- end-to-end encryption device
- прибор или устройство межконцевого шифрования
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
End-to-end — has various meanings.*In e commerce, end to end marketing describes methods or services directly connecting people who want to sell and buy. This practice eliminates middlemen from the trade. *In computer communication, end to end refers to end… … Wikipedia
Device independent file format — DVI stands for device independent. There also is an article about device independent. Device independent (DVI) Evince previewing a DVI file. Note that referenced images are not displayed, because they are not part of the DVI file. Images will be… … Wikipedia
NSA encryption systems — The National Security Agency took over responsibility for all U.S. Government encryption systems when it was formed in 1952. The technical details of most NSA approved systems are still classified, but much more about its early systems has become … Wikipedia
Disk encryption theory — Disk encryption is a special case of data at rest protection when the storage media is a sector addressable device (e.g., a hard disk). This article presents cryptographic aspects of the problem. For discussion of different software packages and… … Wikipedia
On-the-fly encryption — (OTFE), also known as Real time Encryption, is a method used by some encryption programs, for example, disk encryption software. On the fly refers to the fact that the files are accessible immediately after the key is provided, and the entire… … Wikipedia
Hard-Boiled Wonderland and the End of the World — infobox Book | name = Hard Boiled Wonderland and the End of the World title orig = 世界の終りとハードボイルド・ワンダーランド Sekai no owari to Hādoboirudo Wandārando translator = Alfred Birnbaum image caption = Cover Artwork author = Haruki Murakami illustrator =… … Wikipedia
Internet radio device — The Kerbango Internet Radio was the first stand alone product that let users listen to Internet radio without a computer. An Internet radio device, also called network music player is a hardware device that is capable of receiving and playing… … Wikipedia
TEED — Tactical End to End Encryption Device (Computing » Security) Tactical End to End Encryption Device (Governmental » Military) … Abbreviations dictionary
Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… … Wikipedia
Derived unique key per transaction — In cryptography, Derived Unique Key Per Transaction (DUKPT) is a key management scheme in which for every transaction, a unique key is used which is derived from a fixed key. Therefore, if a derived key is compromised, future and past transaction … Wikipedia
Secure communication — includes means by which people can share information with varying degrees of certainty that third parties cannot know what was said. Other than communication spoken face to face out of possibility of listening, it is probably safe to say that no… … Wikipedia