-
1 data authentication algorithm
Безопасность: алгоритм аутентификации данныхУниверсальный англо-русский словарь > data authentication algorithm
-
2 data authentication algorithm
Англо-русский словарь по компьютерной безопасности > data authentication algorithm
-
3 algorithm
алгоритм (cryptoalgorithm) криптографический алгоритм, криптоалгоритм; алгоритм шифрования (криптографического закрытия)- private cryptographic algorithmАнгло-русский словарь по компьютерной безопасности > algorithm
-
4 authentication
аутентификация, опознавание, проверка (подтверждение) подлинности1) в системе компьютерной безопасности - процесс, позволяющий установить, что пользователь или компьютер (сервер), пытающийся получить интерактивный доступ к определённой категории информации, компьютерной системе, вычислительной сети или электронной почте, действительно тот, за кого себя выдаёт. Выполняется с помощью дополнительных идентификаторов - биометрической информации, паролей, специальных карточек, цифровой подписи и др. В компьютерной системе пользователю обычно присваивается символическое имя или идентификационный код (SID), используемые в дальнейшем процедурами управления доступом (см. access control); аутентификация отличается от авторизации (authorization) тем, что не управляет предоставлением или непредоставлением права доступа к ресурсамсм. тж. authentication algorithm, authentication alias, authentication center, authentication data, authentication device, authentication level, authentication method, authentication password, authentication service, authentication token, authentication type, mutual authentication, PAP, password-based authentication, user authentication2) установление подлинности сообщения, источника (data origin authentication) и/или приёмника данныхАнгло-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. > authentication
-
5 algorithm
1) алгоритм2) правило; процедура; метод•- adaptive algorithm
- Agarval-Cooley algorithm
- aim algorithm
- annealing algorithm
- asymmetric encryption algorithm
- autoregressive algorithm
- backoff algorithm
- back propagation of error algorithm
- batch algorithm
- Bellman-Ford algorithm
- best cost path algorithm
- bisection algorithm
- branch and bound algorithm - CART algorithm
- channel algorithm
- channel routing algorithm
- Cholesky algorithm
- classification and regression tree algorithm
- clustering algorithm
- Cochran-Orcutt algorithm
- compression algorithm
- conjugate directions algorithm
- conjugate gradients algorithm
- constructive algorithm
- contour following algorithm
- control algorithm
- convolution algorithm
- Cooley-Tuckey algorithm
- cryptographic algorithm
- deflation compression algorithm
- differential synthesis algorithm
- Diffie-Hellman algorithm
- digital signal processing algorithm
- digital signature algorithm
- Dijkstra algorithm
- distance vector algorithm
- DSP algorithm
- dynamic programming algorithm
- edge-tracking algorithm
- evolutionary algorithm
- exact embedding algorithm
- expansion algorithm
- fast algorithm
- fast convolution Agarval-Cooley algorithm
- fixed-weight algorithm
- Ford-Fulkerson algorithm
- fundamental algorithm
- fuzzy algorithm
- general algorithm - greedy algorithm
- Gummel's algorithm
- hashing algorithm
- heuristic algorithm
- ID3 algorithm
- identification algorithm
- initialization algorithm
- integer algorithm - iterative dichotomizer 3 algorithm
- k-means algorithm
- learning algorithm
- least frequently used algorithm
- least recently used algorithm
- Lee-Moore algorithm
- Lee algorithm
- Lee-type algorithm
- Lempel-Ziv algorithm
- Lempel-Ziv-Welch algorithm
- Levenberg-Marquardt algorithm
- LFU algorithm
- line-probe algorithm
- link state algorithm
- LU decomposition algorithm
- LZ algorithm
- LZW algorithm
- MacQueen's k-means algorithm
- McCulloch-Pitts algorithm
- memetic algorithm - min-cut algorithm - nested algorithm
- numerical algorithm
- Oja iterative algorithm
- on-line algorithm
- optimization algorithm
- ordering algorithm
- painter's algorithm
- parallel algorithm
- pattern classification algorithm
- pattern recognition algorithm
- pel-recursive estimation algorithm
- placement algorithm
- planning algorithm
- polynomial algorithm
- predictive algorithm
- preemptive algorithm
- Prim algorithm
- production rule based algorithm
- pruning algorithm
- pseudo least recently used algorithm
- quantum search algorithm
- quick-union algorithm
- quick-union algorithm with path compression
- Q-R-algorithm
- radix sorting algorithm
- randomized algorithm
- rank algorithm
- Read-Solomon cyclic redundancy compression algorithm
- recognition algorithm
- recurrent algorithm
- recursive algorithm
- resilient propagation algorithm - routing algorithm
- Rprop algorithm
- RSA algorithm
- scheduling algorithm
- search algorithm
- search network algorithm - self-organizing algorithm
- semi-numerical algorithm
- sequential algorithm - shortest path algorithm
- sieving algorithm
- simulated annealing training algorithm
- simulation algorithm
- smoothing algorithm
- software algorithm
- spanning tree algorithm
- spline algorithm
- splitting algorithm
- stack algorithm
- statistical algorithm
- stochastic algorithm
- supervised training algorithm
- symmetric encryption algorithm
- time-wheel algorithm
- training algorithm
- universal algorithm
- unsupervised training algorithm
- van der Waerden algorithm
- variational algorithm
- vector distance algorithm
- Viterbi algorithm
- VLSI algorithm
- weighted quick-union algorithm
- working algorithm -
6 algorithm
1) алгоритм2) правило; процедура; метод•- Agarval-Cooley algorithm
- aim algorithm
- algorithm of doubtful convergence
- annealing algorithm
- asymmetric encryption algorithm
- autoregressive algorithm
- back propagation of error algorithm
- backoff algorithm
- batch algorithm
- Bellman-Ford algorithm
- best cost path algorithm
- bisection algorithm
- branch and bound algorithm
- British Telecom Lempel-Ziv algorithm
- BTLZ algorithm
- CART algorithm
- channel algorithm
- channel routing algorithm
- Cholesky algorithm
- classification and regression tree algorithm
- clustering algorithm
- Cochran-Orcutt algorithm
- compression algorithm
- conjugate directions algorithm
- conjugate gradients algorithm
- constructive algorithm
- contour following algorithm
- control algorithm
- convolution algorithm
- Cooley-Tuckey algorithm
- cryptographic algorithm
- deflation compression algorithm
- differential synthesis algorithm
- Diffie-Hellman algorithm
- digital signal processing algorithm
- digital signature algorithm
- Dijkstra algorithm
- distance vector algorithm
- DSP algorithm
- dynamic programming algorithm
- edge-tracking algorithm
- evolutionary algorithm
- exact embedding algorithm
- expansion algorithm
- fast algorithm
- fast convolution Agarval-Cooley algorithm
- fixed-weight algorithm
- Ford-Fulkerson algorithm
- fundamental algorithm
- fuzzy algorithm
- general algorithm
- genetic algorithm
- graph search algorithm
- greedy algorithm
- Gummel's algorithm
- hashing algorithm
- heuristic algorithm
- ID3 algorithm
- identification algorithm
- initialization algorithm
- integer algorithm
- international data encryption algorithm
- iterative algorithm
- iterative dichotomizer 3 algorithm
- k-means algorithm
- learning algorithm
- least frequently used algorithm
- least recently used algorithm
- Lee-algorithm
- Lee-Moore algorithm
- Lee-type algorithm
- Lempel-Ziv algorithm
- Lempel-Ziv-Welch algorithm
- Levenberg-Marquardt algorithm
- LFU algorithm
- line-probe algorithm
- link state algorithm
- LU decomposition algorithm
- LZ algorithm
- LZW algorithm
- MacQueen's k-means algorithm
- McCulloch-Pitts algorithm
- memetic algorithm
- message authentication algorithm
- metaheuristic algorithm
- min-cut algorithm
- modified Gram-Schmidt algorithm
- Nelder-Mead simplex algorithm
- nested algorithm
- numerical algorithm
- Oja iterative algorithm
- on-line algorithm
- optimization algorithm
- ordering algorithm
- painter's algorithm
- parallel algorithm
- pattern classification algorithm
- pattern recognition algorithm
- pel-recursive estimation algorithm
- placement algorithm
- planning algorithm
- polynomial algorithm
- predictive algorithm
- preemptive algorithm
- Prim algorithm
- production rule based algorithm
- pruning algorithm
- pseudo least recently used algorithm
- Q-R-algorithm
- quantum search algorithm
- quick-union algorithm with path compression
- quick-union algorithm
- radix sorting algorithm
- randomized algorithm
- rank algorithm
- Read-Solomon cyclic redundancy compression algorithm
- recognition algorithm
- recurrent algorithm
- recursive algorithm
- resilient propagation algorithm
- Rivest-Shamir-Adleman algorithm
- robust algorithm
- routing algorithm
- RProp algorithm
- RSA algorithm
- scheduling algorithm
- search algorithm
- search network algorithm
- secure hash algorithm
- selective-trace algorithm
- self-organizing algorithm
- semi-numerical algorithm
- sequential algorithm
- sequential leader clustering algorithm
- serial algorithm
- shortest path algorithm
- sieving algorithm
- simulated annealing training algorithm
- simulation algorithm
- smoothing algorithm
- software algorithm
- spanning tree algorithm
- spline algorithm
- splitting algorithm
- stack algorithm
- statistical algorithm
- stochastic algorithm
- supervised training algorithm
- symmetric encryption algorithm
- time-wheel algorithm
- training algorithm
- universal algorithm
- unsupervised training algorithm
- van der Waerden algorithm
- variational algorithm
- vector distance algorithm
- Viterbi algorithm
- VLSI algorithm
- weighted quick-union algorithm
- working algorithmThe New English-Russian Dictionary of Radio-electronics > algorithm
-
7 algorithm
= ALG II1) алгоритмматематическая функция или конечный чёткий набор описаний логической последовательности действий (правил, инструкций), необходимых для того, чтобы компьютер или интеллектуальное устройство выполнили за конечное время некоторую задачу, например, сжатие изображения, выбор оптимального маршрута пересылки пакета или шифрование данных. Алгоритм может быть описан блок-схемой. Термин происходит от имени древнеперсидского математика Мухаммеда ибн Муса аль Харезми, написавшего трактат, посвящённый алгоритмическому методу. Алгоритмы могут быть детерминированными (deterministic algorithm) или стохастическими (вероятностными) (stochastic algorithm). Детерминированный алгоритм для одинаковых наборов исходных (входных) данных даёт одинаковый результат.см. тж. algorithm design, algorithm validation, algorithmics, approximation algorithm, asymmetric algorithm, authentication algorithm, compression algorithm, computational algorithm, control algorithm, convolution algorithm, CRC algorithm, cryptoalgorithm, data-parallel algorithm, encryption algorithm, evolutionary algorithm, finite difference algorithm, flowchart, genetic algorithm, graphics algorithm, hashing algorithm, learning algorithm, matrix algorithm, Monte Carlo algorithm, Nagle algorithm, optimization algorithm, ordering algorithm, parallel algorithm, public-key algorithm, routing algorithm, scheduling algorithm, search algorithm, sequential algorithm, sort algorithm, theory of algorithms"The most fundamental concept in programming is the algorithm - a set of instructions for doing something" (Steve Lohr). — Наиболее фундаментальной концепцией в программировании является алгоритм - набор инструкций для достижения необходимого результата
2) метод, правилоАнгло-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. > algorithm
-
8 DAA
-
9 DPA
1) Морской термин: Назначенное лицо компании (Designated Person Ashore - DPA)2) Военный термин: Daily Plan Of Action, Data Processing Activities, Defense Procurement Agency, Defense Production Act, Defense Production Administration, data processing agency, data processing area3) Техника: data processing algorithm, data processing assembly, displacements per atom, dynamic-pointer array4) Сокращение: Defence Procurement Agency (UK), Defense Production Act (USA), Delegation of Procurement Authority, Discharged Prisoners Association, докозапентаеновая кислота (Docosapentaenoic acid)5) Физика: разрушающий физический анализ, РФА6) Электроника: Destructive Physical Analysis, Displacement Per Atom, Distributed Power Architecture7) Вычислительная техника: Demand Priority Architecture, Distributed Password Authentication, Document Printing Application, data processing automation8) Биохимия: docosapentaenoic acid9) Пищевая промышленность: Draft Pale Ale10) Фирменный знак: Deer Park Ave11) Сетевые технологии: Demand Priority Access, Demand Protocol Architecture12) Полимеры: diphenylamine13) Химическое оружие: drum preparation area14) Безопасность: Data Privacy Algorithm15) Расширение файла: Document Printing Architecture, Demand Protocol Architecture (3Com)16) Майкрософт: распределенное подтверждение паролей17) ООН: Department of Political Affairs18) Должность: District Publicity Assistant19) Аэропорты: West Chicago, Illinois USA20) Единицы измерений: Defense Per Acre -
10 MDA
1) Компьютерная техника: Machine Data Acquisition, Mobile Digital Assistant, Modifiable Data Area, Monochrome Display Adaptor, Multi Dimensional Archive, адаптер монохромного дисплея3) Военный термин: Malicious Damage Act, Medical Defence Australia, Medical Digital Assistant, Missile Defense Act, Missile Defense Act of 1991, Multinational Deployment Agency, Mutual Defense Agency, maintenance data analysis, maintenance depot assistance, material disposal authority, milestone decision authority, military damage assessment, minimum detectable amount, miss distance analyzer, mobile depot activities, mutual defense assistance4) Техника: 5, 5-methylene disalicylic acid, multidimensional array5) Сельское хозяйство: Manitoba Department Of Agriculture6) Химия: малондиальдегид, малоновый диальдегид7) Горное дело: соглашение об освоении рудного месторождения ((mineral Development agreement) http://www.molme.gov.lr/press.php?news_id=5)8) Телекоммуникации: Model Driven Architecture9) Сокращение: MacDonald Dettweiler Associates (Canada), Mailpiece Design Analyst, Maintenance Data Station, Manufacturing Defects Analyzer, Mine Danger Area, Minimum Descent Altitude, Miss Distance Analyser, Missile Defense Act of 1991 (USA), Mobile Depot Activity, Multiple Docking Adapter10) Физиология: Methylene Dioxy Amphetamine, Minimum Detectable Activity11) Электроника: Multiple Diode Array12) Сленг: метил диамфетамин, стимулянт, имеющий действие, сходное с ЛСД13) Вычислительная техника: media dependent adapter, mirrored disk array, modulation domain analysis, mono display adapter, multidimensional analysis, видеографический стандарт MDA, монохромный дисплейный адаптер, Model Driven Architecture (CASE, OMG), Medicated Digest Authentication (HTTP), Monochrome Display Adapter (IBM, PC), (monochrome display adapter) адаптер монохромного дисплея14) Нефть: main distribution assembly15) Иммунология: MethyleneDiAniline16) Биотехнология: Multiple Displacement Amplification17) Воздухоплавание: McDonnell Douglas Aeronautics18) Фирменный знак: Mcdonnell Douglas Aerospace, Missouri Dental Advocates, Music Direct Australia19) Деловая лексика: Market Development Agreement20) Сетевые технологии: Mail Delivery Agent, Message Delivery Area, Multiple Device Access21) Полимеры: methyldisalicylic acid, methylene dianiline22) Автоматика: Автоматический режим с ручным вводом данных23) Океанография: Mesocyclone Detection Algorithm24) Медицинская техника: Агентство по медицинскому оборудованию (Medical Device Agency)25) Химическое оружие: Munition Disassembly Area [PBCDF only]26) Авиационная медицина: minimum decision altitude27) Расширение файла: Microsoft Access Add-in, Model Drive Architecture, Monochrome Display Adapter, Multi Dimensional Access, Multi Dimensional Array28) Наркотики: 3, 4-метиленэдиоксиоамфетамин (психоактивное вещество амфетаминового ряда.)29) Майкрософт: модельно-зависимая/обусловленная архитектура30) Общественная организация: Muscular Dystrophy Association31) NYSE. Media Arts Group, Inc.32) Программное обеспечение: Media Development Authority
См. также в других словарях:
Data Authentication Algorithm — The Data Authentication Algorithm (DAA) is a former U.S. government standard for producing cryptographic message authentication codes. According to the standard, a code produced by the DAA is called a Data Authentication Code (DAC). The algorithm … Wikipedia
International Data Encryption Algorithm — IDEA An encryption round of IDEA General Designers Xuejia Lai and James Massey … Wikipedia
Data Encryption Standard — The Feistel function (F function) of DES General Designers IBM First publis … Wikipedia
Authentication Header — IPsec im TCP/IP‑Protokollstapel: Anwendung HTTP IMAP SMTP DNS … Transport TCP UDP … Deutsch Wikipedia
Message authentication code — In cryptography, a message authentication code (often MAC) is a short piece of information used to authenticate a message. A MAC algorithm, sometimes called a keyed (cryptographic) hash function, accepts as input a secret key and an arbitrary… … Wikipedia
Message Authentication Code — Ein Message Authentication Code (MAC) dient dazu, Gewissheit über den Ursprung von Daten oder Nachrichten zu erhalten und ihre Integrität zu überprüfen.[1] MAC Algorithmen erfordern zwei Eingabeparameter, erstens die zu schützenden Daten und… … Deutsch Wikipedia
Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in … Wikipedia
Chip Authentication Program — A GemAlto EZIO CAP Device Whitelabeled as Barclays PINSentry The Chip Authentication Program (CAP) is a MasterCard initiative and technical specification for using EMV banking smartcards for authenticating users and transactions in online and… … Wikipedia
CAVE-based Authentication — Articleissues context = September 2008 deadend = September 2008 intromissing = September 2008 jargon = September 2008 unreferenced = September 2008 wikify = September 2008 CAVE based Authentication a.k.a. HLR Authentication, 2G Authentication,… … Wikipedia
Challenge-response authentication — For the spam filtering technique, see Challenge response spam filtering. For other uses, see CRAM (disambiguation). In computer security, challenge response authentication is a family of protocols in which one party presents a question (… … Wikipedia
New Data Seal — General First published 1975 Derived from Lucifer Cipher detail Key sizes 2048 bits Block sizes 128 bits Structure … Wikipedia