challenge/response technique

challenge/response technique
метод (аутентификации) запрос/ответ, запросноответный метод (аутентификации)

Англо-русский словарь по компьютерной безопасности. . 2011.

Игры ⚽ Нужна курсовая?

Смотреть что такое "challenge/response technique" в других словарях:

  • Challenge-response authentication — For the spam filtering technique, see Challenge response spam filtering. For other uses, see CRAM (disambiguation). In computer security, challenge response authentication is a family of protocols in which one party presents a question (… …   Wikipedia

  • response — 1. The reaction of a muscle, nerve, gland, or other excitable tissue to a stimulus. 2. Any act or behavior, or its constituents, that a living organism is capable of emitting. Reflexes are usually excluded because they are typically elicited by a …   Medical dictionary

  • Transcendental Meditation technique — This article is about the technique. For the movement, see Transcendental Meditation movement. The Transcendental Meditation technique is a specific form of mantra meditation[1] often referred to as Transcendental Meditation. It was introduced in …   Wikipedia

  • Congressional response to the NSA warrantless surveillance program — Congressional inquiries and investigations Three days after news broke about the Terrorist Surveillance Program, a bipartisan group of Senators Democrats Dianne Feinstein of California, Carl Levin of Michigan, Ron Wyden of Oregon and Republicans… …   Wikipedia

  • Specific inhalation challenge — The Specific Inhalation Challenge (SIC) is defined as a diagnosis tool to assess airway responsiveness to sensitizing substances as opposed tononspecific stimuli such as pharmacological agents (i.e. histamine, methacholine),cold air and exercise …   Wikipedia

  • Multi-factor authentication — Multi factor authentication, sometimes called strong authentication, is an extension of two factor authentication. This is the Defense in depth approach of Security In Layers applied to authentication. While two factor authentication only… …   Wikipedia

  • SiteKey — is a web based security system that provides one type of mutual authentication between end users and websites. Its primary purpose is to deter phishing.SiteKey has been deployed by several large financial institutions since 2006, including Bank… …   Wikipedia

  • Anti-spam techniques — To prevent e mail spam (aka unsolicited bulk email), both end users and administrators of e mail systems use various anti spam techniques. Some of these techniques have been embedded in products, services and software to ease the burden on users… …   Wikipedia

  • Anti-spam techniques (e-mail) — To prevent e mail spam, both end users and administrators of e mail systems use various anti spam techniques. Some of these techniques have been embedded in products, services and software to ease the burden on users and administrators. No one… …   Wikipedia

  • Authentification Forte — En sécurité des systèmes d information, une authentification forte est une procédure d identification qui requiert concaténation d au moins deux éléments ou « facteurs » d authentification. Sommaire 1 Les éléments de l authentification… …   Wikipédia en Français

  • Radar MASINT — is one of the subdisciplines of Measurement and Signature Intelligence (MASINT) and refers to intelligence gathering activities that bring together disparate elements that do not fit within the definitions of Signals Intelligence (SIGINT),… …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»