-
1 voice cryptography
Англо-русский словарь нормативно-технической терминологии > voice cryptography
-
2 voice cryptography
Безопасность: криптография для защиты речевой информации -
3 voice cryptography
Англо-русский словарь по компьютерной безопасности > voice cryptography
-
4 voice cryptography
криптография для защиты телефонных переговоровEnglish-Russian cryptological dictionary > voice cryptography
-
5 cryptography
1) криптография; криптографическая защита, криптографическое закрытие информации- computational cryptography- computational complexity based cryptographyАнгло-русский словарь по компьютерной безопасности > cryptography
-
6 криптография для защиты телефонных переговоров
Русско-английский словарь нормативно-технической терминологии > криптография для защиты телефонных переговоров
-
7 криптография для защиты речевой информации
Security: voice cryptographyУниверсальный русско-английский словарь > криптография для защиты речевой информации
-
8 criptografía
f.cryptography, encoding, coding.* * *1 cryptography* * *SF cryptography* * *femenino cryptography* * *= cryptography, privacy transformation.Ex. These latter may include control of access to stored data by, say, automatic finger-print or voice-print identification, or protection of data while in transit through a privacy transformation, better known as cryptography.Ex. These latter may include control of access to stored data by, say, automatic finger-print or voice-print identification, or protection of data while in transit through a privacy transformation, better known as cryptography.* * *femenino cryptography* * *= cryptography, privacy transformation.Ex: These latter may include control of access to stored data by, say, automatic finger-print or voice-print identification, or protection of data while in transit through a privacy transformation, better known as cryptography.
Ex: These latter may include control of access to stored data by, say, automatic finger-print or voice-print identification, or protection of data while in transit through a privacy transformation, better known as cryptography.* * *cryptography* * *criptografía nfcryptography* * *f cryptography -
9 identificación mediante la voz
(n.) = voice-print identificationEx. These latter may include control of access to stored data by, say, automatic finger-print or voice-print identification, or protection of data while in transit through a privacy transformation, better known as cryptography.* * *(n.) = voice-print identificationEx: These latter may include control of access to stored data by, say, automatic finger-print or voice-print identification, or protection of data while in transit through a privacy transformation, better known as cryptography.
-
10 identificación mediante las huellas dactilares
(n.) = finger-print identificationEx. These latter may include control of access to stored data by, say, automatic finger-print or voice-print identification, or protection of data while in transit through a privacy transformation, better known as cryptography.* * *(n.) = finger-print identificationEx: These latter may include control of access to stored data by, say, automatic finger-print or voice-print identification, or protection of data while in transit through a privacy transformation, better known as cryptography.
Spanish-English dictionary > identificación mediante las huellas dactilares
-
11 coder
1) кодер; аналого-цифровой преобразователь, АЦП2) кодировщик
См. также в других словарях:
Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption … Wikipedia
Cryptography standards — There are a number of standards related to cryptography. Standard algorithms and protocols provide a focus for study; standards for popular applications attract a large amount of cryptanalysis. Contents 1 Encryption standards 2 Hash standards 3… … Wikipedia
Secure voice — (alternatively secure speech or ciphony) is a term in cryptography for the encryption of voice communication over a range of communication types such as radio, telephone or IP. Contents 1 History 2 Analog Secure Voice technologies 3 Di … Wikipedia
Topics in cryptography — This article is intended to be an analytic glossary , or alternatively, an organized collection of annotated pointers.Classical ciphers*Autokey cipher *Permutation cipher*Polyalphabetic substitution **Vigenère cipher*Polygraphic substitution… … Wikipedia
NSA cryptography — The vast majority of the National Security Agency s work on encryption is classified, but from time to time NSA participates in standards processes or otherwise publishes information about its cryptographic algorithms. The NSA has categorized… … Wikipedia
One-way voice link — A one way voice link (OWVL) is a shortwave radio communication method used by spy networks to communicate with agents in the field. This system often employs recorders to transmit pre recorded messages in real time or in burst transmissions,… … Wikipedia
криптография для защиты телефонных переговоров — — [http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=5078] Тематики защита информации EN voice cryptography … Справочник технического переводчика
SIGSALY — exhibit at the National Cryptologic Museum In cryptography, SIGSALY (also known as the X System, Project X, Ciphony I, and the Green Hornet) was a secure speech system used in World War II for the highest level Allied communications. It pioneered … Wikipedia
One-time pad — Excerpt from a one time pad In cryptography, the one time pad (OTP) is a type of encryption, which has been proven to be impossible to crack if used correctly. Each bit or character from the plaintext is encrypted by a modular addition with a bit … Wikipedia
Key-agreement protocol — In cryptography, a key agreement protocol is a protocol whereby two or more parties can agree on a key in such a way that both influence the outcome. If properly done, this precludes undesired third parties from forcing a key choice on the… … Wikipedia
Technical features new to Windows Vista — This article is part of a series on Windows Vista New features Overview Technical and core system Security and safety Networking technologies I/O technologies Management and administration Removed features … Wikipedia