-
1 authentication algorithm
authentication algorithm KM A3, Authentifikationsalgorithmus m (A3 erzeugt aus der Mobilfunkteilnehmerkennung IMSI Ki und einer Zufallszahl RAND den Authentifikator SRES = A3)English-German dictionary of Electrical Engineering and Electronics > authentication algorithm
-
2 authentication algorithm
Англо-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. > authentication algorithm
-
3 authentication algorithm
Безопасность: алгоритм аутентификацииУниверсальный англо-русский словарь > authentication algorithm
-
4 authentication algorithm
Англо-русский словарь по компьютерной безопасности > authentication algorithm
-
5 authentication algorithm
algorytm uwierzytelnianiaEnglish-Polish dictionary for engineers > authentication algorithm
-
6 authentication algorithm
algorytm uwierzytelnianiaEnglish-Polish dictionary of Electronics and Computer Science > authentication algorithm
-
7 authentication algorithm
English-Russian dictionary of telecommunications and their abbreviations > authentication algorithm
-
8 data authentication algorithm
Безопасность: алгоритм аутентификации данныхУниверсальный англо-русский словарь > data authentication algorithm
-
9 message authentication algorithm
Вычислительная техника: алгоритм аутентификации сообщенийУниверсальный англо-русский словарь > message authentication algorithm
-
10 data authentication algorithm
Англо-русский словарь по компьютерной безопасности > data authentication algorithm
-
11 message authentication algorithm
= MAAEnglish-Russian electronics dictionary > message authentication algorithm
-
12 message authentication algorithm
The New English-Russian Dictionary of Radio-electronics > message authentication algorithm
-
13 message authentication algorithm
алгоритм аутентификации сообщения; алгоритм идентификации сообщенияEnglish-Russian information technology > message authentication algorithm
-
14 algorithm
алгоритм (cryptoalgorithm) криптографический алгоритм, криптоалгоритм; алгоритм шифрования (криптографического закрытия)- private cryptographic algorithmАнгло-русский словарь по компьютерной безопасности > algorithm
-
15 authentication
аутентификация, опознавание, проверка (подтверждение) подлинности1) в системе компьютерной безопасности - процесс, позволяющий установить, что пользователь или компьютер (сервер), пытающийся получить интерактивный доступ к определённой категории информации, компьютерной системе, вычислительной сети или электронной почте, действительно тот, за кого себя выдаёт. Выполняется с помощью дополнительных идентификаторов - биометрической информации, паролей, специальных карточек, цифровой подписи и др. В компьютерной системе пользователю обычно присваивается символическое имя или идентификационный код (SID), используемые в дальнейшем процедурами управления доступом (см. access control); аутентификация отличается от авторизации (authorization) тем, что не управляет предоставлением или непредоставлением права доступа к ресурсамсм. тж. authentication algorithm, authentication alias, authentication center, authentication data, authentication device, authentication level, authentication method, authentication password, authentication service, authentication token, authentication type, mutual authentication, PAP, password-based authentication, user authentication2) установление подлинности сообщения, источника (data origin authentication) и/или приёмника данныхАнгло-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. > authentication
-
16 algorithm
1) алгоритм2) правило; процедура; метод•- adaptive algorithm
- Agarval-Cooley algorithm
- aim algorithm
- annealing algorithm
- asymmetric encryption algorithm
- autoregressive algorithm
- backoff algorithm
- back propagation of error algorithm
- batch algorithm
- Bellman-Ford algorithm
- best cost path algorithm
- bisection algorithm
- branch and bound algorithm - CART algorithm
- channel algorithm
- channel routing algorithm
- Cholesky algorithm
- classification and regression tree algorithm
- clustering algorithm
- Cochran-Orcutt algorithm
- compression algorithm
- conjugate directions algorithm
- conjugate gradients algorithm
- constructive algorithm
- contour following algorithm
- control algorithm
- convolution algorithm
- Cooley-Tuckey algorithm
- cryptographic algorithm
- deflation compression algorithm
- differential synthesis algorithm
- Diffie-Hellman algorithm
- digital signal processing algorithm
- digital signature algorithm
- Dijkstra algorithm
- distance vector algorithm
- DSP algorithm
- dynamic programming algorithm
- edge-tracking algorithm
- evolutionary algorithm
- exact embedding algorithm
- expansion algorithm
- fast algorithm
- fast convolution Agarval-Cooley algorithm
- fixed-weight algorithm
- Ford-Fulkerson algorithm
- fundamental algorithm
- fuzzy algorithm
- general algorithm - greedy algorithm
- Gummel's algorithm
- hashing algorithm
- heuristic algorithm
- ID3 algorithm
- identification algorithm
- initialization algorithm
- integer algorithm - iterative dichotomizer 3 algorithm
- k-means algorithm
- learning algorithm
- least frequently used algorithm
- least recently used algorithm
- Lee-Moore algorithm
- Lee algorithm
- Lee-type algorithm
- Lempel-Ziv algorithm
- Lempel-Ziv-Welch algorithm
- Levenberg-Marquardt algorithm
- LFU algorithm
- line-probe algorithm
- link state algorithm
- LU decomposition algorithm
- LZ algorithm
- LZW algorithm
- MacQueen's k-means algorithm
- McCulloch-Pitts algorithm
- memetic algorithm - min-cut algorithm - nested algorithm
- numerical algorithm
- Oja iterative algorithm
- on-line algorithm
- optimization algorithm
- ordering algorithm
- painter's algorithm
- parallel algorithm
- pattern classification algorithm
- pattern recognition algorithm
- pel-recursive estimation algorithm
- placement algorithm
- planning algorithm
- polynomial algorithm
- predictive algorithm
- preemptive algorithm
- Prim algorithm
- production rule based algorithm
- pruning algorithm
- pseudo least recently used algorithm
- quantum search algorithm
- quick-union algorithm
- quick-union algorithm with path compression
- Q-R-algorithm
- radix sorting algorithm
- randomized algorithm
- rank algorithm
- Read-Solomon cyclic redundancy compression algorithm
- recognition algorithm
- recurrent algorithm
- recursive algorithm
- resilient propagation algorithm - routing algorithm
- Rprop algorithm
- RSA algorithm
- scheduling algorithm
- search algorithm
- search network algorithm - self-organizing algorithm
- semi-numerical algorithm
- sequential algorithm - shortest path algorithm
- sieving algorithm
- simulated annealing training algorithm
- simulation algorithm
- smoothing algorithm
- software algorithm
- spanning tree algorithm
- spline algorithm
- splitting algorithm
- stack algorithm
- statistical algorithm
- stochastic algorithm
- supervised training algorithm
- symmetric encryption algorithm
- time-wheel algorithm
- training algorithm
- universal algorithm
- unsupervised training algorithm
- van der Waerden algorithm
- variational algorithm
- vector distance algorithm
- Viterbi algorithm
- VLSI algorithm
- weighted quick-union algorithm
- working algorithm -
17 algorithm
1) алгоритм2) правило; процедура; метод•- Agarval-Cooley algorithm
- aim algorithm
- algorithm of doubtful convergence
- annealing algorithm
- asymmetric encryption algorithm
- autoregressive algorithm
- back propagation of error algorithm
- backoff algorithm
- batch algorithm
- Bellman-Ford algorithm
- best cost path algorithm
- bisection algorithm
- branch and bound algorithm
- British Telecom Lempel-Ziv algorithm
- BTLZ algorithm
- CART algorithm
- channel algorithm
- channel routing algorithm
- Cholesky algorithm
- classification and regression tree algorithm
- clustering algorithm
- Cochran-Orcutt algorithm
- compression algorithm
- conjugate directions algorithm
- conjugate gradients algorithm
- constructive algorithm
- contour following algorithm
- control algorithm
- convolution algorithm
- Cooley-Tuckey algorithm
- cryptographic algorithm
- deflation compression algorithm
- differential synthesis algorithm
- Diffie-Hellman algorithm
- digital signal processing algorithm
- digital signature algorithm
- Dijkstra algorithm
- distance vector algorithm
- DSP algorithm
- dynamic programming algorithm
- edge-tracking algorithm
- evolutionary algorithm
- exact embedding algorithm
- expansion algorithm
- fast algorithm
- fast convolution Agarval-Cooley algorithm
- fixed-weight algorithm
- Ford-Fulkerson algorithm
- fundamental algorithm
- fuzzy algorithm
- general algorithm
- genetic algorithm
- graph search algorithm
- greedy algorithm
- Gummel's algorithm
- hashing algorithm
- heuristic algorithm
- ID3 algorithm
- identification algorithm
- initialization algorithm
- integer algorithm
- international data encryption algorithm
- iterative algorithm
- iterative dichotomizer 3 algorithm
- k-means algorithm
- learning algorithm
- least frequently used algorithm
- least recently used algorithm
- Lee-algorithm
- Lee-Moore algorithm
- Lee-type algorithm
- Lempel-Ziv algorithm
- Lempel-Ziv-Welch algorithm
- Levenberg-Marquardt algorithm
- LFU algorithm
- line-probe algorithm
- link state algorithm
- LU decomposition algorithm
- LZ algorithm
- LZW algorithm
- MacQueen's k-means algorithm
- McCulloch-Pitts algorithm
- memetic algorithm
- message authentication algorithm
- metaheuristic algorithm
- min-cut algorithm
- modified Gram-Schmidt algorithm
- Nelder-Mead simplex algorithm
- nested algorithm
- numerical algorithm
- Oja iterative algorithm
- on-line algorithm
- optimization algorithm
- ordering algorithm
- painter's algorithm
- parallel algorithm
- pattern classification algorithm
- pattern recognition algorithm
- pel-recursive estimation algorithm
- placement algorithm
- planning algorithm
- polynomial algorithm
- predictive algorithm
- preemptive algorithm
- Prim algorithm
- production rule based algorithm
- pruning algorithm
- pseudo least recently used algorithm
- Q-R-algorithm
- quantum search algorithm
- quick-union algorithm with path compression
- quick-union algorithm
- radix sorting algorithm
- randomized algorithm
- rank algorithm
- Read-Solomon cyclic redundancy compression algorithm
- recognition algorithm
- recurrent algorithm
- recursive algorithm
- resilient propagation algorithm
- Rivest-Shamir-Adleman algorithm
- robust algorithm
- routing algorithm
- RProp algorithm
- RSA algorithm
- scheduling algorithm
- search algorithm
- search network algorithm
- secure hash algorithm
- selective-trace algorithm
- self-organizing algorithm
- semi-numerical algorithm
- sequential algorithm
- sequential leader clustering algorithm
- serial algorithm
- shortest path algorithm
- sieving algorithm
- simulated annealing training algorithm
- simulation algorithm
- smoothing algorithm
- software algorithm
- spanning tree algorithm
- spline algorithm
- splitting algorithm
- stack algorithm
- statistical algorithm
- stochastic algorithm
- supervised training algorithm
- symmetric encryption algorithm
- time-wheel algorithm
- training algorithm
- universal algorithm
- unsupervised training algorithm
- van der Waerden algorithm
- variational algorithm
- vector distance algorithm
- Viterbi algorithm
- VLSI algorithm
- weighted quick-union algorithm
- working algorithmThe New English-Russian Dictionary of Radio-electronics > algorithm
-
18 algorithm
= ALG II1) алгоритмматематическая функция или конечный чёткий набор описаний логической последовательности действий (правил, инструкций), необходимых для того, чтобы компьютер или интеллектуальное устройство выполнили за конечное время некоторую задачу, например, сжатие изображения, выбор оптимального маршрута пересылки пакета или шифрование данных. Алгоритм может быть описан блок-схемой. Термин происходит от имени древнеперсидского математика Мухаммеда ибн Муса аль Харезми, написавшего трактат, посвящённый алгоритмическому методу. Алгоритмы могут быть детерминированными (deterministic algorithm) или стохастическими (вероятностными) (stochastic algorithm). Детерминированный алгоритм для одинаковых наборов исходных (входных) данных даёт одинаковый результат.см. тж. algorithm design, algorithm validation, algorithmics, approximation algorithm, asymmetric algorithm, authentication algorithm, compression algorithm, computational algorithm, control algorithm, convolution algorithm, CRC algorithm, cryptoalgorithm, data-parallel algorithm, encryption algorithm, evolutionary algorithm, finite difference algorithm, flowchart, genetic algorithm, graphics algorithm, hashing algorithm, learning algorithm, matrix algorithm, Monte Carlo algorithm, Nagle algorithm, optimization algorithm, ordering algorithm, parallel algorithm, public-key algorithm, routing algorithm, scheduling algorithm, search algorithm, sequential algorithm, sort algorithm, theory of algorithms"The most fundamental concept in programming is the algorithm - a set of instructions for doing something" (Steve Lohr). — Наиболее фундаментальной концепцией в программировании является алгоритм - набор инструкций для достижения необходимого результата
2) метод, правилоАнгло-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. > algorithm
-
19 algorithm
- binary backoff algorithm
- ciphering algorithm
- coding algorithm
- enciphering algorithm
- encryption algorithm
- image understanding algorithm
- Klovsky-Nicolaev algorithm
- protection algorithm
- public-key algorithm
- reception algorithm
- recurrent algorithm
- replicate algorithm
- Rivest-Shamir-Adleman algorithm
- RSA algorithm
- shrinking algorithm
- string algorithm
- synthesized algorithm
- tandeming algorithm
- truncated algorithm
- type 3 algorithm
- type 4 algorithm
- Viterbi algorithm
- voice conversion algorithm
- weight algorithm
- zero-tree wavelet algorithmEnglish-Russian dictionary of telecommunications and their abbreviations > algorithm
-
20 authentication
E-coma software security verification procedure to acknowledge or validate the source, uniqueness, and integrity of an e-commerce message to make sure data is not being tampered with. The verification is typically achieved through the use of an electronic signature in the form of a key or algorithm that is shared by the trading partners.
См. также в других словарях:
Authentication algorithm — An ISO term. An algorithm used, together with an authentication key, and one or more authentication elements, for authentication … International financial encyclopaedia
Data Authentication Algorithm — The Data Authentication Algorithm (DAA) is a former U.S. government standard for producing cryptographic message authentication codes. According to the standard, a code produced by the DAA is called a Data Authentication Code (DAC). The algorithm … Wikipedia
Message authentication algorithm — (MAA, алгоритм аутентификации сообщений) алгоритм проверки целостности сообщения была разработана D.W. Davies и D.O. Clayden и опубликована в 1983 г. Алгоритм обеспечивает целостность сообщения, но не обеспечивает конфиденциальность. Стойкость… … Википедия
Authentication server — Authentication servers are servers that provide authentication services to users or other systems. Users and other servers authenticate to such a server, and receive cryptographic tickets. These tickets are then exchanged with one another to… … Wikipedia
Authentication key — An ISO term. A cryptographic key used for authentication. When this key and the elements to be authenticated (authentication elements) are applied to the authentication algorithm, the result will be the message authentication code (MAC) or the… … International financial encyclopaedia
MESSAGE AUTHENTICATION ALGORITHM — (MAA) алгоритм идентификации сообщенияалгоритм, используемый для проверки подлинности сообщения … Словарь электронного бизнеса
Authentication Header — IPsec im TCP/IP‑Protokollstapel: Anwendung HTTP IMAP SMTP DNS … Transport TCP UDP … Deutsch Wikipedia
Digest access authentication — HTTP Persistence · Compression · HTTPS Request methods OPTIONS · GET · HEAD · POST · PUT · DELETE · TRACE · CONNECT Header fields Cookie · ETag · Location · Referer DNT · … Wikipedia
Message Authentication Code — Ein Message Authentication Code (MAC) dient dazu, Gewissheit über den Ursprung von Daten oder Nachrichten zu erhalten und ihre Integrität zu überprüfen.[1] MAC Algorithmen erfordern zwei Eingabeparameter, erstens die zu schützenden Daten und… … Deutsch Wikipedia
Message authentication code — In cryptography, a message authentication code (often MAC) is a short piece of information used to authenticate a message. A MAC algorithm, sometimes called a keyed (cryptographic) hash function, accepts as input a secret key and an arbitrary… … Wikipedia
Time-based One-time Password Algorithm — TOTP (Time based One Time Password Algorithm, RFC 6238.) OATH алгоритм создания одноразовых паролей для защищенной аутентификации, являющийся улучшением HOTP (HMAC Based One Time Password Algorithm). Является алгоритмом односторонней… … Википедия