-
1 encryption-based security
Безопасность: безопасность на основе криптографической защитыУниверсальный англо-русский словарь > encryption-based security
-
2 encryption-based security
Англо-русский словарь по компьютерной безопасности > encryption-based security
-
3 security
1) безопасность; служба безопасности2) защита; защищенностьАнгло-русский словарь по компьютерной безопасности > security
-
4 encryption
a) прибор шифрования (обозначение в схеме)b) (encryption)1) шифрование; зашифрование; операция (за) шифрования2) криптография; криптографическая защита; криптографическое сокрытие информации3) шифротекст- hardware encryption- hardware assisted encryptionАнгло-русский словарь по компьютерной безопасности > encryption
-
5 safeguard
2) охранять; защищать (safequards) средства защиты; средства обеспечения безопасности; меры по обеспечению безопасностиАнгло-русский словарь по компьютерной безопасности > safeguard
-
6 system
- computationally secure system- abuse-free system- algebraic code system- analog system- asymmetric system- asymmetric key system- authentication/secrecy system- binary system- block system- broadcast system- broadcasting system- cipher-feedback system- classical system- common-key system- communication system- compromised system- computationally secure system- conference system- conventional system- DES-based system- DES-like system- deterministic system- DH system- Diffie and Hellman system- discrete-exponentiation system- discrete log system- E3 system- effectively unbreakable system- elliptic curve system- endomorphic system- end-to-end encryption system- error propagating system- factorization system- finite system- finite automation system- Galois field system- general system- generalized system- Goppa-code system- hardware-implemented system- hidden key system- high-grade system- high-speed system- hybrid public-secret key system- hybrid stream/block system- identity-based system- system immune to cryptoanalysis- indecipherable system- intractable system- iterated system- key escrow system- keyed system- key escrow system- key-minimal system- knapsack-based system- knapsack public key system- matrix system- McEliece' system- Merkle-Hellman system- MH system- microprocessor based system- minuend system- multiple access system- multiple destination system- multiplicative knapsack system- network system- non-linear system- number theoretic system- one-key system- one-master-key system- one-time-key system- one-time-pad system- one-time-tape system- perfect secrecy system- practical security system- private key system- proprietary system- public key system- public key distribution system- public key signature system- rapid system- reciprocal number system- residue system- Rivest-Shamir-Adleman system- rotor system- RSA public key system- r-th residue system- secret-key system- secure system- shared key system- shift register system- single-key system- sophisticated system- split key system- strong system- subtractive system- symmetric system- theoretically unbreakable system- threshold system- transposition system- trap-door-knapsack public key system- transient key system- threshold system- two-key system- unbreakable system- voice system -
7 key
1) (криптографический) ключ2) ключ к замку или запирающему устройству, механический ключ- base key- candidate key- card key- code key- data key- DES key- fake key- file key- good key- hex key- host key- link key- lost key- node key- numeric key- numerical key- pass key- PRN key- safe key- seed key- test key- true key- used key- user key- weak key- work key- zone key -
8 device
устройство; прибор; аппарат; средство; элемент; знакintruder alarm (proximity) device — разведывательно-сигнализационный прибор с датчиками неконтактного действия
-
9 control
1) управление2) контроль, проверкаАнгло-русский словарь по компьютерной безопасности > control
-
10 protection
защита; средства защитыАнгло-русский словарь по компьютерной безопасности > protection
-
11 package
Англо-русский словарь по компьютерной безопасности > package
-
12 unit
организационная единица; боевая единица (напр. корабль, ЛА танк); подразделение; часть; соединение; расчетно-снабженческая единица; секция; орган; элемент; комплект; агрегат; установка; см. тж. elementbulk petrol (transport) unit — Бр. часть [подразделение] подвоза наливного (бестарного) горючего
counter C3 unit — часть [подразделение] подавления системы оперативного управления и связи
Fleet Marine (Corps) reconnaissance unit — разведывательное подразделение [часть] флотских сил МП
multisensor (AA) firing unit 3PK — с приборным комплексом из нескольких систем обнаружения и сопровождения
photo (graphic) reconnaissance unit — фоторазведывательная часть [подразделение]
surface-launched unit, fuel air explosive — установка дистанционного разминирования объемным взрывом
surface-launched unit, mine — установка дистанционного минирования
tactical (air) control unit — часть [подразделение] управления ТА
war (time) strength (TOE) unit — часть, укомплектованная по штатам военного времени
— air unit— ASA unit— BM unit— border operation unit— car unit— depot support unit— dry unit— EW unit— GM unit— host country unit— HQ unit— logistics support unit— manpack radio unit— marksmanship training unit— mechanized infantry unit— missile-armed unit— nuclear weapon unit— provisional unit— QM unit— Rangers unit— supported unit— TOE unit— transportation unit— truck transport unit— van unit— wet unit* * *1) часть; 2) единица -
13 cryptosystem
криптографическая система, криптосистема; шифросистема- abuse-free cryptosystem- algebraic code cryptosystem- analog cryptosystem- asymmetric cryptosystem- asymmetric key cryptosystem- authentication/secrecy cryptosystem- bijective public key cryptosystem- binary cryptosystem- block cryptosystem- broadcast cryptosystem- broadcasting cryptosystem- cipher-feedback cryptosystem- classical cryptosystem- common-key cryptosystem- communication cryptosystem- compromised cryptosystem- computationally secure cryptosystem- conference cryptosystem- conventional cryptosystem- DES-based cryptosystem- DES-like cryptosystem- deterministic cryptosystem- DH cryptosystem- Diffie and Hellman cryptosystem- discrete-exponentiation cryptosystem- discrete log cryptosystem- E3 cryptosystem- effectively unbreakable cryptosystem- elliptic curve cryptosystem- endomorphic cryptosystem- end-to-end encryption cryptosystem- error propagating cryptosystem- factorization cryptosystem- finite cryptosystem- finite automation cryptosystem- Galois field cryptosystem- general cryptosystem- generalized cryptosystem- Goppa-code cryptosystem- hardware-implemented cryptosystem- hidden key cryptosystem- high-grade cryptosystem- high-speed cryptosystem- hybrid public-secret key cryptosystem- hybrid stream/block cryptosystem- identity-based cryptosystem- intractable cryptosystem- indecipherable cryptosystem- iterated cryptosystem- keyed cryptosystem- key escrow cryptosystem- key-minimal cryptosystem- knapsack-based cryptosystem- knapsack public key cryptosystem- matrix cryptosystem- McEliece' cryptosystem- Merkle-Hellman cryptosystem- MH cryptosystem- microprocessor based cryptosystem- minuend cryptosystem- multiple access cryptosystem- multiple destination cryptosystem- multiplicative knapsack cryptosystem- network cryptosystem- non-linear cryptosystem- number theoretic cryptosystem- one-key cryptosystem- one-master-key cryptosystem- one-time-key cryptosystem- one-time-pad cryptosystem- one-time-tape cryptosystem- perfect secrecy cryptosystem- practical security cryptosystem- private key cryptosystem- proprietary cryptosystem- provable secure cryptosystem- public key cryptosystem- public key distribution cryptosystem- public key signature cryptosystem- rapid cryptosystem- reciprocal number cryptosystem- residue cryptosystem- Rivest-Shamir-Adleman cryptosystem- rotor cryptosystem- RSA public key cryptosystem- r-th residue cryptosystem- secret-key cryptosystem- secure cryptosystem- shared key cryptosystem- shift register cryptosystem- single-key cryptosystem- sophisticated cryptosystem- split key cryptosystem- strong cryptosystem- subtractive cryptosystem- symmetric cryptosystem- theoretically unbreakable cryptosystem- threshold cryptosystem- transposition cryptosystem- trap-door-knapsack public key cryptosystem- transient key cryptosystem- threshold cryptosystem- two-key cryptosystem- unbreakable cryptosystem- voice cryptosystem- cryptosystem immune to cryptoanalysisАнгло-русский словарь по компьютерной безопасности > cryptosystem
-
14 method
метод; способ -
15 technique
Англо-русский словарь по компьютерной безопасности > technique
-
16 communication
1) связь, коммуникация; система связи2) передача информации (от ее источника адресатам); сообщение- all-points communication- analog communication- authenticated communication- broadcast communication- burst communication- character-oriented communication- clear communication- clear-to clear communication- client-server communication- coded communication- computer-to-terminal communication- confidential communication- conversational communication- covert communication- cryptographic communication- cryptographically protected communication- cryptographically secure communication- data communication- dial-up communication- digital communication- digitally encrypted voice communication- diplomatic communication- document communication- enciphered communication- encrypted communication- encryption communication- based secure communication- end-to-end communication- frequency hopping communication- high density communication- high-speed communication- imitative communication- intelligence communication- interactive communication- inter-enclosure communication- in-the-clear communication- large-volume communication- legitimate communication- multichannel communication- multimedia communication- multipeer communication- online communication- packet communication- peer-to-peer communication- plain communication- point-to-multipoint communication- program-to-program communication- prohibited communication- protected communication- reliable communication- robust communication- secrecy communication- secret communication- secure communication- secure-to-secure communication- secure voice communication- sensitive communication- signed communication- single-domain communication- speech communication- spoken communication- teleprinter communication- teletype communication- terminal-to-computer communication- terminal-to-terminal communication- top security communication- two-way communication- unauthorised communication- undirected communication- user/computer communication- user to user communication- visual communication- voice communicationАнгло-русский словарь по компьютерной безопасности > communication
-
17 management
(административное) управление; руководствоАнгло-русский словарь по компьютерной безопасности > management
-
18 protocol
Англо-русский словарь по компьютерной безопасности > protocol
-
19 telecommunication
1) связь, коммуникация; система связи2) передача информации (от ее источника адресатам); сообщение- all-points telecommunication- analog telecommunication- authenticated telecommunication- broadcast telecommunication- burst telecommunication- character-oriented telecommunication- clear telecommunication- clear-to clear telecommunication- client-server telecommunication- coded telecommunication- computer-to-terminal telecommunication- confidential telecommunication- conversational telecommunication- covert telecommunication- cryptographic telecommunication- cryptographically protected telecommunication- cryptographically secure telecommunication- data telecommunication- dial-up telecommunication- digital telecommunication- digitally encrypted voice telecommunication- diplomatic telecommunication- document telecommunication- enciphered telecommunication- encrypted telecommunication- encryption telecommunication- based secure telecommunication- end-to-end telecommunication- frequency hopping telecommunication- high density telecommunication- high-speed telecommunication- imitative telecommunication- intelligence telecommunication- interactive telecommunication- inter-enclosure telecommunication- in-the-clear telecommunication- large-volume telecommunication- legitimate telecommunication- multichannel telecommunication- multimedia telecommunication- multipeer telecommunication- online telecommunication- packet telecommunication- peer-to-peer telecommunication- plain telecommunication- point-to-multipoint telecommunication- program-to-program telecommunication- prohibited telecommunication- protected telecommunication- reliable telecommunication- robust telecommunication- secrecy telecommunication- secret telecommunication- secure telecommunication- secure-to-secure telecommunication- secure voice telecommunication- sensitive telecommunication- signed telecommunication- single-domain telecommunication- speech telecommunication- spoken telecommunication- teleprinter telecommunication- teletype telecommunication- terminal-to-computer telecommunication- terminal-to-terminal telecommunication- top security telecommunication- two-way telecommunication- unauthorised telecommunication- undirected telecommunication- user/computer telecommunication- user to user telecommunication- visual telecommunication- voice telecommunicationАнгло-русский словарь по компьютерной безопасности > telecommunication
См. также в других словарях:
Security token — Several types of security tokens with a penny for scale … Wikipedia
Security-focused operating system — This is an alphabetical list of operating systems with a sharp security focus. Their order does not imply rank.In our context, Security focused means that the project is devoted to increasing the security as a major goal. As such, something can… … Wikipedia
Security Assertion Markup Language — (SAML) is an XML based standard for exchanging authentication and authorization data between security domains, that is, between an identity provider (a producer of assertions) and a service provider (a consumer of assertions). SAML is a product… … Wikipedia
Encryption software — is software whose main task is encryption and decryption of data, usually in the form of files on (or sectors of) hard drives and removable media, email messages, or in the form of packets sent over computer networks. Contents 1 Security 2… … Wikipedia
Security and safety features new to Windows Vista — There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.Beginning in early 2002 with Microsoft s announcement of their Trustworthy Computing… … Wikipedia
Security and Trust Services API for J2ME — The Security and Trust Services API for J2ME (SATSA) is a collection of Java ME based APIs that provides compliant devices with additional cryptographic security features. It permits the communication of a Java ME application with a smartcard… … Wikipedia
Data security — is the means of ensuring that data is kept safe from corruption and that access to it is suitably controlled. Thus data security helps to ensure privacy. It also helps in protecting personal data. Data security is part of the larger practice of… … Wikipedia
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia
National Security Agency — NSA redirects here. For other uses, see NSA (disambiguation). For the Bahraini intelligence agency, see National Security Agency (Bahrain). National Security Agency Agency overview … Wikipedia
Computer security — This article is about computer security through design and engineering. For computer security exploits and defenses, see computer insecurity. Computer security Secure operating systems Security architecture Security by design Secure coding … Wikipedia
Skype security — Skype is a Voip system developed by Skype Technologies S.A., and owned by eBay. It is a peer to peer based network in which voice calls don’t pass through a central server. Skype users search for other users to connect to, enabling them to search … Wikipedia