cryptographic compatibility - определение. Что такое cryptographic compatibility
Diclib.com
Словарь ChatGPT
Введите слово или словосочетание на любом языке 👆
Язык:

Перевод и анализ слов искусственным интеллектом ChatGPT

На этой странице Вы можете получить подробный анализ слова или словосочетания, произведенный с помощью лучшей на сегодняшний день технологии искусственного интеллекта:

  • как употребляется слово
  • частота употребления
  • используется оно чаще в устной или письменной речи
  • варианты перевода слова
  • примеры употребления (несколько фраз с переводом)
  • этимология

Что (кто) такое cryptographic compatibility - определение

Cryptographic Log On; Cryptographic logon
Найдено результатов: 293
Compatibility (geochemistry)         
PARTITIONING OF ELEMENTS IN A MINERAL
Compatibility (Geochemistry)
Compatibility is a term used by geochemists to describe how elements partition themselves in the solid and melt within Earth's mantle. In geochemistry, compatibility is a measure of how readily a particular trace element substitutes for a major element within a mineral.
Compatibility (chemical)         
MEASURE OF HOW STABLE A SUBSTANCE IS WHEN MIXED WITH ANOTHER SUBSTANCE. IF SUBSTANCES MIX AND DO NOT CHANGE THEY ARE CONSIDERED COMPATIBLE. IF SUBSTANCES MIX AND CHANGE OR DO NOT MIX AT ALL THEY ARE CONSIDERED INCOMPATIBLE
Chemical compatibility
Chemical compatibility is a measure of how stable a substance is when mixed with another substance.Chemical compatibility chart safe/unsafe combinations If two substances can mix together and undergo a chemical reaction, they are considered compatible.
forwards compatible         
DESIGN CHARACTERISTIC THAT ALLOWS A SYSTEM TO ACCEPT INPUT INTENDED FOR A LATER VERSION OF ITSELF
Forward compatible; Forwards-compatible; Forwards compatibility; Upward compatible; Forwards compatible; Upward compatibility; Upward Compatibility; Bidirectional compatibility; Multidirectional compatibility; Not Upwardly Compatible; Forward-compatible
forward compatible         
DESIGN CHARACTERISTIC THAT ALLOWS A SYSTEM TO ACCEPT INPUT INTENDED FOR A LATER VERSION OF ITSELF
Forward compatible; Forwards-compatible; Forwards compatibility; Upward compatible; Forwards compatible; Upward compatibility; Upward Compatibility; Bidirectional compatibility; Multidirectional compatibility; Not Upwardly Compatible; Forward-compatible
forwards compatibility         
DESIGN CHARACTERISTIC THAT ALLOWS A SYSTEM TO ACCEPT INPUT INTENDED FOR A LATER VERSION OF ITSELF
Forward compatible; Forwards-compatible; Forwards compatibility; Upward compatible; Forwards compatible; Upward compatibility; Upward Compatibility; Bidirectional compatibility; Multidirectional compatibility; Not Upwardly Compatible; Forward-compatible
one-way hash function         
SPECIAL CLASS OF HASH FUNCTION THAT HAS CERTAIN PROPERTIES WHICH MAKE IT SUITABLE FOR USE IN CRYPTOGRAPHY
Message digest; Cryptographic hash; Cryptographic message digest; One-way hash; Modification Detection Code; Cryptographic hash functions; Hash function (cryptography); One-way hash function; CRHF; Secure hash function; One way encryption; Numerical hash; Cryptograhic hash; Cryptographic hash value; Cryptographic Hash Function; Cryptographic one-way hash function; Message-digest; Message-digest algorithm; Sphincter hash; Terahash; Cryptographic hashing; Wide pipe; Wide pipe hash; Wide pipe design; Wide pipe construction; Wide-pipe; Widepipe; Narrowpipe; Narrow-pipe; Narrow pipe; Applications of cryptographic hash functions; Cryptographic hashes; Hash (cryptography)
<algorithm> (Or "message digest function") A {one-way function} which takes a variable-length message and produces a fixed-length hash. Given the hash it is computationally infeasible to find a message with that hash; in fact one can't determine any usable information about a message with that hash, not even a single bit. For some one-way hash functions it's also computationally impossible to determine two messages which produce the same hash. A one-way hash function can be private or public, just like an encryption function. MD5, SHA and Snefru are examples of public one-way hash functions. A public one-way hash function can be used to speed up a public-key digital signature system. Rather than sign a long message, which can take a long time, compute the one-way hash of the message, and sign the hash. {sci.crypt FAQ (ftp://src.doc.ic.ac.uk/usenet/usenet-by-group/sci.crypt/)}. (2001-05-10)
Forward compatibility         
DESIGN CHARACTERISTIC THAT ALLOWS A SYSTEM TO ACCEPT INPUT INTENDED FOR A LATER VERSION OF ITSELF
Forward compatible; Forwards-compatible; Forwards compatibility; Upward compatible; Forwards compatible; Upward compatibility; Upward Compatibility; Bidirectional compatibility; Multidirectional compatibility; Not Upwardly Compatible; Forward-compatible
Forward compatibility or upward compatibility is a design characteristic that allows a system to accept input intended for a later version of itself. The concept can be applied to entire systems, electrical interfaces, telecommunication signals, data communication protocols, file formats, and programming languages.
forward compatibility         
DESIGN CHARACTERISTIC THAT ALLOWS A SYSTEM TO ACCEPT INPUT INTENDED FOR A LATER VERSION OF ITSELF
Forward compatible; Forwards-compatible; Forwards compatibility; Upward compatible; Forwards compatible; Upward compatibility; Upward Compatibility; Bidirectional compatibility; Multidirectional compatibility; Not Upwardly Compatible; Forward-compatible
<jargon> The ability to accept input from later versions of itself. Forward compatibility is harder to achieve than {backward compatibility}, since, in the backward case, the input format is know whereas a forward compatible system needs to cope gracefully with unknown future features. An example of future compatibility is the stipulation that a web browser should ignore HTML tags it does not recognise. See also extensible. (2003-06-23)
Computer compatibility         
TECHNOLOGICAL COMPATIBILITY OF SOFTWARE AND HARDWARE
Software compatibility; Hardware compatibility; Computer hardware compatibility; Compatibility (hardware); Computer software compatibility; Compatibility (software); Compatibility (computing); Computer incompatibility; Hardware incompatibility; Computer hardware incompatibility; Incompatibility (hardware); Compatibility of software; Compatibility of computer hardware
A family of computer models is said to be compatible if certain software that runs on one of the models can also be run on all other models of the family. The computer models may differ in performance, reliability or some other characteristic.
backward compatibility         
PROPERTY OF A SYSTEM, PRODUCT, OR TECHNOLOGY THAT ALLOWS FOR INTEROPERABILITY WITH AN OLDER LEGACY SYSTEM, OR WITH INPUT DESIGNED FOR SUCH A SYSTEM, ESPECIALLY IN TELECOMMUNICATIONS AND COMPUTING
Backwards compatibility; Backward compatible; Backward-compatible; Backwards compatible; Backwards-compatible; Backward-compatibility; Backwards-compatibility; Downward compatible; Backwards Compatibility; Backwards compatability; Downward compatibility; Downward Compatibility; Hysterical raisins; Format rot; Legacy compatibility; Bugwards compatible; Bugwards compatibility; Bugward compatible; Bugward compatibility; Backward-incompatible; Breaking changes; Breaking change; Translation compatibility; Hysterical reasons; Retrocompatibility; Retrocompatible
<jargon> Able to share data or commands with older versions of itself, or sometimes other older systems, particularly systems it intends to supplant. Sometimes backward compatibility is limited to being able to read old data but does not extend to being able to write data in a format that can be read by old versions. For example, WordPerfect 6.0 can read WordPerfect 5.1 files, so it is backward compatible. It can be said that Perl is backward compatible with awk, because Perl was (among other things) intended to replace awk, and can, with a converter, run awk programs. See also: backward combatability. Compare: forward compatible. (2003-06-23)

Википедия

Cryptographic log on

Cryptographic log-on (CLO) is a process that uses Common Access Cards (CAC) and embedded Public Key Infrastructure (PKI) certificates to authenticate a user's identification to a workstation and network. It replaces the username and passwords for identifying and authenticating users. To log-on cryptographically to a CLO-enabled workstation, users simply insert their CAC into their workstation’s CAC reader and provide their Personal Identification Number (PIN).

The Navy/Marine Corps Intranet, among many other secure networks, uses CLO.