Перевод: с английского на русский

с русского на английский

Key Pairs

См. также в других словарях:

  • dual key pairs — sudvejintos raktų poros statusas T sritis informatika apibrėžtis Dvi ↑viešųjų raktų ir ↑privačiųjų raktų poros – iš viso keturi raktai – atitinkantys du atskirus ↑liudijimus. Privatusis raktas iš vienos poros yra naudojamas parašui, o viešasis ir …   Enciklopedinis kompiuterijos žodynas

  • Key-agreement protocol — In cryptography, a key agreement protocol is a protocol whereby two or more parties can agree on a key in such a way that both influence the outcome. If properly done, this precludes undesired third parties from forcing a key choice on the… …   Wikipedia

  • Key System — The Key System (or Key Route) was a privately owned company which provided mass transit in the cities of Oakland, Berkeley, Alameda [ [http://findarticles.com/p/articles/mi qn4176/is 20030621/ai n14551761 Old Alameda s transit system was less… …   Wikipedia

  • Cryptographic key types — One of the most important aspects of any cryptographic system is key management; it is also the aspect which is most often neglected.[citation needed] A very common mistake is mixing different key types and reusing the same key for different… …   Wikipedia

  • Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key …   Wikipedia

  • Weak key — In cryptography, a weak key is a key which when used with a specific cipher, makes the cipher behave in some undesirable way. Weak keys usually represent a very small fraction of the overall keyspace, which usually means that if one generates a… …   Wikipedia

  • List of cryptographic key types — This glossary lists types of keys as the term is used in cryptography, as opposed to door locks. Terms that are primarily used by the U.S. National Security Agency are marked (NSA) . For classification of keys according to their usage see… …   Wikipedia

  • Glossary of cryptographic key types — This glossary lists types of keys as the term is used in cryptography, as opposed to door locks. Terms that are primarily used by the U.S. National Security Agency are marked (NSA). For classification of keys according to their usage see… …   Wikipedia

  • Public key infrastructure — In cryptography, a public key infrastructure (PKI) is an arrangement that binds public keys with respective user identities by means of a certificate authority (CA). The user identity must be unique for each CA. The binding is established through …   Wikipedia

  • Public key fingerprint — In public key cryptography, a public key fingerprint is a short sequence of bytes used to authenticate or look up a longer public key. Fingerprints are created by applying a cryptographic hash function to a public key. Since fingerprints are… …   Wikipedia

  • 1A2 Key System — The 1A2 Key System is an analog multiline business key telephone system. Unlike more modern multiline systems, every telephone line serving a particular phone is wired into that phone, and electromechanical switches (the keys ) switch the lines… …   Wikipedia

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»