-
1 password-protected key
- ключ, защищенный паролем
ключ, защищенный паролем
—
[[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]]Тематики
EN
Англо-русский словарь нормативно-технической терминологии > password-protected key
-
2 password-protected key
Безопасность: защищённый паролем ключУниверсальный англо-русский словарь > password-protected key
-
3 password-protected key
Англо-русский словарь по компьютерной безопасности > password-protected key
-
4 key
1) (криптографический) ключ2) ключ к замку или запирающему устройству, механический ключ- base key- candidate key- card key- code key- data key- DES key- fake key- file key- good key- hex key- host key- link key- lost key- node key- numeric key- numerical key- pass key- PRN key- safe key- seed key- test key- true key- used key- user key- weak key- work key- zone key -
5 password
пароль; персональная информация аутентификацииАнгло-русский словарь по компьютерной безопасности > password
-
6 password
n воен. пароль, пропускСинонимический ряд:watchword (noun) catchword; countersign; key; open sesame; parole; passport; phrase; shibboleth; signal; ticket; watchword; word -
7 system
- computationally secure system- abuse-free system- algebraic code system- analog system- asymmetric system- asymmetric key system- authentication/secrecy system- binary system- block system- broadcast system- broadcasting system- cipher-feedback system- classical system- common-key system- communication system- compromised system- computationally secure system- conference system- conventional system- DES-based system- DES-like system- deterministic system- DH system- Diffie and Hellman system- discrete-exponentiation system- discrete log system- E3 system- effectively unbreakable system- elliptic curve system- endomorphic system- end-to-end encryption system- error propagating system- factorization system- finite system- finite automation system- Galois field system- general system- generalized system- Goppa-code system- hardware-implemented system- hidden key system- high-grade system- high-speed system- hybrid public-secret key system- hybrid stream/block system- identity-based system- system immune to cryptoanalysis- indecipherable system- intractable system- iterated system- key escrow system- keyed system- key escrow system- key-minimal system- knapsack-based system- knapsack public key system- matrix system- McEliece' system- Merkle-Hellman system- MH system- microprocessor based system- minuend system- multiple access system- multiple destination system- multiplicative knapsack system- network system- non-linear system- number theoretic system- one-key system- one-master-key system- one-time-key system- one-time-pad system- one-time-tape system- perfect secrecy system- practical security system- private key system- proprietary system- public key system- public key distribution system- public key signature system- rapid system- reciprocal number system- residue system- Rivest-Shamir-Adleman system- rotor system- RSA public key system- r-th residue system- secret-key system- secure system- shared key system- shift register system- single-key system- sophisticated system- split key system- strong system- subtractive system- symmetric system- theoretically unbreakable system- threshold system- transposition system- trap-door-knapsack public key system- transient key system- threshold system- two-key system- unbreakable system- voice system -
8 access
1) доступ (в систему обработки информации или в сеть связи)2) доступ (на защищенную территорию); способ доступа -
9 control
1) управление2) контроль, проверкаАнгло-русский словарь по компьютерной безопасности > control
-
10 protection
механизм реализации политики безопасности ( security policy) путём предотвращения (ограничения) несанкционированного доступа пользователям к компьютерной системе или компьютерной сети, а программам - к системным ресурсам и услугамсм. тж. block protection, boundary protection, copy protection, data protection, error protection, firewall protection, hardware key protection, password protection, protected area, protected memory, protection device, protection error, protection level, protection system, registration-number protection, virus protectionАнгло-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. > protection
-
11 program
Англо-русский словарь по компьютерной безопасности > program
-
12 space
1) пространство2) пробел; знак пробела -
13 file
1) файл || формировать файл; хранить ( данные) в файле2) список; реестр; каталог || включать в список; заносить в реестр или каталог; регистрировать3) упорядоченный набор или массив; колонка || формировать набор или массив; размещать в определённом порядке; располагать в виде колонки4) папка для бумаг; скоросшиватель || помещать в папку или скоросшиватель; подшивать (напр. документы)5) передавать сводку новостей по радио или телевидению6) представлять (напр. документ на рассмотрение); подавать (напр. заявление)7) принимать заказ ( к исполнению)8) напильник || обрабатывать напильником•- accounting file
- active file
- alias file
- amendments file
- application file
- archive file
- archived file
- ASCII file
- back-up file
- backed-up file
- batch file
- binary file
- bubble-lattice file
- card file
- cassette file
- change file
- chained file
- circular file
- closed file
- comma-delimited file
- command file
- compressed file
- computer-generated file
- concordance file
- configuration file
- contiguous file
- contiguous-disk file
- cookie file
- corrupted file
- Creative music file
- Creative Labs music file
- cross-linked files
- damaged file
- data file
- data-storage file
- dead file
- destination file
- detail file
- device-independent file
- difference file
- direct file
- direct-access file
- directory file
- disk file
- display file
- dot file
- error file
- exe file
- executable file
- external file
- external data file
- fact file
- father file
- flat file
- fully inverted file
- galley file
- global kill file
- grandfather file
- header file
- hidden file
- HTML file
- image file
- index file
- indexed file
- Indian file
- indirect file
- input file
- internal file
- inverted file
- JEDEC file
- job file
- journal file
- key file
- kill file
- link file
- locked file
- logical file
- logon file
- lost file
- master file
- MIDI file
- multi-data carrier file
- multivolume file
- music file
- object file
- open file
- output file
- page file
- page-image file
- paging file
- password file
- permalloy-bar file
- permanent swap file
- permanent swapping file
- piggyback file
- premastered file
- profile file
- program file
- program information file
- protected file
- random file
- read-only file
- reference file
- register retirement file
- relative file
- remote file
- report file
- resource file
- scan file
- scratch file
- security files
- segment -file
- sequential file
- server side include file
- shareable file
- shareable image file
- shared file
- single file
- slide file
- son file
- source file
- speech file
- spill file
- spool file
- SSI file
- stream-oriented file
- swap file
- swapping file
- system file
- system recorder file
- tab-delimited file
- temporary file
- text file
- text-only file
- threaded file
- transaction file
- transferred file
- unformatted text file
- update file
- updated file
- virtual file
- volatile file
- volume file
- watermarked file
- work file
- working-data file -
14 file
1) файл || формировать файл; хранить ( данные) в файле2) список; реестр; каталог || включать в список; заносить в реестр или каталог; регистрировать3) упорядоченный набор или массив; колонка || формировать набор или массив; размещать в определённом порядке; располагать в виде колонки4) папка для бумаг; скоросшиватель || помещать в папку или скоросшиватель; подшивать (напр. документы)5) передавать сводку новостей по радио или телевидению6) представлять (напр. документ на рассмотрение); подавать (напр. заявление)7) принимать заказ ( к исполнению)8) напильник || обрабатывать напильником•- accounting file
- active file
- alias file
- amendments file
- application file
- archive file
- archived file
- ASCII file
- backed-up file
- back-up file
- batch file
- binary file
- bubble-lattice file
- card file
- cassette file
- chained file
- change file
- circular file
- closed file
- comma-delimited file
- command file
- compressed file
- computer-generated file
- concordance file
- configuration file
- contiguous file
- contiguous-disk file
- cookie file
- corrupted file
- Creative Labs music file
- Creative music file
- cross-linked files
- damaged file
- data file
- data-storage file
- dead file
- destination file
- detail file
- device-independent file
- difference file
- direct file
- direct-access file
- directory file
- disk file
- display file
- dot file
- error file
- exe file
- executable file
- external data file
- external file
- fact file
- father file
- flat file
- fully inverted file
- galley file
- global kill file
- grandfather file
- header file
- hidden file
- HTML file
- image file
- index file
- indexed file
- Indian file
- indirect file
- input file
- internal file
- inverted file
- JEDEC file
- job file
- journal file
- key file
- kill file
- link file
- locked file
- logical file
- logon file
- lost file
- master file
- MIDI file
- multi-data carrier file
- multivolume file
- music file
- object file
- open file
- output file
- page file
- page-image file
- paging file
- password file
- permalloy-bar file
- permanent swap file
- permanent swapping file
- piggyback file
- premastered file
- profile file
- program file
- program information file
- protected file
- random file
- read-only file
- reference file
- register retirement file
- relative file
- remote file
- report file
- resource file
- scan file
- scratch file
- security files
- segment-file
- sequential file
- server side include file
- shareable file
- shareable image file
- shared file
- single file
- slide file
- son file
- source file
- speech file
- spill file
- spool file
- SSI file
- stream-oriented file
- swap file
- swapping file
- system file
- system recorder file
- tab-delimited file
- temporary file
- text file
- text-only file
- threaded file
- transaction file
- transferred file
- unformatted text file
- update file
- updated file
- virtual file
- volatile file
- volume file
- watermarked file
- work file
- working-data fileThe New English-Russian Dictionary of Radio-electronics > file
См. также в других словарях:
Password strength — is a measurement of the effectiveness of a password as an authentication credential. Specifically, it estimates how many trials an attacker who does not have direct access to the password would need, on average, to correctly guess it. The… … Wikipedia
Password cracking — is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. The purpose of password cracking might be to help a user recover a… … Wikipedia
Password — For other uses, see Password (disambiguation). A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password… … Wikipedia
Key strengthening — In cryptography, key strengthening or key stretching refer to techniques used to make a possibly weak key, typically a password or passphrase, more secure against a brute force attack by increasing the time it takes to test each possible key.… … Wikipedia
Password manager — A password manager is software that helps a user organize passwords and PIN codes. The software typically has a local database or a file that holds the encrypted password data for secure logon onto computers, networks, web sites and application… … Wikipedia
Key (lock) — A cut key A key is an instrument that is used to operate a lock. A typical key consists of two parts: the blade, which slides into the keyway of the lock and distinguishes between different keys, and the bow, which is left protruding so that… … Wikipedia
Key distribution — In symmetric key cryptography, both parties must possess a secret key which they must exchange prior to using any encryption. Distribution of secret keys has been problematic until recently, because it involved face to face meeting, use of a… … Wikipedia
Protected Extensible Authentication Protocol — PEAP is also an acronym for Personal Egress Air Packs. Protected Extensible Authentication Protocol, Protected EAP, or simply PEAP (pronounced peep ), is a method to securely transmit authentication information, including passwords, over wired or … Wikipedia
Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key … Wikipedia
Wi-Fi Protected Access — (WPA and WPA2) is a certification program administered by the Wi Fi Alliance to indicate compliance with the security protocol created by the Wi Fi Alliance to secure wireless computer networks. This protocol was created in response to several… … Wikipedia
pre-shared key — noun A TKIP passphrase used to protect your network traffic in WPA. A mechanism in Wi Fi Protected Access (WPA) Personal that allows the use of manually entered keys or passwords to initiate WPA security. The PSK is entered on the access point or … Wiktionary