-
1 HBA
1) Общая лексика: health and beauty aids2) Военный термин: home base3) Техника: horizontal baffle assembly4) Грубое выражение: Head Bobbing Asshole5) Сокращение: Housing Builders Association6) Вычислительная техника: Host Bus Adapter (SCSI), адаптер главной шины7) СМИ: Harvest Broadcasting Association8) Деловая лексика: High Bandwidth Access9) Безопасность: Hardware Based Authentication, Host Based Authentication10) Расширение файла: Host Bus Adapter -
2 HbA
1) Общая лексика: health and beauty aids2) Военный термин: home base3) Техника: horizontal baffle assembly4) Грубое выражение: Head Bobbing Asshole5) Сокращение: Housing Builders Association6) Вычислительная техника: Host Bus Adapter (SCSI), адаптер главной шины7) СМИ: Harvest Broadcasting Association8) Деловая лексика: High Bandwidth Access9) Безопасность: Hardware Based Authentication, Host Based Authentication10) Расширение файла: Host Bus Adapter -
3 key
1) (криптографический) ключ2) ключ к замку или запирающему устройству, механический ключ- base key- candidate key- card key- code key- data key- DES key- fake key- file key- good key- hex key- host key- link key- lost key- node key- numeric key- numerical key- pass key- PRN key- safe key- seed key- test key- true key- used key- user key- weak key- work key- zone key -
4 system
- computationally secure system- abuse-free system- algebraic code system- analog system- asymmetric system- asymmetric key system- authentication/secrecy system- binary system- block system- broadcast system- broadcasting system- cipher-feedback system- classical system- common-key system- communication system- compromised system- computationally secure system- conference system- conventional system- DES-based system- DES-like system- deterministic system- DH system- Diffie and Hellman system- discrete-exponentiation system- discrete log system- E3 system- effectively unbreakable system- elliptic curve system- endomorphic system- end-to-end encryption system- error propagating system- factorization system- finite system- finite automation system- Galois field system- general system- generalized system- Goppa-code system- hardware-implemented system- hidden key system- high-grade system- high-speed system- hybrid public-secret key system- hybrid stream/block system- identity-based system- system immune to cryptoanalysis- indecipherable system- intractable system- iterated system- key escrow system- keyed system- key escrow system- key-minimal system- knapsack-based system- knapsack public key system- matrix system- McEliece' system- Merkle-Hellman system- MH system- microprocessor based system- minuend system- multiple access system- multiple destination system- multiplicative knapsack system- network system- non-linear system- number theoretic system- one-key system- one-master-key system- one-time-key system- one-time-pad system- one-time-tape system- perfect secrecy system- practical security system- private key system- proprietary system- public key system- public key distribution system- public key signature system- rapid system- reciprocal number system- residue system- Rivest-Shamir-Adleman system- rotor system- RSA public key system- r-th residue system- secret-key system- secure system- shared key system- shift register system- single-key system- sophisticated system- split key system- strong system- subtractive system- symmetric system- theoretically unbreakable system- threshold system- transposition system- trap-door-knapsack public key system- transient key system- threshold system- two-key system- unbreakable system- voice system -
5 cryptosystem
криптографическая система, криптосистема; шифросистема- abuse-free cryptosystem- algebraic code cryptosystem- analog cryptosystem- asymmetric cryptosystem- asymmetric key cryptosystem- authentication/secrecy cryptosystem- bijective public key cryptosystem- binary cryptosystem- block cryptosystem- broadcast cryptosystem- broadcasting cryptosystem- cipher-feedback cryptosystem- classical cryptosystem- common-key cryptosystem- communication cryptosystem- compromised cryptosystem- computationally secure cryptosystem- conference cryptosystem- conventional cryptosystem- DES-based cryptosystem- DES-like cryptosystem- deterministic cryptosystem- DH cryptosystem- Diffie and Hellman cryptosystem- discrete-exponentiation cryptosystem- discrete log cryptosystem- E3 cryptosystem- effectively unbreakable cryptosystem- elliptic curve cryptosystem- endomorphic cryptosystem- end-to-end encryption cryptosystem- error propagating cryptosystem- factorization cryptosystem- finite cryptosystem- finite automation cryptosystem- Galois field cryptosystem- general cryptosystem- generalized cryptosystem- Goppa-code cryptosystem- hardware-implemented cryptosystem- hidden key cryptosystem- high-grade cryptosystem- high-speed cryptosystem- hybrid public-secret key cryptosystem- hybrid stream/block cryptosystem- identity-based cryptosystem- intractable cryptosystem- indecipherable cryptosystem- iterated cryptosystem- keyed cryptosystem- key escrow cryptosystem- key-minimal cryptosystem- knapsack-based cryptosystem- knapsack public key cryptosystem- matrix cryptosystem- McEliece' cryptosystem- Merkle-Hellman cryptosystem- MH cryptosystem- microprocessor based cryptosystem- minuend cryptosystem- multiple access cryptosystem- multiple destination cryptosystem- multiplicative knapsack cryptosystem- network cryptosystem- non-linear cryptosystem- number theoretic cryptosystem- one-key cryptosystem- one-master-key cryptosystem- one-time-key cryptosystem- one-time-pad cryptosystem- one-time-tape cryptosystem- perfect secrecy cryptosystem- practical security cryptosystem- private key cryptosystem- proprietary cryptosystem- provable secure cryptosystem- public key cryptosystem- public key distribution cryptosystem- public key signature cryptosystem- rapid cryptosystem- reciprocal number cryptosystem- residue cryptosystem- Rivest-Shamir-Adleman cryptosystem- rotor cryptosystem- RSA public key cryptosystem- r-th residue cryptosystem- secret-key cryptosystem- secure cryptosystem- shared key cryptosystem- shift register cryptosystem- single-key cryptosystem- sophisticated cryptosystem- split key cryptosystem- strong cryptosystem- subtractive cryptosystem- symmetric cryptosystem- theoretically unbreakable cryptosystem- threshold cryptosystem- transposition cryptosystem- trap-door-knapsack public key cryptosystem- transient key cryptosystem- threshold cryptosystem- two-key cryptosystem- unbreakable cryptosystem- voice cryptosystem- cryptosystem immune to cryptoanalysisАнгло-русский словарь по компьютерной безопасности > cryptosystem
-
6 code
1) код || кодировать3) (машинная) программа || программировать4) код, (машинное) слово (напр., команда)•- absolute code
- abstract code
- access code - address code
- alphanumeric code
- alphameric code
- alphabetical code
- alphabetic code
- amplitude code
- ASA code
- attribute-control code
- augmented operation code - balanced code
- bar code
- baseline code
- basic code
- basic order code
- Baudot code
- binary code
- binary decimal code
- binary-coded decimal code
- biquinary code
- block code
- block structured code
- Bose-Chaudhuri code
- brevity code
- bug-arresting code
- burst error correcting code
- cable code
- call directing code
- call direction code- cap code- character code
- check code
- checkable code
- Chinese binary code
- color code
- column binary code
- comma-free code
- command code
- compiler-produced code
- completion code
- computer code
- conditional code
- condition code
- constant ratio code
- continuous progressive code - convolution code
- convolutional code
- correcting code- CP code- cyclic code
- cyclic permuted code
- data code
- data conversion code
- data link code - dense binary code
- deposited source code
- destination code
- device code
- digital code
- direct code
- directing character code
- dot-and-dash code
- double-error correcting code
- eight channel code
- entry code - error-checking code
- error-control code
- error-correcting code
- error-detecting code
- error-detection code
- error-limited code
- escape code - executable code
- exit code
- exponent code
- extended mneminic code
- external readable code
- factorable code
- false code
- fault code
- feature code
- Fire code
- five bit code
- five channel code
- forbidden-character code
- forbidden code
- format code
- four-adress code
- fragile code
- frequency code
- function code
- Gray code
- group code
- Hamming code
- hash code - Huffman code
- identification code
- identifying code
- illegal code
- improper code
- in-line code
- inner code
- instantaneously decodable code
- instruction code
- internal code
- interpretive code
- inverted code - line code
- linear code
- line-feed code
- lock code
- machine code
- machine-instruction code
- machine-language code
- machine-operation code
- machine-readable code
- machine-treatable code
- magnetic bar code
- magnetic tape code
- Manchester code
- message-format code
- micro code
- minimum-access code
- minimum-delay code
- minimum-distance code
- minimum-latency code
- minimum-redundance code
- mnemonic code
- modified binary code
- modular code
- modulation code - Muller code
- multiple-address code
- multiple-error correcting code
- N-adjacent code
- name code
- N-ary code
- native code
- natural binary code
- N-bit code
- N-error correcting code
- N-level code
- noise combating code
- nonconsistently based code
- nonexistent code
- nonprint code
- nonreproducing code
- non-return-to-zero code
- nonsystematic code
- nonweighted code
- N-place code
- number address code
- number code
- numerical code
- numeric code
- N-unit code
- object code
- one-address code
- one-dimensional code
- one-level code
- one-out-of-ten code
- op code
- operand code
- operation code
- optimum code
- order code
- outer code
- own code
- paired-disparity code
- paper tape code
- parallel code
- parity-checking code
- parity-check code
- perforated tape code
- permutation code
- permuted code
- personal-identification code
- phonetic code
- physical-hardware-dependent code- positional code- position code
- position-independent code
- precedence code
- print restore code - pseudocyclic code
- pseudorandom code
- pulse code
- punched card code
- punched tape code
- pure code
- quibinary code
- ready-to-run code
- recurrent code
- redundant code
- Reed-Muller code
- Reed-Solomon code
- reenterable code
- reentrant code
- reflected binary code
- reflected code
- relative code
- relocatable code
- repertory code
- reproducing code
- residual class code
- residue code
- restricted-magnitude-error correcting code
- retrieval code
- return code
- return-to-zero code
- routing code
- row-binary code
- safety code - self-checking code
- self-complementaring code
- self-complementing code
- self-correcting code
- self-demarcating code
- separable code
- serial code - severity code
- Shannon code
- short computer code
- short code
- sign code
- signal code
- significant-digit subset code - single-address code
- single-error correcting and double-error detecting code
- single-error correcting code
- single-error detecting code
- single-parity code - skip code
- source code
- space code
- space-efficient code
- specific code - status code
- Stone's code
- stop code
- straight binary code
- straight-line code
- strip code
- syllable code
- symbol code
- symbolic code
- systematic error checking code
- tape code
- task code
- telecommunication code
- telegraph code
- teleprinter code
- teletype code
- ternary code
- threaded code
- three-adress code
- throw-away code
- time code
- timing code
- trace back code
- transmission code
- transmitter-start code
- triple-error correcting code
- two-address code
- two-out-of-five code
- two-rail code
- uniquely decipherable code
- uniquely decodable code
- unitary code
- unit-distance code
- unused code
- variable-length code
- viral code - weighted code
- weighted-checksum code - zero-address code
- zone codeEnglish-Russian dictionary of computer science and programming > code
См. также в других словарях:
Hardware-based full disk encryption — is being pursued by a number of HDD vendors including Intel, Seagate Technology, and Hitachi, Ltd. with the rest of the hard drive industry following. Encryption and the symmetric encryption key is maintained independently from the CPU, thus… … Wikipedia
Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in … Wikipedia
Pre-boot authentication — (PBA) serves as an extension of the BIOS or boot firmware and guarantees a secure, tamper proof environment external to the operating system as a trusted authentication layer. The PBA prevents anything being read from the hard disk such as the… … Wikipedia
Extensible Authentication Protocol — Extensible Authentication Protocol, or EAP, is a universal authentication framework frequently used in wireless networks and Point to Point connections. It is defined in RFC 3748, which has been updated by RFC 5247. Although the EAP protocol is… … Wikipedia
Visitor Based Network — What is a Visitor based Network (VBN)? A Visitor based network (VBN) is a network designed for mobile users in need of temporary Internet service. A visitor based network is most commonly established in hotels, airports, convention centers,… … Wikipedia
Nintendo Entertainment System hardware clone — An example of a clone system: The PolyStation, designed to resemble a PSOne. Owing to the popularity and longevity of the Nintendo Entertainment System (NES; known in Japan as the Family Computer, or Famicom), the system has become one of the… … Wikipedia
Computer security compromised by hardware failure — is a branch of computer security applied to hardware. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible … Wikipedia
Array controller based encryption — Within a storage network, encryption of data may occur at different hardware levels. Array controller based encryption describes the encryption of data occurring at the disk array controller before being sent to the disk drives. This article will … Wikipedia
Web-Based Enterprise Management — (WBEM) is a set of systems management technologies developed to unify the management of distributed computing environments. WBEM is based on Internet standards and Distributed Management Task Force (DMTF) open standards: Common Information Model… … Wikipedia
HBA — Host Bus Adapter (Computing » General) Host Bus Adapter (Computing » Drivers) ** Home Builders Association (Community » Non Profit Organizations) * Health And Beauty Aids (Business » General) * Host Based Authentication (Computing » Security) *… … Abbreviations dictionary
Security token — Several types of security tokens with a penny for scale … Wikipedia