Перевод: с английского на все языки

со всех языков на английский

system-protected key

См. также в других словарях:

  • Key (lock) — A cut key A key is an instrument that is used to operate a lock. A typical key consists of two parts: the blade, which slides into the keyway of the lock and distinguishes between different keys, and the bow, which is left protruding so that… …   Wikipedia

  • Key escrow — (also known as a fair cryptosystem) is an arrangement in which the keys needed to decrypt encrypted data are held in escrow so that, under certain circumstances, an authorized third party may gain access to those keys. These third parties may… …   Wikipedia

  • Key authentication — is a problem that arises when using public key cryptography. It is the process of assuring that the public key of person A held by person B does in fact belong to person A .In traditional symmetric key cryptography, this problem wasn t an issue… …   Wikipedia

  • Protected areas of China — This article lists the nationally protected areas of China. There are many forms of protected areas in China. Based on their relative importance, each type of protected area can be further graded into two to three levels (national, provincial and …   Wikipedia

  • Protected area — Natural park redirects here. For specific use in Spain, see Natural park (Spain). This article is about protected regions of environmental or cultural value. For protected area of a cricket pitch, see Cricket pitch. Protected areas are locations… …   Wikipedia

  • Key size — In cryptography, key size or key length is the size measured in bits[1] of the key used in a cryptographic algorithm (such as a cipher). An algorithm s key length is distinct from its cryptographic security, which is a logarithmic measure of the… …   Wikipedia

  • System/34 and System/36 Screen Design Aid — Screen Design Aid (System/34 and System/36) (SDA) is a utility for the IBM System/34, System/36, System/38, and AS/400 (iSeries) midrange computers.This article refers to the S/34 and S/36 implementations of SDA. S/38 and AS/400 use a different… …   Wikipedia

  • Key strengthening — In cryptography, key strengthening or key stretching refer to techniques used to make a possibly weak key, typically a password or passphrase, more secure against a brute force attack by increasing the time it takes to test each possible key.… …   Wikipedia

  • Protected Extensible Authentication Protocol — PEAP is also an acronym for Personal Egress Air Packs. Protected Extensible Authentication Protocol, Protected EAP, or simply PEAP (pronounced peep ), is a method to securely transmit authentication information, including passwords, over wired or …   Wikipedia

  • System Folder — The System Folder is the directory in classic versions of Mac OS (those prior to OS X) that holds various files required for the system to operate, such as fonts, system extensions, control panels, and preferences. Location and blessed foldersIt… …   Wikipedia

  • Baltic Pipeline System — The Baltic Pipeline System (BPS) is a Russian oil transport system operated by oil pipeline company Transneft. The BPS transports oil from the Timan Pechora region, West Siberia and the Urals Volga region to Primorsk oil terminal at the eastern… …   Wikipedia

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»