- end-to-end encryption channel
- канал передачи (за) шифрованной информации между двумя пунктами
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
End-to-end encryption — Description End to end encryption (E2EE) encrypts clear (red) data at source with knowledge of the intended recipient, allowing the encrypted (black) data to travel safely through vulnerable channels (eg. public networks) to its recipient where… … Wikipedia
BitTorrent protocol encryption — Protocol encryption (PE), message stream encryption (MSE), or protocol header encrypt (PHE)[1] are related features of some peer to peer file sharing clients, including BitTorrent clients. They attempt to enhance privacy and confidentiality. In… … Wikipedia
Fibre Channel — Layer 4. Protocol mapping LUN masking Layer 3. Common services Layer 2. Network Fibre Channel fabric … Wikipedia
Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… … Wikipedia
Terrestrial Trunked Radio — TETRA redirects here. For other uses, see Tetra (disambiguation) TErrestrial Trunked RAdio [ETSI EN 300 392 2 v3.2.1] (TETRA) (formerly known as Trans European Trunked RAdio ) is a specialist Professional Mobile Radio [http://www.tetra… … Wikipedia
Tor (anonymity network) — Tor Developer(s) The Tor Project[1] Initial release 20 September 2002 (2002 09 20) … Wikipedia
Wireless LAN security — One issue with corporate wireless networks in general, and WLANs in particular, involves the need for security. Many early access points could not discern whether or not a particular user had authorization to access the network. Although this… … Wikipedia
OSI model — 7. Application layer NNTP · SIP · SSI · DNS · FTP · Gopher · … Wikipedia
Extensible Messaging and Presence Protocol — (XMPP) is an open, XML inspired protocol originally aimed at near real time, extensible instant messaging (IM) and presence information (a.k.a. buddy lists), but now expanded into the broader realm of message oriented middleware. [Citation |… … Wikipedia
Telecommunications data retention — In the field of telecommunications, data retention (or data preservation) generally refers to the storage of call detail records (CDRs) of telephony and internet traffic and transaction data (IPDRs) by governments and commercial organisations. In … Wikipedia
HTTP cookie — HTTP Persistence · Compression · HTTPS Request methods OPTIONS · GET · HEAD · POST · PUT · DELETE · TRACE · CONNECT Header fields Cookie · ETag · Location · Referer DNT · … Wikipedia