- taxonomy for authentication schemes
- классификация схем аутентификации.
English-Russian cryptological dictionary . 2014.
English-Russian cryptological dictionary . 2014.
классификация схем аутентификации — — [http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=4690] Тематики защита информации EN taxonomy for authentication schemes … Справочник технического переводчика
Digital identity — For related uses, see Internet identity Digital identity is the aspect of digital technology that is concerned with the mediation of people s experience of their own identity and the identity of other people and things. Digital identity also has… … Wikipedia
Application security — encompasses measures taken throughout the life cycle to prevent exceptions in the security policy of an application or the underlying system (vulnerabilities) through flaws in the design, development, deployment, upgradation,or maintenance of the … Wikipedia
Intellectual capital — is a term with various definitions in different theories of management and economics. Accordingly, its only truly neutral definition is as a debate over economic intangibles . Ambiguous combinations of human capital, instructional capital and… … Wikipedia
Cipher — For other uses, see Cipher (disambiguation). Edward Larsson s rune cipher resembling that found on the Kensington Runestone. Also includes runically unrelated blackletter writing style and pigpen cipher. In cryptography, a cipher (or cypher) is… … Wikipedia
Meteorite — This article is about debris from space that survives impact with the ground. For other uses of Meteor and Meteors , see Meteor (disambiguation). For popular applications, see Falling star. For the fictional superhero in the Marvel Comics… … Wikipedia
Spam (electronic) — An email box folder littered with spam messages A typical spam m … Wikipedia