-
1 two-way authentication
= 2WAY authenticationАнгло-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. > two-way authentication
-
2 two-way authentication
Безопасность: двусторонняя аутентификацияУниверсальный англо-русский словарь > two-way authentication
-
3 two-way authentication
Англо-русский словарь по компьютерной безопасности > two-way authentication
-
4 authentication
аутентификация, установление подлинности (идентичности) (личности, документа, объекта), отождествлениеАнгло-русский словарь по компьютерной безопасности > authentication
-
5 2WAY authentication
Англо-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. > 2WAY authentication
-
6 mutual authentication
в информационной безопасности: аутентификация (предоставление друг другу доказательств своей идентичности) двумя взаимодействующими сторонами - например, пользователь (клиент) предоставляет свои данные серверу, а этот сервер - пользователю, так что обе стороны могут быть уверены в идентичности друг друга (как правило, это делают клиентский и серверный процессы без участия пользователя). Если речь идёт об Интернете, то для обозначения взаимной аутентификации часто употребляются такие термины, как website-to-user authentication или site-to-user authentication (аутентификация веб-сайта или сайта для пользователя).Syn:Англо-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. > mutual authentication
-
7 Shiva Password Authentication Protocol
"A two-way, reversible encryption mechanism for authenticating PPP connections employed by Shiva remote access servers."English-Arabic terms dictionary > Shiva Password Authentication Protocol
-
8 двусторонняя аутентификация
Security: bidirection authentication, two-way authenticationУниверсальный русско-английский словарь > двусторонняя аутентификация
-
9 key
1) (криптографический) ключ2) ключ к замку или запирающему устройству, механический ключ- base key- candidate key- card key- code key- data key- DES key- fake key- file key- good key- hex key- host key- link key- lost key- node key- numeric key- numerical key- pass key- PRN key- safe key- seed key- test key- true key- used key- user key- weak key- work key- zone key -
10 shortcut trust
A trust that is manually created between two domains in the same forest. The purpose of a shortcut trust is to optimize the interdomain authentication process by shortening the trust path. Shortcut trusts are transitive and can be one-way or two-way. -
11 channel
канал (связи, передачи информации)Англо-русский словарь по компьютерной безопасности > channel
См. также в других словарях:
Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in … Wikipedia
Authentication — (from Greek αυθεντικός; real or genuine, from authentes; author) is the act of establishing or confirming something (or someone) as authentic , that is, that claims made by or about the thing are true. This might involve confirming the identity… … Wikipedia
Mutual authentication — or two way authentication (sometimes written as 2WAY authentication) refers to two parties authenticating each other suitably. In technology terms, it refers to a client or user authenticating themselves to a server and that server authenticating … Wikipedia
Challenge-response authentication — For the spam filtering technique, see Challenge response spam filtering. For other uses, see CRAM (disambiguation). In computer security, challenge response authentication is a family of protocols in which one party presents a question (… … Wikipedia
Two Twisted — is an Australian TV mystery drama which premiered on the Nine Network on 14 August, 2006. Narrated by Bryan Brown, who also produced the series predecessor, Twisted Tales , each episode of the series contains two short half hour stories, that… … Wikipedia
Chip Authentication Program — A GemAlto EZIO CAP Device Whitelabeled as Barclays PINSentry The Chip Authentication Program (CAP) is a MasterCard initiative and technical specification for using EMV banking smartcards for authenticating users and transactions in online and… … Wikipedia
CAVE-based Authentication — Articleissues context = September 2008 deadend = September 2008 intromissing = September 2008 jargon = September 2008 unreferenced = September 2008 wikify = September 2008 CAVE based Authentication a.k.a. HLR Authentication, 2G Authentication,… … Wikipedia
One-way compression function — In cryptography, a one way compression function is a function that transforms two fixed length inputs to an output of the same size as one of the inputs. The transformation is one way , meaning that it is difficult given a particular output to… … Wikipedia
E-mail authentication — is the effort to equip messages of the e mail transport system with enough verifiable information, so that recipients can recognize the nature of each incoming message automatically. It is different from content filtering s fuzzy methods.… … Wikipedia
Extensible Authentication Protocol — Extensible Authentication Protocol, or EAP, is a universal authentication framework frequently used in wireless networks and Point to Point connections. It is defined in RFC 3748, which has been updated by RFC 5247. Although the EAP protocol is… … Wikipedia
One-way function — Unsolved problems in computer science Do one way functions exist? In computer science, a one way function is a function that is easy to compute on every input, but hard to invert given the image of a random input. Here easy and hard are to be… … Wikipedia