-
1 129 digit cryptographic security number
Information technology: RSA129 (named after its inventors: Drs. Ronald L. Rivest, Adi Shamir and Leonard M. Adleman)Универсальный русско-английский словарь > 129 digit cryptographic security number
-
2 digital cryptographic security agent
Information technology: DCSAУниверсальный русско-английский словарь > digital cryptographic security agent
-
3 violation of cryptographic security
Military: VOCSУниверсальный русско-английский словарь > violation of cryptographic security
-
4 Cryptographic File System
Security: CFSУниверсальный русско-английский словарь > Cryptographic File System
-
5 Cryptographic Message Syntax
Универсальный русско-английский словарь > Cryptographic Message Syntax
-
6 cryptographic supplement to the industrial security manual
Military: CSISMУниверсальный русско-английский словарь > cryptographic supplement to the industrial security manual
-
7 Challenge Response For Authenticated Cryptographic Keys
Security: CRACKУниверсальный русско-английский словарь > Challenge Response For Authenticated Cryptographic Keys
-
8 Endorsed Cryptographic Product List
Security: ECPLУниверсальный русско-английский словарь > Endorsed Cryptographic Product List
-
9 Public Key Cryptographic System
Security: PKCSУниверсальный русско-английский словарь > Public Key Cryptographic System
-
10 controlled cryptographic item
Security: CCIУниверсальный русско-английский словарь > controlled cryptographic item
-
11 криптографическая защита
cryptographic protection, encryption protection, cryptographic securityРусско-английский политехнический словарь > криптографическая защита
-
12 криптобезопасность
Security: cryptographic security, cryptosecurityУниверсальный русско-английский словарь > криптобезопасность
-
13 обеспечение безопасности криптографическими средствами
Security: cryptographic security, cryptosecurityУниверсальный русско-английский словарь > обеспечение безопасности криптографическими средствами
-
14 криптографическая стойкость
1) Military: cryptographic strengthУниверсальный русско-английский словарь > криптографическая стойкость
-
15 криптографическая защита
1) Computers: cryptographical security2) Engineering: cryptographic protection, cryptographic security, encryption protection3) Security: ciphering, cryptoprotection, cryptosecurity, enciphering, encipherment, encryptionУниверсальный русско-английский словарь > криптографическая защита
-
16 криптостойкость
1) Network technologies: ((ГОСТ 28147-89)) encryption strength -
17 криптографическая защита
(напр. системы связи) cryptogear, cryptographic protection, encryption protection, cryptographic securityРусско-английский словарь по электронике > криптографическая защита
-
18 криптографическая защита
(напр. системы связи) cryptogear, cryptographic protection, encryption protection, cryptographic securityРусско-английский словарь по радиоэлектронике > криптографическая защита
-
19 безопасность шифрсистем и шифр-связи
Military: cryptographic securityУниверсальный русско-английский словарь > безопасность шифрсистем и шифр-связи
-
20 безопасность шифрсистем и шифрсвязи
Military: cryptographic security, cryptosecurityУниверсальный русско-английский словарь > безопасность шифрсистем и шифрсвязи
См. также в других словарях:
Security token — Several types of security tokens with a penny for scale … Wikipedia
Cryptographic Modernization Program — The Cryptographic Modernization Program is a Department of Defense directed, NSA Information Assurance Directorate led effort to transform and modernize Information Assurance capabilities for the 21st century. It has three phases: Replacement All … Wikipedia
Security and Trust Services API for J2ME — The Security and Trust Services API for J2ME (SATSA) is a collection of Java ME based APIs that provides compliant devices with additional cryptographic security features. It permits the communication of a Java ME application with a smartcard… … Wikipedia
Cryptographic engineering — is the discipline of using cryptography to solve human problems. Cryptography is typically applied when trying to ensure data confidentiality, to authenticate people or devices, or to verify data integrity in risky environments. Cryptographic… … Wikipedia
Cryptographic primitive — Cryptographic primitives are well established, low level cryptographic algorithms that are frequently used to build computer security systems. These routines include, but are not limited to, one way hash functions and encryption functions.… … Wikipedia
Security management — is a broad field of management related to asset management, physical security and human resource safety functions. It entails the identification of an organization s information assets and the development, documentation and implementation of… … Wikipedia
Cryptographic log on — (CLO) is a process that uses Common Access Cards (CAC) and embedded Public Key Infrastructure (PKI) certificates to authenticate a user s identification to a workstation and network. It replaces the username and passwords for identifying and… … Wikipedia
Cryptographic Message Syntax — (CMS) ist ein Standard vom IETF für gesicherte kryptographische Mitteilungen. CMS ist die Obermenge des PKCS #7 (Public Key Cryptography Standards #7) welche auf S/MIME aufsetzt. Der Version 2 lag der gleiche Standard zugrunde. Ab Version 3… … Deutsch Wikipedia
Security software — is a generic term referring to any computer program or library whose purpose is to (help) secure a computer system or computer network.* Antivirus software * Cryptographic software * Firewall * Spyware remover * Any Operating system security… … Wikipedia
Cryptographic hash function — A cryptographic hash function (specifically, SHA 1) at work. Note that even small changes in the source input (here in the word over ) drastically change the resulting output, by the so called avalanche effect. A cryptographic hash function is a… … Wikipedia
Security through obscurity — In cryptography and computer security, security through obscurity (sometimes security by obscurity) is a controversial principle in security engineering, which attempts to use secrecy (of design, implementation, etc.) to provide security. A… … Wikipedia