-
1 link encryption key
ключ канального шифрования
—
[[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]]Тематики
EN
Англо-русский словарь нормативно-технической терминологии > link encryption key
-
2 link-encryption key
Безопасность: ключ межканального шифрования -
3 link encryption key
Англо-русский словарь по компьютерной безопасности > link encryption key
-
4 key
1) (криптографический) ключ2) ключ к замку или запирающему устройству, механический ключ- base key- candidate key- card key- code key- data key- DES key- fake key- file key- good key- hex key- host key- link key- lost key- node key- numeric key- numerical key- pass key- PRN key- safe key- seed key- test key- true key- used key- user key- weak key- work key- zone key -
5 encryption
a) прибор шифрования (обозначение в схеме)b) (encryption)1) шифрование; зашифрование; операция (за) шифрования2) криптография; криптографическая защита; криптографическое сокрытие информации3) шифротекст- hardware encryption- hardware assisted encryptionАнгло-русский словарь по компьютерной безопасности > encryption
-
6 encryption
1) шифрование2) кодирование•- asymmetric encryption
- block encryption
- bulk encryption
- conventional encryption
- data encryption
- end-to-end encryption
- hardware encryption
- link encryption
- Microsoft point-to-point encryption
- multiple encryption
- public key encryption
- secret encryption
- software encryption
- stream encryption
- symmetric encryption
- traditional encryption
- virtual key encryption -
7 encryption
1) шифрование2) кодирование•- asymmetric encryption
- block encryption
- bulk encryption
- conventional encryption
- data encryption
- end-to-end encryption
- hardware encryption
- link encryption
- Microsoft point-to-point encryption
- multiple encryption
- public key encryption
- secret encryption
- software encryption
- stream encryption
- symmetric encryption
- traditional encryption
- virtual key encryptionThe New English-Russian Dictionary of Radio-electronics > encryption
-
8 key
1) ключ2) гаечный ключ3) замок; замковый камень ( арки или свода)4) шпонка; пластинчатый нагель || крепить шпонкой; сажать на шпонку5) клин; шплинт || крепить клином или шплинтом6) расшивка ( инструмент)7) насекать поверхность под штукатурку8) перевязывать швы ( в кладке)9) ключ; кнопка; кнопочный переключатель; клавиша || нажимать кнопку; нажимать клавишу11) направляющий ключ (напр. цоколя лампы)12) вчт. ключ; шифр13) полигр. изображение-основа14) пояснение в подрисуночной подписи; экспликация•to drift out a key — выбивать ( выколачивать) шпонку;to seat a key — ставить шпонку;to key to surface — сцепляться с поверхностью-
accent key
-
access key
-
activate key
-
actual key
-
adjusting key
-
aligning key
-
alignment key
-
Allen key
-
alphanumeric keys
-
alphameric keys
-
angle cock key
-
announcer's key
-
answering key
-
anticlash key
-
arch key
-
armature head lock key
-
armature keys
-
assignment key
-
attention key
-
automatic cancel key
-
auxiliary key
-
averaging key
-
axle-lining key
-
backspace key
-
backup key
-
brake hanger key
-
brake shoe key
-
break key
-
breakout key
-
bridge key
-
buffered key
-
busy key
-
calling key
-
call key
-
cancel transmission key
-
canceling key
-
cancel key
-
candidate key
-
cap key
-
carriage release key
-
carriage restore key
-
censor key
-
center key
-
chamfered key
-
character key
-
check key
-
cipher key
-
clearing key
-
clear key
-
code key
-
column layout key
-
command key
-
concatenated key
-
concrete key
-
control key
-
correction key
-
coupler shank pin retaining key
-
crypto key
-
current-reversing key
-
cursor key
-
cutoff key
-
dazzle-free key
-
decimal tabulator key
-
deck support key
-
de-jammer key
-
delete key
-
dive key
-
dog damping key
-
double-dovetail key
-
double-function key
-
draft key
-
draw key
-
ductor key
-
editing key
-
edit key
-
encryption key
-
end-of-page key
-
enter key
-
erase key
-
escape key
-
exclusion key
-
exit key
-
extra key
-
feather key
-
figure key
-
flat key
-
foreign key
-
format recall key
-
fox key
-
fully concatenated key
-
functional key
-
function key
-
generic key
-
gib-headed key
-
gib-head key
-
half-space key
-
halt key
-
hammerhead key
-
hardware storage key
-
hold-down tabulator key
-
home key
-
index key
-
ink key
-
interference-fit key
-
interruption key
-
interrupt key
-
justification key
-
keying-fit key
-
lie key
-
line recall key
-
line spacing key
-
load key
-
locator key
-
locking key
-
loose key
-
lower rail key
-
major key
-
margin key
-
margin-release key
-
memory key
-
memory total key
-
microadjustable key
-
monitoring key
-
Morse key
-
multifunction key
-
nonlocking key
-
numbered key
-
number key
-
numeric shift key
-
numerical key
-
numeric key
-
occupation key
-
operating key
-
order-wire key
-
paper ejection key
-
paper injection key
-
paper positioning key
-
paragraph indentation key
-
party line ringing key
-
pass key
-
pattern key
-
phrase recall key
-
pin key
-
plug key
-
point key
-
primary key
-
privacy key
-
private key
-
programmable key
-
prong key
-
protection key
-
public key
-
pulsing key
-
radial key
-
reading key
-
read key
-
recall key
-
release key
-
relocate typing point key
-
removable key
-
repeat key
-
resetting key
-
reset key
-
return and vertical spacing key
-
return key
-
reverse key
-
rhythm-compensation key
-
ring-back key
-
ringing key
-
round key
-
route canceling key
-
route key
-
rubout key
-
screw key
-
search key
-
secondary key
-
selector key
-
semicircular key
-
sending key
-
sequencing key
-
shear key
-
shift key
-
shift-lock key
-
signaling key
-
sliding key
-
sloped key
-
socket key
-
soft key
-
sorting key
-
sort key
-
space key
-
spacing key
-
speaking key
-
split key
-
spring buckle key
-
start key
-
stop key
-
storage key
-
straight key
-
switching key
-
switch key
-
switch-lock key
-
tabulating key
-
tab key
-
tabulator clearing key
-
tab clearing key
-
tabulator-set key
-
talking key
-
tangential key
-
tangent key
-
tapered key
-
taper key
-
telegraph key
-
test key
-
tightening key
-
title centering key
-
total tabulator clearing key
-
touch-sensitive key
-
touch key
-
track key
-
track link key
-
track shoe key
-
transfer key
-
turn key
-
typamatic key
-
upper rail key
-
user-defined key
-
voice key
-
wedge key
-
Woodruff key
-
write key -
9 device
прибор; аппарат; устройство; (техническое) средство- wireless bugging device -
10 standard
1) стандарт2) стандартныйАнгло-русский словарь по компьютерной безопасности > standard
-
11 security
1) безопасность; служба безопасности2) защита; защищенностьАнгло-русский словарь по компьютерной безопасности > security
-
12 protocol
Англо-русский словарь по компьютерной безопасности > protocol
-
13 procedure
процедура; образ действияАнгло-русский словарь по компьютерной безопасности > procedure
См. также в других словарях:
AACS encryption key controversy — A controversy surrounding the AACS cryptographic key arose in April 2007 when the Motion Picture Association of America and the Advanced Access Content System Licensing Administrator, LLC (AACS LA) began issuing demand letters[1] to websites… … Wikipedia
NSA encryption systems — The National Security Agency took over responsibility for all U.S. Government encryption systems when it was formed in 1952. The technical details of most NSA approved systems are still classified, but much more about its early systems has become … Wikipedia
Key size — In cryptography, key size or key length is the size measured in bits[1] of the key used in a cryptographic algorithm (such as a cipher). An algorithm s key length is distinct from its cryptographic security, which is a logarithmic measure of the… … Wikipedia
Comparison of disk encryption software — This is a technical feature comparison of different disk encryption software. Contents 1 Background information 2 Operating systems 3 Features 4 Layering … Wikipedia
Proxy re-encryption — schemes are cryptosystems which allow third parties (proxies) to alter a ciphertext which has been encrypted for one party, so that it may be decrypted by another. Examples of UseBob could designate a proxy to re encrypt one of his messages that… … Wikipedia
Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key … Wikipedia
Diffie–Hellman key exchange — (D–H)[nb 1] is a specific method of exchanging keys. It is one of the earliest practical examples of key exchange implemented within the field of cryptography. The Diffie–Hellman key exchange method allows two parties that have no prior knowledge … Wikipedia
Symmetric-key algorithm — Symmetric key algorithms are a class of algorithms for cryptography that use trivially related, often identical, cryptographic keys for both decryption and encryption.The encryption key is trivially related to the decryption key, in that they may … Wikipedia
End-to-end encryption — Description End to end encryption (E2EE) encrypts clear (red) data at source with knowledge of the intended recipient, allowing the encrypted (black) data to travel safely through vulnerable channels (eg. public networks) to its recipient where… … Wikipedia
Homomorphic encryption — is a form of encryption where one can perform a specific algebraic operation on the plaintext by performing a (possibly different) algebraic operation on the ciphertext. Depending on one s viewpoint, this can be seen as a positive or negative… … Wikipedia
Temporal Key Integrity Protocol — or TKIP is a security protocol used in the IEEE 802.11 wireless networks. Background TKIP (pronounced tee kip ) was designed by the IEEE 802.11i task group and the Wi Fi Alliance as a solution to replace WEP without requiring the replacement of… … Wikipedia