-
1 multilevel encryption
Безопасность: многоуровневое шифрование -
2 multilevel encryption
Англо-русский словарь по компьютерной безопасности > multilevel encryption
-
3 encryption
a) прибор шифрования (обозначение в схеме)b) (encryption)1) шифрование; зашифрование; операция (за) шифрования2) криптография; криптографическая защита; криптографическое сокрытие информации3) шифротекст- hardware encryption- hardware assisted encryptionАнгло-русский словарь по компьютерной безопасности > encryption
-
4 device
прибор; аппарат; устройство; (техническое) средство- wireless bugging device -
5 mode
-
6 regime
-
7 coding
-
8 security
1) безопасность; служба безопасности2) защита; защищенностьАнгло-русский словарь по компьютерной безопасности > security
-
9 system
- computationally secure system- abuse-free system- algebraic code system- analog system- asymmetric system- asymmetric key system- authentication/secrecy system- binary system- block system- broadcast system- broadcasting system- cipher-feedback system- classical system- common-key system- communication system- compromised system- computationally secure system- conference system- conventional system- DES-based system- DES-like system- deterministic system- DH system- Diffie and Hellman system- discrete-exponentiation system- discrete log system- E3 system- effectively unbreakable system- elliptic curve system- endomorphic system- end-to-end encryption system- error propagating system- factorization system- finite system- finite automation system- Galois field system- general system- generalized system- Goppa-code system- hardware-implemented system- hidden key system- high-grade system- high-speed system- hybrid public-secret key system- hybrid stream/block system- identity-based system- system immune to cryptoanalysis- indecipherable system- intractable system- iterated system- key escrow system- keyed system- key escrow system- key-minimal system- knapsack-based system- knapsack public key system- matrix system- McEliece' system- Merkle-Hellman system- MH system- microprocessor based system- minuend system- multiple access system- multiple destination system- multiplicative knapsack system- network system- non-linear system- number theoretic system- one-key system- one-master-key system- one-time-key system- one-time-pad system- one-time-tape system- perfect secrecy system- practical security system- private key system- proprietary system- public key system- public key distribution system- public key signature system- rapid system- reciprocal number system- residue system- Rivest-Shamir-Adleman system- rotor system- RSA public key system- r-th residue system- secret-key system- secure system- shared key system- shift register system- single-key system- sophisticated system- split key system- strong system- subtractive system- symmetric system- theoretically unbreakable system- threshold system- transposition system- trap-door-knapsack public key system- transient key system- threshold system- two-key system- unbreakable system- voice system -
10 channel
канал (связи, передачи информации)Англо-русский словарь по компьютерной безопасности > channel
-
11 control
1) управление2) контроль, проверкаАнгло-русский словарь по компьютерной безопасности > control
-
12 hierarchy
Англо-русский словарь по компьютерной безопасности > hierarchy
-
13 management
(административное) управление; руководствоАнгло-русский словарь по компьютерной безопасности > management
-
14 network
Англо-русский словарь по компьютерной безопасности > network
-
15 process
Англо-русский словарь по компьютерной безопасности > process
См. также в других словарях:
SIGSALY — exhibit at the National Cryptologic Museum In cryptography, SIGSALY (also known as the X System, Project X, Ciphony I, and the Green Hornet) was a secure speech system used in World War II for the highest level Allied communications. It pioneered … Wikipedia
Comparison of VoIP software — VoIP software is used to conduct telephone like voice conversations across Internet Protocol (IP) based networks. VoIP stands for Voice over IP . For residential markets, VoIP phone service is often cheaper than traditional public switched… … Wikipedia
Copy protection — Copy protection, also known as content protection, copy obstruction, copy prevention and copy restriction, refer to techniques used for preventing the reproduction of software, films, music, and other media, usually for copyright reasons.[1]… … Wikipedia
Avaya Application Server 5300 — Avaya Aura AS5300 The Avaya Aura Application Server 5300 or Avaya Aura AS5300 in telecommunication and computer networking is a secure Unified Communications (UC) system designed and manufactured by Avaya. The system provides integrated IP… … Wikipedia
Virgil D. Gligor — Infobox Scientist name = Virgil D. Gligor birth date = Birth date and age|1949|7|28|df=y box width = image width = 100 caption = Virgil D. Gligor, 2007 birth date = birth place = death date = death place = residence = citizenship = nationality =… … Wikipedia
Sanitization (classified information) — Not to be confused with Data cleansing. Part of a series on Censorship … Wikipedia
Cisco Unified Communications Manager — (CUCM), formerly Cisco Unified CallManager and Cisco CallManager (CCM), is a software based call processing system developed by Cisco Systems. CUCM tracks all active VoIP network components; these include phones, gateways, conference bridges,… … Wikipedia
Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… … Wikipedia
Abreviations en informatique M — Abréviations en informatique M MAC : Medium access control MAC Media Access Control, voir adresse MAC Mac : familier Macintosh (à ne pas confondre avec Mac OS) MACAO : Méthode d analyse et de conception d applications orientées… … Wikipédia en Français
Abréviations En Informatique M — MAC : Medium access control MAC Media Access Control, voir adresse MAC Mac : familier Macintosh (à ne pas confondre avec Mac OS) MACAO : Méthode d analyse et de conception d applications orientées objet MAN: Metropolitan Area… … Wikipédia en Français
Abréviations en informatique M — MAC : Medium access control MAC Media Access Control, voir adresse MAC Mac : familier Macintosh (à ne pas confondre avec Mac OS) MACAO : Méthode d analyse et de conception d applications orientées objet MAN: Metropolitan Area… … Wikipédia en Français