable behaviour used at official ceremonies ...
See more atprotocol

(Definition ofsecurityandprotocolfrom theCambridge English Dictionary© Cambridge University Press)

Examplesofsecurity protocol

These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
Relating multiset rewriting and process algebras forsecurityprotocolanalysis.
From theCambridge English Corpus
As the size of the system increases, so does the demand for communication and processing resources, especially when thesecurityprotocolis based on public key encryption.
From theCambridge English Corpus
Last week, thesecurityprotocolthat allowed the army to intervene without authorisation in the case of security threats was annulled.
FromEuroparl Parallel Corpus - English
The school'ssecurityprotocolhad recently been upgraded, requiring visitors to be individually admitted after visual and identification review by video monitor.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Some of these devices support thesecurityprotocolonly after a firmware upgrade.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
He also ordered a review of thesecurityprotocol.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Combining cryptographic primitives to make asecurityprotocolis itself an entire specialization.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Why such a blatant violation of normalsecurityprotocolis not punished is not explained.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Generally, such an assessment has made use of security protocols in the past (to confirm the credentials of the client component).
From theCambridge English Corpus
Some important examples are memory pointers in imperative languages, identifiers in concurrent programming languages, and nonces in security protocols.
From theCambridge English Corpus
Secrecy by typing in security protocols.
From theCambridge English Corpus
Undecidability of bounded security protocols.
From theCambridge English Corpus
Thanks to strict safety and security protocols, as well as the excellence of the workers, many of whom are our constituents, we have not had any incidents.
From the
Hansard archive
Example from the Hansard archive. Contains Parliamentary information licensed under theOpen Parliament Licence v3.0
For some time now he has been specializing in cryptography and security protocols.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
This is an implementation strategy, required for scalability, and interaction with standard web security protocols.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
This is extremely useful to validate security protocols and critical code.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
Want to learn more?
Go to the definition ofsecurity
Go to the definition ofprotocol
See other collocations withprotocol
See other collocations withsecurity