翻訳と辞書
Words near each other
・ List of Teenage Mutant Ninja Turtles characters
・ List of Teenage Mutant Ninja Turtles supporting characters
・ List of Teenage Mutant Ninja Turtles video games
・ List of teetotalers
・ List of Tegami Bachi chapters
・ List of Tegami Bachi episodes
・ List of Tehran metro stations
・ List of Tehran metropolis parks
・ List of Tehran's Friday Prayer Imams
・ List of Tekken characters
・ List of Tekken media
・ List of TekWar episodes
・ List of Telecaster players
・ List of telecom companies in India
・ List of telecommunications companies of Pakistan
List of telecommunications encryption terms
・ List of telecommunications regulatory bodies
・ List of telegraph stations
・ List of telegraphists
・ List of Telemidae species
・ List of Telemundo affiliates (by U.S. state)
・ List of Telemundo affiliates (table)
・ List of telenovelas
・ List of telenovelas filmed in the United States
・ List of telenovelas of ABS-CBN
・ List of telenovelas of Azteca
・ List of telenovelas of Caracol Televisión
・ List of telenovelas of GMA Network
・ List of telenovelas of Radio Caracas Televisión
・ List of telenovelas of Rede Globo


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

List of telecommunications encryption terms : ウィキペディア英語版
List of telecommunications encryption terms

__NOTOC__
This is a list of telecommunications encryption terms. This list is derived in part from the ''Glossary of Telecommunication Terms'' published as Federal Standard 1037C.
*A5/1a stream cipher used to provide over-the-air communication privacy in the GSM cellular telephone standard.
*Bulk encryption
*Cellular Message Encryption Algorithma block cipher which was used for securing mobile phones in the United States.
*Cipher
*Cipher system
*Cipher text
*Ciphony
*Civision
*Codress message

*COMSEC equipment

*Cryptanalysis
*Cryptographic key
*CRYPTO (International Cryptology Conference)
*Crypto phone
*Data Encryption Standard (DES) 〔Coppersmith, Don. (1994). (The data encryption standard (DES) and its strength against attacks ). ''IBM Journal of Research and Development'', 38(3), 243–250.〕
*Decipher
*Decode
*Decrypt
*DECT Standard Cipher
*Descrambler
*Dncipher
*Encode
*Encoding law
*Encrypt
*End-to-end encryption

*group
*IMSI-catcheran eavesdropping device used for interception of cellular phones and usually is undetectable for users of mobile phones.
*Key distribution center (KDC)
*Key management
*Key stream
*KSD-64
*Link encryption
*MISTY1
*Multiplex link encryption
*Net control station (NCS)
*Null cipher
*One-time pad
*Over the Air Rekeying (OTAR)
*Plaintext
*PPPoX
*Protected distribution system (PDS)
*Protection interval (PI)
*Pseudorandom number generator
*Public-key cryptography
*RED/BLACK concept
*RED signal

*Remote rekeying
*Security management
*Spoofing
*STU-IIIa family of secure telephones introduced in 1987 by the National Security Agency for use by the United States government, its contractors, and its allies.
*Superencryption
*Synchronous crypto-operation
*Transmission security key (TSK)
*Trunk encryption device (TED)
*Type 1 encryption
*Type 2 encryption
*Type 3 encryption
*Type 4 encryption
*Unique key


*VoIP VPNcombines voice over IP and virtual private network technologies to offer a method for delivering secure voice.
*ZRTPa cryptographic key-agreement protocol used in Voice over Internet Protocol (VoIP) phone telephony.
==See also==

*Communications security
*CONDOR secure cell phone
*Cryptography standards
*Secure communication
*Secure telephone
* Telecommunication

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「List of telecommunications encryption terms」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.