-
21 heuristic
An approach or algorithm that leads to a correct solution of a programming task by non-rigorous or self-learning means. One approach to programming is first to develop a heuristic and then to improve on it.موجِّه -
22 key
"In encryption, authentication, and digital signatures, a value used in combination with an algorithm to encrypt or decrypt information." -
23 online
"A state that marks a component in a failover cluster or server cluster as available. When a node is online, it is an active member of the cluster and can own and run clustered services and applications, honor cluster database updates, contribute votes to the quorum algorithm, and maintain heartbeats. Clustered services and applications, and the resources within them, also have an online state." -
24 private key
"The secret half of a cryptographic key pair that is used with a public key algorithm. Private keys are typically used to decrypt a symmetric session key, digitally sign data, or decrypt data that has been encrypted with the corresponding public key." -
25 public key
"The nonsecret half of a cryptographic key pair that is used with a public key algorithm. Public keys are typically used when encrypting a session key, verifying a digital signature, or encrypting data that can be decrypted with the corresponding private key." -
26 symmetric encryption
"An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data." -
27 secret key encryption
"An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data." -
28 Message Authentication Code
An algorithm that allows a receiver to ensure that a block of data has retained its integrity from the time it was sent until the time it was received.English-Arabic terms dictionary > Message Authentication Code
-
29 MAC
An algorithm that allows a receiver to ensure that a block of data has retained its integrity from the time it was sent until the time it was received. -
30 key
"In IP security (IPSec), a value used in combination with an algorithm to encrypt or decrypt data. Key settings for IPSec are configurable to provide greater security." -
31 bulk encryption
"A process in which large amounts of data, such as files, e-mail messages, or online communications sessions, are encrypted for confidentiality. It is usually done with a symmetric key algorithm." -
32 Challenge Handshake Authentication Protocol
A challenge-response authentication protocol for Point-to-Point Protocol (PPP) connections described in RFC 1994. It uses the industry-standard MD5 hashing algorithm to hash the combination of a challenge string issued by the authenticating server and the user's password in the response."بروتوكول ""Challenge Handshake Authentication Protocol"""English-Arabic terms dictionary > Challenge Handshake Authentication Protocol
-
33 CHAP
A challenge-response authentication protocol for Point-to-Point Protocol (PPP) connections described in RFC 1994. It uses the industry-standard MD5 hashing algorithm to hash the combination of a challenge string issued by the authenticating server and the user's password in the response. -
34 encryption key
A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data. -
35 Network Load Balancing
"A Windows network component that uses a distributed algorithm to load-balance Internet Protocol (IP) traffic across a number of hosts, helping to enhance the scalability and availability of mission-critical, IP-based services, such as Remote Desktop Services, Web services, virtual private networking, and streaming media. It also provides high availability by detecting host failures and automatically redistributing traffic to the surviving hosts." -
36 hash code
"A fixed-size result that is obtained by applying a one-way mathematical function (sometimes called a hash algorithm) to an arbitrary amount of data. If there is a change in the input data, the hash changes. The hash can be used in many operations, including authentication and digital signing." -
37 Triple Data Encryption Standard
An encryption algorithm based on the Data Encryption Standard (DES).English-Arabic terms dictionary > Triple Data Encryption Standard
-
38 3DES
An encryption algorithm based on the Data Encryption Standard (DES). -
39 Advanced Encryption Standard
A cryptographic algorithm specified by the National Institute of Standards and Technology (NIST) to protect sensitive information.English-Arabic terms dictionary > Advanced Encryption Standard
-
40 AES
A cryptographic algorithm specified by the National Institute of Standards and Technology (NIST) to protect sensitive information.
См. также в других словарях:
Algorithm design — is a specific method to create a mathematical process in solving problems. Applied algorithm design is algorithm engineering.Algorithm design is identified and incorporated into many solution theories of operation research, such as dynamic… … Wikipedia
Algorithm engineering — is a combination of theoretical algorithm design with real world data. By taking an algorithm and combining it with a hardware device connected to the real world, you are able to more accurately verify and validate the algorithm results and… … Wikipedia
algorithm — UK US /ˈælgərɪðəm/ noun [C] IT ► a set of mathematical instructions that must be followed in a fixed order, and that, especially if given to a computer, will help to calculate an answer to a mathematical problem: a computer/mathematical/search… … Financial and business terms
algorithm — n. a precise rule (or set of rules) specifying how to solve some problem; a set of procedures guaranteed to find the solution to a problem. Syn: algorithmic rule, algorithmic program [WordNet 1.5 +PJC] … The Collaborative International Dictionary of English
algorithm — [al′gə rith΄əm] n. [altered (after ARITHMETIC) < ALGORISM] 1. Math. a) any systematic method of solving a certain kind of problem b) the repetitive calculations used in finding the greatest common divisor of two numbers: called in full… … English World dictionary
Algorithm Builder — ist eine Entwicklungsumgebung für AVR Mikrocontroller, basierend auf einer graphischen Makro Assembler Sprache. Der gesamte Programmablauf wird in graphischer Form als Flussdiagramm eingegeben. Es lässt sich mit einzelnen Anweisungen direkt auf… … Deutsch Wikipedia
Algorithm — [engl.], Algorithmus. … Universal-Lexikon
algorithm — (n.) 1690s, from Fr. algorithme, refashioned (under mistaken connection with Gk. arithmos number ) from O.Fr. algorisme the Arabic numeral system (13c.), from M.L. algorismus, a mangled transliteration of Arabic al Khwarizmi native of Khwarazm,… … Etymology dictionary
algorithm — ► NOUN ▪ a process or set of rules used in calculations or other problem solving operations. DERIVATIVES algorithmic adjective. ORIGIN Latin algorismus, from an Arabic word meaning the man of Kw rizm , referring to a 9th century mathematician … English terms dictionary
Algorithm — Flow chart of an algorithm (Euclid s algorithm) for calculating the greatest common divisor (g.c.d.) of two numbers a and b in locations named A and B. The algorithm proceeds by successive subtractions in two loops: IF the test B ≤ A yields yes… … Wikipedia
Algorithm characterizations — The word algorithm does not have a generally accepted definition. Researchers are actively working in formalizing this term. This article will present some of the characterizations of the notion of algorithm in more detail. This article is a… … Wikipedia