-
1 password generation algorithm
Безопасность: алгоритм выбора паролей, алгоритм формирования паролейУниверсальный англо-русский словарь > password generation algorithm
-
2 password generation algorithm
Англо-русский словарь по компьютерной безопасности > password generation algorithm
-
3 algorithm
алгоритм (cryptoalgorithm) криптографический алгоритм, криптоалгоритм; алгоритм шифрования (криптографического закрытия)- private cryptographic algorithmАнгло-русский словарь по компьютерной безопасности > algorithm
-
4 алгоритм выбора паролей
Security: password algorithm, password generation algorithmУниверсальный русско-английский словарь > алгоритм выбора паролей
-
5 алгоритм формирования паролей
Security: password algorithm, password generation algorithmУниверсальный русско-английский словарь > алгоритм формирования паролей
См. также в других словарях:
Password (video games) — In many video games of the 8 and 16 bit eras, after a level was beaten and/or when all continues were used, the game would display a password, that when entered in the game would allow the player to return back to this part in the game. This way … Wikipedia
One-time password — A one time password (OTP) is a password that is valid for only one login session or transaction. OTPs avoid a number of shortcomings that are associated with traditional (static) passwords. The most important shortcoming that is addressed by OTPs … Wikipedia
Random number generation — A random number generator (often abbreviated as RNG) is a computational or physical device designed to generate a sequence of numbers or symbols that lack any pattern, i.e. appear random. Computer based systems for random number generation are… … Wikipedia
Security token — Several types of security tokens with a penny for scale … Wikipedia
Salt (cryptography) — In cryptography, a salt consists of random bits, creating one of the inputs to a one way function. The other input is usually a password or passphrase. The output of the one way function can be stored rather than the password, and still be used… … Wikipedia
RC4 — In cryptography, RC4 (also known as ARC4 or ARCFOUR meaning Alleged RC4, see below) is the most widely used software stream cipher and is used in popular protocols such as Secure Sockets Layer (SSL) (to protect Internet traffic) and WEP (to… … Wikipedia
Digital signature — This article is about secure cryptographic signatures. For simple signatures in digital form, see Electronic signature. A digital signature or digital signature scheme is a mathematical scheme for demonstrating the authenticity of a digital… … Wikipedia
OpenBSD security features — The OpenBSD operating system is noted for its security focus and for the development of a number of security features. Contents 1 API and build changes 2 Memory protection 3 Cryptography and randomization … Wikipedia
Cryptovirology — is a field that studies how to use cryptography to design powerful malicious software. The field was born with the observation that public key cryptography can be used to break the symmetry between what an antivirus analyst sees regarding a virus … Wikipedia
Oracle Corporation — Type Public Traded as NYSE: ORCL NASDAQ: … Wikipedia
Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… … Wikipedia