Перевод: с английского на арабский

с арабского на английский

key+data

  • 21 digital signature

    "Data that binds a sender's identity to the information being sent. A digital signature may be bundled with any message, file, or other digitally encoded information, or transmitted separately. Digital signatures are used in public key environments and provide authentication and integrity services."

    English-Arabic terms dictionary > digital signature

  • 22 signature

    "Data that binds a sender's identity to the information being sent. A digital signature may be bundled with any message, file, or other digitally encoded information, or transmitted separately. Digital signatures are used in public key environments and provide authentication and integrity services."

    English-Arabic terms dictionary > signature

  • 23 SRK

    "On a system that incorporates a TPM, a cryptographic asymmetric key which is created at the root of the TPM key hierarchy (2048-bit RSA key) and which is used by the TPM to store protected data. The private portion of this key never leaves the TPM. The public part of this key is returned to the owner and needs to be carefully guarded since it uniquely identifies the TPM on the network, therefore is privacy sensitive."

    English-Arabic terms dictionary > SRK

  • 24 asymmetric encryption

    "A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it."

    English-Arabic terms dictionary > asymmetric encryption

  • 25 AE

    "A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it."
    AE

    English-Arabic terms dictionary > AE

  • 26 40-bit encryption

    A low level of encryption that uses a 40-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key.

    English-Arabic terms dictionary > 40-bit encryption

  • 27 128-bit encryption

    A high level of encryption that uses a 128-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key.

    English-Arabic terms dictionary > 128-bit encryption

  • 28 authenticator

    "A data structure used by one party to prove that another party knows a secret key. In the Kerberos authentication protocol, authenticators include timestamps, to prevent replay attacks, and are encrypted with the session key issued by the Key Distribution Center (KDC)."
    مصدّق

    English-Arabic terms dictionary > authenticator

  • 29 Secure Sockets Layer

    "The protocol that improves the security of data communication by using a combination of data encryption, digital certificates, and public key cryptography. SSL enables authentication and increases data integrity and privacy over networks. SSL does not provide authorization or nonrepudiation."

    English-Arabic terms dictionary > Secure Sockets Layer

  • 30 SSL

    "The protocol that improves the security of data communication by using a combination of data encryption, digital certificates, and public key cryptography. SSL enables authentication and increases data integrity and privacy over networks. SSL does not provide authorization or nonrepudiation."

    English-Arabic terms dictionary > SSL

  • 31 hash algorithm

    "An algorithm that produces a hash value of some piece of data, such as a message or session key. With a good hash algorithm, changes in the input data can change every bit in the resulting hash value; for this reason, hashes are useful in detecting any modification in a data object, such as a message. Furthermore, a good hash algorithm makes it computationally infeasible to construct two independent inputs that have the same hash. Typical hash algorithms include MD2, MD4, MD5, and SHA-1."

    English-Arabic terms dictionary > hash algorithm

  • 32 hash function

    "An algorithm that produces a hash value of some piece of data, such as a message or session key. With a good hash algorithm, changes in the input data can change every bit in the resulting hash value; for this reason, hashes are useful in detecting any modification in a data object, such as a message. Furthermore, a good hash algorithm makes it computationally infeasible to construct two independent inputs that have the same hash. Typical hash algorithms include MD2, MD4, MD5, and SHA-1."

    English-Arabic terms dictionary > hash function

  • 33 legend keys

    Symbols in legends that show the patterns and colors assigned to the data series (or categories) in a chart. Legend keys appear to the left of legend entries. Formatting a legend key also formats the data marker that's associated with it.

    English-Arabic terms dictionary > legend keys

  • 34 event

    "An action or occurrence to which a program might respond. Examples include state changes, data transfers, key presses, and mouse movements."

    English-Arabic terms dictionary > event

  • 35 recovery agent

    A person who is issued a public key certificate for the purpose of recovering user data that is encrypted with Encrypting File System (EFS).

    English-Arabic terms dictionary > recovery agent

  • 36 RSA

    "A public-key encryption standard for Internet security. It is the default cryptographic service provider (CSP) for Microsoft Windows. It was patented by RSA Data Security, Inc. in 1977. This acronym derives from the last names of the inventors of the technology: Rivest, Shamir, and Adleman."

    English-Arabic terms dictionary > RSA

  • 37 symmetric encryption

    "An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data."

    English-Arabic terms dictionary > symmetric encryption

  • 38 content header

    "Part of the file structure of a Windows Media file that contains information necessary for a client computer to decompress and render the content data. In a packaged file, an additional content header exists and contains the key ID, content ID, and license acquisition URL. This content header can also include a required individualization version number and attributes defined by the content provider."

    English-Arabic terms dictionary > content header

  • 39 bulk encryption

    "A process in which large amounts of data, such as files, e-mail messages, or online communications sessions, are encrypted for confidentiality. It is usually done with a symmetric key algorithm."

    English-Arabic terms dictionary > bulk encryption

  • 40 Digital Signature Standard

    A standard that uses the Digital Signature Algorithm (DSA) for its signature algorithm and Secure Hash Algorithm (SHA-1) as its message hash algorithm. DSA is a public-key cipher that is used only to generate digital signatures and cannot be used for data encryption.

    English-Arabic terms dictionary > Digital Signature Standard

См. также в других словарях:

  • Count Key Data — (CKD) is a disk data architecture. Each physical disk record consists of a count field, an optional key field, and a ( user ) data field with error correction/detection information appended to each field and gaps separating each field [1].… …   Wikipedia

  • Data.gov.uk — is a UK Government project to open up almost all non personal data acquired for official purposes for free re use. Sir Tim Berners Lee and Professor Nigel Shadbolt are the two key figures behind the project.[1] Homepage of data.gov.uk …   Wikipedia

  • Data profiling — is the process of examining the data available in an existing data source (e.g. a database or a file) and collecting statistics and information about that data. The purpose of these statistics may be to: Find out whether existing data can easily… …   Wikipedia

  • Data Vault Modeling — is a database modeling method that is designed to provide historical storage of data coming in from multiple operational systems. It is also a method of looking at historical data that, apart from the modeling aspect, deals with issues such as… …   Wikipedia

  • Data Encryption Standard — The Feistel function (F function) of DES General Designers IBM First publis …   Wikipedia

  • Data Intensive Computing — is a class of parallel computing applications which use a data parallel approach to processing large volumes of data typically terabytes or petabytes in size and typically referred to as Big Data. Computing applications which devote most of their …   Wikipedia

  • Key disclosure law — Key disclosure laws, also known as mandatory key disclosure, is legislation that require individuals to surrender cryptographic keys to law enforcement. The purpose is to allow access to material for confiscation or digital forensics purposes and …   Wikipedia

  • Data integrity — in its broadest meaning refers to the trustworthiness of system resources over their entire life cycle. In more analytic terms, it is the representational faithfulness of information to the true state of the object that the information represents …   Wikipedia

  • Key generation — is the process of generating keys for cryptography. A key is used to encrypt and decrypt whatever data is being encrypted/decrypted.Modern cryptographic systems include symmetric key algorithms (such as DES and AES) and public key algorithms… …   Wikipedia

  • Data remanence — is the residual representation of data that remains even after attempts have been made to remove or erase the data. This residue may result from data being left intact by a nominal file deletion operation, by reformatting of storage media that… …   Wikipedia

  • Key performance indicator — Key Performance Indicators (KPI) are financial and non financial metrics used to help an organization define and measure progress toward organizational goals [ [http://management.about.com/cs/generalmanagement/a/keyperfindic.htm Key Performance… …   Wikipedia

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»