-
1 Temporal Key Integrity
Security: TKIУниверсальный русско-английский словарь > Temporal Key Integrity
-
2 Temporal Key Integrity Protocol
Information technology: TKIP (WEP, WLAN, WPA)Универсальный русско-английский словарь > Temporal Key Integrity Protocol
-
3 temporal key integrity protocol
Information technology: TKIP (WEP, WLAN, WPA)Универсальный русско-английский словарь > temporal key integrity protocol
-
4 Протокол ограниченной во времени целостности ключа
Programming: Temporal Key Integrity ProtocolУниверсальный русско-английский словарь > Протокол ограниченной во времени целостности ключа
-
5 шифрование с использованием временных ключей
Network technologies: temporal key integrity protocol (см. также TKIP)Универсальный русско-английский словарь > шифрование с использованием временных ключей
См. также в других словарях:
Temporal Key Integrity Protocol — or TKIP is a security protocol used in the IEEE 802.11 wireless networks. Background TKIP (pronounced tee kip ) was designed by the IEEE 802.11i task group and the Wi Fi Alliance as a solution to replace WEP without requiring the replacement of… … Wikipedia
Temporal Key Integrity Protocol — oder kurz TKIP ist ein Sicherheitsprotokoll für drahtlose Netzwerke gemäß IEEE 802.11 Standard. TKIP (/ˌtiːˈkɪp/) wurde von der IEEE 802.11i Arbeitsgruppe in Zusammenarbeit mit der Wi Fi Alliance entwickelt, um WEP, ohne dass neue bzw.… … Deutsch Wikipedia
Temporal Key Integrity Protocol — TKIP (Temporal Key Integrity Protocol) est un protocole de communication utilisé pour la protection et l authentification des données transitant sur un réseau Wi Fi. Destiné à remplacer le WEP, protocole ayant de nombreuses faiblesses, TKIP est… … Wikipédia en Français
pre-shared key — noun A TKIP passphrase used to protect your network traffic in WPA. A mechanism in Wi Fi Protected Access (WPA) Personal that allows the use of manually entered keys or passwords to initiate WPA security. The PSK is entered on the access point or … Wiktionary
Temporal single-system interpretation — The temporal single system interpretation (TSSI) of Karl Marx s value theory emerged in the early 1980s in response to renewed allegations that his theory was riven with internal inconsistencies, and that it must therefore be rejected or… … Wikipedia
Surrogate key — A surrogate key in a database is a unique identifier for either an entity in the modeled world or an object in the database. The surrogate key is not derived from application data. Definition Two definitions of a surrogate appear in the… … Wikipedia
Domain/key normal form — (DKNF) is a normal form used in database normalization which requires that the database contains no constraints other than domain constraints and key constraints. A domain constraint specifies the permissible values for a given attribute, while a … Wikipedia
TKIP — Temporal Key Integrity Protocol TKIP (Temporal Key Integrity Protocol) est un protocole de communication utilisé pour la protection et l authentification des données transitant sur un réseau Wi Fi. Destiné à remplacer le WEP, protocole ayant de… … Wikipédia en Français
TKIP — Temporal Key Integrity Protocol (Computing » Telecom) Temporal Key Integrity Protocol (Computing » Security) … Abbreviations dictionary
IEEE 802.11i-2004 — IEEE 802.11i 2004, or 802.11i, is an amendment to the IEEE 802.11 standard specifying security mechanisms for wireless networks. The amendment has been incorporated into the published IEEE 802.11 2007 standard.802.11 is a set of IEEE standards… … Wikipedia
Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… … Wikipedia