crypto-technology

crypto-technology
1) криптографическая техника, криптотехнология
2) технология криптографических устройств

Англо-русский словарь по компьютерной безопасности. . 2011.

Игры ⚽ Поможем решить контрольную работу

Смотреть что такое "crypto-technology" в других словарях:

  • Crypto++ — Developer(s) Wei Dai Initial release 1995 Stable release 5.6.1 / August 9, 2010; 14 months ago ( …   Wikipedia

  • Crypto AG — Website http://www.crypto.ch/ Crypto AG is a Swiss company specialising in communications and information security. With headquarters in Steinhausen, the company is a long established manufacturer of encryption machines and a wide variety of… …   Wikipedia

  • Crypto phone — Crypto phones are mobile telephones that provide security against eavesdropping and electronic surveillance. The interception of telecommunications has become a major industry. Most of the world s intelligence agencies and many private… …   Wikipedia

  • Crypto-society — A crypto society is an encrypted virtual community. It is nearly impossible to create a face to face crypto society as it would take too much time and resources to encrypt all the human to human interactions. Therefore, nearly all encrypted… …   Wikipedia

  • Crypto Operating System — This article is about the COS operating system. For the µC/OS real time kernel, see MicroC/OS II. For the ChibiOS real time operating system, see ChibiOS/RT. Crypto Operating System (COS) was the development name of a Mac compatible operating… …   Wikipedia

  • Al Gore and information technology — Al Gore is the former Vice President of the United States (1993–2001), the 2000 Democratic Party presidential nominee, and the co winner of the 2007 Nobel Peace Prize. He has been involved with the development of the Internet since the… …   Wikipedia

  • History of information technology auditing — Information Technology Auditing (IT auditing) began as Electronic Data Process (EDP) Auditing and developed largely as a result of the rise in technology in accounting systems, the need for IT control, and the impact of computers on the ability… …   Wikipedia

  • List of computer technology code names — Following is a list of code names that have been used to identify computer hardware and software products while in development. In some cases, the code name became the completed product s name, but most of these code names are no longer used once …   Wikipedia

  • Distributed Systems Technology Centre — DSTC Industry Distributed Computing Research Fate Failed to receive continued funding[1] Founded 1992 Defunct 30 June 2006 Headquarters …   Wikipedia

  • NIST hash function competition — Cryptography portal The NIST hash function competition is an open competition held by the US National Institute of Standards and Technology for a new SHA 3 function to replace the older SHA 1 and SHA 2, which was formally announced in the Federal …   Wikipedia

  • Destroy All Humans! Path of the Furon — Developer(s) Sandblast Games Publisher …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»