-
1 time varying encryption
Безопасность: шифрование на изменяющемся во времени ключеУниверсальный англо-русский словарь > time varying encryption
-
2 time varying encryption
Англо-русский словарь по компьютерной безопасности > time varying encryption
-
3 encryption
a) прибор шифрования (обозначение в схеме)b) (encryption)1) шифрование; зашифрование; операция (за) шифрования2) криптография; криптографическая защита; криптографическое сокрытие информации3) шифротекст- hardware encryption- hardware assisted encryptionАнгло-русский словарь по компьютерной безопасности > encryption
-
4 function
- function D- function EАнгло-русский словарь по компьютерной безопасности > function
-
5 channel
канал (связи, передачи информации)Англо-русский словарь по компьютерной безопасности > channel
См. также в других словарях:
Full disk encryption — (or whole disk encryption) is a kind of disk encryption software or hardware which encrypts every bit of data that goes on a disk or disk volume. The term full disk encryption is often used to signify that everything on a disk, including the… … Wikipedia
Disk encryption — uses disk encryption software or hardware to encrypt every bit of data that goes on a disk or disk volume. Disk encryption prevents unauthorized access to data storage. The term full disk encryption (or whole disk encryption) is often used to… … Wikipedia
Wireless USB specification — Certified Wireless USB (W USB for short) is the specification of a wireless extension of the USB standard which intends to further increase the availability of general USB based solutions. It is maintained by the WiMedia Alliance, and as of 2007… … Wikipedia
Clandestine HUMINT operational techniques — The Clandestine HUMINT page deals with the functions of that discipline, including espionage and active counterintelligence. This page deals with Clandestine HUMINT operational techniques, also called tradecraft . It applies to clandestine… … Wikipedia
Computer security compromised by hardware failure — is a branch of computer security applied to hardware. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible … Wikipedia
Project 25 — (P25 or APCO 25) is a suite of standards for digital radio communications for use by federal, state/province and local public safety agencies in North America to enable them to communicate with other agencies and mutual aid response teams in… … Wikipedia
Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer. The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… … Universalium
Enigma machine — Military Enigma machine … Wikipedia
Signals intelligence — SIGINT redirects here. For the UNIX signal, see SIGINT (POSIX). RAF Menwith Hill, a large site in the United Kingdom, part of ECHELON and the UK USA Security Agreement. Signals intelligence (often contracted to SIGINT) is intelligence gathering… … Wikipedia
Copy protection — Copy protection, also known as content protection, copy obstruction, copy prevention and copy restriction, refer to techniques used for preventing the reproduction of software, films, music, and other media, usually for copyright reasons.[1]… … Wikipedia
Media and Publishing — ▪ 2007 Introduction The Frankfurt Book Fair enjoyed a record number of exhibitors, and the distribution of free newspapers surged. TV broadcasters experimented with ways of engaging their audience via the Internet; mobile TV grew; magazine… … Universalium