-
21 system
- computationally secure system- abuse-free system- algebraic code system- analog system- asymmetric system- asymmetric key system- authentication/secrecy system- binary system- block system- broadcast system- broadcasting system- cipher-feedback system- classical system- common-key system- communication system- compromised system- computationally secure system- conference system- conventional system- DES-based system- DES-like system- deterministic system- DH system- Diffie and Hellman system- discrete-exponentiation system- discrete log system- E3 system- effectively unbreakable system- elliptic curve system- endomorphic system- end-to-end encryption system- error propagating system- factorization system- finite system- finite automation system- Galois field system- general system- generalized system- Goppa-code system- hardware-implemented system- hidden key system- high-grade system- high-speed system- hybrid public-secret key system- hybrid stream/block system- identity-based system- system immune to cryptoanalysis- indecipherable system- intractable system- iterated system- key escrow system- keyed system- key escrow system- key-minimal system- knapsack-based system- knapsack public key system- matrix system- McEliece' system- Merkle-Hellman system- MH system- microprocessor based system- minuend system- multiple access system- multiple destination system- multiplicative knapsack system- network system- non-linear system- number theoretic system- one-key system- one-master-key system- one-time-key system- one-time-pad system- one-time-tape system- perfect secrecy system- practical security system- private key system- proprietary system- public key system- public key distribution system- public key signature system- rapid system- reciprocal number system- residue system- Rivest-Shamir-Adleman system- rotor system- RSA public key system- r-th residue system- secret-key system- secure system- shared key system- shift register system- single-key system- sophisticated system- split key system- strong system- subtractive system- symmetric system- theoretically unbreakable system- threshold system- transposition system- trap-door-knapsack public key system- transient key system- threshold system- two-key system- unbreakable system- voice system -
22 rnethod
метод, способamplitude (comparison) radio direction finding rnethod — амплитудный метод радиопеленгации (измерением амплитуд принимаемых сигналов)
battlebook calculus (operations simulation) rnethod — метод моделирования боевых операций (по перечню основных операционных принципов)
fording rnethod for (water obstacle) crossing — форсирование водной преграды с переправой (машин) вброд
graphic traverse rnethod of obtaining (position) coordinates — полигонометрический метод определения координат (ОП)
one-man, one-sight rnethod — способ наводки (орудия) одним наводчиком с одним прицелом
two-men, two-sights rnethod — способ наводки (орудия) взаимным визированием (двумя наводчиками с двумя прицелами)
visual (nuclear) damage estimation rnethod — визуальный метод определения вероятного поражения цели при ЯУ
— clock face rnethod— two-station observation rnethod -
23 security
1) безопасность; служба безопасности2) защита; защищенностьАнгло-русский словарь по компьютерной безопасности > security
-
24 circuit
цепь; схемаАнгло-русский словарь по компьютерной безопасности > circuit
-
25 communication
1) связь, коммуникация; система связи2) передача информации (от ее источника адресатам); сообщение- all-points communication- analog communication- authenticated communication- broadcast communication- burst communication- character-oriented communication- clear communication- clear-to clear communication- client-server communication- coded communication- computer-to-terminal communication- confidential communication- conversational communication- covert communication- cryptographic communication- cryptographically protected communication- cryptographically secure communication- data communication- dial-up communication- digital communication- digitally encrypted voice communication- diplomatic communication- document communication- enciphered communication- encrypted communication- encryption communication- based secure communication- end-to-end communication- frequency hopping communication- high density communication- high-speed communication- imitative communication- intelligence communication- interactive communication- inter-enclosure communication- in-the-clear communication- large-volume communication- legitimate communication- multichannel communication- multimedia communication- multipeer communication- online communication- packet communication- peer-to-peer communication- plain communication- point-to-multipoint communication- program-to-program communication- prohibited communication- protected communication- reliable communication- robust communication- secrecy communication- secret communication- secure communication- secure-to-secure communication- secure voice communication- sensitive communication- signed communication- single-domain communication- speech communication- spoken communication- teleprinter communication- teletype communication- terminal-to-computer communication- terminal-to-terminal communication- top security communication- two-way communication- unauthorised communication- undirected communication- user/computer communication- user to user communication- visual communication- voice communicationАнгло-русский словарь по компьютерной безопасности > communication
-
26 processor
Англо-русский словарь по компьютерной безопасности > processor
-
27 telecommunication
1) связь, коммуникация; система связи2) передача информации (от ее источника адресатам); сообщение- all-points telecommunication- analog telecommunication- authenticated telecommunication- broadcast telecommunication- burst telecommunication- character-oriented telecommunication- clear telecommunication- clear-to clear telecommunication- client-server telecommunication- coded telecommunication- computer-to-terminal telecommunication- confidential telecommunication- conversational telecommunication- covert telecommunication- cryptographic telecommunication- cryptographically protected telecommunication- cryptographically secure telecommunication- data telecommunication- dial-up telecommunication- digital telecommunication- digitally encrypted voice telecommunication- diplomatic telecommunication- document telecommunication- enciphered telecommunication- encrypted telecommunication- encryption telecommunication- based secure telecommunication- end-to-end telecommunication- frequency hopping telecommunication- high density telecommunication- high-speed telecommunication- imitative telecommunication- intelligence telecommunication- interactive telecommunication- inter-enclosure telecommunication- in-the-clear telecommunication- large-volume telecommunication- legitimate telecommunication- multichannel telecommunication- multimedia telecommunication- multipeer telecommunication- online telecommunication- packet telecommunication- peer-to-peer telecommunication- plain telecommunication- point-to-multipoint telecommunication- program-to-program telecommunication- prohibited telecommunication- protected telecommunication- reliable telecommunication- robust telecommunication- secrecy telecommunication- secret telecommunication- secure telecommunication- secure-to-secure telecommunication- secure voice telecommunication- sensitive telecommunication- signed telecommunication- single-domain telecommunication- speech telecommunication- spoken telecommunication- teleprinter telecommunication- teletype telecommunication- terminal-to-computer telecommunication- terminal-to-terminal telecommunication- top security telecommunication- two-way telecommunication- unauthorised telecommunication- undirected telecommunication- user/computer telecommunication- user to user telecommunication- visual telecommunication- voice telecommunicationАнгло-русский словарь по компьютерной безопасности > telecommunication
-
28 terminal
терминал, оконечное (абонентское) устройство- telex terminalАнгло-русский словарь по компьютерной безопасности > terminal
-
29 card
1) карточка2) плата•- adapter card
- address card
- aperture card
- audio-stripped card
- AV-card
- capture card
- CF card
- chip card
- chip-carrying card
- Compact Flash card
- correction card
- data interface card
- decoding card
- encryption card
- ENET card
- expansion card
- extended-line card
- GSM-card
- index card
- information card
- interface card
- Kodak Picture card
- line card
- magnetic card
- main processor card
- master card
- memory card
- multichannel card
- multiple card
- network-interface card
- nonlinear editing card
- PC card
- PCMCIA card
- plug-in card
- QSL-card
- radar card
- remote programming card
- resources switching card
- setup card
- SIM card
- smart card
- Smart Media card
- sound card
- spare card
- speech authentication card
- Super Loop card
- switching card
- system controlling card
- test card
- trunk card
- video card
- voice card
- wild cardEnglish-Russian dictionary of telecommunications and their abbreviations > card
- 1
- 2
См. также в других словарях:
Speech Synthesis Markup Language — (SSML) (Язык Разметки Синтеза Речи) представляет собой основанный на XML язык разметки для приложений синтеза речи[1]. Он был рекомендован рабочей группой W3C[2]. SSML часто встраивается в сценарии VoiceXML для интерактивных систем телефонии[3].… … Википедия
AACS encryption key controversy — A controversy surrounding the AACS cryptographic key arose in April 2007 when the Motion Picture Association of America and the Advanced Access Content System Licensing Administrator, LLC (AACS LA) began issuing demand letters[1] to websites… … Wikipedia
NSA encryption systems — The National Security Agency took over responsibility for all U.S. Government encryption systems when it was formed in 1952. The technical details of most NSA approved systems are still classified, but much more about its early systems has become … Wikipedia
шифрование речи — — [http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=4489] Тематики защита информации EN speech encryption … Справочник технического переводчика
Secure voice — (alternatively secure speech or ciphony) is a term in cryptography for the encryption of voice communication over a range of communication types such as radio, telephone or IP. Contents 1 History 2 Analog Secure Voice technologies 3 Di … Wikipedia
Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer. The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… … Universalium
Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption … Wikipedia
Vocoder — A vocoder ( /ˈvoʊk … Wikipedia
Al Gore and information technology — Al Gore is the former Vice President of the United States (1993–2001), the 2000 Democratic Party presidential nominee, and the co winner of the 2007 Nobel Peace Prize. He has been involved with the development of the Internet since the… … Wikipedia
Cypherpunk — Not to be confused with Cyberpunk. A cypherpunk is an activist advocating widespread use of strong cryptography as a route to social and political change. Originally communicating through the Cypherpunks electronic mailing list, informal groups… … Wikipedia
Secure Communications Interoperability Protocol — SCIP is the U.S. Government s standard for secure voice and data communication. The acronym stands for Secure Communications Interoperability Protocol and was adopted to replace the FNBDT (Future Narrowband Digital Terminal) title in 2004. SCIP… … Wikipedia