zero knowledge technique

zero knowledge technique
Безопасность: метод (информационного обмена) без сообщения конфиденциальных сведений

Универсальный англо-русский словарь. . 2011.

Игры ⚽ Поможем решить контрольную работу

Смотреть что такое "zero knowledge technique" в других словарях:

  • Zero configuration networking — (zeroconf), is a set of techniques that automatically creates a usable Internet Protocol (IP) network without manual operator intervention or special configuration servers. Zero configuration networking allows devices such as computers and… …   Wikipedia

  • Program Evaluation and Review Technique — For other uses, see Pert (disambiguation). PERT network chart for a seven month project with five milestones (10 through 50) and six activities (A through F). The Program (or Project) Evaluation and Review Technique, commonly abbreviated PERT, is …   Wikipedia

  • F-Zero GX — Infobox VG title=F Zero GX caption=Box art for the North American version developer=Amusement Vision (Sega)cite web|url= http://www.gamespot.com/gamecube/driving/fzero/news.html?sid=2858754|title=Sega and Nintendo form developmental… …   Wikipedia

  • Berserker (Fate/Zero) — Berserker is a fictional character from the Japanese novel Fate/Zero by TYPE MOON and fellow developer Nitroplus.He is the Servant of Kariya Matō during the 4th Holy Grail War.ervant Status Abilities* Mad Enhancement:Rank: C :Rank up for… …   Wikipedia

  • Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption …   Wikipedia

  • Metamemory — Metamemory, one component of metacognition, is about one’s memory capabilities and strategies that can aid memory, as well as the processes involved in memory self monitoring.[1] This self awareness of memory has important implications for how… …   Wikipedia

  • List of cryptographers — See also: Category:Cryptographers for an exhaustive list. Contents 1 Pre twentieth century 2 World War I and World War II Wartime Cryptographers 3 Other pre computer 4 Modern …   Wikipedia

  • Digital credential — Digital credentials are the digital equivalent of paper based credentials. Just as a paper based credential could be a passport, a Driver s license, a membership certificate or some kind of ticket to obtain some service, such as a cinema ticket… …   Wikipedia

  • Password cracking — is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. The purpose of password cracking might be to help a user recover a… …   Wikipedia

  • Piezoelectricity — is the ability of some materials (notably crystals and certain ceramics, including bone) to generate an electric potentialPrinciples of Instrumental Analysis. 6th Edition, 2007. Skoog, Holler, and Crouch. Chapter 1, Sec. 1C 4, Pg. 9.] in response …   Wikipedia

  • IP (complexity) — In computational complexity theory, the class IP is the class of problems solvable by an interactive proof system. The concept of an interactive proof system was first introduced by Goldwasser, et al. in 1985. An interactive proof system consists …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»