-
21 Modified One-Time key
Abbreviation: MOT-keyУниверсальный русско-английский словарь > Modified One-Time key
-
22 система функциональной поддержки ОТК [one-time key] одноразовый ключ
Security: operation support systemУниверсальный русско-английский словарь > система функциональной поддержки ОТК [one-time key] одноразовый ключ
-
23 modified one-time key
Англо-русский словарь по компьютерной безопасности > modified one-time key
-
24 modified one-time key
модифицированный одноразовый ключ.English-Russian cryptological dictionary > modified one-time key
-
25 one-time revaluation on a key date
SAP.фин. повышение балансовой стоимости на датуУниверсальный англо-русский словарь > one-time revaluation on a key date
-
26 one-time encryption key
• kertakäyttöinen salausavain -
27 key
1) (криптографический) ключ2) ключ к замку или запирающему устройству, механический ключ- base key- candidate key- card key- code key- data key- DES key- fake key- file key- good key- hex key- host key- link key- lost key- node key- numeric key- numerical key- pass key- PRN key- safe key- seed key- test key- true key- used key- user key- weak key- work key- zone key -
28 key
1) ключ; кнопка, клавиша; переключатель2) ключ, шифр, код; указание к решению3) переключать, работать ключом, коммутировать6) ключ (в управлении базами данных - идентификатор записи или группы записей в файле данных)7) снабжать ключом (для правильной пространственной ориентации, напр., микросхемы)8) ключ (папка в левой части окна редактора реестра (registry); может содержать подключи и значимые элементы)•- key in- key off
- key on
- key out
- accelerator key
- activate key
- actual key
- alphanumeric keys
- alphameric keys
- arrow key
- ascending key - authorization key
- autorepeating key
- backarrow key
- backspace key
- break key
- bucky bit key
- calculation key
- cancel key
- canceling key
- candidate key
- carriage restore key
- carriage reverse key
- carriage space key
- chained key
- change mode key
- character key
- check reset key
- chroma key
- clear key
- clear/entry key
- clearing key
- concatenated key
- confirmation key
- control key
- conversion key
- data encryption key
- dead key
- decimal key
- descending key
- diode key
- direction key
- duplicate key
- encryption key
- entity key
- entry and summation key
- erase key
- erase-all key
- escape key
- execute console instruction key
- extra key
- fast key
- foreign key
- front key
- function key
- generic control key
- generic key
- half-space key
- halt key
- home key
- hot key
- infinite random key
- initiate key
- interrupt key
- labeled key
- latch-down key
- lighted key
- load key
- major key
- membrane key
- menu-driven key
- minor key - one-shot key
- option key
- page-up key
- pass key
- primary key
- printscreen key
- privacy key
- private key
- product key
- programmable function key
- protection key
- public key
- qualified compound key
- release key
- request enter key
- reset key
- respond typeout key
- return key
- rubout key
- running key
- run-time key
- search key
- secondary key
- self-certified public key - session key
- shift key
- shifted function key
- shortcut key
- signaling key
- single cycle key
- single step key
- size key
- soft key
- sort key
- start key
- stop key
- storage key
- storage protection key
- switch key
- system key
- system utility key
- top key
- transaction key
- unlabeled function key
- unmatched key
- up arrow key
- user-definable key
- voice keyEnglish-Russian dictionary of computer science and programming > key
-
29 key account management
Mktgthe management of the customer relationships that are most important to a company. Key accounts are those held by customers who produce most profit for a company or have the potential to do so, or those who are of strategic importance. Development of these customer relations and customer retention is important to business success. Particular emphasis is placed on analyzing which accounts are key to a company at any one time, determining the needs of these particular customers, and implementing procedures to ensure that they receive premium customer service and to increase customer satisfaction. -
30 Mot-key
модифицированный одноразовый ключ
МОР-ключ
—
[[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]]Тематики
Синонимы
EN
Англо-русский словарь нормативно-технической терминологии > Mot-key
-
31 MOT-key
Сокращение: Modified One-Time key -
32 mot-key
Англо-русский словарь по компьютерной безопасности > mot-key
-
33 mot-key
abbr МОР-ключ (см. modified one-time key). -
34 BACKSPACE key
"A keyboard key that moves the cursor to the left, one character at a time, usually erasing each character as it moves." -
35 touch one's cap to smb.
приветствовать кого-л. ( прикладывая руку к козырьку)...you could be sure of being kept on for as long as you worked like a slave and touched your cap to the gaffers every time you passed. (A. Sillitoe, ‘Key to the Door’, ch. 18) —...можете быть уверены, пока вы работаете как лошадь и спешите приложить руку к козырьку всякий раз, как мимо проходит мастер, вас будут держать на заводе.
...they are just touching their caps to the traditional culture. (C. P. Snow, ‘The Two Cultures and the Scientific Revolution’, ‘The Two Cultures’) —...многие из этих ученых имеют лишь шапочное знакомство с традиционной культурой.
-
36 kertakäyttöinen salausavain
• one-time encryption key• one-time key• one-time pad -
37 шифрование на ключе одноразового использования
шифрование на ключе одноразового использования
—
[[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]]Тематики
EN
Русско-английский словарь нормативно-технической терминологии > шифрование на ключе одноразового использования
-
38 system
- computationally secure system- abuse-free system- algebraic code system- analog system- asymmetric system- asymmetric key system- authentication/secrecy system- binary system- block system- broadcast system- broadcasting system- cipher-feedback system- classical system- common-key system- communication system- compromised system- computationally secure system- conference system- conventional system- DES-based system- DES-like system- deterministic system- DH system- Diffie and Hellman system- discrete-exponentiation system- discrete log system- E3 system- effectively unbreakable system- elliptic curve system- endomorphic system- end-to-end encryption system- error propagating system- factorization system- finite system- finite automation system- Galois field system- general system- generalized system- Goppa-code system- hardware-implemented system- hidden key system- high-grade system- high-speed system- hybrid public-secret key system- hybrid stream/block system- identity-based system- system immune to cryptoanalysis- indecipherable system- intractable system- iterated system- key escrow system- keyed system- key escrow system- key-minimal system- knapsack-based system- knapsack public key system- matrix system- McEliece' system- Merkle-Hellman system- MH system- microprocessor based system- minuend system- multiple access system- multiple destination system- multiplicative knapsack system- network system- non-linear system- number theoretic system- one-key system- one-master-key system- one-time-key system- one-time-pad system- one-time-tape system- perfect secrecy system- practical security system- private key system- proprietary system- public key system- public key distribution system- public key signature system- rapid system- reciprocal number system- residue system- Rivest-Shamir-Adleman system- rotor system- RSA public key system- r-th residue system- secret-key system- secure system- shared key system- shift register system- single-key system- sophisticated system- split key system- strong system- subtractive system- symmetric system- theoretically unbreakable system- threshold system- transposition system- trap-door-knapsack public key system- transient key system- threshold system- two-key system- unbreakable system- voice system -
39 cryptosystem
криптографическая система, криптосистема; шифросистема- abuse-free cryptosystem- algebraic code cryptosystem- analog cryptosystem- asymmetric cryptosystem- asymmetric key cryptosystem- authentication/secrecy cryptosystem- bijective public key cryptosystem- binary cryptosystem- block cryptosystem- broadcast cryptosystem- broadcasting cryptosystem- cipher-feedback cryptosystem- classical cryptosystem- common-key cryptosystem- communication cryptosystem- compromised cryptosystem- computationally secure cryptosystem- conference cryptosystem- conventional cryptosystem- DES-based cryptosystem- DES-like cryptosystem- deterministic cryptosystem- DH cryptosystem- Diffie and Hellman cryptosystem- discrete-exponentiation cryptosystem- discrete log cryptosystem- E3 cryptosystem- effectively unbreakable cryptosystem- elliptic curve cryptosystem- endomorphic cryptosystem- end-to-end encryption cryptosystem- error propagating cryptosystem- factorization cryptosystem- finite cryptosystem- finite automation cryptosystem- Galois field cryptosystem- general cryptosystem- generalized cryptosystem- Goppa-code cryptosystem- hardware-implemented cryptosystem- hidden key cryptosystem- high-grade cryptosystem- high-speed cryptosystem- hybrid public-secret key cryptosystem- hybrid stream/block cryptosystem- identity-based cryptosystem- intractable cryptosystem- indecipherable cryptosystem- iterated cryptosystem- keyed cryptosystem- key escrow cryptosystem- key-minimal cryptosystem- knapsack-based cryptosystem- knapsack public key cryptosystem- matrix cryptosystem- McEliece' cryptosystem- Merkle-Hellman cryptosystem- MH cryptosystem- microprocessor based cryptosystem- minuend cryptosystem- multiple access cryptosystem- multiple destination cryptosystem- multiplicative knapsack cryptosystem- network cryptosystem- non-linear cryptosystem- number theoretic cryptosystem- one-key cryptosystem- one-master-key cryptosystem- one-time-key cryptosystem- one-time-pad cryptosystem- one-time-tape cryptosystem- perfect secrecy cryptosystem- practical security cryptosystem- private key cryptosystem- proprietary cryptosystem- provable secure cryptosystem- public key cryptosystem- public key distribution cryptosystem- public key signature cryptosystem- rapid cryptosystem- reciprocal number cryptosystem- residue cryptosystem- Rivest-Shamir-Adleman cryptosystem- rotor cryptosystem- RSA public key cryptosystem- r-th residue cryptosystem- secret-key cryptosystem- secure cryptosystem- shared key cryptosystem- shift register cryptosystem- single-key cryptosystem- sophisticated cryptosystem- split key cryptosystem- strong cryptosystem- subtractive cryptosystem- symmetric cryptosystem- theoretically unbreakable cryptosystem- threshold cryptosystem- transposition cryptosystem- trap-door-knapsack public key cryptosystem- transient key cryptosystem- threshold cryptosystem- two-key cryptosystem- unbreakable cryptosystem- voice cryptosystem- cryptosystem immune to cryptoanalysisАнгло-русский словарь по компьютерной безопасности > cryptosystem
-
40 encryption
a) прибор шифрования (обозначение в схеме)b) (encryption)1) шифрование; зашифрование; операция (за) шифрования2) криптография; криптографическая защита; криптографическое сокрытие информации3) шифротекст- hardware encryption- hardware assisted encryptionАнгло-русский словарь по компьютерной безопасности > encryption
См. также в других словарях:
One time key — A one time key is a cryptographic key used once and then discarded, used either to authenticate or encrypt data.If a key is used only once and is truly random, it is theoretically unbreakable … Wikipedia
One-time pad — Excerpt from a one time pad In cryptography, the one time pad (OTP) is a type of encryption, which has been proven to be impossible to crack if used correctly. Each bit or character from the plaintext is encrypted by a modular addition with a bit … Wikipedia
One Time (song) — One Time Single by Justin Bieber fro … Wikipedia
One-time password — A one time password (OTP) is a password that is valid for only one login session or transaction. OTPs avoid a number of shortcomings that are associated with traditional (static) passwords. The most important shortcoming that is addressed by OTPs … Wikipedia
Time-based One-time Password Algorithm — TOTP (Time based One Time Password Algorithm, RFC 6238.) OATH алгоритм создания одноразовых паролей для защищенной аутентификации, являющийся улучшением HOTP (HMAC Based One Time Password Algorithm). Является алгоритмом односторонней… … Википедия
List of one-time The Simpsons characters — Further information: List of characters in The Simpsons and List of recurring characters in The Simpsons The following is a list of one time characters from the American animated television comedy series The Simpsons. Some of the… … Wikipedia
List of one-time characters in The Simpsons — This following is a list, by episode, of one time fictional characters from the American animated television comedy series The Simpsons . ] and for this and four other guest performances he was named the greatest guest star in the show s history… … Wikipedia
One More Car, One More Rider — Live album by Eric Clapton Released November 5, 2002 … Wikipedia
Time Lord — This article is about the civilisation from Doctor Who. For other uses, see Time Lord (disambiguation). Doctor Who alien Time Lord Type … Wikipedia
Key strengthening — In cryptography, key strengthening or key stretching refer to techniques used to make a possibly weak key, typically a password or passphrase, more secure against a brute force attack by increasing the time it takes to test each possible key.… … Wikipedia
Key size — In cryptography, key size or key length is the size measured in bits[1] of the key used in a cryptographic algorithm (such as a cipher). An algorithm s key length is distinct from its cryptographic security, which is a logarithmic measure of the… … Wikipedia