- message (integrity) checksum
- Безопасность: контрольная сумма для проверки сообщения
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
Checksum — Effect of a typical checksum function (the Unix cksum utility). A checksum or hash sum is a fixed size datum computed from an arbitrary block of digital data for the purpose of detecting accidental errors that may have been introduced during its… … Wikipedia
Cryptographic hash function — A cryptographic hash function (specifically, SHA 1) at work. Note that even small changes in the source input (here in the word over ) drastically change the resulting output, by the so called avalanche effect. A cryptographic hash function is a… … Wikipedia
Md5sum — is a computer program that calculates and verifies 128 bit MD5 hashes, as described in RFC 1321. The MD5 hash (or checksum) functions as a compact digital fingerprint of a file. It is extremely unlikely that any two non identical files existing… … Wikipedia
Electronic signature — The term electronic signature has several meanings. Among the more expansive is that given by US law, influenced by ABA committee white papers and the uniform law promulgated by the National Conference of Commissioners on Uniform State Laws… … Wikipedia
Health Level 7 — Health Level Seven (HL7), is an all volunteer, non profit organization involved in development of international healthcare informatics interoperability standards.[1] HL7 is also used to refer to some of the specific standards created by the… … Wikipedia
MIC — may refer to: Business and industry*Military industrial complex, the relationship between a nation s military forces and its arms industry *Miami Intermodal Center, a mega transportation hub in Miami, Florida *Mortgage Investment Corporation, a… … Wikipedia
MD5 — General Designers Ronald Rivest First published April 1992 Series MD2, MD4, MD5, MD6 Detail Digest sizes 128 bits … Wikipedia
Cyclic redundancy check — A cyclic redundancy check (CRC) is an error detecting code designed to detect accidental changes to raw computer data, and is commonly used in digital networks and storage devices such as hard disk drives. Blocks of data entering these systems… … Wikipedia
Error detection and correction — In mathematics, computer science, telecommunication, and information theory, error detection and correction has great practical importance in maintaining data (information) integrity across noisy channels and less than reliable storage… … Wikipedia
XMODEM — Contents 1 XMODEM 1.1 Packet structure 1.2 Transfer details 1.3 … Wikipedia
BitTorrent (protocol) — BitTorrent is a peer to peer file sharing protocol used to distribute large amounts of data. The initial distributor of the complete file or collection acts as the first seed . Each peer who downloads the data also uploads them to other peers.… … Wikipedia