Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Install
Faster access than browser!
 

Near-field communication and Transport Layer Security

Shortcuts: Differences, Similarities, Jaccard Similarity Coefficient, References.

Difference between Near-field communication and Transport Layer Security

Near-field communication vs. Transport Layer Security

Near-field communication (NFC) is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4 cm (1.6 in) of each other. Transport Layer Security (TLS) – and its predecessor, Secure Sockets Layer (SSL), which is now deprecated by the Internet Engineering Task Force (IETF) – are cryptographic protocols that provide communications security over a computer network.

Similarities between Near-field communication and Transport Layer Security

Near-field communication and Transport Layer Security have 14 things in common (in Unionpedia): Android (operating system), Apple Inc., Communication protocol, Cryptographic protocol, Data transmission, Free and open-source software, Google, Man-in-the-middle attack, Microsoft, Transport layer, Transport Layer Security, Visa Inc., Windows 8, Windows Phone 8.

Android (operating system)

Android is a mobile operating system developed by Google, based on a modified version of the Linux kernel and other open source software and designed primarily for touchscreen mobile devices such as smartphones and tablets.

Android (operating system) and Near-field communication · Android (operating system) and Transport Layer Security · See more »

Apple Inc.

Apple Inc. is an American multinational technology company headquartered in Cupertino, California, that designs, develops, and sells consumer electronics, computer software, and online services.

Apple Inc. and Near-field communication · Apple Inc. and Transport Layer Security · See more »

Communication protocol

In telecommunication, a communication protocol is a system of rules that allow two or more entities of a communications system to transmit information via any kind of variation of a physical quantity.

Communication protocol and Near-field communication · Communication protocol and Transport Layer Security · See more »

Cryptographic protocol

A security protocol (cryptographic protocol or encryption protocol) is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods, often as sequences of cryptographic primitives.

Cryptographic protocol and Near-field communication · Cryptographic protocol and Transport Layer Security · See more »

Data transmission

Data transmission (also data communication or digital communications) is the transfer of data (a digital bitstream or a digitized analog signal) over a point-to-point or point-to-multipoint communication channel.

Data transmission and Near-field communication · Data transmission and Transport Layer Security · See more »

Free and open-source software

Free and open-source software (FOSS) is software that can be classified as both free software and open-source software.

Free and open-source software and Near-field communication · Free and open-source software and Transport Layer Security · See more »

Google

Google LLC is an American multinational technology company that specializes in Internet-related services and products, which include online advertising technologies, search engine, cloud computing, software, and hardware.

Google and Near-field communication · Google and Transport Layer Security · See more »

Man-in-the-middle attack

In cryptography and computer security, a man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.

Man-in-the-middle attack and Near-field communication · Man-in-the-middle attack and Transport Layer Security · See more »

Microsoft

Microsoft Corporation (abbreviated as MS) is an American multinational technology company with headquarters in Redmond, Washington.

Microsoft and Near-field communication · Microsoft and Transport Layer Security · See more »

Transport layer

In computer networking, the transport layer is a conceptual division of methods in the layered architecture of protocols in the network stack in the Internet Protocol Suite and the OSI model.

Near-field communication and Transport layer · Transport Layer Security and Transport layer · See more »

Transport Layer Security

Transport Layer Security (TLS) – and its predecessor, Secure Sockets Layer (SSL), which is now deprecated by the Internet Engineering Task Force (IETF) – are cryptographic protocols that provide communications security over a computer network.

Near-field communication and Transport Layer Security · Transport Layer Security and Transport Layer Security · See more »

Visa Inc.

Visa Inc. (also known as Visa, stylized as VISA) is an American multinational financial services corporation headquartered in Foster City, California, United States.

Near-field communication and Visa Inc. · Transport Layer Security and Visa Inc. · See more »

Windows 8

Windows 8 is a personal computer operating system developed by Microsoft as part of the Windows NT family of operating systems.

Near-field communication and Windows 8 · Transport Layer Security and Windows 8 · See more »

Windows Phone 8

Windows Phone 8 is the second generation of the Windows Phone mobile operating system from Microsoft.

Near-field communication and Windows Phone 8 · Transport Layer Security and Windows Phone 8 · See more »

The list above answers the following questions

Near-field communication and Transport Layer Security Comparison

Near-field communication has 153 relations, while Transport Layer Security has 347. As they have in common 14, the Jaccard index is 2.80% = 14 / (153 + 347).

References

This article shows the relationship between Near-field communication and Transport Layer Security. To access each article from which the information was extracted, please visit:

Hey! We are on Facebook now! »