-
101 Quantum Key Generation
Security: QKGУниверсальный русско-английский словарь > Quantum Key Generation
-
102 Quicken Password Recovery Key
Security: QPRKУниверсальный русско-английский словарь > Quicken Password Recovery Key
-
103 Rapid Public Key
Security: RPK -
104 Relative Key Position
Security: RKPУниверсальный русско-английский словарь > Relative Key Position
-
105 Short Message Encryption Key
Security: SMEKУниверсальный русско-английский словарь > Short Message Encryption Key
-
106 Sierra-Based Advanced Standard Key Management Processor
Security: SASKMMУниверсальный русско-английский словарь > Sierra-Based Advanced Standard Key Management Processor
-
107 Signature Verifiable Key
Security: SVKУниверсальный русско-английский словарь > Signature Verifiable Key
-
108 Simple Key Management for Internet Protocols
Security: SKIPУниверсальный русско-английский словарь > Simple Key Management for Internet Protocols
-
109 Simple Public Key
Security: SPK -
110 Simple Public Key Infrastructure
Security: SPKIУниверсальный русско-английский словарь > Simple Public Key Infrastructure
-
111 Simple Public Key Mechanism
Security: SPKMУниверсальный русско-английский словарь > Simple Public Key Mechanism
-
112 Site Key Library
Security: SKL -
113 Spatial Key
Security: SK -
114 Standard Key Management
Security: SKMУниверсальный русско-английский словарь > Standard Key Management
-
115 Standard Key Management Module
Security: SKMMУниверсальный русско-английский словарь > Standard Key Management Module
-
116 Standard Key Management Protocol
Security: SKMPУниверсальный русско-английский словарь > Standard Key Management Protocol
-
117 Strengthened Key
Security: SK -
118 Surrogate Key
Security: SK -
119 Synchronizing Key Server
Security: SKSУниверсальный русско-английский словарь > Synchronizing Key Server
-
120 System Multipurpose Key
Security: SMKУниверсальный русско-английский словарь > System Multipurpose Key
См. также в других словарях:
Internet Security Association and Key Management Protocol — ISAKMP (Internet Security Association and Key Management Protocol) is a protocol for establishing Security Associations (SA) and cryptographic keys in an Internet environment. The protocol is defined by RFC 2408. Overview ISAKMP defines the… … Wikipedia
Internet Security Association and Key Management Protocol — ISAKMP im TCP/IP‑Protokollstapel: Anwendung ISAKMP Transport UDP TCP Internet IP (IPv4, IPv6) Netzzugang Ethernet … Deutsch Wikipedia
Internet Security Association and Key Management Protocol — (ISAKMP) es un protocolo criptográfico que constituye la base del protocolo de intercambio de claves IKE. Está definido en el RFC 2408. ISAKMP define los procedimientos para la autenticación entre pares, creación y gestión de asociaciones de… … Wikipedia Español
Security token — Several types of security tokens with a penny for scale … Wikipedia
Security interest — A security interest is a property interest created by agreement or by operation of law over assets to secure the performance of an obligation, usually the payment of a debt.[1] It gives the beneficiary of the security interest certain… … Wikipedia
Security Association — Eine Security Association (SA, dt. Sicherheitsverbindung) ist eine Vereinbarung zwischen zwei kommunizierenden Einheiten in Rechnernetzen. Sie beschreibt, wie die beiden Parteien Sicherheitsdienste anwenden werden, um sicher miteinander… … Deutsch Wikipedia
Key money — is used differently in different parts of the world. It sometimes means money paid to an existing tenant who assigns a lease to a new tenant where the rent is below market. It sometimes means a bribe to a landlord. In other parts of the world it… … Wikipedia
Key management — is a term used to describe two different fields; (1) cryptography, and (2) physical key management (or electronic key management) within building or campus access control.In cryptography, key management includes all of the provisions made in a… … Wikipedia
Key Wrap — constructions are a class of symmetric encryption algorithms designed to encapsulate (encrypt) cryptographic key material. The Key Wrap algorithms are intended for applications such as (a) protecting keys while in untrusted storage, or (b)… … Wikipedia
KEY-Record — KEY Resource Records dienen der Propagierung öffentlicher Schlüssel durch DNS. KEY Records wurden im Rahmen von DNSSEC (DNS Security) verwendet, ab 2004 aber durch die nahezu identischen DNSKEY Resource Records ersetzt. Inhaltsverzeichnis 1… … Deutsch Wikipedia
Security protocol notation — Security (engineering) protocol notation is a way of expressing a protocol of correspondence between entities of a dynamic system, such as a computer network. In the context of a formal model, it allows reasoning about the properties of such a… … Wikipedia