-
1 dynamic password
Безопасность: динамический пароль, одноразовый пароль, разовый пароль -
2 dynamic password
динамический пароль; одноразовый парольАнгло-русский словарь по компьютерной безопасности > dynamic password
-
3 password
пароль; персональная информация аутентификацииАнгло-русский словарь по компьютерной безопасности > password
-
4 device
прибор; аппарат; устройство; (техническое) средство- wireless bugging device -
5 system
- computationally secure system- abuse-free system- algebraic code system- analog system- asymmetric system- asymmetric key system- authentication/secrecy system- binary system- block system- broadcast system- broadcasting system- cipher-feedback system- classical system- common-key system- communication system- compromised system- computationally secure system- conference system- conventional system- DES-based system- DES-like system- deterministic system- DH system- Diffie and Hellman system- discrete-exponentiation system- discrete log system- E3 system- effectively unbreakable system- elliptic curve system- endomorphic system- end-to-end encryption system- error propagating system- factorization system- finite system- finite automation system- Galois field system- general system- generalized system- Goppa-code system- hardware-implemented system- hidden key system- high-grade system- high-speed system- hybrid public-secret key system- hybrid stream/block system- identity-based system- system immune to cryptoanalysis- indecipherable system- intractable system- iterated system- key escrow system- keyed system- key escrow system- key-minimal system- knapsack-based system- knapsack public key system- matrix system- McEliece' system- Merkle-Hellman system- MH system- microprocessor based system- minuend system- multiple access system- multiple destination system- multiplicative knapsack system- network system- non-linear system- number theoretic system- one-key system- one-master-key system- one-time-key system- one-time-pad system- one-time-tape system- perfect secrecy system- practical security system- private key system- proprietary system- public key system- public key distribution system- public key signature system- rapid system- reciprocal number system- residue system- Rivest-Shamir-Adleman system- rotor system- RSA public key system- r-th residue system- secret-key system- secure system- shared key system- shift register system- single-key system- sophisticated system- split key system- strong system- subtractive system- symmetric system- theoretically unbreakable system- threshold system- transposition system- trap-door-knapsack public key system- transient key system- threshold system- two-key system- unbreakable system- voice system -
6 protocol
- analog networking protocol - cache coherence protocol
- card isolation protocol - character count protocol - cryptographic protocol
- data compression protocol - digital voice messaging networking protocol - error-correction protocol - interior gateway protocol
- interior gateway routing protocol
- internal message protocol
- Internet protocol
- internet protocol
- Internet control message protocol
- internet control message protocol
- Internet gateway routing protocol - IP multicast protocol - link access protocol-digital
- link access protocol for modems - packetized ensemble protocol
- password authentication protocol
- point to point protocol
- point to point multi-link protocol
- point to point tunneling protocol - routing information protocol
- SCSI interlocked protocol - session protocol
- session initiation protocol - stated protocol
- stateful protocol
- stateless protocol
- synchronous protocol - transmission control protocol - transport protocol
- transport protocol class 0
- transport protocol class 4 -
7 protocol
- analog networking protocol
- AppleTalk remote access protocol
- autonomous virtual network protocol
- bandwidth allocation control protocol
- bit-oriented protocol
- bootstrap protocol
- border gateway protocol
- byte-oriented protocol
- cache coherence protocol
- card isolation protocol
- challenge handshake authentication protocol
- character count protocol
- character-controlled protocol
- character-oriented protocol
- client-to-client protocol
- common management information protocol
- communications protocol
- compressed serial line Internet protocol
- connectionless network layer protocol
- connectionless network protocol
- connectionless protocol
- connectionless transport protocol
- connection-oriented protocol
- cryptographic protocol
- data compression protocol
- data link control protocol
- digital data communication message protocol
- digital networking protocol
- digital voice messaging networking protocol
- directory access protocol
- distance vector multicast routing protocol
- dynamic host configuration protocol
- dynamic serial line Internet protocol
- end system to intermediate system protocol
- error-correction protocol
- extended simple mail transfer protocol
- exterior gateway protocol
- fiber channel protocol
- file transfer protocol
- flexible wide-area protocol
- generic packetized protocol
- hot standby router protocol
- hypertext transfer protocol
- image access protocol
- interior gateway protocol
- interior gateway routing protocol
- internal message protocol
- Internet control message protocol
- internet control message protocol
- Internet gateway routing protocol
- Internet group management protocol
- internet group management protocol
- internet inter-ORB protocol
- Internet mail access protocol
- Internet protocol
- internet protocol
- Internet relay chat protocol
- interworking protocol
- IP multicast protocol
- layer-2 tunneling protocol
- lightweight directory access protocol
- link access protocol for modems
- link access protocol
- link access protocol-balanced
- link access protocol-digital
- link control protocol
- manufacturing automation protocol
- medium access control protocol
- message transport protocol
- Microcom networking protocol
- modulation protocol
- multicast file transfer protocol
- multi-link access protocol-digital
- multiprotocol gateway control protocol
- multi-vendor integration protocol
- NetWare core protocol
- NetWare link service protocol
- network control protocols
- network news transfer protocol
- network service protocol
- network time protocol
- next-hop routing protocol
- nonroutable protocol
- packetized ensemble protocol
- password authentication protocol
- point to point multi-link protocol
- point to point protocol
- point to point tunneling protocol
- post office protocol
- proprietary protocol
- proxy address resolution protocol
- radio link protocol
- random-access protocol
- real-time control protocol
- real-time streaming protocol
- real-time transport protocol
- resource reservation protocol
- reverse address resolution protocol
- Rock Ridge interchange protocol
- routable protocol
- router discovery protocol
- routing information protocol
- routing protocol
- SCSI interlocked protocol
- secure hypertext transfer protocol
- serial bus protocol
- serial line access protocol
- serial line Internet protocol
- service advertising protocol
- session initiation protocol
- session protocol
- simple gateway management protocol
- simple mail transfer protocol
- simple management protocol
- simple network management protocol
- socket protocol
- stated protocol
- stateful protocol
- stateless protocol
- synchronous protocol
- system use shared protocol
- technical/office protocol
- time-triggered protocol
- track protocol
- transmission control protocol Internet protocol
- transmission control protocol over/based on Internet protocol
- transmission control protocol
- transport layer protocol
- transport protocol class 0
- transport protocol class 4
- transport protocol
- upper layer protocol
- user datagram protocol
- voice over Internet protocol
- voice-channel protocol
- wireless application protocolThe New English-Russian Dictionary of Radio-electronics > protocol
-
8 DPA
1) Морской термин: Назначенное лицо компании (Designated Person Ashore - DPA)2) Военный термин: Daily Plan Of Action, Data Processing Activities, Defense Procurement Agency, Defense Production Act, Defense Production Administration, data processing agency, data processing area3) Техника: data processing algorithm, data processing assembly, displacements per atom, dynamic-pointer array4) Сокращение: Defence Procurement Agency (UK), Defense Production Act (USA), Delegation of Procurement Authority, Discharged Prisoners Association, докозапентаеновая кислота (Docosapentaenoic acid)5) Физика: разрушающий физический анализ, РФА6) Электроника: Destructive Physical Analysis, Displacement Per Atom, Distributed Power Architecture7) Вычислительная техника: Demand Priority Architecture, Distributed Password Authentication, Document Printing Application, data processing automation8) Биохимия: docosapentaenoic acid9) Пищевая промышленность: Draft Pale Ale10) Фирменный знак: Deer Park Ave11) Сетевые технологии: Demand Priority Access, Demand Protocol Architecture12) Полимеры: diphenylamine13) Химическое оружие: drum preparation area14) Безопасность: Data Privacy Algorithm15) Расширение файла: Document Printing Architecture, Demand Protocol Architecture (3Com)16) Майкрософт: распределенное подтверждение паролей17) ООН: Department of Political Affairs18) Должность: District Publicity Assistant19) Аэропорты: West Chicago, Illinois USA20) Единицы измерений: Defense Per Acre
См. также в других словарях:
Dynamic SSL — is an endpoint security technology developed by Daniel McCann and Nima Sharifimehr of NetSecure Technologies Ltd. Dynamic SSL was created to solve the endpoint security problem in public networks by transparently correcting the implementation… … Wikipedia
Dynamic Microprocessor Associates — Type Subsidiary of Symantec Founded United States Headquarters United States Dynamic Microprocessor Associates is a software company in the United States. Though best known for its remote administration product pcAnywhere, DMA also developed and … Wikipedia
Password — For other uses, see Password (disambiguation). A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password… … Wikipedia
Password-Sniffer — Dieser Artikel oder Abschnitt bedarf einer Überarbeitung. Näheres ist auf der Diskussionsseite angegeben. Hilf mit, ihn zu verbessern, und entferne anschließend diese Markierung. Ein Sniffer (engl. „to sniff“ für riechen, schnüffeln) ist eine… … Deutsch Wikipedia
Security token — Several types of security tokens with a penny for scale … Wikipedia
PassPattern system — (PPS) is a pseudodynamic password user authentication system, which is based on patterns. Unlike the other dynamic password based systems, PassPattern System(PPS) [ [http://netlab.cs.iitm.ernet.in/pps PassPattern System, NETLAB, Indian Institute… … Wikipedia
Code injection — is the exploitation of a computer bug that is caused by processing invalid data. Code injection can be used by an attacker to introduce (or inject ) code into a computer program to change the course of execution. The results of a code injection… … Wikipedia
Wikipedia:Reference desk/Computing — The Wikipedia Reference Desk covering the topic of computing. Computing #eee #f5f5f5 #eee #aaa #aaa #aaa #00f #36b #000 #00f computing Wikipedia:Reference de … Wikipedia
OpenLDAP — Software Developer(s) The OpenLDAP Project Stable release 2.4.26 / June 30, 2011; 4 months ago (2011 06 30) … Wikipedia
Abkürzungen/Computer — Dies ist eine Liste technischer Abkürzungen, die im IT Bereich verwendet werden. A [nach oben] AA Antialiasing AAA authentication, authorization and accounting, siehe Triple A System AAC Advanced Audio Coding AACS … Deutsch Wikipedia
Liste der Abkürzungen (Computer) — Dies ist eine Liste technischer Abkürzungen, die im IT Bereich verwendet werden. A [nach oben] AA Antialiasing AAA authentication, authorization and accounting, siehe Triple A System AAC Advanced Audio Coding AACS … Deutsch Wikipedia