authenticated copy - определение. Что такое authenticated copy
Diclib.com
Словарь ChatGPT
Введите слово или словосочетание на любом языке 👆
Язык:

Перевод и анализ слов искусственным интеллектом ChatGPT

На этой странице Вы можете получить подробный анализ слова или словосочетания, произведенный с помощью лучшей на сегодняшний день технологии искусственного интеллекта:

  • как употребляется слово
  • частота употребления
  • используется оно чаще в устной или письменной речи
  • варианты перевода слова
  • примеры употребления (несколько фраз с переводом)
  • этимология

Что (кто) такое authenticated copy - определение

ACT OF CONFIRMING THE TRUTH OF AN ATTRIBUTE OF A DATUM OR ENTITY, OFTEN USED AS PART OF ACCESS CONTROL
Authenticate; Authentification; Authentication factor; Authentication factors; Authenticated copy; Forgery detection; AuthN; Authentications; Authenticates; Authenticated; Authenticating; Authn; Client authentication; Server authentication; Service authentication; Product authentication; Single-factor authentication; Continuous authentication
  • ATM user authenticating himself
  • A [[security hologram]] label on an electronics box for authentication
  • NSA KAL-55B Tactical Authentication System used by the U.S. military during the [[Vietnam War]] – [[National Cryptologic Museum]]
  • A military police officer checks a driver's identification card before allowing her to enter a military base.

Copy (command)         
COMMAND OF RT-11, RSX-11, OPENVMS, DOS, OS/2 AND MICROSOFT WINDOWS OPERATING SYSTEMS
Copy Con; Copy con; COPY (command); COPY (DOS command); COPY (DOS); COPY/FTP (command)
In computing, copy is a command in various operating systems. The command copies computer files from one directory to another.
Password-authenticated key agreement         
INTERACTIVE METHOD FOR TWO OR MORE PARTIES TO ESTABLISH CRYPTOGRAPHIC KEYS BASED ON ONE OR MORE PARTY'S KNOWLEDGE OF A PASSWORD
PAKE; Password Authenticated Key Exchange; Password-authenticated key exchange
In cryptography, a password-authenticated key agreement method is an interactive method for two or more parties to establish cryptographic keys based on one or more party's knowledge of a password.
Authenticated encryption         
  • E&M approach
  • EtM approach
  • MtE approach
CIPHERS WHICH SIMULTANEOUSLY ASSURE CONFIDENTIALITY AND AUTHENTICITY
AEAD block cipher modes of operation; AEAD; Encrypt-then-MAC; Encrypt-and-MAC; MAC-then-Encrypt; Authenticated Encryption with Associated Data; Authenticated encryption with associated data; Authenticated Encryption; Generic composition; Authenticated cipher; AE scheme; Additional authenticated data
Authenticated Encryption (AE) and Authenticated Encryption with Associated Data (AEAD) are forms of encryption which simultaneously assure the confidentiality and authenticity of data.

Википедия

Authentication

Authentication (from Greek: αὐθεντικός authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicating a person or thing's identity, authentication is the process of verifying that identity. It might involve validating personal identity documents, verifying the authenticity of a website with a digital certificate, determining the age of an artifact by carbon dating, or ensuring that a product or document is not counterfeit.

Примеры употребления для authenticated copy
1. Among the documents required for business and commercial visits are an authenticated copy of the contract with the agency they belong to and a letter from the licensing agency of their occupation.