asymmetric authentication method
- asymmetric authentication method
- асимметричный метод аутентификации
асимметричный метод аутентификации
Метод аутентификации, при котором не вся информация об аутентификации совместно используется обеими сторонами.
Рекомендация МСЭ-Т X.811.
[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]
Тематики
EN
- asymmetric authentication method
Англо-русский словарь нормативно-технической терминологии.
academic.ru.
2015.
Смотреть что такое "asymmetric authentication method" в других словарях:
Extensible Authentication Protocol — Extensible Authentication Protocol, or EAP, is a universal authentication framework frequently used in wireless networks and Point to Point connections. It is defined in RFC 3748, which has been updated by RFC 5247. Although the EAP protocol is… … Wikipedia
Message authentication code — In cryptography, a message authentication code (often MAC) is a short piece of information used to authenticate a message. A MAC algorithm, sometimes called a keyed (cryptographic) hash function, accepts as input a secret key and an arbitrary… … Wikipedia
Key authentication — is a problem that arises when using public key cryptography. It is the process of assuring that the public key of person A held by person B does in fact belong to person A .In traditional symmetric key cryptography, this problem wasn t an issue… … Wikipedia
асимметричный метод аутентификации — Метод аутентификации, при котором не вся информация об аутентификации совместно используется обеими сторонами. Рекомендация МСЭ Т X.811. [http://www.rfcmd.ru/glossword/1.8/index.php?a=index d=23] Тематики защита информации EN asymmetric… … Справочник технического переводчика
Security and safety features new to Windows Vista — There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.Beginning in early 2002 with Microsoft s announcement of their Trustworthy Computing… … Wikipedia
List of computer term etymologies — This is a list of the origins of computer related terms or terms used in the computing world (i.e., a list of computer term etymologies). It relates to both computer hardware and computer software. Names of many computer terms, especially… … Wikipedia
Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key … Wikipedia
Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption … Wikipedia
cryptology — cryptologist, n. cryptologic /krip tl oj ik/, cryptological, adj. /krip tol euh jee/, n. 1. cryptography. 2. the science and study of cryptanalysis and cryptography. [1635 45; < NL cryptologia. See CRYPTO , LOGY] * * * Introduction … Universalium
Cryptographic key types — One of the most important aspects of any cryptographic system is key management; it is also the aspect which is most often neglected.[citation needed] A very common mistake is mixing different key types and reusing the same key for different… … Wikipedia
List of file systems — The following lists identify, characterize and link to more thorough information on computer file systems.Many older operating systems support only their one native file system, which does not bear any name apart from the name of the operating… … Wikipedia