integrity key

integrity key
Безопасность: ключ целостности

Универсальный англо-русский словарь. . 2011.

Игры ⚽ Поможем сделать НИР

Смотреть что такое "integrity key" в других словарях:

  • Key Wrap — constructions are a class of symmetric encryption algorithms designed to encapsulate (encrypt) cryptographic key material. The Key Wrap algorithms are intended for applications such as (a) protecting keys while in untrusted storage, or (b)… …   Wikipedia

  • Key-agreement protocol — In cryptography, a key agreement protocol is a protocol whereby two or more parties can agree on a key in such a way that both influence the outcome. If properly done, this precludes undesired third parties from forcing a key choice on the… …   Wikipedia

  • Data integrity — in its broadest meaning refers to the trustworthiness of system resources over their entire life cycle. In more analytic terms, it is the representational faithfulness of information to the true state of the object that the information represents …   Wikipedia

  • Referential integrity — in a relational database is consistency between coupled tables. Referential integrity is usually enforced by the combination of a primary key or candidate key (alternate key) and a foreign key. For referential integrity to hold, any field in a… …   Wikipedia

  • Cryptographic key types — One of the most important aspects of any cryptographic system is key management; it is also the aspect which is most often neglected.[citation needed] A very common mistake is mixing different key types and reusing the same key for different… …   Wikipedia

  • Entity integrity — In the relational data model, entity integrity is one of the three inherent integrity rules. Entity integrity is an integrity rule which states that every table must have a primary key and that the column or columns chosen to be the primary key… …   Wikipedia

  • Global Integrity — is an independent, nonprofit organization tracking governance and corruption trends around the world using local teams of researchers and journalists to monitor openness and accountability. Global Integrity s reporting has been cited by over 50… …   Wikipedia

  • Transient-key cryptography — is a form of public key cryptography wherein keypairs are generated and assigned to brief intervals of time instead of to individuals or organizations. In a transient key system, private keys are used briefly and then destroyed, which is why it… …   Wikipedia

  • Internet Key Exchange — IPsec im TCP/IP‑Protokollstapel: Anwendung HTTP IMAP SMTP DNS … Transport TCP UDP …   Deutsch Wikipedia

  • Internet Key Exchange Protocol — IPsec im TCP/IP‑Protokollstapel: Anwendung HTTP IMAP SMTP DNS … Transport TCP UDP …   Deutsch Wikipedia

  • Internet Key Exchange Protokoll — IPsec im TCP/IP‑Protokollstapel: Anwendung HTTP IMAP SMTP DNS … Transport TCP UDP …   Deutsch Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»