-
1 privacy transposition
преобразование [шифрование] секретных данныхБольшой англо-русский и русско-английский словарь > privacy transposition
-
2 privacy transposition
Вычислительная техника: преобразование секретных данных, шифрование секретных данных -
3 privacy transposition
преобразование [шифрование] секретных данныхEnglish-Russian dictionary of computer science and programming > privacy transposition
-
4 privacy transposition
1. преобразование секретных данных; шифрование данных2. преобразование секретных данных; шифрование секретных данных -
5 privacy transposition
English-Russian dictionary of computer science > privacy transposition
-
6 transposition
1) перемещение, перестановка; перегруппировка2) матем. транспонирование; транспозиция; перенос членов ( из одной части равенства в другую)•English-Russian dictionary of computer science and programming > transposition
-
7 data privacy
privacy transposition — преобразование секретных данных; шифрование данных
English-Russian dictionary of Information technology > data privacy
-
8 преобразование секретных данных
Большой англо-русский и русско-английский словарь > преобразование секретных данных
-
9 преобразование секретных данных
Русско-английский словарь по вычислительной технике и программированию > преобразование секретных данных
-
10 шифрование секретных данных
Русско-английский большой базовый словарь > шифрование секретных данных
-
11 шифрование данных
Русско-английский большой базовый словарь > шифрование данных
-
12 преобразование секретных данных
Русско-английский большой базовый словарь > преобразование секретных данных
-
13 преобразование секретных данных
Information technology: privacy transpositionУниверсальный русско-английский словарь > преобразование секретных данных
-
14 шифрование секретных данных
Information technology: privacy transpositionУниверсальный русско-английский словарь > шифрование секретных данных
-
15 system
- computationally secure system- abuse-free system- algebraic code system- analog system- asymmetric system- asymmetric key system- authentication/secrecy system- binary system- block system- broadcast system- broadcasting system- cipher-feedback system- classical system- common-key system- communication system- compromised system- computationally secure system- conference system- conventional system- DES-based system- DES-like system- deterministic system- DH system- Diffie and Hellman system- discrete-exponentiation system- discrete log system- E3 system- effectively unbreakable system- elliptic curve system- endomorphic system- end-to-end encryption system- error propagating system- factorization system- finite system- finite automation system- Galois field system- general system- generalized system- Goppa-code system- hardware-implemented system- hidden key system- high-grade system- high-speed system- hybrid public-secret key system- hybrid stream/block system- identity-based system- system immune to cryptoanalysis- indecipherable system- intractable system- iterated system- key escrow system- keyed system- key escrow system- key-minimal system- knapsack-based system- knapsack public key system- matrix system- McEliece' system- Merkle-Hellman system- MH system- microprocessor based system- minuend system- multiple access system- multiple destination system- multiplicative knapsack system- network system- non-linear system- number theoretic system- one-key system- one-master-key system- one-time-key system- one-time-pad system- one-time-tape system- perfect secrecy system- practical security system- private key system- proprietary system- public key system- public key distribution system- public key signature system- rapid system- reciprocal number system- residue system- Rivest-Shamir-Adleman system- rotor system- RSA public key system- r-th residue system- secret-key system- secure system- shared key system- shift register system- single-key system- sophisticated system- split key system- strong system- subtractive system- symmetric system- theoretically unbreakable system- threshold system- transposition system- trap-door-knapsack public key system- transient key system- threshold system- two-key system- unbreakable system- voice system -
16 cryptosystem
криптографическая система, криптосистема; шифросистема- abuse-free cryptosystem- algebraic code cryptosystem- analog cryptosystem- asymmetric cryptosystem- asymmetric key cryptosystem- authentication/secrecy cryptosystem- bijective public key cryptosystem- binary cryptosystem- block cryptosystem- broadcast cryptosystem- broadcasting cryptosystem- cipher-feedback cryptosystem- classical cryptosystem- common-key cryptosystem- communication cryptosystem- compromised cryptosystem- computationally secure cryptosystem- conference cryptosystem- conventional cryptosystem- DES-based cryptosystem- DES-like cryptosystem- deterministic cryptosystem- DH cryptosystem- Diffie and Hellman cryptosystem- discrete-exponentiation cryptosystem- discrete log cryptosystem- E3 cryptosystem- effectively unbreakable cryptosystem- elliptic curve cryptosystem- endomorphic cryptosystem- end-to-end encryption cryptosystem- error propagating cryptosystem- factorization cryptosystem- finite cryptosystem- finite automation cryptosystem- Galois field cryptosystem- general cryptosystem- generalized cryptosystem- Goppa-code cryptosystem- hardware-implemented cryptosystem- hidden key cryptosystem- high-grade cryptosystem- high-speed cryptosystem- hybrid public-secret key cryptosystem- hybrid stream/block cryptosystem- identity-based cryptosystem- intractable cryptosystem- indecipherable cryptosystem- iterated cryptosystem- keyed cryptosystem- key escrow cryptosystem- key-minimal cryptosystem- knapsack-based cryptosystem- knapsack public key cryptosystem- matrix cryptosystem- McEliece' cryptosystem- Merkle-Hellman cryptosystem- MH cryptosystem- microprocessor based cryptosystem- minuend cryptosystem- multiple access cryptosystem- multiple destination cryptosystem- multiplicative knapsack cryptosystem- network cryptosystem- non-linear cryptosystem- number theoretic cryptosystem- one-key cryptosystem- one-master-key cryptosystem- one-time-key cryptosystem- one-time-pad cryptosystem- one-time-tape cryptosystem- perfect secrecy cryptosystem- practical security cryptosystem- private key cryptosystem- proprietary cryptosystem- provable secure cryptosystem- public key cryptosystem- public key distribution cryptosystem- public key signature cryptosystem- rapid cryptosystem- reciprocal number cryptosystem- residue cryptosystem- Rivest-Shamir-Adleman cryptosystem- rotor cryptosystem- RSA public key cryptosystem- r-th residue cryptosystem- secret-key cryptosystem- secure cryptosystem- shared key cryptosystem- shift register cryptosystem- single-key cryptosystem- sophisticated cryptosystem- split key cryptosystem- strong cryptosystem- subtractive cryptosystem- symmetric cryptosystem- theoretically unbreakable cryptosystem- threshold cryptosystem- transposition cryptosystem- trap-door-knapsack public key cryptosystem- transient key cryptosystem- threshold cryptosystem- two-key cryptosystem- unbreakable cryptosystem- voice cryptosystem- cryptosystem immune to cryptoanalysisАнгло-русский словарь по компьютерной безопасности > cryptosystem
См. также в других словарях:
Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption … Wikipedia
Directive du 12 juillet 2002 sur la protection de la vie privée dans le secteur des communications électroniques — Directive vie privée et communications électroniques Titre Directive du 12 juillet 2002 sur la protection de la vie privée dans le secteur des communications électroniques Abréviation Directive 2002/58/CE Code CELEX : 32002L0058 Organisation … Wikipédia en Français
cryptology — cryptologist, n. cryptologic /krip tl oj ik/, cryptological, adj. /krip tol euh jee/, n. 1. cryptography. 2. the science and study of cryptanalysis and cryptography. [1635 45; < NL cryptologia. See CRYPTO , LOGY] * * * Introduction … Universalium
Directive 95/46/EC on the protection of personal data — The full title of this European Union directive is Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data. The directive was implemented in 1995 by the European… … Wikipedia
Cryptographie — Kryptographie (auch: Kryptografie; von griechisch: κρυπτός, kryptós, „verborgen“, und γράφειν, gráphein, „schreiben“) ist die Wissenschaft der Verschlüsselung von Informationen. Die Anfänge der Kryptographie liegen im Altertum. Die Ägypter… … Deutsch Wikipedia
Geheimcode — Kryptographie (auch: Kryptografie; von griechisch: κρυπτός, kryptós, „verborgen“, und γράφειν, gráphein, „schreiben“) ist die Wissenschaft der Verschlüsselung von Informationen. Die Anfänge der Kryptographie liegen im Altertum. Die Ägypter… … Deutsch Wikipedia
Geheimschrift — Kryptographie (auch: Kryptografie; von griechisch: κρυπτός, kryptós, „verborgen“, und γράφειν, gráphein, „schreiben“) ist die Wissenschaft der Verschlüsselung von Informationen. Die Anfänge der Kryptographie liegen im Altertum. Die Ägypter… … Deutsch Wikipedia
Kryptografie — Kryptographie (auch: Kryptografie; von griechisch: κρυπτός, kryptós, „verborgen“, und γράφειν, gráphein, „schreiben“) ist die Wissenschaft der Verschlüsselung von Informationen. Die Anfänge der Kryptographie liegen im Altertum. Die Ägypter… … Deutsch Wikipedia
Kryptograph — Kryptographie (auch: Kryptografie; von griechisch: κρυπτός, kryptós, „verborgen“, und γράφειν, gráphein, „schreiben“) ist die Wissenschaft der Verschlüsselung von Informationen. Die Anfänge der Kryptographie liegen im Altertum. Die Ägypter… … Deutsch Wikipedia
Kryptographisch — Kryptographie (auch: Kryptografie; von griechisch: κρυπτός, kryptós, „verborgen“, und γράφειν, gráphein, „schreiben“) ist die Wissenschaft der Verschlüsselung von Informationen. Die Anfänge der Kryptographie liegen im Altertum. Die Ägypter… … Deutsch Wikipedia
Data Protection Directive — The Data Protection Directive (officially Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data) is a European Union directive which regulates the processing of… … Wikipedia