cryptographic secure

cryptographic secure
  1. криптографически стойкий

 

криптографически стойкий

[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]

Тематики

  • защита информации

EN

  • cryptographic secure


Англо-русский словарь нормативно-технической терминологии. . 2015.

Игры ⚽ Поможем написать курсовую

Смотреть что такое "cryptographic secure" в других словарях:

  • Cryptographic engineering — is the discipline of using cryptography to solve human problems. Cryptography is typically applied when trying to ensure data confidentiality, to authenticate people or devices, or to verify data integrity in risky environments. Cryptographic… …   Wikipedia

  • Secure multi-party computation — (also known as secure computation or multi party computation (MPC)) is a sub field of cryptography. The goal of methods for secure multi party computation is to enable parties to jointly compute a function over their inputs, while at the same… …   Wikipedia

  • Cryptographic primitive — Cryptographic primitives are well established, low level cryptographic algorithms that are frequently used to build computer security systems. These routines include, but are not limited to, one way hash functions and encryption functions.… …   Wikipedia

  • Secure messaging — is a server based approach to protect sensitive data when sent beyond the corporate borders and provides compliance with industry regulations such as HIPAA, GLBA and SOX. Advantages over classical secure e Mail are that confidential and… …   Wikipedia

  • Secure voice — (alternatively secure speech or ciphony) is a term in cryptography for the encryption of voice communication over a range of communication types such as radio, telephone or IP. Contents 1 History 2 Analog Secure Voice technologies 3 Di …   Wikipedia

  • Secure Shell — or SSH is a network protocol that allows data to be exchanged using a secure channel between two networked devices. RFC 4252] Used primarily on Linux and Unix based systems to access shell accounts, SSH was designed as a replacement for TELNET… …   Wikipedia

  • Secure two-party computation — (2PC) is sub problem of secure multi party computation (MPC) that has received special attention by researchers because of its close relation to many cryptographic tasks. It is concerned with the question: Can two party computation be achieved… …   Wikipedia

  • Secure electronic transaction — (SET) is a standard protocol for securing credit card transactions over insecure networks, specifically, the Internet. SET is not itself a payment system, but rather a set of security protocols and formats that enables users to employ the… …   Wikipedia

  • Cryptographic log on — (CLO) is a process that uses Common Access Cards (CAC) and embedded Public Key Infrastructure (PKI) certificates to authenticate a user s identification to a workstation and network. It replaces the username and passwords for identifying and… …   Wikipedia

  • Cryptographic hash function — A cryptographic hash function (specifically, SHA 1) at work. Note that even small changes in the source input (here in the word over ) drastically change the resulting output, by the so called avalanche effect. A cryptographic hash function is a… …   Wikipedia

  • Cryptographic protocol — A security protocol (cryptographic protocol or encryption protocol) is an abstract or concrete protocol that performs a security related function and applies cryptographic methods. A protocol describes how the algorithms should be used. A… …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»