-
1 криптомодуль
1) Computers: crypto module (cryptomodule)2) Security: cryptomodule, encryption box
См. также в других словарях:
Crypto++ — Developer(s) Wei Dai Initial release 1995 Stable release 5.6.1 / August 9, 2010; 14 months ago ( … Wikipedia
Crypto phone — Crypto phones are mobile telephones that provide security against eavesdropping and electronic surveillance. The interception of telecommunications has become a major industry. Most of the world s intelligence agencies and many private… … Wikipedia
Crypto Operating System — This article is about the COS operating system. For the µC/OS real time kernel, see MicroC/OS II. For the ChibiOS real time operating system, see ChibiOS/RT. Crypto Operating System (COS) was the development name of a Mac compatible operating… … Wikipedia
Hardware Security Module — A Hardware Security Module (often abbreviated to HSM) is a physical device in form of a plug in card or an external security device that can be attached to general purpose computer and servers.The goals of an HSM are the: (a) secure generation,… … Wikipedia
Trusted Platform Module — В вычислительной технике, Trusted Platform Module (TPM) название спецификации, описывающей криптопроцессор, в котором хранятся криптографические ключи для защиты информации, а также обобщенное наименование реализаций указанной спецификации … Википедия
Hardware Security Module — Ein nCipher nShield F3 Hardware Security Module in PCIe Form Der Begriff Hardware Sicherheitsmodul (HSM) oder englisch Hardware Security Module bezeichnet ein (internes oder externes) Peripheriegerät für die effiziente und sichere Ausführung… … Deutsch Wikipedia
CyaSSL — Developer(s) Todd Ouska Stable release 1.9.0 / March 2011 Development status Active Written in C language Op … Wikipedia
Network Security Services — Developer(s) AOL, Red Hat, Sun Microsystems, Oracle Corporation, Google and others Stable release 3.12.8 / September 23, 2010; 13 months ago (2010 09 23) … Wikipedia
Liaison 16 — La Liaison 16 (L16) est un standard de liaison de données tactiques de l OTAN pour l échange d informations tactiques entre des unités militaires. Le contenu de sa messagerie et le protocole d émission sont définis par le STANAG[acro 1] 5516 pour … Wikipédia en Français
Comparison of TLS Implementations — The Transport Layer Security (TLS) protocol provide the ability to secure communications across networks. There are several TLS implementations which are free and open source software and sometimes choosing between the available implementations… … Wikipedia
Trusted Computing — (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has a specialized meaning. With Trusted Computing the computer will consistently behave in specific ways, and… … Wikipedia