- proprietary (crypto)system
- фирменная криптосистема, криптосистема пользователя
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Crypto API (Linux) — For the Microsoft Windows Cryptography API, see Cryptographic Application Programming Interface. Crypto API is a cryptography framework in the Linux kernel, for various parts of the kernel that deal with cryptography, such as IPsec and dm crypt.… … Wikipedia
Near field communication — An NFC enabled mobile phone interacting with a SmartPoster Near field communication, or NFC, allows for simplified transactions, data exchange, and wireless connections between two devices in proximity to each other, usually by no more than a few … Wikipedia
Cos — Cos, COS or CoS, may refer to: Contents 1 Maths, science and technology 2 Places 3 Roles 4 Organizations, societies and churches … Wikipedia
Comparison of disk encryption software — This is a technical feature comparison of different disk encryption software. Contents 1 Background information 2 Operating systems 3 Features 4 Layering … Wikipedia
MIFARE — is the NXP Semiconductors owned trademark of a series of chips widely used in contactless smart cards and proximity cards. According to the producers, billions of smart card chips and many millions of reader modules have been sold.[1] The… … Wikipedia
Comparison of email clients — The following tables compare general and technical features of a number of e mail client programs. Please see the individual products articles for further information. This article is not all inclusive or necessarily up to date. Contents 1… … Wikipedia
Elliptic curve cryptography — (ECC) is an approach to public key cryptography based on the algebraic structure of elliptic curves over finite fields. The use of elliptic curves in cryptography was suggested independently by Neal Koblitz[1] and Victor S. Miller[2] in 1985.… … Wikipedia
Microsoft Windows — Windows redirects here. For the part of a building, see Window. For other uses, see Windows (disambiguation). Microsoft Windows … Wikipedia
Comparison of TLS Implementations — The Transport Layer Security (TLS) protocol provide the ability to secure communications across networks. There are several TLS implementations which are free and open source software and sometimes choosing between the available implementations… … Wikipedia
List of file systems — The following lists identify, characterize and link to more thorough information on computer file systems.Many older operating systems support only their one native file system, which does not bear any name apart from the name of the operating… … Wikipedia
Security through obscurity — In cryptography and computer security, security through obscurity (sometimes security by obscurity) is a controversial principle in security engineering, which attempts to use secrecy (of design, implementation, etc.) to provide security. A… … Wikipedia