- zero knowledge technique
- Безопасность: метод (информационного обмена) без сообщения конфиденциальных сведений
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
Zero configuration networking — (zeroconf), is a set of techniques that automatically creates a usable Internet Protocol (IP) network without manual operator intervention or special configuration servers. Zero configuration networking allows devices such as computers and… … Wikipedia
Program Evaluation and Review Technique — For other uses, see Pert (disambiguation). PERT network chart for a seven month project with five milestones (10 through 50) and six activities (A through F). The Program (or Project) Evaluation and Review Technique, commonly abbreviated PERT, is … Wikipedia
F-Zero GX — Infobox VG title=F Zero GX caption=Box art for the North American version developer=Amusement Vision (Sega)cite web|url= http://www.gamespot.com/gamecube/driving/fzero/news.html?sid=2858754|title=Sega and Nintendo form developmental… … Wikipedia
Berserker (Fate/Zero) — Berserker is a fictional character from the Japanese novel Fate/Zero by TYPE MOON and fellow developer Nitroplus.He is the Servant of Kariya Matō during the 4th Holy Grail War.ervant Status Abilities* Mad Enhancement:Rank: C :Rank up for… … Wikipedia
Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption … Wikipedia
Metamemory — Metamemory, one component of metacognition, is about one’s memory capabilities and strategies that can aid memory, as well as the processes involved in memory self monitoring.[1] This self awareness of memory has important implications for how… … Wikipedia
List of cryptographers — See also: Category:Cryptographers for an exhaustive list. Contents 1 Pre twentieth century 2 World War I and World War II Wartime Cryptographers 3 Other pre computer 4 Modern … Wikipedia
Digital credential — Digital credentials are the digital equivalent of paper based credentials. Just as a paper based credential could be a passport, a Driver s license, a membership certificate or some kind of ticket to obtain some service, such as a cinema ticket… … Wikipedia
Password cracking — is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. The purpose of password cracking might be to help a user recover a… … Wikipedia
Piezoelectricity — is the ability of some materials (notably crystals and certain ceramics, including bone) to generate an electric potentialPrinciples of Instrumental Analysis. 6th Edition, 2007. Skoog, Holler, and Crouch. Chapter 1, Sec. 1C 4, Pg. 9.] in response … Wikipedia
IP (complexity) — In computational complexity theory, the class IP is the class of problems solvable by an interactive proof system. The concept of an interactive proof system was first introduced by Goldwasser, et al. in 1985. An interactive proof system consists … Wikipedia