- challenge-response sequence
- Безопасность: последовательность запросов и ответов
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
Challenge-response authentication — For the spam filtering technique, see Challenge response spam filtering. For other uses, see CRAM (disambiguation). In computer security, challenge response authentication is a family of protocols in which one party presents a question (… … Wikipedia
Critical response to the Harry Potter films — The Harry Potter film series is distributed by Warner Bros. Pictures, produced by David Heyman and based on the Harry Potter novels by British author J. K. Rowling. The franchise consists of eight fantasy adventure films. It is currently the… … Wikipedia
Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in … Wikipedia
Security token — Several types of security tokens with a penny for scale … Wikipedia
Password — For other uses, see Password (disambiguation). A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password… … Wikipedia
HTTPsec — ( HTTP security ) is an authentication scheme for the web protocol HTTP. HTTPsec provides cryptographically strong security at the application layer. HTTPsec is a proposal by [http://secarta.com/ Secarta] .HTTPsec operates within the framework of … Wikipedia
List of shibboleths — Below are listed various examples of shibboleths. Note that many apocryphal shibboleths exist, and that since, by definition, shibboleths rely on stereotypical pronunciation traits, they may not accurately describe the speech of all members of… … Wikipedia
CAPTCHA — Early CAPTCHAs such as these, generated by the EZ Gimpy program, were used on Yahoo!. However, technology was developed to read this type of CAPTCHA[1] … Wikipedia
Key fob — A key fob is a generally decorative and at times useful item many people often carry with their keys, on a ring or a chain, for ease of tactile identification, to provide a better grip, or to make a personal statement. Key fobs are often called… … Wikipedia
GrIDsure — Articleissues notable = October 2007 refimprove = October 2007 advert = October 2007IntroductionThis article describes the GrIDsure personal identification system which extends the standard ‘shared secret’ authentication model to create a secure… … Wikipedia
Post Office Protocol — In computing, local e mail clients use the Post Office Protocol version 3 (POP3), an application layer Internet standard protocol, to retrieve e mail from a remote server over a TCP/IP connection. POP3 and IMAP4 (Internet Message Access Protocol) … Wikipedia