- system session key
- системный сеансовый ключ.
English-Russian cryptological dictionary . 2014.
Смотреть что такое "system session key" в других словарях:
Session key — A session key is a single use symmetric key used for encrypting all messages in one communication session. A closely related term is traffic encryption key or TEK, which refers to any key used to encrypt messages as opposed to different uses,… … Wikipedia
Session hijacking — The term session hijacking refers to the exploitation of a valid computer session sometimes also called a session key to gain unauthorized access to information or services in a computer system. In particular, it is used to refer to the theft of… … Wikipedia
Key (cryptography) — In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher. Without a key, the algorithm would produce no useful result. In encryption, a key specifies the… … Wikipedia
System Architecture Evolution — (aka SAE) is the core network architecture of 3GPP s LTE wireless communication standard. SAE is the evolution of the GPRS Core Network, with some differences: simplified architecture all IP Network (AIPN) support for higher throughput and lower… … Wikipedia
Session Manager Subsystem — Session Manager Subsystem, or smss.exe, is a component of the Microsoft Windows NT operating system. It is executed during the startup process of Windows 2000, XP, 2003 and Vista. At this time it: *Creates environment variables *Starts the kernel … Wikipedia
Session Border Controller — A Session Border Controller is a device used in some VoIP networks to exert control over the signaling and usually also the media streams involved in setting up, conducting, and tearing down calls. Within the context of VoIP, the word Session in… … Wikipedia
System/34 and System/36 Screen Design Aid — Screen Design Aid (System/34 and System/36) (SDA) is a utility for the IBM System/34, System/36, System/38, and AS/400 (iSeries) midrange computers.This article refers to the S/34 and S/36 implementations of SDA. S/38 and AS/400 use a different… … Wikipedia
System Preferences — Infobox Software| name = System Preferences caption = System Preferences in Mac OS X Leopard after the MobileMe update, with no third party preference panes installed. developer = Apple Inc. latest release version = 5.0 (5.0) latest release date … Wikipedia
Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key … Wikipedia
Derived unique key per transaction — In cryptography, Derived Unique Key Per Transaction (DUKPT) is a key management scheme in which for every transaction, a unique key is used which is derived from a fixed key. Therefore, if a derived key is compromised, future and past transaction … Wikipedia
Diffie–Hellman key exchange — (D–H)[nb 1] is a specific method of exchanging keys. It is one of the earliest practical examples of key exchange implemented within the field of cryptography. The Diffie–Hellman key exchange method allows two parties that have no prior knowledge … Wikipedia