-
1 tamper response security
Безопасность: защищённость от несанкционированного вскрытияУниверсальный англо-русский словарь > tamper response security
-
2 tamper response security
Англо-русский словарь по компьютерной безопасности > tamper response security
-
3 security
1) безопасность; служба безопасности2) защита; защищенностьАнгло-русский словарь по компьютерной безопасности > security
-
4 system
- computationally secure system- abuse-free system- algebraic code system- analog system- asymmetric system- asymmetric key system- authentication/secrecy system- binary system- block system- broadcast system- broadcasting system- cipher-feedback system- classical system- common-key system- communication system- compromised system- computationally secure system- conference system- conventional system- DES-based system- DES-like system- deterministic system- DH system- Diffie and Hellman system- discrete-exponentiation system- discrete log system- E3 system- effectively unbreakable system- elliptic curve system- endomorphic system- end-to-end encryption system- error propagating system- factorization system- finite system- finite automation system- Galois field system- general system- generalized system- Goppa-code system- hardware-implemented system- hidden key system- high-grade system- high-speed system- hybrid public-secret key system- hybrid stream/block system- identity-based system- system immune to cryptoanalysis- indecipherable system- intractable system- iterated system- key escrow system- keyed system- key escrow system- key-minimal system- knapsack-based system- knapsack public key system- matrix system- McEliece' system- Merkle-Hellman system- MH system- microprocessor based system- minuend system- multiple access system- multiple destination system- multiplicative knapsack system- network system- non-linear system- number theoretic system- one-key system- one-master-key system- one-time-key system- one-time-pad system- one-time-tape system- perfect secrecy system- practical security system- private key system- proprietary system- public key system- public key distribution system- public key signature system- rapid system- reciprocal number system- residue system- Rivest-Shamir-Adleman system- rotor system- RSA public key system- r-th residue system- secret-key system- secure system- shared key system- shift register system- single-key system- sophisticated system- split key system- strong system- subtractive system- symmetric system- theoretically unbreakable system- threshold system- transposition system- trap-door-knapsack public key system- transient key system- threshold system- two-key system- unbreakable system- voice system
См. также в других словарях:
Tamper — can mean:* A device used for tamping, commonly to prepare ground coffee beans to make espresso. * * A ballast tamper, a machine that tamps track ballast. * In nuclear weapon design, either a shell surrounding the fission core and keeping the… … Wikipedia
Security token — Several types of security tokens with a penny for scale … Wikipedia
Cyber-security regulation — In the United States government, cyber security regulation comprises directives from the Executive Branch and legislation from Congress that safeguards information technology and computer systems. The purpose of cyber security regulation is to… … Wikipedia
Norton Internet Security — The main, simplified graphical user interface of Norton Internet Security 2012 … Wikipedia
AKA (security) — AKA stands for the Authentication and Key Agreement. It is a security protocol used in 3G networks.AKA is also used for one time password generation mechanism for Hypertext Transfer Protocol (HTTP) Digest access authentication. The HTTP… … Wikipedia
Supply chain security — refers to efforts to enhance the security of the supply chain: the transport and logistics system for the world s cargo. It combines traditional practices of supply chain management with the security requirements of the system, which are driven… … Wikipedia
Automated Teller Machine Communication Security — Automated Teller Machines were first used in 1939. Nowadays, about 1.5 million are installed worldwide [ [http://www.atmmarketplace.com/news story 24706.htm Number of ATMs worldwide expected to hit 1.5 million in December 2005] www.atmmarketplace … Wikipedia
Smart card — This article is regarding smart cards that use electrical connectors to transmit data. For smart cards that use radio see contactless smart card Contact type smart cards may have many different contact pad layouts, such as these SIMs A smart card … Wikipedia
Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in … Wikipedia
USA PATRIOT Act — Full title Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 Acronym USA PATRIOT Act, also Patriot Act Enacted by the 107th United States Congress … Wikipedia
Nuclear weapon design — The first nuclear weapons, though large, cumbersome and inefficient, provided the basic design building blocks of all future weapons. Here the Gadget device is prepared for the first nuclear test: Trinity. Nuclear weapon designs are physical,… … Wikipedia