- challenge-response personal identifier
- запросно-ответный персональный идентификатор
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in … Wikipedia
Radio-frequency identification — (RFID) is a technology that uses radio waves to transfer data from an electronic tag, called RFID tag or label, attached to an object, through a reader for the purpose of identifying and tracking the object. Some RFID tags can be read from… … Wikipedia
Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… … Wikipedia
Radar MASINT — is one of the subdisciplines of Measurement and Signature Intelligence (MASINT) and refers to intelligence gathering activities that bring together disparate elements that do not fit within the definitions of Signals Intelligence (SIGINT),… … Wikipedia
Social Security (United States) — This article is about the retirement/disability program. For the general concept of providing welfare, see Social security. For other uses, see Social Security (disambiguation) … Wikipedia
Biometric passport — A biometric passport is a combined paper and electronic identity document that uses biometrics to authenticate the identity of travelers. The passport s critical information is stored on a tiny RFID computer chip, much like information stored on… … Wikipedia
Authentication — (from Greek αυθεντικός; real or genuine, from authentes; author) is the act of establishing or confirming something (or someone) as authentic , that is, that claims made by or about the thing are true. This might involve confirming the identity… … Wikipedia
List of computing and IT abbreviations — This is a list of computing and IT acronyms and abbreviations. Contents: 0–9 A B C D E F G H I J K L M N O P Q R S T U V W X Y … Wikipedia
HTTP cookie — HTTP Persistence · Compression · HTTPS Request methods OPTIONS · GET · HEAD · POST · PUT · DELETE · TRACE · CONNECT Header fields Cookie · ETag · Location · Referer DNT · … Wikipedia
Real-time locating — Articleissues confusing=July 2008 refimprove=May 2008 essay=May 2008: This page specifically concerns operational aspects of RTLS. For methodology issues see locating engine. For technology issues see wireless. According to ISO/IEC JTC1 SC31 and… … Wikipedia
Genetically modified food — Genetically modified foods (GM foods or GMO foods) are foods derived from genetically modified organisms (GMOs). Genetically modified organisms have had specific changes introduced into their DNA by genetic engineering techniques. These… … Wikipedia