challenge-response sequence

challenge-response sequence
Безопасность: последовательность запросов и ответов

Универсальный англо-русский словарь. . 2011.

Игры ⚽ Нужна курсовая?

Смотреть что такое "challenge-response sequence" в других словарях:

  • Challenge-response authentication — For the spam filtering technique, see Challenge response spam filtering. For other uses, see CRAM (disambiguation). In computer security, challenge response authentication is a family of protocols in which one party presents a question (… …   Wikipedia

  • Critical response to the Harry Potter films — The Harry Potter film series is distributed by Warner Bros. Pictures, produced by David Heyman and based on the Harry Potter novels by British author J. K. Rowling. The franchise consists of eight fantasy adventure films. It is currently the… …   Wikipedia

  • Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in …   Wikipedia

  • Security token — Several types of security tokens with a penny for scale …   Wikipedia

  • Password — For other uses, see Password (disambiguation). A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password… …   Wikipedia

  • HTTPsec — ( HTTP security ) is an authentication scheme for the web protocol HTTP. HTTPsec provides cryptographically strong security at the application layer. HTTPsec is a proposal by [http://secarta.com/ Secarta] .HTTPsec operates within the framework of …   Wikipedia

  • List of shibboleths — Below are listed various examples of shibboleths. Note that many apocryphal shibboleths exist, and that since, by definition, shibboleths rely on stereotypical pronunciation traits, they may not accurately describe the speech of all members of… …   Wikipedia

  • CAPTCHA — Early CAPTCHAs such as these, generated by the EZ Gimpy program, were used on Yahoo!. However, technology was developed to read this type of CAPTCHA[1] …   Wikipedia

  • Key fob — A key fob is a generally decorative and at times useful item many people often carry with their keys, on a ring or a chain, for ease of tactile identification, to provide a better grip, or to make a personal statement. Key fobs are often called… …   Wikipedia

  • GrIDsure — Articleissues notable = October 2007 refimprove = October 2007 advert = October 2007IntroductionThis article describes the GrIDsure personal identification system which extends the standard ‘shared secret’ authentication model to create a secure… …   Wikipedia

  • Post Office Protocol — In computing, local e mail clients use the Post Office Protocol version 3 (POP3), an application layer Internet standard protocol, to retrieve e mail from a remote server over a TCP/IP connection. POP3 and IMAP4 (Internet Message Access Protocol) …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»