- public key device
- прибор криптосистемы с открытым ключом, шифратор системы с открытым ключом
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Key disclosure law — Key disclosure laws, also known as mandatory key disclosure, is legislation that require individuals to surrender cryptographic keys to law enforcement. The purpose is to allow access to material for confiscation or digital forensics purposes and … Wikipedia
Key selection vector — The Key Selection Vector means the numerical associated with a Device Key Set and distributed by Licensor or its designee to Adopters and used to support authentication of Licensed Products and Revocation. It is considered a confidential set of… … Wikipedia
Public transport — This article is about passenger transportation systems. For mathematics, see transportation theory. For other uses, see Mass transit (disambiguation). Public infrastructure Assets and facilities … Wikipedia
Device driver — Operating systems Common features … Wikipedia
Public order crime — For relevant case law, see Public order crime case law in the United States In criminology public order crime is defined by Siegel (2004) as ...crime which involves acts that interfere with the operations of society and the ability of people to… … Wikipedia
Public-order crime — Criminology and penology Theories Causes and correlates of crime Anomie Differential association theory Deviance … Wikipedia
List of cryptographic key types — This glossary lists types of keys as the term is used in cryptography, as opposed to door locks. Terms that are primarily used by the U.S. National Security Agency are marked (NSA) . For classification of keys according to their usage see… … Wikipedia
Glossary of cryptographic key types — This glossary lists types of keys as the term is used in cryptography, as opposed to door locks. Terms that are primarily used by the U.S. National Security Agency are marked (NSA). For classification of keys according to their usage see… … Wikipedia
Derived unique key per transaction — In cryptography, Derived Unique Key Per Transaction (DUKPT) is a key management scheme in which for every transaction, a unique key is used which is derived from a fixed key. Therefore, if a derived key is compromised, future and past transaction … Wikipedia
W3C Device Description Working Group — The W3C Device Description Working Group (DDWG), operating as part of the W3C Mobile Web Initiative (MWI), was chartered to foster the provision and access to device descriptions that can be used in support of Web enabled applications that… … Wikipedia
S/KEY — is a one time password system developed for authentication to Unix like operating systems, especially from dumb terminals or untrusted public computers on which one does not want to type a long term password. A user s real password is combined in … Wikipedia