- challenge-response mechanism
- механизм вызов-ответ, запросно-ответный механизм
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Challenge hypothesis — The challenge hypothesis outlines the dynamic relationship between testosterone and aggression in mating contexts. It proposes that testosterone promotes aggression when it would be beneficial for reproduction, such as mate guarding, or… … Wikipedia
Demand response — This article is about the electrical concept. For the transport concept, see Demand responsive transport. A clothes dryer using a demand response switch to reduce peak demand In electricity grids, demand response (DR) is similar to dynamic demand … Wikipedia
International response to the War in Darfur — While there is a general consensus in the international community that ethnic groups have been targeted and that crimes against humanity have therefore occurred, there has been debate in some quarters about whether genocide has taken place. In… … Wikipedia
Congressional response to the NSA warrantless surveillance program — Congressional inquiries and investigations Three days after news broke about the Terrorist Surveillance Program, a bipartisan group of Senators Democrats Dianne Feinstein of California, Carl Levin of Michigan, Ron Wyden of Oregon and Republicans… … Wikipedia
Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in … Wikipedia
Disk encryption — uses disk encryption software or hardware to encrypt every bit of data that goes on a disk or disk volume. Disk encryption prevents unauthorized access to data storage. The term full disk encryption (or whole disk encryption) is often used to… … Wikipedia
Simple Authentication and Security Layer — (SASL) is a framework for authentication and data security in Internet protocols. It decouples authentication mechanisms from application protocols, in theory allowing any authentication mechanism supported by SASL to be used in any application… … Wikipedia
Full disk encryption — (or whole disk encryption) is a kind of disk encryption software or hardware which encrypts every bit of data that goes on a disk or disk volume. The term full disk encryption is often used to signify that everything on a disk, including the… … Wikipedia
Secure Computing — Infobox Company company name = Secure Computing Corporation company company type = Public (NASDAQ: [http://quotes.nasdaq.com/asp/SummaryQuote.asp?symbol=SCUR selected=SCUR SCUR] ) company slogan = Securing connections between people, applications … Wikipedia
OpenSSH — Don t tell anyone that I m free Developer(s) The OpenBSD Project Stable release 5.9 / September 6, 2011; 2 months ago … Wikipedia
CRAM — Challenge Response Authentication Mechanism (Computing » Security) * Challenge Response Authorization Mechanism (Computing » Security) * Cultivating Relationships Among Managers (Business » General) * Cram Really Ain t Mathematica (Computing »… … Abbreviations dictionary