cryptographic information - перевод на русский
Diclib.com
Словарь ChatGPT
Введите слово или словосочетание на любом языке 👆
Язык:

Перевод и анализ слов искусственным интеллектом ChatGPT

На этой странице Вы можете получить подробный анализ слова или словосочетания, произведенный с помощью лучшей на сегодняшний день технологии искусственного интеллекта:

  • как употребляется слово
  • частота употребления
  • используется оно чаще в устной или письменной речи
  • варианты перевода слова
  • примеры употребления (несколько фраз с переводом)
  • этимология

cryptographic information - перевод на русский

Cryptographic Log On; Cryptographic logon
Найдено результатов: 1258
cryptographic information      
информация, относящаяся к криптографическим системам и средствам
message digest         
SPECIAL CLASS OF HASH FUNCTION THAT HAS CERTAIN PROPERTIES WHICH MAKE IT SUITABLE FOR USE IN CRYPTOGRAPHY
Message digest; Cryptographic hash; Cryptographic message digest; One-way hash; Modification Detection Code; Cryptographic hash functions; Hash function (cryptography); One-way hash function; CRHF; Secure hash function; One way encryption; Numerical hash; Cryptograhic hash; Cryptographic hash value; Cryptographic Hash Function; Cryptographic one-way hash function; Message-digest; Message-digest algorithm; Sphincter hash; Terahash; Cryptographic hashing; Wide pipe; Wide pipe hash; Wide pipe design; Wide pipe construction; Wide-pipe; Widepipe; Narrowpipe; Narrow-pipe; Narrow pipe; Applications of cryptographic hash functions; Cryptographic hashes; Hash (cryptography)

общая лексика

свёртка [профиль] сообщения

сжатая текстовая строка, полученная из текста сообщения применением односторонней хэш-функции (one-way hash function). Используется для создания цифровой подписи

Смотрите также

digital signature

message digest         
SPECIAL CLASS OF HASH FUNCTION THAT HAS CERTAIN PROPERTIES WHICH MAKE IT SUITABLE FOR USE IN CRYPTOGRAPHY
Message digest; Cryptographic hash; Cryptographic message digest; One-way hash; Modification Detection Code; Cryptographic hash functions; Hash function (cryptography); One-way hash function; CRHF; Secure hash function; One way encryption; Numerical hash; Cryptograhic hash; Cryptographic hash value; Cryptographic Hash Function; Cryptographic one-way hash function; Message-digest; Message-digest algorithm; Sphincter hash; Terahash; Cryptographic hashing; Wide pipe; Wide pipe hash; Wide pipe design; Wide pipe construction; Wide-pipe; Widepipe; Narrowpipe; Narrow-pipe; Narrow pipe; Applications of cryptographic hash functions; Cryptographic hashes; Hash (cryptography)
сообщение, преобразованное в краткую форму (при формировании цифровой подписи); часть сообщения, удостоверяемая цифровой подписью; сжатая форма (дайджест) сообщения
modification detection code         
SPECIAL CLASS OF HASH FUNCTION THAT HAS CERTAIN PROPERTIES WHICH MAKE IT SUITABLE FOR USE IN CRYPTOGRAPHY
Message digest; Cryptographic hash; Cryptographic message digest; One-way hash; Modification Detection Code; Cryptographic hash functions; Hash function (cryptography); One-way hash function; CRHF; Secure hash function; One way encryption; Numerical hash; Cryptograhic hash; Cryptographic hash value; Cryptographic Hash Function; Cryptographic one-way hash function; Message-digest; Message-digest algorithm; Sphincter hash; Terahash; Cryptographic hashing; Wide pipe; Wide pipe hash; Wide pipe design; Wide pipe construction; Wide-pipe; Widepipe; Narrowpipe; Narrow-pipe; Narrow pipe; Applications of cryptographic hash functions; Cryptographic hashes; Hash (cryptography)
код обнаружения изменений текста; контрольная сумма сообщения
information science         
  • Visualisation of various methodological approaches to gaining insights from meta data areas.
  • [[Gottfried Wilhelm Leibniz]], a German [[polymath]] who wrote primarily in Latin and French. His fields of study were [[Metaphysics]], [[Mathematics]], [[Theodicy]].
  • [[Joseph Marie Jacquard]]
  • [[Vannevar Bush]], a famous information scientist, ca. 1940–1944
FIELD PRIMARILY CONCERNED WITH THE ANALYSIS, COLLECTION, CLASSIFICATION, MANIPULATION, STORAGE, RETRIEVAL AND DISSEMINATION OF INFORMATION
Information Science; Information sciences; Information Sciences; Infosci; Information studies; Information Studies; Documentation (field); Information Science and Engineering; Abstracting information; Informatically; History of information science; Informational science; Informational sciences; Informational study; Informational studies; Information science and engineering

[infə'meiʃ(ə)n'saiəns]

синоним

informatics

information theory         
  • ''H''<sub>b</sub>(''p'')}}.  The entropy is maximized at 1 bit per trial when the two possible outcomes are equally probable, as in an unbiased coin toss.
  • A picture showing scratches on the readable surface of a CD-R.  Music and data CDs are coded using error correcting codes and thus can still be read even if they have minor scratches using [[error detection and correction]].
MATHEMATICAL THEORY FROM THE FIELD OF PROBABILITY THEORY AND STATISTICS
Information Theory; Classical information theory; Shannon theory; Information theorist; Shannon information theory; Semiotic information theory; Semiotic information; Information-theoretic; Shannons theory; Shannon's information theory; Applications of information theory
information theory теория информации
information theory         
  • ''H''<sub>b</sub>(''p'')}}.  The entropy is maximized at 1 bit per trial when the two possible outcomes are equally probable, as in an unbiased coin toss.
  • A picture showing scratches on the readable surface of a CD-R.  Music and data CDs are coded using error correcting codes and thus can still be read even if they have minor scratches using [[error detection and correction]].
MATHEMATICAL THEORY FROM THE FIELD OF PROBABILITY THEORY AND STATISTICS
Information Theory; Classical information theory; Shannon theory; Information theorist; Shannon information theory; Semiotic information theory; Semiotic information; Information-theoretic; Shannons theory; Shannon's information theory; Applications of information theory

общая лексика

теория информации

научная дисциплина

Смотрите также

information

information model         
  • Database requirements for a CD collection in [[EXPRESS-G]] notation.
  • ER diagram]].
REPRESENTATION OF CONCEPTUAL RELATIONSHIPS BETWEEN THINGS
Information models; Information modeling; Information Modelling; Information modelling; Information modeling language

общая лексика

информационная модель

Смотрите также

conceptual model; essential model; model

information theory         
  • ''H''<sub>b</sub>(''p'')}}.  The entropy is maximized at 1 bit per trial when the two possible outcomes are equally probable, as in an unbiased coin toss.
  • A picture showing scratches on the readable surface of a CD-R.  Music and data CDs are coded using error correcting codes and thus can still be read even if they have minor scratches using [[error detection and correction]].
MATHEMATICAL THEORY FROM THE FIELD OF PROBABILITY THEORY AND STATISTICS
Information Theory; Classical information theory; Shannon theory; Information theorist; Shannon information theory; Semiotic information theory; Semiotic information; Information-theoretic; Shannons theory; Shannon's information theory; Applications of information theory
теория информации; математическая теория, основанная К. Шенноном, которая используется для интерпретации процесса передачи сообщений в системах связи.
sensitive information         
INFORMATION OR KNOWLEDGE THAT MIGHT RESULT IN LOSS OF AN ADVANTAGE OR LEVEL OF SECURITY IF DISCLOSED TO OTHERS
Sensitive information; Sensitivity indicator; Sensitivity (information); Sensitive data

общая лексика

важная [значимая, секретная, конфиденциальная, критичная] информация

информация, потеря, раскрытие или уничтожение которой по тем или иным причинам нежелательны для бизнеса, функционирования системы, или её владельца

Смотрите также

privileged information

Определение

Поиск информационный

Википедия

Cryptographic log on

Cryptographic log-on (CLO) is a process that uses Common Access Cards (CAC) and embedded Public Key Infrastructure (PKI) certificates to authenticate a user's identification to a workstation and network. It replaces the username and passwords for identifying and authenticating users. To log-on cryptographically to a CLO-enabled workstation, users simply insert their CAC into their workstation’s CAC reader and provide their Personal Identification Number (PIN).

The Navy/Marine Corps Intranet, among many other secure networks, uses CLO.

Как переводится cryptographic information на Русский язык