-
1 cryptography
"The study or analysis of codes and encoding methods used to secure information. Cryptography is used to provide confidentiality, data integrity, authentication (entity and data origin), and nonrepudiation." -
2 Cryptography Application Programming Interface
An (API) that is provided as part of Microsoft Windows. CryptoAPI provides a set of functions that allow applications to encrypt or digitally sign data in a flexible manner while providing protection for the user's sensitive private key data. Actual cryptographic operations are performed by independent modules known as (CSPs).English-Arabic terms dictionary > Cryptography Application Programming Interface
-
3 Public Key Cryptography Standards
"A family of standards for public key cryptography that includes RSA encryption, Diffie-Hellman key agreement, password-based encryption, extended-syntax, cryptographic message syntax, private key information syntax, and certificate request syntax, as well as selected attributes. Developed, owned, and maintained by RSA Data Security, Inc."English-Arabic terms dictionary > Public Key Cryptography Standards
-
4 Secure Sockets Layer
"The protocol that improves the security of data communication by using a combination of data encryption, digital certificates, and public key cryptography. SSL enables authentication and increases data integrity and privacy over networks. SSL does not provide authorization or nonrepudiation." -
5 SSL
"The protocol that improves the security of data communication by using a combination of data encryption, digital certificates, and public key cryptography. SSL enables authentication and increases data integrity and privacy over networks. SSL does not provide authorization or nonrepudiation." -
6 ar-sa عامل تصفية
"The study or analysis of codes and encoding methods used to secure information. Cryptography is used to provide confidentiality, data integrity, authentication (entity and data origin), and nonrepudiation." -
7 PKCS #7
"The Cryptographic Message Syntax Standard. It is a general syntax, developed and maintained by RSA Data Security, Inc., for data to which cryptography may be applied, such as digital signatures and encryption. It also provides a syntax for disseminating certificates or certificate revocation lists."PKCS#7 -
8 Internet Protocol security
"A set of industry-standard, cryptography-based services and protocols that help to protect data over a network."English-Arabic terms dictionary > Internet Protocol security
-
9 ar-sa أمان برتوكول الإنترنت
"A set of industry-standard, cryptography-based services and protocols that help to protect data over a network."English-Arabic terms dictionary > ar-sa أمان برتوكول الإنترنت
-
10 IPsec
"A set of industry-standard, cryptography-based services and protocols that help to protect data over a network." -
11 confidentiality
"A basic security function of cryptography that ensures that only authorized users can read or use confidential or secret information. Without confidentiality, anyone with network access can use readily available tools to eavesdrop on network traffic and intercept valuable proprietary information. For example, an Internet Protocol security service ensures that a message is disclosed only to intended recipients by encrypting the data."السرّية
См. также в других словарях:
Data Encryption Standard — The Feistel function (F function) of DES General Designers IBM First publis … Wikipedia
Cryptography Research — Cryptography Research, Inc. Type Private subsidiary Headquarters San Francisco, California Key people … Wikipedia
Data remanence — is the residual representation of data that remains even after attempts have been made to remove or erase the data. This residue may result from data being left intact by a nominal file deletion operation, by reformatting of storage media that… … Wikipedia
Data erasure — (also called data clearing or data wiping) is a software based method of overwriting data that completely destroys all electronic data residing on a hard disk drive or other digital media. Permanent data erasure goes beyond basic file deletion… … Wikipedia
Data transmission — Data transmission, digital transmission, or digital communications is the physical transfer of data (a digital bit stream) over a point to point or point to multipoint communication channel. Examples of such channels are copper wires, optical… … Wikipedia
cryptography — The process of writing or solving codes. The term describes processes by which transmissions of data are kept secure by applying very large numbers with particular mathematical properties for the purpose of encryption of or scrambling data.… … Law dictionary
Data Validation and Certification Server — (DVCS) is a public key infrastructure or PKI service providing data validation services, asserting correctness of digitally signed documents, validity of public key certificates and possession or existence of data. In practical applications DVCS… … Wikipedia
Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption … Wikipedia
Cryptography standards — There are a number of standards related to cryptography. Standard algorithms and protocols provide a focus for study; standards for popular applications attract a large amount of cryptanalysis. Contents 1 Encryption standards 2 Hash standards 3… … Wikipedia
Data Encryption Standard — DES Eine Feistel Runde (F Funktion) Entwickler IBM Veröffentlicht 1975 Abgeleitet von … Deutsch Wikipedia
Data Authentication Algorithm — The Data Authentication Algorithm (DAA) is a former U.S. government standard for producing cryptographic message authentication codes. According to the standard, a code produced by the DAA is called a Data Authentication Code (DAC). The algorithm … Wikipedia