-
1 user-specific encryption
English-Russian cryptological dictionary > user-specific encryption
-
2 user-oriented encryption
ориентированное на пользователя [учитывающее требования пользователя] шифрованиеEnglish-Russian cryptological dictionary > user-oriented encryption
-
3 межабонентское шифрование
Универсальный русско-английский словарь > межабонентское шифрование
-
4 межконцевое шифрование
Универсальный русско-английский словарь > межконцевое шифрование
-
5 шифрование, определенное для данного пользователя
шифрование, определенное для данного пользователя
Шифрование, учитывающее требования данного пользователя.
[ http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=5024]Тематики
EN
Русско-английский словарь нормативно-технической терминологии > шифрование, определенное для данного пользователя
-
6 шифрование по алгоритму пользователя
Security: user-oriented encryption, user-specific encryptionУниверсальный русско-английский словарь > шифрование по алгоритму пользователя
-
7 шифрование, ориентированное на пользователя
Security: user-oriented encryption, user-specific encryptionУниверсальный русско-английский словарь > шифрование, ориентированное на пользователя
-
8 шифрование, учитывающее требования пользователя
Security: user-oriented encryption, user-specific encryptionУниверсальный русско-английский словарь > шифрование, учитывающее требования пользователя
-
9 ключ шифра
ключ шифра
Уникальная последовательность символов, которая является частью процесса шифрования и расшифровывания данных. См. authentication -, common ~, derived ~, encryption ~, latch-down ~, privacy ~, programmed ~, public ~, SCK, session -, shortcut ~, soft ~, static ~, toggle ~, two-part ~, user authentication ~, user defined ~.
[Л.М. Невдяев. Телекоммуникационные технологии. Англо-русский толковый словарь-справочник. Под редакцией Ю.М. Горностаева. Москва, 2002]Тематики
- электросвязь, основные понятия
EN
Русско-английский словарь нормативно-технической терминологии > ключ шифра
-
10 шифрование данных пользователей
Computers: user data encryptionУниверсальный русско-английский словарь > шифрование данных пользователей
См. также в других словарях:
User agent — A user agent is the client application used with a particular network protocol; the phrase is most commonly used in reference to those which access the World Wide Web, but other systems such as SIP use the term user agent to refer to the user s… … Wikipedia
Deniable encryption — In cryptography and steganography, deniable encryption is encryption that allows its users to convincingly deny that the data is encrypted, or that they are able to decrypt it[citation needed]. Such convincing denials may or may not be genuine.… … Wikipedia
BitLocker Drive Encryption — infobox software caption = developer = Microsoft latest release version = 1.0 latest release date = January 30, 2007 programming language = C, C++, AssemblerFact|date=June 2008 operating system = Windows Vista, Windows Server 2008 language =… … Wikipedia
Disk encryption — uses disk encryption software or hardware to encrypt every bit of data that goes on a disk or disk volume. Disk encryption prevents unauthorized access to data storage. The term full disk encryption (or whole disk encryption) is often used to… … Wikipedia
Full disk encryption — (or whole disk encryption) is a kind of disk encryption software or hardware which encrypts every bit of data that goes on a disk or disk volume. The term full disk encryption is often used to signify that everything on a disk, including the… … Wikipedia
Disk encryption software — To protect confidentiality of the data stored on a computer disk a computer security technique called disk encryption is used. This article discusses software that is used to implement the technique (for cryptographic aspects of the problem see… … Wikipedia
End-to-end encryption — Description End to end encryption (E2EE) encrypts clear (red) data at source with knowledge of the intended recipient, allowing the encrypted (black) data to travel safely through vulnerable channels (eg. public networks) to its recipient where… … Wikipedia
AACS encryption key controversy — A controversy surrounding the AACS cryptographic key arose in April 2007 when the Motion Picture Association of America and the Advanced Access Content System Licensing Administrator, LLC (AACS LA) began issuing demand letters[1] to websites… … Wikipedia
Comparison of disk encryption software — This is a technical feature comparison of different disk encryption software. Contents 1 Background information 2 Operating systems 3 Features 4 Layering … Wikipedia
NSA encryption systems — The National Security Agency took over responsibility for all U.S. Government encryption systems when it was formed in 1952. The technical details of most NSA approved systems are still classified, but much more about its early systems has become … Wikipedia
Proxy re-encryption — schemes are cryptosystems which allow third parties (proxies) to alter a ciphertext which has been encrypted for one party, so that it may be decrypted by another. Examples of UseBob could designate a proxy to re encrypt one of his messages that… … Wikipedia