- semantic security
- семантическая стойкость.
English-Russian cryptological dictionary . 2014.
English-Russian cryptological dictionary . 2014.
Semantic security — is a widely used definition for security in an asymmetric key encryption algorithm. For a cryptosystem to be semantically secure, it must be infeasible for a computationally bounded adversary to derive significant information about a message… … Wikipedia
Semantic interoperability — (also referred to as Computable Semantic Interoperability) is the ability of two or more computer systems to exchange information and have the meaning of that information automatically interpreted by the receiving system accurately enough to… … Wikipedia
SeMantic Information Logistics Architecture — Betriebssystem unabhängig Programmiersprache Java Kategorie Framework für Informationsmanagement Lizenz Eclipse Public License … Deutsch Wikipedia
Semantic Information Logistics Architecture — Betriebssystem: unabhängig Programmiersprache: Java Kategorie: Framework für Informationsmanagement Lizenz: Eclipse Public License … Deutsch Wikipedia
Semantic dispute — For semantic arguments in linguistics, see verb argument. A semantic dispute is a disagreement that arises if the parties involved disagree about whether a particular claim is true, not becausethey disagree on material facts, but rather because… … Wikipedia
Semantic URL — The term semantic URL refers to a URL which is of a form that is immediately and intuitively meaningful to non experts. Such URL schemes tend to reflect the conceptual structure of a collection of information (see Information Architecture) and… … Wikipedia
Semantic service oriented architecture — A Semantic Service Oriented Architecture (SSOA) is a computer architecture that allows for scalable and controlled Enterprise Application Integration solutions. [ [http://www.wsmx.org/papers/publications/SSOA.pdf Exposing Semantic Web Service… … Wikipedia
Entropic security — is a security definition for encryption for specific message spaces. Standard security definitions such as semantic security permit the adversary a great deal of knowledge about the messages being encrypted for example, the adversary is often… … Wikipedia
Provable security — In cryptography, a system has provable security if its security requirements can be stated formally in an adversarial model, as opposed to heuristically, with clear assumptions that the adversary has access to the system as well as enough… … Wikipedia
Information theoretic security — A cryptosystem is information theoretically secure if its security derives purely from information theory. That is, it is secure even when the adversary has unbounded computing power. An example of an information theoretically secure cryptosystem … Wikipedia
United Nations Security Council Resolution 242 — (S/RES/242) was adopted unanimously by the UN Security Council on November 22, 1967 in the aftermath of the Six Day War. It was adopted under Chapter VI of the United Nations Charter. [ [http://domino.un.org/unispal.nsf/db942872b9eae454852560f6005… … Wikipedia