-
1 encryption-based secure communication
Универсальный англо-русский словарь > encryption-based secure communication
-
2 communication
1) связь, коммуникация; система связи2) передача информации (от ее источника адресатам); сообщение- all-points communication- analog communication- authenticated communication- broadcast communication- burst communication- character-oriented communication- clear communication- clear-to clear communication- client-server communication- coded communication- computer-to-terminal communication- confidential communication- conversational communication- covert communication- cryptographic communication- cryptographically protected communication- cryptographically secure communication- data communication- dial-up communication- digital communication- digitally encrypted voice communication- diplomatic communication- document communication- enciphered communication- encrypted communication- encryption communication- based secure communication- end-to-end communication- frequency hopping communication- high density communication- high-speed communication- imitative communication- intelligence communication- interactive communication- inter-enclosure communication- in-the-clear communication- large-volume communication- legitimate communication- multichannel communication- multimedia communication- multipeer communication- online communication- packet communication- peer-to-peer communication- plain communication- point-to-multipoint communication- program-to-program communication- prohibited communication- protected communication- reliable communication- robust communication- secrecy communication- secret communication- secure communication- secure-to-secure communication- secure voice communication- sensitive communication- signed communication- single-domain communication- speech communication- spoken communication- teleprinter communication- teletype communication- terminal-to-computer communication- terminal-to-terminal communication- top security communication- two-way communication- unauthorised communication- undirected communication- user/computer communication- user to user communication- visual communication- voice communicationАнгло-русский словарь по компьютерной безопасности > communication
-
3 encryption
a) прибор шифрования (обозначение в схеме)b) (encryption)1) шифрование; зашифрование; операция (за) шифрования2) криптография; криптографическая защита; криптографическое сокрытие информации3) шифротекст- hardware encryption- hardware assisted encryptionАнгло-русский словарь по компьютерной безопасности > encryption
-
4 protocol
Англо-русский словарь по компьютерной безопасности > protocol
-
5 telecommunication
1) связь, коммуникация; система связи2) передача информации (от ее источника адресатам); сообщение- all-points telecommunication- analog telecommunication- authenticated telecommunication- broadcast telecommunication- burst telecommunication- character-oriented telecommunication- clear telecommunication- clear-to clear telecommunication- client-server telecommunication- coded telecommunication- computer-to-terminal telecommunication- confidential telecommunication- conversational telecommunication- covert telecommunication- cryptographic telecommunication- cryptographically protected telecommunication- cryptographically secure telecommunication- data telecommunication- dial-up telecommunication- digital telecommunication- digitally encrypted voice telecommunication- diplomatic telecommunication- document telecommunication- enciphered telecommunication- encrypted telecommunication- encryption telecommunication- based secure telecommunication- end-to-end telecommunication- frequency hopping telecommunication- high density telecommunication- high-speed telecommunication- imitative telecommunication- intelligence telecommunication- interactive telecommunication- inter-enclosure telecommunication- in-the-clear telecommunication- large-volume telecommunication- legitimate telecommunication- multichannel telecommunication- multimedia telecommunication- multipeer telecommunication- online telecommunication- packet telecommunication- peer-to-peer telecommunication- plain telecommunication- point-to-multipoint telecommunication- program-to-program telecommunication- prohibited telecommunication- protected telecommunication- reliable telecommunication- robust telecommunication- secrecy telecommunication- secret telecommunication- secure telecommunication- secure-to-secure telecommunication- secure voice telecommunication- sensitive telecommunication- signed telecommunication- single-domain telecommunication- speech telecommunication- spoken telecommunication- teleprinter telecommunication- teletype telecommunication- terminal-to-computer telecommunication- terminal-to-terminal telecommunication- top security telecommunication- two-way telecommunication- unauthorised telecommunication- undirected telecommunication- user/computer telecommunication- user to user telecommunication- visual telecommunication- voice telecommunicationАнгло-русский словарь по компьютерной безопасности > telecommunication
-
6 system
- computationally secure system- abuse-free system- algebraic code system- analog system- asymmetric system- asymmetric key system- authentication/secrecy system- binary system- block system- broadcast system- broadcasting system- cipher-feedback system- classical system- common-key system- communication system- compromised system- computationally secure system- conference system- conventional system- DES-based system- DES-like system- deterministic system- DH system- Diffie and Hellman system- discrete-exponentiation system- discrete log system- E3 system- effectively unbreakable system- elliptic curve system- endomorphic system- end-to-end encryption system- error propagating system- factorization system- finite system- finite automation system- Galois field system- general system- generalized system- Goppa-code system- hardware-implemented system- hidden key system- high-grade system- high-speed system- hybrid public-secret key system- hybrid stream/block system- identity-based system- system immune to cryptoanalysis- indecipherable system- intractable system- iterated system- key escrow system- keyed system- key escrow system- key-minimal system- knapsack-based system- knapsack public key system- matrix system- McEliece' system- Merkle-Hellman system- MH system- microprocessor based system- minuend system- multiple access system- multiple destination system- multiplicative knapsack system- network system- non-linear system- number theoretic system- one-key system- one-master-key system- one-time-key system- one-time-pad system- one-time-tape system- perfect secrecy system- practical security system- private key system- proprietary system- public key system- public key distribution system- public key signature system- rapid system- reciprocal number system- residue system- Rivest-Shamir-Adleman system- rotor system- RSA public key system- r-th residue system- secret-key system- secure system- shared key system- shift register system- single-key system- sophisticated system- split key system- strong system- subtractive system- symmetric system- theoretically unbreakable system- threshold system- transposition system- trap-door-knapsack public key system- transient key system- threshold system- two-key system- unbreakable system- voice system -
7 key
1) (криптографический) ключ2) ключ к замку или запирающему устройству, механический ключ- base key- candidate key- card key- code key- data key- DES key- fake key- file key- good key- hex key- host key- link key- lost key- node key- numeric key- numerical key- pass key- PRN key- safe key- seed key- test key- true key- used key- user key- weak key- work key- zone key -
8 device
устройство; прибор; аппарат; средство; элемент; знакintruder alarm (proximity) device — разведывательно-сигнализационный прибор с датчиками неконтактного действия
-
9 cryptosystem
криптографическая система, криптосистема; шифросистема- abuse-free cryptosystem- algebraic code cryptosystem- analog cryptosystem- asymmetric cryptosystem- asymmetric key cryptosystem- authentication/secrecy cryptosystem- bijective public key cryptosystem- binary cryptosystem- block cryptosystem- broadcast cryptosystem- broadcasting cryptosystem- cipher-feedback cryptosystem- classical cryptosystem- common-key cryptosystem- communication cryptosystem- compromised cryptosystem- computationally secure cryptosystem- conference cryptosystem- conventional cryptosystem- DES-based cryptosystem- DES-like cryptosystem- deterministic cryptosystem- DH cryptosystem- Diffie and Hellman cryptosystem- discrete-exponentiation cryptosystem- discrete log cryptosystem- E3 cryptosystem- effectively unbreakable cryptosystem- elliptic curve cryptosystem- endomorphic cryptosystem- end-to-end encryption cryptosystem- error propagating cryptosystem- factorization cryptosystem- finite cryptosystem- finite automation cryptosystem- Galois field cryptosystem- general cryptosystem- generalized cryptosystem- Goppa-code cryptosystem- hardware-implemented cryptosystem- hidden key cryptosystem- high-grade cryptosystem- high-speed cryptosystem- hybrid public-secret key cryptosystem- hybrid stream/block cryptosystem- identity-based cryptosystem- intractable cryptosystem- indecipherable cryptosystem- iterated cryptosystem- keyed cryptosystem- key escrow cryptosystem- key-minimal cryptosystem- knapsack-based cryptosystem- knapsack public key cryptosystem- matrix cryptosystem- McEliece' cryptosystem- Merkle-Hellman cryptosystem- MH cryptosystem- microprocessor based cryptosystem- minuend cryptosystem- multiple access cryptosystem- multiple destination cryptosystem- multiplicative knapsack cryptosystem- network cryptosystem- non-linear cryptosystem- number theoretic cryptosystem- one-key cryptosystem- one-master-key cryptosystem- one-time-key cryptosystem- one-time-pad cryptosystem- one-time-tape cryptosystem- perfect secrecy cryptosystem- practical security cryptosystem- private key cryptosystem- proprietary cryptosystem- provable secure cryptosystem- public key cryptosystem- public key distribution cryptosystem- public key signature cryptosystem- rapid cryptosystem- reciprocal number cryptosystem- residue cryptosystem- Rivest-Shamir-Adleman cryptosystem- rotor cryptosystem- RSA public key cryptosystem- r-th residue cryptosystem- secret-key cryptosystem- secure cryptosystem- shared key cryptosystem- shift register cryptosystem- single-key cryptosystem- sophisticated cryptosystem- split key cryptosystem- strong cryptosystem- subtractive cryptosystem- symmetric cryptosystem- theoretically unbreakable cryptosystem- threshold cryptosystem- transposition cryptosystem- trap-door-knapsack public key cryptosystem- transient key cryptosystem- threshold cryptosystem- two-key cryptosystem- unbreakable cryptosystem- voice cryptosystem- cryptosystem immune to cryptoanalysisАнгло-русский словарь по компьютерной безопасности > cryptosystem
-
10 network
Англо-русский словарь по компьютерной безопасности > network
См. также в других словарях:
Secure communication — includes means by which people can share information with varying degrees of certainty that third parties cannot know what was said. Other than communication spoken face to face out of possibility of listening, it is probably safe to say that no… … Wikipedia
Secure voice — (alternatively secure speech or ciphony) is a term in cryptography for the encryption of voice communication over a range of communication types such as radio, telephone or IP. Contents 1 History 2 Analog Secure Voice technologies 3 Di … Wikipedia
Secure messaging — is a server based approach to protect sensitive data when sent beyond the corporate borders and provides compliance with industry regulations such as HIPAA, GLBA and SOX. Advantages over classical secure e Mail are that confidential and… … Wikipedia
Secure telephone — A secure telephone is a telephone that provides voice security in the form of end to end encryption for the telephone call, and in some cases also the mutual authentication of the call parties, protecting them against a man in the middle attack.… … Wikipedia
Encryption software — is software whose main task is encryption and decryption of data, usually in the form of files on (or sectors of) hard drives and removable media, email messages, or in the form of packets sent over computer networks. Contents 1 Security 2… … Wikipedia
Secure multicast — IP Multicast is a communication method where a single data packet can be transmitted from a sender and replicated to a set of receivers. The replication techniques are somewhat dependent upon the media used to transmit the data. Transmission of … Wikipedia
Secure Communications Interoperability Protocol — SCIP is the U.S. Government s standard for secure voice and data communication. The acronym stands for Secure Communications Interoperability Protocol and was adopted to replace the FNBDT (Future Narrowband Digital Terminal) title in 2004. SCIP… … Wikipedia
Secure cryptoprocessor — A secure cryptoprocessor is a dedicated computer on a chip or microprocessor for carrying out cryptographic operations, embedded in a packaging with multiple physical security measures, which give it a degree of tamper resistance. The purpose of… … Wikipedia
NSA encryption systems — The National Security Agency took over responsibility for all U.S. Government encryption systems when it was formed in 1952. The technical details of most NSA approved systems are still classified, but much more about its early systems has become … Wikipedia
Automated Teller Machine Communication Security — Automated Teller Machines were first used in 1939. Nowadays, about 1.5 million are installed worldwide [ [http://www.atmmarketplace.com/news story 24706.htm Number of ATMs worldwide expected to hit 1.5 million in December 2005] www.atmmarketplace … Wikipedia
Nautilus (secure telephone) — Nautilus is a program which allows two parties to securely communicate using modems or TCP/IP. It runs from a command line and is available for the Linux and Windows operating systems. The name was based upon Jules Verne s Nautilus and its… … Wikipedia