-
1 traditional encryption
симметричное шифрование, одноключевое шифрование, шифрование с секретным ключом, проф. традиционное шифрованиеEnglish-Russian electronics dictionary > traditional encryption
-
2 traditional encryption
симметричное шифрование, одноключевое шифрование, шифрование с секретным ключом, проф. традиционное шифрованиеThe New English-Russian Dictionary of Radio-electronics > traditional encryption
-
3 encryption
1) шифрование2) кодирование•- asymmetric encryption
- block encryption
- bulk encryption
- conventional encryption
- data encryption
- end-to-end encryption
- hardware encryption
- link encryption
- Microsoft point-to-point encryption
- multiple encryption
- public key encryption
- secret encryption
- software encryption
- stream encryption
- symmetric encryption
- traditional encryption
- virtual key encryption -
4 encryption
1) шифрование2) кодирование•- asymmetric encryption
- block encryption
- bulk encryption
- conventional encryption
- data encryption
- end-to-end encryption
- hardware encryption
- link encryption
- Microsoft point-to-point encryption
- multiple encryption
- public key encryption
- secret encryption
- software encryption
- stream encryption
- symmetric encryption
- traditional encryption
- virtual key encryptionThe New English-Russian Dictionary of Radio-electronics > encryption
-
5 TEA
1) Компьютерная техника: Tiny Embedded Application2) Военный термин: Tactical Exploitation Assessment, Test and Evaluation Agency, Transportability Engineering Analysis, Transportation Engineering Agency, Transportation Engineering Agreement, target engagement area, task equipment analysis, test equipment analysis, test equipment, accessory, training effectiveness analysis, transversely-excited atmospheric3) Техника: Trade Expansion Act, target echo attenuation, transferred electron amplifier, transversely excited at atmospheric pressure5) Религия: The Experience Of All, Transcendent Eternal Absolute6) Метеорология: Transversely Excited Atmosphere7) Оптика: transversely excited atmospheric8) Электроника: Transverse Excited Atmosphere9) Вычислительная техника: Tiny Encryption Algorithm (Verschluesselung)10) Нефть: technical and economic assessment11) Иммунология: "T early alpha"12) Космонавтика: положение равновесия моментов13) Транспорт: Transportation Enhancement Act, Transportation Equity Act14) Пищевая промышленность: Traditional English Ale15) Парфюмерия: триэтаноламин16) Фирменный знак: Trans European Airways17) Целлюлозно-бумажная промышленность: tensile energy absorbtion18) СМИ: Theatrical Equipment Association19) Глоссарий компании Сахалин Энерджи: Technical and Economic Analysis20) Образование: Teachers Experiencing Antarctica, Teddies Education Association, Terminal Education Age, Training Education And Awareness21) Полимеры: triethanolamine, triethylaluminum22) Сахалин Ю: travel and entertainment accounting23) Химическое оружие: thermal energy analyzer24) Безопасность: Tiny Encryption Algorithm25) Нефть и газ: tri etanol amine, tri-etanol amine, trietanol amine, trietanol-amine, trietanolamine, ТЭА, три этанол амин, триэтанол амин, триэтанол-амин26) Цемент: trimethyl amine27) Должность: Transitional Employment Assistance28) Чат: Tomorrow And Everyday After29) NYSE. Templeton Emerging Markets Appreciation Fund31) НАСА: Transversal Excited Atmospheric -
6 tea
1) Компьютерная техника: Tiny Embedded Application2) Военный термин: Tactical Exploitation Assessment, Test and Evaluation Agency, Transportability Engineering Analysis, Transportation Engineering Agency, Transportation Engineering Agreement, target engagement area, task equipment analysis, test equipment analysis, test equipment, accessory, training effectiveness analysis, transversely-excited atmospheric3) Техника: Trade Expansion Act, target echo attenuation, transferred electron amplifier, transversely excited at atmospheric pressure5) Религия: The Experience Of All, Transcendent Eternal Absolute6) Метеорология: Transversely Excited Atmosphere7) Оптика: transversely excited atmospheric8) Электроника: Transverse Excited Atmosphere9) Вычислительная техника: Tiny Encryption Algorithm (Verschluesselung)10) Нефть: technical and economic assessment11) Иммунология: "T early alpha"12) Космонавтика: положение равновесия моментов13) Транспорт: Transportation Enhancement Act, Transportation Equity Act14) Пищевая промышленность: Traditional English Ale15) Парфюмерия: триэтаноламин16) Фирменный знак: Trans European Airways17) Целлюлозно-бумажная промышленность: tensile energy absorbtion18) СМИ: Theatrical Equipment Association19) Глоссарий компании Сахалин Энерджи: Technical and Economic Analysis20) Образование: Teachers Experiencing Antarctica, Teddies Education Association, Terminal Education Age, Training Education And Awareness21) Полимеры: triethanolamine, triethylaluminum22) Сахалин Ю: travel and entertainment accounting23) Химическое оружие: thermal energy analyzer24) Безопасность: Tiny Encryption Algorithm25) Нефть и газ: tri etanol amine, tri-etanol amine, trietanol amine, trietanol-amine, trietanolamine, ТЭА, три этанол амин, триэтанол амин, триэтанол-амин26) Цемент: trimethyl amine27) Должность: Transitional Employment Assistance28) Чат: Tomorrow And Everyday After29) NYSE. Templeton Emerging Markets Appreciation Fund31) НАСА: Transversal Excited Atmospheric -
7 P2P
abbr. E-compeer-to-peer: a means of optimizing the networking capabilities of the Internet among groups of computers. Effectively it puts every computer on an equal footing, in that each can be both a publisher and consumer of information. The traditional model on the Web is the client-server one: the client is a computer that is able only to receive information; the server, on the other hand, publishes information on a Web site. Peer-to-peer makes a computer both a server and a client. Perhaps the best-known example of peer-to-peer is Napster, which enabled person A to search for and download music from person B’s computer, while person B could search for and download music from person A’s computer.There are several options for the use of peer-to-peer technologies. Information/ content: where the content on your computer becomes accessible to everyone else in the peer-to-peer environment, and vice versa. Processing sharing: where computers with spare processing capacity network together in order to combine resources. Using a large number of computers, this can create very significant processing capabilities. Services: a computer user can offer services to other people in the peer-to-peer network. File sharing: if person A downloads a file from a central server (an e-learning course from the Internet, for example), other people can use it from person A’s machine instead of having to download it again, significantly reducing strain on bandwidth.The main problem with peer-to-peer is the issue of security, and therefore it is essential to authenticate users. Many peer-to-peer interactions also use encryption, which ensures that the communication is secure as it is being passed from computer to computer.
См. также в других словарях:
Proxy re-encryption — schemes are cryptosystems which allow third parties (proxies) to alter a ciphertext which has been encrypted for one party, so that it may be decrypted by another. Examples of UseBob could designate a proxy to re encrypt one of his messages that… … Wikipedia
Opportunistic encryption — (OE) refers to any system that, when connecting to another system, attempts to encrypt the communications channel otherwise falling back to unencrypted communications. This method requires no pre arrangement between the two systems. Opportunistic … Wikipedia
Optimal asymmetric encryption padding — This article is about the padding scheme used in public key cryptography. For the division of the Thailand Ministry of Science Technology and Environment entitled Office of Atomic Energy for Peace, see [1]. In cryptography, Optimal Asymmetric… … Wikipedia
Optimal Asymmetric Encryption Padding — This article is about the padding scheme used in public key cryptography. For the division of the Thailand Ministry of Science Technology and Environment entitled Office of Atomic Energy for Peace, see [http://www.oaep.go.th/english/index.html] … Wikipedia
Xtraview Encryption System — Xtraview is a trademark of Top Up TV. The Xtraview Video Encryption System refers to the patented encryption system used on the now defunct Xtraview channel and a number of other Top Up TV services including Setanta Sports, Television X and Red… … Wikipedia
Envaulting — otheruses4|envaulting, a novel cryptographic method for protecting the confidentiality and integrity of information|anoverview about traditional cryptographic technology in general|CryptographyEnvaulting is the process of transforming information … Wikipedia
GEOM — is the storage framework available in the FreeBSD Operating System. It is available in FreeBSD 5.0 and higher and provides a standardized way to access storage layers. GEOM is modular and allows for geom modules to connect to the framework. For… … Wikipedia
Chaffing and winnowing — is a cryptographic technique to achieve confidentiality without using encryption when sending data over an insecure channel. The name is derived from agriculture: after grain has been harvested and threshed, it remains mixed together with… … Wikipedia
Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer. The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… … Universalium
Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… … Wikipedia
crypt (Unix) — In Unix computing, crypt is the name of both a utility program and a C programming function. Though both are used for encrypting data, they are otherwise essentially unrelated. To distinguish between the two, writers often refer to the utility… … Wikipedia