authentication pattern

authentication pattern
комбинация (знаков) для аутентификации

Англо-русский словарь по компьютерной безопасности. . 2011.

Игры ⚽ Поможем сделать НИР

Смотреть что такое "authentication pattern" в других словарях:

  • Authentication — (from Greek αυθεντικός; real or genuine, from authentes; author) is the act of establishing or confirming something (or someone) as authentic , that is, that claims made by or about the thing are true. This might involve confirming the identity… …   Wikipedia

  • Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in …   Wikipedia

  • Object pool pattern — For the article about a general pool see Pool (Computer science) In computer programming, an object pool is a software design pattern. An object pool is a set of initialised objects that are kept ready to use, rather than allocated and destroyed… …   Wikipedia

  • DAP — steht für: 2,6 Diaminopimelinsäure Data Access Protocol, ein Netzprotokoll auf der Anwendungsebene von DECnet Data Authentication Pattern, ein Mechanismus, nach welchem die Security Domain einer Chipkarte sicherstellen kann, dass die Daten einer… …   Deutsch Wikipedia

  • комбинация для аутентификации — — [http://www.rfcmd.ru/glossword/1.8/index.php?a=index d=23] Тематики защита информации EN authentication pattern …   Справочник технического переводчика

  • GrIDsure — Articleissues notable = October 2007 refimprove = October 2007 advert = October 2007IntroductionThis article describes the GrIDsure personal identification system which extends the standard ‘shared secret’ authentication model to create a secure… …   Wikipedia

  • Biometrics — For the academic journal of statistics in biology, see Biometrics (journal). For the application of statistics to topics in biology, see Biostatistics. At Walt Disney World, biometric measurements are taken from the fingers of guests to ensure… …   Wikipedia

  • cryptology — cryptologist, n. cryptologic /krip tl oj ik/, cryptological, adj. /krip tol euh jee/, n. 1. cryptography. 2. the science and study of cryptanalysis and cryptography. [1635 45; < NL cryptologia. See CRYPTO , LOGY] * * * Introduction …   Universalium

  • Anti-spam techniques — To prevent e mail spam (aka unsolicited bulk email), both end users and administrators of e mail systems use various anti spam techniques. Some of these techniques have been embedded in products, services and software to ease the burden on users… …   Wikipedia

  • Cellular neural network — Cellular neural networks (CNN) are a parallel computing paradigm similar to neural networks, with the difference that communication is allowed between neighbouring units only. Typical applications include image processing, analyzing 3D surfaces,… …   Wikipedia

  • Keystroke dynamics — Keystroke dynamics, or typing dynamics, is the detailed timing information that describes exactly when each key was depressed and when it was released as a person is typing at a computer keyboard. Science of Keystroke Dynamics The behavioral… …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»