message origin authentication

message origin authentication
uwierzytelnienie nadawcy wiadomości

English-Polish dictionary for engineers. 2013.

Игры ⚽ Поможем решить контрольную работу

Look at other dictionaries:

  • Authentication — (from Greek αυθεντικός; real or genuine, from authentes; author) is the act of establishing or confirming something (or someone) as authentic , that is, that claims made by or about the thing are true. This might involve confirming the identity… …   Wikipedia

  • E-mail authentication — is the effort to equip messages of the e mail transport system with enough verifiable information, so that recipients can recognize the nature of each incoming message automatically. It is different from content filtering s fuzzy methods.… …   Wikipedia

  • HTTPsec — ( HTTP security ) is an authentication scheme for the web protocol HTTP. HTTPsec provides cryptographically strong security at the application layer. HTTPsec is a proposal by [http://secarta.com/ Secarta] .HTTPsec operates within the framework of …   Wikipedia

  • аутентификация исходного сообщения — Предоставляет возможность получателю или любому агенту МТА, через которого проходит сообщение, аутентифицировать идентификацию отправителя сообщения. Рекомендация МСЭ Т X.400. [[http://www.rfcmd.ru/glossword/1.8/index.php?a=index d=23]] Тематики… …   Справочник технического переводчика

  • Internet security — is a branch of computer security[1] specifically related to the Internet. Its objective is to establish rules and measures to use against attacks over the Internet.[2] The Internet represents an insecure channel for exchanging information leading …   Wikipedia

  • Burrows-Abadi-Needham logic — (also known as the BAN logic) is a set of rules for defining and analyzing information exchange protocols. Specifically, BAN logic helps its users determine whether exchanged information is trustworthy, secured against eavesdropping, or both. BAN …   Wikipedia

  • IPsec — Internet Protocol Security (IPsec) is a suite of protocols for securing Internet Protocol (IP) communications by authenticating and/or encrypting each in a data stream. IPsec also includes protocols for cryptographic key establishment.… …   Wikipedia

  • UMTS security — The Universal Mobile Telecommunications System (UMTS) is one of the new ‘third generation’ 3G mobile cellular communication systems. UMTS builds on the success of the ‘second generation’ GSM system. One of the factors in the success of GSM has… …   Wikipedia

  • ISO 8583 — Standard para Transacciones Financieras con Mensajes originados en una tarjeta Especificaciones de los mensajes de intercambio es el standard de la International Organization for Standardization para sistemas que intercambian transacciones… …   Wikipedia Español

  • Domain Name System Security Extensions — Internet protocol suite Application layer BGP DHCP DNS FTP HTTP …   Wikipedia

  • Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”