- authentication result
- банк. итог аутентификации
Англо-русский универсальный дополнительный практический переводческий словарь И. Мостицкого. И. Мостицкий. 2002-2012.
Англо-русский универсальный дополнительный практический переводческий словарь И. Мостицкого. И. Мостицкий. 2002-2012.
Authentication Header — IPsec im TCP/IP‑Protokollstapel: Anwendung HTTP IMAP SMTP DNS … Transport TCP UDP … Deutsch Wikipedia
Authentication key — An ISO term. A cryptographic key used for authentication. When this key and the elements to be authenticated (authentication elements) are applied to the authentication algorithm, the result will be the message authentication code (MAC) or the… … International financial encyclopaedia
Digest access authentication — HTTP Persistence · Compression · HTTPS Request methods OPTIONS · GET · HEAD · POST · PUT · DELETE · TRACE · CONNECT Header fields Cookie · ETag · Location · Referer DNT · … Wikipedia
Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in … Wikipedia
Electronic authentication — (E authentication) is the process of establishing confidence in user identities electronically presented to an information system. E authentication presents a technical challenge when this process involves the remote authentication of individual… … Wikipedia
Protected Extensible Authentication Protocol — Protected Extensible Authentication Protocol, Protected EAP, ou plus simplement PEAP, est une méthode de transfert sécurisée d informations d authentification, créée au départ pour les réseaux sans fil. Ce protocole a été développé conjointement… … Wikipédia en Français
Chip Authentication Program — A GemAlto EZIO CAP Device Whitelabeled as Barclays PINSentry The Chip Authentication Program (CAP) is a MasterCard initiative and technical specification for using EMV banking smartcards for authenticating users and transactions in online and… … Wikipedia
WLAN Authentication and Privacy Infrastructure — WAPI (WLAN Authentication and Privacy Infrastructure) is a Chinese National Standard for Wireless LAN (GB 15629.11 2003).Although it was allegedly designed to operate on top of WiFi, compatibility with the security protocol used by the 802.11… … Wikipedia
Key authentication — is a problem that arises when using public key cryptography. It is the process of assuring that the public key of person A held by person B does in fact belong to person A .In traditional symmetric key cryptography, this problem wasn t an issue… … Wikipedia
Message Authentication Code — (MAC) An ISO term. A code in a message between the sender and the receiver used to validate the source and part or all of the text of the message. The code is the result of an agreed calculation. ISO Funds Transfer Messages term. 16x. ISO… … International financial encyclopaedia
challenge-response authentication — A method of authentication used by Microsoft Windows 2000 and other operating systems. When a user contacts a server, the server responds with a challenge, upon which the user then performs a cryptographic operation and returns the result… … Dictionary of networking