-
1 cryptosystem assessment
оценка криптосистемы
Процесс определения применимости криптосистемы на практике.
[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]Тематики
EN
Англо-русский словарь нормативно-технической терминологии > cryptosystem assessment
-
2 cryptosystem
abbr криптосистема, шифрсистема (см. cryptographic system): assessment оценка криптосистемы (процесс определения применимости криптосистемы на практике) -
3 оценка криптосистемы
оценка криптосистемы
Процесс определения применимости криптосистемы на практике.
[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]Тематики
EN
Русско-английский словарь нормативно-технической терминологии > оценка криптосистемы
См. также в других словарях:
оценка криптосистемы — Процесс определения применимости криптосистемы на практике. [http://www.rfcmd.ru/glossword/1.8/index.php?a=index d=23] Тематики защита информации EN cryptosystem assessment … Справочник технического переводчика
Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption … Wikipedia
Intelligence cycle management — This article is at the top level of a series of articles about Intelligence Cycle Management.Within the context of government, military and business affairs, intelligence (the gathering and analysis of accurate, reliable information) is intended… … Wikipedia
Intelligence collection management — is the process of managing and organizing the collection of intelligence information from various sources. The collection department of an intelligence organization may attempt basic validation of that which it collects, but is not intended to… … Wikipedia
Signals intelligence — SIGINT redirects here. For the UNIX signal, see SIGINT (POSIX). RAF Menwith Hill, a large site in the United Kingdom, part of ECHELON and the UK USA Security Agreement. Signals intelligence (often contracted to SIGINT) is intelligence gathering… … Wikipedia
Red Pike — is a classified United Kingdom government cipher, proposed for use by the National Health Service by GCHQ, but designed for a broad range of applications in the British government [http://www.cs.berkeley.edu/ daw/rja/GCHQ/25 2 97.htm] . Little is … Wikipedia
Clandestine HUMINT operational techniques — The Clandestine HUMINT page deals with the functions of that discipline, including espionage and active counterintelligence. This page deals with Clandestine HUMINT operational techniques, also called tradecraft . It applies to clandestine… … Wikipedia