- challenge/response method
- метод (аутентификации) запрос/ответ, запросноответный метод (аутентификации)
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Challenge-response authentication — For the spam filtering technique, see Challenge response spam filtering. For other uses, see CRAM (disambiguation). In computer security, challenge response authentication is a family of protocols in which one party presents a question (… … Wikipedia
challenge-response authentication — A method of authentication used by Microsoft Windows 2000 and other operating systems. When a user contacts a server, the server responds with a challenge, upon which the user then performs a cryptographic operation and returns the result… … Dictionary of networking
Challenge — A challenge is a general term referring to things that are imbued with a sense of difficulty and victory. Challenge may also refer to: Contents 1 Film and television 2 Music 3 … Wikipedia
Response to intervention — In education, Response To Intervention (commonly abbreviated RTI or RtI) is a method of academic intervention used in the United States designed to provide early, effective assistance to children who are having difficulty learning. Response to… … Wikipedia
Total Physical Response — (TPR) is a method developed by Dr. James J. Asher, a professor emeritus of psychology at San José State University, to aid learning second languages. The method relies on the assumption that when learning a second or additional language, that… … Wikipedia
Specific inhalation challenge — The Specific Inhalation Challenge (SIC) is defined as a diagnosis tool to assess airway responsiveness to sensitizing substances as opposed tononspecific stimuli such as pharmacological agents (i.e. histamine, methacholine),cold air and exercise … Wikipedia
Chakravala method — The chakravala method (Hindi: चक्रवाल विधि) is a cyclic algorithm to solve indeterminate quadratic equations, including Pell s equation. It is commonly attributed to Bhāskara II, (c. 1114 – 1185 CE)[1][2] although some attribute it to Jayadeva (c … Wikipedia
Dose-response relationship — Semi log plots of two agonists with different Kd. The dose response relationship, or exposure response relationship, describes the change in effect on an organism caused by differing levels of exposure (or doses) to a stressor (usually a… … Wikipedia
Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in … Wikipedia
Password — For other uses, see Password (disambiguation). A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password… … Wikipedia
Anti-spam techniques — To prevent e mail spam (aka unsolicited bulk email), both end users and administrators of e mail systems use various anti spam techniques. Some of these techniques have been embedded in products, services and software to ease the burden on users… … Wikipedia