- theoretical security
- теоретическая стойкость.
English-Russian cryptological dictionary . 2014.
English-Russian cryptological dictionary . 2014.
Security through obscurity — In cryptography and computer security, security through obscurity (sometimes security by obscurity) is a controversial principle in security engineering, which attempts to use secrecy (of design, implementation, etc.) to provide security. A… … Wikipedia
Mortgage-backed security — Securities Securities Bond Stock Investment fund Derivative Structured finance Agency security … Wikipedia
Information theoretic security — A cryptosystem is information theoretically secure if its security derives purely from information theory. That is, it is secure even when the adversary has unbounded computing power. An example of an information theoretically secure cryptosystem … Wikipedia
Computer security — This article is about computer security through design and engineering. For computer security exploits and defenses, see computer insecurity. Computer security Secure operating systems Security architecture Security by design Secure coding … Wikipedia
United Nations Security Council Resolution 1267 — UN Security Council Resolution 1267 (1999) established a sanctions regime to cover individuals and entities associated with Al Qaida, Osama bin Ladenand/or the Taliban wherever located. [cite web|url=http://www.un.org/sc/committees/1267/index.shtm… … Wikipedia
Provable security — In cryptography, a system has provable security if its security requirements can be stated formally in an adversarial model, as opposed to heuristically, with clear assumptions that the adversary has access to the system as well as enough… … Wikipedia
Concrete security — In cryptography, concrete security or exact security is a practice oriented approach that aims to give more precise estimates of the computational complexities of adversarial tasks than polynomial equivalence would allow. Traditionally, provable… … Wikipedia
Computer security model — A computer security model is a scheme for specifying and enforcing security policies. A security model may be founded upon a formal model of access rights, a model of computation, a model of distributed computing, or no particular theoretical… … Wikipedia
Wireless Transport Layer Security — (WTLS) is a security protocol, part of the Wireless Application Protocol (WAP) stack. It sits between the WTP and WDP layers in the WAP communications stack.OverviewWTLS is derived from TLS. WTLS uses similar semantics adapted for a low bandwidth … Wikipedia
Cipher security summary — This article summarizes publicly known attacks against ciphers. Note that not all entries may be up to date. Table color key No known successful attacks Theoretical break Attack demonstrated in practice The Best attack column lists the complexity … Wikipedia
computer security — noun a) A branch of information security applied to both theoretical and actual computer systems. b) A branch of computer science that addresses enforcement of secure behavior on the operation of computers … Wiktionary