-
1 clear key encryption
использование ключа шифрования, не защищённого шифрованием при помощи другого ключаАнгло-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. > clear key encryption
-
2 clear key
незашифрованный (незащищённый, чистый) криптографический ключАнгло-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. > clear key
-
3 key
1) (криптографический) ключ2) ключ к замку или запирающему устройству, механический ключ- base key- candidate key- card key- code key- data key- DES key- fake key- file key- good key- hex key- host key- link key- lost key- node key- numeric key- numerical key- pass key- PRN key- safe key- seed key- test key- true key- used key- user key- weak key- work key- zone key -
4 key
1) ключ; кнопка, клавиша; переключатель2) ключ, шифр, код; указание к решению3) переключать, работать ключом, коммутировать6) ключ (в управлении базами данных - идентификатор записи или группы записей в файле данных)7) снабжать ключом (для правильной пространственной ориентации, напр., микросхемы)8) ключ (папка в левой части окна редактора реестра (registry); может содержать подключи и значимые элементы)•- key in- key off
- key on
- key out
- accelerator key
- activate key
- actual key
- alphanumeric keys
- alphameric keys
- arrow key
- ascending key - authorization key
- autorepeating key
- backarrow key
- backspace key
- break key
- bucky bit key
- calculation key
- cancel key
- canceling key
- candidate key
- carriage restore key
- carriage reverse key
- carriage space key
- chained key
- change mode key
- character key
- check reset key
- chroma key
- clear key
- clear/entry key
- clearing key
- concatenated key
- confirmation key
- control key
- conversion key
- data encryption key
- dead key
- decimal key
- descending key
- diode key
- direction key
- duplicate key
- encryption key
- entity key
- entry and summation key
- erase key
- erase-all key
- escape key
- execute console instruction key
- extra key
- fast key
- foreign key
- front key
- function key
- generic control key
- generic key
- half-space key
- halt key
- home key
- hot key
- infinite random key
- initiate key
- interrupt key
- labeled key
- latch-down key
- lighted key
- load key
- major key
- membrane key
- menu-driven key
- minor key - one-shot key
- option key
- page-up key
- pass key
- primary key
- printscreen key
- privacy key
- private key
- product key
- programmable function key
- protection key
- public key
- qualified compound key
- release key
- request enter key
- reset key
- respond typeout key
- return key
- rubout key
- running key
- run-time key
- search key
- secondary key
- self-certified public key - session key
- shift key
- shifted function key
- shortcut key
- signaling key
- single cycle key
- single step key
- size key
- soft key
- sort key
- start key
- stop key
- storage key
- storage protection key
- switch key
- system key
- system utility key
- top key
- transaction key
- unlabeled function key
- unmatched key
- up arrow key
- user-definable key
- voice keyEnglish-Russian dictionary of computer science and programming > key
-
5 key
1) ключ2) гаечный ключ3) замок; замковый камень ( арки или свода)4) шпонка; пластинчатый нагель || крепить шпонкой; сажать на шпонку5) клин; шплинт || крепить клином или шплинтом6) расшивка ( инструмент)7) насекать поверхность под штукатурку8) перевязывать швы ( в кладке)9) ключ; кнопка; кнопочный переключатель; клавиша || нажимать кнопку; нажимать клавишу11) направляющий ключ (напр. цоколя лампы)12) вчт. ключ; шифр13) полигр. изображение-основа14) пояснение в подрисуночной подписи; экспликация•to drift out a key — выбивать ( выколачивать) шпонку;to seat a key — ставить шпонку;to key to surface — сцепляться с поверхностью-
accent key
-
access key
-
activate key
-
actual key
-
adjusting key
-
aligning key
-
alignment key
-
Allen key
-
alphanumeric keys
-
alphameric keys
-
angle cock key
-
announcer's key
-
answering key
-
anticlash key
-
arch key
-
armature head lock key
-
armature keys
-
assignment key
-
attention key
-
automatic cancel key
-
auxiliary key
-
averaging key
-
axle-lining key
-
backspace key
-
backup key
-
brake hanger key
-
brake shoe key
-
break key
-
breakout key
-
bridge key
-
buffered key
-
busy key
-
calling key
-
call key
-
cancel transmission key
-
canceling key
-
cancel key
-
candidate key
-
cap key
-
carriage release key
-
carriage restore key
-
censor key
-
center key
-
chamfered key
-
character key
-
check key
-
cipher key
-
clearing key
-
clear key
-
code key
-
column layout key
-
command key
-
concatenated key
-
concrete key
-
control key
-
correction key
-
coupler shank pin retaining key
-
crypto key
-
current-reversing key
-
cursor key
-
cutoff key
-
dazzle-free key
-
decimal tabulator key
-
deck support key
-
de-jammer key
-
delete key
-
dive key
-
dog damping key
-
double-dovetail key
-
double-function key
-
draft key
-
draw key
-
ductor key
-
editing key
-
edit key
-
encryption key
-
end-of-page key
-
enter key
-
erase key
-
escape key
-
exclusion key
-
exit key
-
extra key
-
feather key
-
figure key
-
flat key
-
foreign key
-
format recall key
-
fox key
-
fully concatenated key
-
functional key
-
function key
-
generic key
-
gib-headed key
-
gib-head key
-
half-space key
-
halt key
-
hammerhead key
-
hardware storage key
-
hold-down tabulator key
-
home key
-
index key
-
ink key
-
interference-fit key
-
interruption key
-
interrupt key
-
justification key
-
keying-fit key
-
lie key
-
line recall key
-
line spacing key
-
load key
-
locator key
-
locking key
-
loose key
-
lower rail key
-
major key
-
margin key
-
margin-release key
-
memory key
-
memory total key
-
microadjustable key
-
monitoring key
-
Morse key
-
multifunction key
-
nonlocking key
-
numbered key
-
number key
-
numeric shift key
-
numerical key
-
numeric key
-
occupation key
-
operating key
-
order-wire key
-
paper ejection key
-
paper injection key
-
paper positioning key
-
paragraph indentation key
-
party line ringing key
-
pass key
-
pattern key
-
phrase recall key
-
pin key
-
plug key
-
point key
-
primary key
-
privacy key
-
private key
-
programmable key
-
prong key
-
protection key
-
public key
-
pulsing key
-
radial key
-
reading key
-
read key
-
recall key
-
release key
-
relocate typing point key
-
removable key
-
repeat key
-
resetting key
-
reset key
-
return and vertical spacing key
-
return key
-
reverse key
-
rhythm-compensation key
-
ring-back key
-
ringing key
-
round key
-
route canceling key
-
route key
-
rubout key
-
screw key
-
search key
-
secondary key
-
selector key
-
semicircular key
-
sending key
-
sequencing key
-
shear key
-
shift key
-
shift-lock key
-
signaling key
-
sliding key
-
sloped key
-
socket key
-
soft key
-
sorting key
-
sort key
-
space key
-
spacing key
-
speaking key
-
split key
-
spring buckle key
-
start key
-
stop key
-
storage key
-
straight key
-
switching key
-
switch key
-
switch-lock key
-
tabulating key
-
tab key
-
tabulator clearing key
-
tab clearing key
-
tabulator-set key
-
talking key
-
tangential key
-
tangent key
-
tapered key
-
taper key
-
telegraph key
-
test key
-
tightening key
-
title centering key
-
total tabulator clearing key
-
touch-sensitive key
-
touch key
-
track key
-
track link key
-
track shoe key
-
transfer key
-
turn key
-
typamatic key
-
upper rail key
-
user-defined key
-
voice key
-
wedge key
-
Woodruff key
-
write key -
6 key
1) ключ; переключатель2) кнопка; клавиша3) телеграфный ключ, манипулятор; работать телеграфным ключом, манипулировать4) вчт. код, шифр•- adaptive current-controlled key
- All Messages key
- alphameric key
- alphanumeric key
- analog key
- answering key
- Answering Unit Lock key
- Answering Unit On key
- Ant key
- arrow keys
- assignment key
- Asterisk key
- Audio Mixing key
- authentication key
- Auto Store key
- Band key
- break key
- bridge key
- busy key
- calibration test key
- call key
- calling key
- cam key
- Cancel key
- Caps Lock key
- caption key
- Carriage return key
- check key
- chroma key
- ciphering key
- Clear key
- clearing key
- closed key
- code key
- collector key
- Confidential Mailbox key
- contactless key
- contactor key
- Contrast key
- Contrast selector key
- Control key
- Copy key
- Cut-in key
- Cut-out key
- Darker key
- Dedicated-Message key
- Delayed-Polling key
- Delayed-Transmission key
- Delete key
- dial key
- Dial Tone key
- digital keys
- Directory key
- disk key
- Display/Clock key
- diver-telephone key
- DT key
- DUB key
- electronic key
- enciphering key
- encryption key
- End key
- Energy Saver key
- Enter key
- Erase key
- Esc key
- Escape key
- Extra key
- F1 key
- F2 key
- F3 key
- Fade-in key
- Fade-out key
- feed key
- Fine key
- Flash key
- function key
- functional key
- Game/Digital Preset keys
- Greeting Rec key
- Greeting Recording key
- Greeting Select key
- Halftone key
- Halftone selector key
- Handsfree key
- hanged key
- Headset key
- Help key
- HI-LITE key
- Hold key
- Home key
- identification key
- Insert key
- integral key
- intelligent key
- interruption key
- lighted key
- line disconnection key
- Line Spacing key
- linear feedback key
- listening and speaking key
- load key
- Local Mode On key
- locking key
- Lower key
- magnetic key
- mail box key
- measure key
- menu key
- M-key
- Mode key
- monitoring key
- mono/tuner key
- Mute key
- Navi key
- new message key
- Num Lock key
- numbered key
- n-wire key
- open key
- open/close key
- operating key
- optron key
- P+/P-keys
- Page Down key
- Page Up key
- Party Line Ringing key
- Pause Break key
- Pause key
- Phase key
- plug key
- Polarity key
- power key
- previous program key
- Print Screen key
- Priority key
- private key
- programmable key
- protection key
- public key
- pulsing key
- Recall key
- RECEIVE MODE key
- receiving key
- Reception key
- Reception mode key
- Reception/Transmission key
- Reception/Transmission mode key
- redial key
- Redial/Pause key
- reed key
- Relay Broadcast key
- releasing key
- Repeat key
- Reperforator ON/OFF key
- Report key
- Reset key
- Resolution key
- Resolution selector key
- reverse key
- ring-back key
- ringing key
- running key
- Scroll key
- Scroll Lock key
- Search key
- selector key
- semiconductor key
- sending key
- session key
- SET key
- Shift key
- signaling key
- Skipping key
- slave key
- soft key
- SOUND MODE key
- sounder key
- Space key
- speaking key
- specific key
- splitting key
- Stamp key
- STANDBY key
- Start key
- Stop key
- stopless key
- Store key
- Super key
- switch key
- Switch Teletext ON/OFF key
- switching key
- Tab key
- Tabulation key
- Talk key
- talk ringing key
- talking key
- tape eject key
- telegraph key
- Telephone Registration key
- thyristor key
- Tone key
- transfer key
- transistor key
- Transmission Speed Selector key
- TTI key
- Tuner/Band key
- Turbo-dial key
- turn key
- unique key
- User Data key
- User Sw. key
- V-key
- Volume key
- Yes/No keysEnglish-Russian dictionary of telecommunications and their abbreviations > key
-
7 secure key
ключ шифрования, защищённый шифрованием при помощи другого ключаАнгло-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. > secure key
-
8 mode
-
9 regime
См. также в других словарях:
Key size — In cryptography, key size or key length is the size measured in bits[1] of the key used in a cryptographic algorithm (such as a cipher). An algorithm s key length is distinct from its cryptographic security, which is a logarithmic measure of the… … Wikipedia
Disk encryption theory — Disk encryption is a special case of data at rest protection when the storage media is a sector addressable device (e.g., a hard disk). This article presents cryptographic aspects of the problem. For discussion of different software packages and… … Wikipedia
Diffie–Hellman key exchange — (D–H)[nb 1] is a specific method of exchanging keys. It is one of the earliest practical examples of key exchange implemented within the field of cryptography. The Diffie–Hellman key exchange method allows two parties that have no prior knowledge … Wikipedia
AACS encryption key controversy — A controversy surrounding the AACS cryptographic key arose in April 2007 when the Motion Picture Association of America and the Advanced Access Content System Licensing Administrator, LLC (AACS LA) began issuing demand letters[1] to websites… … Wikipedia
Disk encryption software — To protect confidentiality of the data stored on a computer disk a computer security technique called disk encryption is used. This article discusses software that is used to implement the technique (for cryptographic aspects of the problem see… … Wikipedia
Opportunistic encryption — (OE) refers to any system that, when connecting to another system, attempts to encrypt the communications channel otherwise falling back to unencrypted communications. This method requires no pre arrangement between the two systems. Opportunistic … Wikipedia
Filesystem-level encryption — Filesystem level encryption, often called file or folder encryption, is a form of disk encryption where individual files or directories are encrypted by the file system itself. This is in contrast to full disk encryption where the entire… … Wikipedia
End-to-end encryption — Description End to end encryption (E2EE) encrypts clear (red) data at source with knowledge of the intended recipient, allowing the encrypted (black) data to travel safely through vulnerable channels (eg. public networks) to its recipient where… … Wikipedia
Public key infrastructure — In cryptography, a public key infrastructure (PKI) is an arrangement that binds public keys with respective user identities by means of a certificate authority (CA). The user identity must be unique for each CA. The binding is established through … Wikipedia
Disk encryption hardware — To protect confidentiality of the data stored on a computer disk a computer security technique called disk encryption is used. This article discusses hardware which is used to implement the technique (for cryptographic aspects of the problem see… … Wikipedia
Transparent end-to-end encryption for the internets — (IPETEE) is a proposal for a network level encryption method which would effectively encrypt all internet communication. The encryption would be handled by software on the client and server machines, and would negotiate the encryption behind the… … Wikipedia