-
1 ar-sa تشفير
"The ultimate user of a computer or computer application in its finished, marketable form." -
2 ENCRYPTION
-
3 BULK ENCRYPTION
-
4 END-TO-END CIPHERING
تشفير طرفيّ -
5 BLOCK-BY-BLOCK ENCRYPTION
English-Arabic military dictionary > BLOCK-BY-BLOCK ENCRYPTION
-
6 Coding
ترميز، تشفير -
7 Testing
اختبار ، امتحان ، تجربة ، تشفير -
8 encoding
ترميز ; تشفير* * *تَرْميز ; تَشْفِيْر -
9 Encrypting File System
A Microsoft file-based encryption technology that enables users to encrypt files and folders on NTFS volumes. EFS helps protect the confidentiality of data by ensuring that only authorized users can decrypt the encrypted files or folders. -
10 ar-sa عامل تصفية
"The study or analysis of codes and encoding methods used to secure information. Cryptography is used to provide confidentiality, data integrity, authentication (entity and data origin), and nonrepudiation." -
11 cryptography
"The study or analysis of codes and encoding methods used to secure information. Cryptography is used to provide confidentiality, data integrity, authentication (entity and data origin), and nonrepudiation." -
12 encryption
The process of converting readable data (plaintext) into a coded form (ciphertext) to prevent it from being read by an unauthorized party. -
13 Cryptography Application Programming Interface
An (API) that is provided as part of Microsoft Windows. CryptoAPI provides a set of functions that allow applications to encrypt or digitally sign data in a flexible manner while providing protection for the user's sensitive private key data. Actual cryptographic operations are performed by independent modules known as (CSPs).English-Arabic terms dictionary > Cryptography Application Programming Interface
-
14 message digest
"A fixed-size result that is obtained by applying a one-way mathematical function (sometimes called a hash algorithm) to an arbitrary amount of data. If there is a change in the input data, the hash changes. The hash can be used in many operations, including authentication and digital signing." -
15 public key encryption
"A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it." -
16 asymmetric encryption
"A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it." -
17 RSA encryption
"The patented public key encryption method, introduced by Ronald Rivest, Adi Shamir, and Leonard Adleman in 1978, on which the PGP (Pretty Good Privacy) encryption program is based." -
18 symmetric encryption
"An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data." -
19 secret key encryption
"An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data." -
20 bulk encryption
"A process in which large amounts of data, such as files, e-mail messages, or online communications sessions, are encrypted for confidentiality. It is usually done with a symmetric key algorithm."
- 1
- 2
См. также в других словарях:
شفر — I الوسيط (شَفَرَهُ) ُ شفْرًا: أَصَابَ شُفْرَه. و الشيءَ: أصاب حَرْفَهُ. (شَفَّرَتِ) الشَّمْسُ: دنَت للغُرُوبِ. و المالُ: قَلَّ وذهب. و على الأمْرِ: أشرف ودنا منه. (الشُّفْرُ): حرفُ كلِّ شيءِ. وشَفْرُ الجَفْن: حرفُهُ الذي ينبتُ عليه الهُدْبُ. (ج)… … Arabic modern dictionary