-
101 PKC
1) Медицина: protein kinase C2) Военный термин: position keeping computer3) Техника: public key cryptosystem4) Сокращение: Public Key Cryptography5) Аэропорты: Petropavlovsk, Kamchatka, Russia -
102 PKCS
криптосистема с открытым ключом
—
[[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]]Тематики
EN
система шифрования открытым ключом
(МСЭ-Т Н.235.2, МСЭ-Т Н.235).
[ http://www.iks-media.ru/glossary/index.html?glossid=2400324]Тематики
- электросвязь, основные понятия
EN
Англо-русский словарь нормативно-технической терминологии > PKCS
-
103 PKC
public key cryptosystem - шифровальная система с открытым ключом -
104 PKCS
сокр. от public key cryptosystemкриптосистема с открытым (общедоступным) ключом, двухключевая (ассиметричная) криптосистема, криптосистема множественного доступа -
105 symmetric (crypto)system
(one-key cryptosystem) криптосистема с одним (секретным) ключом шифрования и расшифрования, одноключевая криптосистемаАнгло-русский словарь по компьютерной безопасности > symmetric (crypto)system
-
106 symmetric (crypto)system
(one-key cryptosystem) криптосистема с одним (секретным) ключом шифрования и расшифрования, одноключевая криптосистемаАнгло-русский словарь по компьютерной безопасности > symmetric (crypto)system
-
107 PKCS
см. Public Key CryptosystemEnglish-Russian dictionary of modern telecommunications > PKCS
-
108 symmetric system
(one-key cryptosystem) криптосистема с одним (секретным) ключом шифрования и расшифрования, одноключевая криптосистемаАнгло-русский словарь по компьютерной безопасности > symmetric system
-
109 PKC
сокр. от public-key cryptosystemEnglish-Russian dictionary of telecommunications and their abbreviations > PKC
-
110 security
1) безопасность; служба безопасности2) защита; защищенностьАнгло-русский словарь по компьютерной безопасности > security
См. также в других словарях:
Key management — is a term used to describe two different fields; (1) cryptography, and (2) physical key management (or electronic key management) within building or campus access control.In cryptography, key management includes all of the provisions made in a… … Wikipedia
Key system — can refer to the following:*Key telephone system communication *Key System Defunct transportation system in the San Francisco Bay Area *KeY System a software verification tool. *Cryptosystem using a Cryptographic key … Wikipedia
Key escrow — (also known as a fair cryptosystem) is an arrangement in which the keys needed to decrypt encrypted data are held in escrow so that, under certain circumstances, an authorized third party may gain access to those keys. These third parties may… … Wikipedia
Cryptosystem — There are two different meanings of the word cryptosystem. One is used by the cryptographic community, while the other is the meaning understood by the public. General meaning In this meaning, the term cryptosystem is used as shorthand for… … Wikipedia
Key server (cryptographic) — In computer security, a key server is a computer mdash; typically running special software mdash; which provides cryptographic keys to users or other programs. The users programs can be working on the same network as the key server or on another… … Wikipedia
Key distribution center — In cryptography, a key distribution center (KDC) is part of a cryptosystem intended to reduce the risks inherent in exchanging keys. KDCs often operate in systems within which some users may have permission to use certain services at some times… … Wikipedia
Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key … Wikipedia
McEliece cryptosystem — In cryptography, the McEliece cryptosystem is an asymmetric encryption algorithm developed in 1978 by Robert McEliece.[1] It was the first such scheme to use randomization in the encryption process. The algorithm has never gained much acceptance… … Wikipedia
Hybrid cryptosystem — In cryptography, public key cryptosystems are convenient in that they do not require the sender and receiver to share a common secret in order to communicate securely (among other useful properties). However, they often rely on complicated… … Wikipedia
Cramer–Shoup cryptosystem — The Cramer–Shoup system is an asymmetric key encryption algorithm, and was the first efficient scheme proven to be secure against adaptive chosen ciphertext attack using standard cryptographic assumptions. Its security is based on the… … Wikipedia
Naccache–Stern cryptosystem — Note: this is not to be confused with the Naccache–Stern knapsack cryptosystem. The Naccache–Stern cryptosystem is a homomorphic public key cryptosystem whose security rests on the higher residuosity problem. The Naccache–Stern cryptosystem was… … Wikipedia