- identity key
- ключ идентификации
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Key exchange — is any method in cryptography by which cryptographic keys are exchanged between users, allowing use of a cryptographic algorithm. If Alice and Bob wish to exchange encrypted messages, each must be equipped to decrypt received messages and to… … Wikipedia
Identity politics — is political action to advance the interests of members of a group whose members are oppressed by virtue of a shared and marginalized identity (such as race, ethnicity, religion, gender, sexual orientation, or neurological wiring). The term has… … Wikipedia
Identity document — National identity card redirects here. For cards referred to in the English language as national identity card , see National identity card (disambiguation). An identity document (also called a piece of identification or ID, or colloquially as… … Wikipedia
Identity correlation — Definition In information systems, identity correlation is a process that reconciles and validates the proper ownership of disparate user account login IDs (user names) that reside on systems and applications throughout an organization and can… … Wikipedia
Identity Cards Act 2006 — The Identity Cards Act 2006[1] Parliament of the United Kingdom Long title An Act to make provision for a national scheme of registration of individuals … Wikipedia
Identity column — An Identity column is a column ( also known as a field ) in a database table that (1) uniquely identifies every row in the table, and (2) is made up of values generated by the database. This is much like an AutoNumber field in Microsoft Access or … Wikipedia
Identity documents in Sweden — There are several identity documents used in Sweden. None are compulsory. Certified identification cards are issued by the banks and the postal service (until 2008). A national identity card was introduced in 2005, which along with passports are… … Wikipedia
Key-agreement protocol — In cryptography, a key agreement protocol is a protocol whereby two or more parties can agree on a key in such a way that both influence the outcome. If properly done, this precludes undesired third parties from forcing a key choice on the… … Wikipedia
Identity management — In information systems, identity management is the management of the identity life cycle of entities (subjects or objects). An identity management system: # Establishes the identity ## Links a name (or number) with the subject or object; ## Re… … Wikipedia
Identity Metasystem — The Identity Metasystem is an interoperable architecture for digital identity that enables people to have and employ a collection of digital identities based on multiple underlying technologies, implementations, and providers. Using this approach … Wikipedia
identity — Although the term identity has a long history deriving from the Latin root idem implying sameness and continuity it was not until the twentieth century that the term came into popular usage. Discussions of identity take two major forms… … Dictionary of sociology