multi-user cryptographic techniques
- multi-user cryptographic techniques
- многопользовательские криптографические методы
многопользовательские криптографические методы
—
[[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]]
Тематики
EN
- multi-user cryptographic techniques
Англо-русский словарь нормативно-технической терминологии.
academic.ru.
2015.
Смотреть что такое "multi-user cryptographic techniques" в других словарях:
Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption … Wikipedia
многопользовательские криптографические методы — — [[http://www.rfcmd.ru/glossword/1.8/index.php?a=index d=23]] Тематики защита информации EN multi user cryptographic techniques … Справочник технического переводчика
List of computer science conferences — This is a list of academic conferences in computer science. Most of these academic conferences are annual or bi annual events.The order with which the conferences are listed in their respective fields corresponds to a rough and non authoritative… … Wikipedia
Radio-frequency identification — (RFID) is a technology that uses radio waves to transfer data from an electronic tag, called RFID tag or label, attached to an object, through a reader for the purpose of identifying and tracking the object. Some RFID tags can be read from… … Wikipedia
Password-authenticated key agreement — In cryptography, a password authenticated key agreement method is an interactive method for two or more parties to establish cryptographic keys based on one or more party s knowledge of a password. Contents 1 Types 2 Brief history 3 See also … Wikipedia
Outline of cryptography — See also: Index of cryptography articles The following outline is provided as an overview of and topical guide to cryptography: Cryptography (or cryptology) – practice and study of hiding information. Modern cryptography intersects the… … Wikipedia
Topics in cryptography — This article is intended to be an analytic glossary , or alternatively, an organized collection of annotated pointers.Classical ciphers*Autokey cipher *Permutation cipher*Polyalphabetic substitution **Vigenère cipher*Polygraphic substitution… … Wikipedia
Signature block — For the use of signatures in Wikipedia, see Wikipedia:Signatures. A signature block (often abbreviated as signature, sig block, sig file, .sig, dot sig, siggy, or just sig) is a block of text automatically appended at the bottom of an e mail… … Wikipedia
Liaison 16 — La Liaison 16 (L16) est un standard de liaison de données tactiques de l OTAN pour l échange d informations tactiques entre des unités militaires. Le contenu de sa messagerie et le protocole d émission sont définis par le STANAG[acro 1] 5516 pour … Wikipédia en Français
Hardware random number generator — This SSL Accelerator computer card uses a hardware random number generator to generate cryptographic keys to encrypt data sent over computer networks. In computing, a hardware random number generator is an apparatus that generates random numbers… … Wikipedia
Digital credential — Digital credentials are the digital equivalent of paper based credentials. Just as a paper based credential could be a passport, a Driver s license, a membership certificate or some kind of ticket to obtain some service, such as a cinema ticket… … Wikipedia