-
1 authentication string
Англо-русский словарь по компьютерной безопасности > authentication string
-
2 string
-
3 Challenge Handshake Authentication Protocol
A challenge-response authentication protocol for Point-to-Point Protocol (PPP) connections described in RFC 1994. It uses the industry-standard MD5 hashing algorithm to hash the combination of a challenge string issued by the authenticating server and the user's password in the response."بروتوكول ""Challenge Handshake Authentication Protocol"""English-Arabic terms dictionary > Challenge Handshake Authentication Protocol
-
4 code
1) код; система кодирования || кодировать2) программа, текст программы, код || программировать, писать программу•-
absolute code
-
abstract code
-
address code
-
aeronautical code
-
algebraic code
-
alphanumeric code
-
alphameric code
-
answer-back code
-
antipollution code
-
area code
-
arithmetic code
-
authentication code
-
automatic code
-
balanced code
-
bar code
-
basic code
-
Baudot code
-
BCH code
-
best estimate code
-
binary code
-
binary-coded decimal code
-
binary decimal code
-
biphase code
-
bipolar code
-
block code
-
boiler code
-
Bose-Chaudhuri-Hocquenghem code
-
Building code
-
burst-correcting code
-
burst-detecting code
-
cable code
-
card code
-
carriage return code
-
chain code
-
channel code
-
character code
-
circulant code
-
close-packed code
-
code of practice
-
color code
-
command code
-
compiled code
-
complementary code
-
completion code
-
component code
-
computer code
-
concatenated code
-
condition code
-
constant ratio code
-
control code
-
convolutional code
-
copy codes
-
cyclic code
-
cyclic redundancy code
-
decimal code
-
destination code
-
diffuse code
-
direct code
-
dot-and-dash code
-
double-adjacent error-correcting code
-
electrical code
-
end line code
-
entropy code
-
equal-length code
-
equidistant code
-
erroneous code
-
error code
-
error-checking code
-
error-correcting code
-
error-detecting code
-
escape code
-
excess-N code
-
executable code
-
Fibonacci code
-
fixed-length code
-
fixed-weight code
-
flag code
-
format code
-
function code
-
genetic code
-
Gray code
-
group code
-
Hamming code
-
Hanning code
-
Hollerith code
-
Huffman code
-
identifying code
-
illegal code
-
instruction code
-
interleaved code
-
interrogation code
-
inverse code
-
kill line code
-
letter code
-
line ignore code
-
linear code
-
machine-language code
-
machine code
-
macro code
-
majority-decodable code
-
micro code
-
mnemonic code
-
m-out-of-n code
-
multiple-error correcting code
-
new common surface code
-
noise aeroport code
-
noise code
-
non-return-to-zero code
-
NRZI code
-
number code
-
numerical code
-
numeric code
-
n-unit code
-
object code
-
offset binary code
-
op code
-
parallel code
-
parity-check code
-
part-program code
-
P-code
-
perfect code
-
permutation code
-
personality code
-
polynomial code
-
positional code
-
position code
-
precedence code
-
prefix code
-
prime-residue error-correction code
-
proceed code
-
product code
-
pseudo code
-
pseudocyclic code
-
pseudonoise code
-
pseudoternary code
-
quasi-cyclic code
-
quasi-perfect code
-
quaternary code
-
rail code
-
raster code
-
recording code
-
rectangular bar code
-
recurrent code
-
redundant code
-
Reed-Muller code
-
Reed-Solomon code
-
reflected code
-
relative code
-
residue code
-
return code
-
return-to-zero code
-
rubout code
-
run-length code
-
run-length-limited code
-
sanitary code
-
self-checking code
-
serial code
-
sign code
-
simplex code
-
single error-correcting code
-
skeletal code
-
skip code
-
SMPTE time code
-
source code
-
specific code
-
standard code
-
state code
-
stop code
-
string code
-
studio code
-
symbolic code
-
systematic code
-
termination code
-
ternary code
-
time code
-
tool code
-
track code
-
transmission code
-
transparent code
-
trellis code
-
TTS code
-
twinned-binary code
-
two-frame code
-
type-bar flag code
-
typesetting code
-
unit disparity code
-
Universal Product code
-
unrail code
-
user identification code
-
user code
-
variable-length code
-
Wagner code
-
water code
-
weighted code
-
zero-disparity code
-
ZIP code -
5 algorithm
- binary backoff algorithm
- ciphering algorithm
- coding algorithm
- enciphering algorithm
- encryption algorithm
- image understanding algorithm
- Klovsky-Nicolaev algorithm
- protection algorithm
- public-key algorithm
- reception algorithm
- recurrent algorithm
- replicate algorithm
- Rivest-Shamir-Adleman algorithm
- RSA algorithm
- shrinking algorithm
- string algorithm
- synthesized algorithm
- tandeming algorithm
- truncated algorithm
- type 3 algorithm
- type 4 algorithm
- Viterbi algorithm
- voice conversion algorithm
- weight algorithm
- zero-tree wavelet algorithmEnglish-Russian dictionary of telecommunications and their abbreviations > algorithm
-
6 login ID
"A string that is used to identify a user or entity to an operating system, directory service, or distributed system. For example, in Windows® integrated authentication, a login name uses the form ""DOMAIN\username.""" -
7 CHAP
A challenge-response authentication protocol for Point-to-Point Protocol (PPP) connections described in RFC 1994. It uses the industry-standard MD5 hashing algorithm to hash the combination of a challenge string issued by the authenticating server and the user's password in the response.
См. также в других словарях:
Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in … Wikipedia
Digest access authentication — HTTP Persistence · Compression · HTTPS Request methods OPTIONS · GET · HEAD · POST · PUT · DELETE · TRACE · CONNECT Header fields Cookie · ETag · Location · Referer DNT · … Wikipedia
Basic access authentication — In the context of an HTTP transaction, the basic access authentication is a method designed to allow a web browser, or other client program, to provide credentials ndash; in the form of a user name and password ndash; when making a request.… … Wikipedia
Graphical identification and authentication — The graphical identification and authentication (GINA) library is a component of some Microsoft Windows operating systems that provides secure authentication and interactive logon services. GINA is a dynamically linked library that is loaded in… … Wikipedia
ZRTP — is a cryptographic key agreement protocol to negotiate the keys to encrypt VoIP phone calls. ZRTP describes a method of Diffie Hellman key agreement for Secure Real time Transport Protocol (SRTP). It was submitted to the IETF by Phil Zimmermann,… … Wikipedia
PGP word list — The PGP Word List (also called a biometric word list for reasons explained below) is a list of words for conveying data bytes in a clear unambiguous way via a voice channel. They are analogous in purpose to the NATO phonetic alphabet used by… … Wikipedia
PGPfone — is a secure voice telephony system developed by Philip Zimmermann in 1995. The PGPfone protocol had little in common with Zimmermann s popular PGP email encryption package, except for the use of the name. It used ephemeral Diffie Hellman protocol … Wikipedia
ZRTP — Необходимо проверить качество перевода и привести статью в соответствие со стилистическими правилами Википедии. Вы можете помочь улучшить эту статью, исправив в ней ошибки. Оригинал на английском языке … Википедия
X Window System core protocol — The X Window System logo The X Window System core protocol[1][2][3] is the base protocol of the X Windo … Wikipedia
HTTP cookie — HTTP Persistence · Compression · HTTPS Request methods OPTIONS · GET · HEAD · POST · PUT · DELETE · TRACE · CONNECT Header fields Cookie · ETag · Location · Referer DNT · … Wikipedia
Lightweight Directory Access Protocol — The Lightweight Directory Access Protocol (LDAP; /ˈɛld … Wikipedia