-
1 cryptographic model
Безопасность: модель криптоалгоритма, модель криптосистемы -
2 cryptographic model
Англо-русский словарь по компьютерной безопасности > cryptographic model
-
3 model
-
4 модель криптоалгоритма
Security: cryptographic modelУниверсальный русско-английский словарь > модель криптоалгоритма
-
5 модель криптосистемы
Security: cryptographic modelУниверсальный русско-английский словарь > модель криптосистемы
-
6 system
1) система || системный3) вчт операционная система; программа-супервизор5) вчт большая программа6) метод; способ; алгоритм•system halted — "система остановлена" ( экранное сообщение об остановке компьютера при наличии серьёзной ошибки)
- CPsystem- H-system- h-system- hydrogen-air/lead battery hybrid system- Ksystem- Lsystem- L*a*b* system- master/slave computer system- p-system- y-system- Δ-system -
7 security
1) защита; защищённость, безопасностьсвойства ПО и аппаратного обеспечения, обеспечивающие предотвращение несанкционированного доступа (случайного или намеренного) к программам и даннымсм. тж. A1 security, access control, authorization, communication security, computer security, content security software, crimeware, cryptographic security, data security, emission security, information security, Internet security, login security, network security, physical security, proactive security, security administrator, security agent security architecture, security audit, security breach, security certification, security context, security erase, security evaluation, security hole, security kernel, security log, security management, security model, security patch, security perimeter, security policy, security protocol, security scanner, security service, security solution, security technology, security testing, security threat, security tools, security vulnerability, traffic-flow security, transmission security, Web securityсм. тж. security audit, security certification, security management, security policy, wireless security3) секретность, конфиденциальность, защищённость"Neither the first Ethernet local area network nor the first Internet computer networks were built with privacy or security in mind" (Т. Shimomura). — При разработке как первой локальной сети Ethernet, так и первых компьютерных сетей Интернета о проблемах защищённости персональных данных и безопасности практически не думали
Англо-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. > security
-
8 board
комитет; совет; комиссия; планшет; доска; пульт; борт; совершать посадку (на) ; садиться (напр. на корабль, машину) ; разг. «комиссовать, увольнять по состоянию здоровья; пропускать через комиссию; см. тж. committeeArmy (Central) Physical Evaluation board — (центральная) комиссия СВ по оценке уровня физической подготовки ЛС
Army Airborne, Electronics and Special Warfare board — комитет СВ по авиационным бортовым электронным системам и специальным методам ведения боевых действий
— on board— target status board
См. также в других словарях:
Cryptographic protocol — A security protocol (cryptographic protocol or encryption protocol) is an abstract or concrete protocol that performs a security related function and applies cryptographic methods. A protocol describes how the algorithms should be used. A… … Wikipedia
Dolev-Yao model — The Dolev Yao model is a formal model used to prove properties of interactive protocols. Contents 1 The network 2 The adversary 3 The algebraic model 4 See also … Wikipedia
Standard Model (cryptography) — In cryptography the standard model is the model of computation in which the adversary is only limited by the amount of time and computational power available. Other names used are bare model and plain model.Cryptographic schemes are usually based … Wikipedia
Dolev-Yao threat model — The Dolev Yao model represents an attacker that can overhear, intercept, and synthesise any message and is only limited by the constraints of the cryptographic methods used. In other words: the attacker carries the message. This omnipotence has… … Wikipedia
OSI model — 7. Application layer NNTP · SIP · SSI · DNS · FTP · Gopher · … Wikipedia
Common reference string model — In cryptography, the common reference string (CRS) model captures the assumption that a trusted setup in which all involved parties get access to the same string crs taken from some distribution D exists. Schemes proven secure in the CRS model… … Wikipedia
Key server (cryptographic) — In computer security, a key server is a computer mdash; typically running special software mdash; which provides cryptographic keys to users or other programs. The users programs can be working on the same network as the key server or on another… … Wikipedia
Attack model — Attack models or attack typesref|secondname specify how much information a cryptanalyst has access to when cracking an encrypted message. Some common attack models are: *Ciphertext only attack *Known plaintext attack *Chosen plaintext attack… … Wikipedia
Enigma machine — Military Enigma machine … Wikipedia
Microsoft CryptoAPI — The Cryptographic Application Programming Interface (also known variously as CryptoAPI, Microsoft Cryptography API, MS CAPI or simply CAPI) is an application programming interface included with Microsoft Windows operating systems that provides… … Wikipedia
Digital signature — This article is about secure cryptographic signatures. For simple signatures in digital form, see Electronic signature. A digital signature or digital signature scheme is a mathematical scheme for demonstrating the authenticity of a digital… … Wikipedia