cryptographic$17950$ - traduzione in italiano
DICLIB.COM
Strumenti linguistici IA
Inserisci una parola o una frase in qualsiasi lingua 👆
Lingua:     

Traduzione e analisi delle parole da parte dell'intelligenza artificiale

In questa pagina puoi ottenere un'analisi dettagliata di una parola o frase, prodotta utilizzando la migliore tecnologia di intelligenza artificiale fino ad oggi:

  • come viene usata la parola
  • frequenza di utilizzo
  • è usato più spesso nel discorso orale o scritto
  • opzioni di traduzione delle parole
  • esempi di utilizzo (varie frasi con traduzione)
  • etimologia

cryptographic$17950$ - traduzione in italiano

Cryptographic Log On; Cryptographic logon

cryptographic      
adj. crittografo
digital certificate         
  • The roles of root certificate, intermediate certificate and end-entity certificate as in the [[chain of trust]].
  • The procedure of obtaining a Public key certificate
ELECTRONIC DOCUMENT USED TO PROVE THE OWNERSHIP OF A PUBLIC KEY
Digital certificate; Digital Certificate; Identity certificate; Digital identity certificate; Certificate (cryptography); Digital certificates; SSL Certificate; Server certificate; SSL certificate; Certificate in Computer Programming; Ssl certificate; Digital certification; Public-key certificate; Public key certificates; SSL Certificates; Cryptographic certificate; Digital Certification; SSL security certificate; SSL certificates; Organization Validation Certificate; OV certificate; Trusted root store; TLS certificate; Organization validation certificate; Intermediate certificate (cryptography)
(Internet) certificato di identità elettronico contenente dati personali dell"operatore (supporto digitale e codice inclusi), promette riserbo negli affari in rete

Definizione

one-way hash function
<algorithm> (Or "message digest function") A {one-way function} which takes a variable-length message and produces a fixed-length hash. Given the hash it is computationally infeasible to find a message with that hash; in fact one can't determine any usable information about a message with that hash, not even a single bit. For some one-way hash functions it's also computationally impossible to determine two messages which produce the same hash. A one-way hash function can be private or public, just like an encryption function. MD5, SHA and Snefru are examples of public one-way hash functions. A public one-way hash function can be used to speed up a public-key digital signature system. Rather than sign a long message, which can take a long time, compute the one-way hash of the message, and sign the hash. {sci.crypt FAQ (ftp://src.doc.ic.ac.uk/usenet/usenet-by-group/sci.crypt/)}. (2001-05-10)

Wikipedia

Cryptographic log on

Cryptographic log-on (CLO) is a process that uses Common Access Cards (CAC) and embedded Public Key Infrastructure (PKI) certificates to authenticate a user's identification to a workstation and network. It replaces the username and passwords for identifying and authenticating users. To log-on cryptographically to a CLO-enabled workstation, users simply insert their CAC into their workstation’s CAC reader and provide their Personal Identification Number (PIN).

The Navy/Marine Corps Intranet, among many other secure networks, uses CLO.