-
1 encrypted data
Data that has been converted from plaintext into ciphertext. Encrypted messages are used to disguise the content of a message when it is sent or stored. -
2 BitLocker encrypted installation
A feature of BitLocker that enables IT pros to encrypt a disk before a user begins to use it.التثبيت المشفَّر من BitLockerEnglish-Arabic terms dictionary > BitLocker encrypted installation
-
3 Encrypting File System
A Microsoft file-based encryption technology that enables users to encrypt files and folders on NTFS volumes. EFS helps protect the confidentiality of data by ensuring that only authorized users can decrypt the encrypted files or folders. -
4 EFS
A Microsoft file-based encryption technology that enables users to encrypt files and folders on NTFS volumes. EFS helps protect the confidentiality of data by ensuring that only authorized users can decrypt the encrypted files or folders. -
5 decryption
The process of converting encrypted content back into its original form to make it readable again. This is also called converting ciphertext back to plaintext. -
6 ciphertext
Data that has been encrypted.نص مشفّر -
7 virtual private network
"The extension of a private network that encompasses encapsulated, encrypted, and authenticated links across shared or public networks. VPN connections typically provide remote access and router-to-router connections to private networks over the Internet." -
8 VPN
"The extension of a private network that encompasses encapsulated, encrypted, and authenticated links across shared or public networks. VPN connections typically provide remote access and router-to-router connections to private networks over the Internet." -
9 countersignature
A signature of an existing signature and message or a signature of an existing signature. A countersignature is used to sign the encrypted hash of an existing signature or to time stamp a message. -
10 counter-signature
A signature of an existing signature and message or a signature of an existing signature. A countersignature is used to sign the encrypted hash of an existing signature or to time stamp a message. -
11 decrypt
To convert encrypted content back into its original form. -
12 packet privacy
An authentication level in which each data packet is signed and encrypted in order to protect the entire communication between the client and server. -
13 private key
"The secret half of a cryptographic key pair that is used with a public key algorithm. Private keys are typically used to decrypt a symmetric session key, digitally sign data, or decrypt data that has been encrypted with the corresponding public key." -
14 recovery agent
A person who is issued a public key certificate for the purpose of recovering user data that is encrypted with Encrypting File System (EFS). -
15 packaged Windows Media file
"A Windows Media file encrypted with a key, which consumers cannot play unless they have a key provided by a license. A packaged Windows Media file is produced by and protected through the implementation of digital rights management using the Windows Media Rights Manager Software Development Kit(SDK) or a program based on the Microsoft Windows Media Format SDK."English-Arabic terms dictionary > packaged Windows Media file
-
16 attribute
"For files, information that indicates whether a file is read-only, hidden, ready for archiving (backing up), compressed, or encrypted, and whether the file contents should be indexed for fast file searching." -
17 bulk encryption
"A process in which large amounts of data, such as files, e-mail messages, or online communications sessions, are encrypted for confidentiality. It is usually done with a symmetric key algorithm." -
18 authenticator
"A data structure used by one party to prove that another party knows a secret key. In the Kerberos authentication protocol, authenticators include timestamps, to prevent replay attacks, and are encrypted with the session key issued by the Key Distribution Center (KDC)."مصدّق -
19 sniffer
"An application or device that can read, monitor, and capture network data exchanges and read network packets. If the packets are not encrypted, a sniffer provides a full view of the data inside the packet." -
20 MD5
"An industry-standard one-way, 128-bit hashing scheme, developed by RSA Data Security, Inc., and used by various Point-to-Point Protocol (PPP) vendors for encrypted authentication."
- 1
- 2
См. также в других словарях:
encrypted — a. converted into a coded form that cannot be interpreted without knowing the secret method for interpretation, called the key; of messages or other forms of information. Syn: encoded, coded, enciphered, ciphered, cyphered, written in code.… … The Collaborative International Dictionary of English
encrypted — See encryption. Practical Law Dictionary. Glossary of UK, US and international legal terms. www.practicallaw.com. 2010 … Law dictionary
encrypted — adjective Describing something that is in code. The encrypted text was unreadable … Wiktionary
encrypted — adj. Encrypted is used with these nouns: ↑message … Collocations dictionary
encrypted — un·encrypted; … English syllables
Encrypted Key Transport — Saltar a navegación, búsqueda Encrypted Key Transport o EKT es una extensión a SRTP que cumple el framework de SRTP y reduce la cantidad de señalización de control necesaria en una sesión SRTP. Distribuye de manera segura la clave SRTP maestra y… … Wikipedia Español
Encrypted key exchange — (also known as EKE) is a family of password authenticated key agreement methods described by Steven M. Bellovin and Michael Merritt. [cite conference|author=S. M. Bellovin|coauthors=M. Merritt|title=Encrypted Key Exchange: Password Based… … Wikipedia
Encrypted filesystem — can mean:* A filesystem with filesystem level encryption support * A filesystem that resides on an encrypted disk or partition, see full disk encryption * Encrypting File System (EFS), the encryption subsystem of NTFS … Wikipedia
Encrypted Key Transport — or EKT is an extension to SRTP that fits within the SRTP framework and reduces the amount of signaling control that is needed in an SRTP session. EKT securely distributes the SRTP master key and other information for each SRTP source, using SRTCP … Wikipedia
Encrypted Real Time Messaging Protocol — (RTMPE ou RTMPTE) est un protocole propriétaire, développé par Macromedia[Quand ?], pour diffuser de la vidéo de façon chiffrée. Ce protocole permet de sécuriser le transfert de données sans SSL. Il est implémenté dans Flash Player 9.0.115… … Wikipédia en Français
Encrypted function — An encrypted function is an attempt to provide mobile code privacy without providing any tamper resistant hardware. It is a method where in mobile code can carry out cryptographic primitives even though the code is executed in untrusted… … Wikipedia