- tamper resistant hardware
- защищенное от умышленных повреждений аппаратное оборудование
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Tamper resistance — is resistance to by either the normal users of a product, package, or system or others with physical access to it. There are many reasons for employing tamper resistance.Tamper resistance ranges from simple features like screws with special heads … Wikipedia
SecurID — RSA SecurID is a mechanism developed by RSA Security for performing two factor authentication for a user to a network resource. Overview The RSA SecurID authentication mechanism consists of a token mdash;a piece of hardware (e.g. a token or USB)… … Wikipedia
Tri-Wing — The Tri Wing is a type of screw and screw head. It is sometimes called a triangular slotted screw. It is used as a tamper resistant screw on various products, typically electronics.AppearanceTri Wing, as the name suggests, is a screw with three… … Wikipedia
Хандшух, Хелен — Хелен Хандшух (англ. Helena Handschuh) криптограф. Наиболее известная разработка симметричный блочный криптоалгоритм SHACAL. Помимо этого принимала участие в создании блочного шифра Universal Encryption Standard. С 2009 года… … Википедия
Qascom — (Quality and Secure Communications) is a software and systems technology provider of security applications in the satellite navigation and communications domain.Qascom operates in various sectors: Space, Transport and Government.In the space… … Wikipedia
Zeroisation — In cryptography, zeroisation (also spelled zeroization) is the practice of erasing sensitive parameters (especially keys) from a cryptographic module to prevent their disclosure if the equipment is captured. When encryption was performed by… … Wikipedia
Encrypted function — An encrypted function is an attempt to provide mobile code privacy without providing any tamper resistant hardware. It is a method where in mobile code can carry out cryptographic primitives even though the code is executed in untrusted… … Wikipedia
List of screw drives — Contents 1 Common types 1.1 External types 1.1.1 Square 1.1.2 Hex … Wikipedia
Sécurité matérielle des cartes à puce — La sécurité matérielle des cartes à puce et des autres microcontrôleurs est l un des éléments clefs de la sécurité des informations sensibles qu ils manipulent. La littérature scientifique a produit un grand nombre de publications visant à… … Wikipédia en Français
Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in … Wikipedia
Copy protection — Copy protection, also known as content protection, copy obstruction, copy prevention and copy restriction, refer to techniques used for preventing the reproduction of software, films, music, and other media, usually for copyright reasons.[1]… … Wikipedia