Словари
Англо-русский словарь по компьютерной безопасности
Слова
Поиск
Слова на "K" в Англо-русском словаре по компьютерной безопасности
(
2
И
П
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Все
KA
KB
KC
KD
KE
KI
KK
KM
KN
KO
Список всех слов на букву K
Англо-русский словарь по компьютерной безопасности содержит 447 слов на букву K
Слова, начинающиеся на букву K
KAK
KBD
KBIT CIPHER FEEDBACK MODE
KBIT CIPHER FEEDBACK REGIME
KBIT OUTPUT FEEDBACK MODE
KBIT OUTPUT FEEDBACK REGIME
KBMS
KBS
KCA
KCC
KDC
KDP
KDS
KEA
KEEPER
KEK
KERBEROS
KERNEL
KERNEL ISOLATION
KERNEL SOFTWARE
KERNELBASED OPERATING SYSTEM
KERNELIZED OPERATING SYSTEM
KES
KEY
KEY AGREEMENT
KEY AGREEMENT PROTOCOL
KEY AREA
KEY ASSIGNEMENT
KEY ATTRIBUTE
KEY AUTHENTICATION CENTER
KEY AUTHENTICATION CODE
KEY BANK
KEY BASE
KEY BIT
KEY BITS SEQUENCE
KEY BITS STRING
KEY BLOCK
KEY BOOK
KEY BREAK
KEY BREAK(ING)
KEY BREAK(ING)
KEY BREAKING
KEY BYTE
KEY CARD
KEY CARD SYSTEM
KEY CARRIER
KEY CERFITICATION AUTHORITY
KEY CERTIFICATION
KEY CERTIFICATION AUTHORITY
KEY CERTIFICATION CENTER
KEY CHAIN
KEY CHANGE
KEY CHANGE INTERVAL
KEY CHANGE RATE
KEY CHANGE TRANSACTION
KEY CHANGEOVER
KEY CHANNEL
KEY CHARACTER
KEY CHECKSUM
KEY CLUSTERING
KEY CLUSTERING CRYPTANALYSIS
KEY CODE
KEY COMBINATION
KEY COMPONENT
KEY COMPOSITION
KEY COMPROMISE
KEY COMPROMISE COUNTERMEASURES
KEY COMPUTATION
KEY COPY
KEY CREATION FUNCTION
KEY CRUNCHING
KEY CRYPTOSYSTEM
KEY CYCLE PERIOD
KEY CYCLING
KEY DATABASE
KEY DECODER
KEY DELETION
KEY DELIVERY
KEY DEPENDENCE
KEY DEPTH
KEY DERIVATION
KEY DERIVATION OPERATION
KEY DESTRUCTION
KEY DIFFUSION
KEY DISCLOSURE
KEY DISESTABLISHING
KEY DISK
KEY DISSEMINATION
KEY DISTRIBUTION
KEY DISTRIBUTION ALGORITHM
KEY DISTRIBUTION BY CODEBOOK
KEY DISTRIBUTION CENTER
KEY DISTRIBUTION CHANNEL
KEY DISTRIBUTION CRYPTOSYSTEM
KEY DISTRIBUTION DEVICE
KEY DISTRIBUTION INFORMATION
KEY DISTRIBUTION MECHANISM
KEY DISTRIBUTION NODE
KEY DISTRIBUTION PROTOCOL
KEY DISTRIBUTION SCHEME
KEY DISTRIBUTION SERVICE
KEY DISTRIBUTION SYSTEM
KEY DISTRIBUTION UNIT
KEY DIVERSITY
KEY ENCRYPTION
KEY ENCRYPTION KEY
KEY ENTRY
KEY ENTRY PORT
KEY ENTRY PROCEDURE
KEY EQUIVOCATION FUNCTION
KEY ERASURE
KEY ESCROW (CRYPTO)SYSTEM
KEY ESCROW (CRYPTO)SYSTEM
KEY ESCROW CRYPTOSYSTEM
KEY ESCROW SYSTEM
KEY ESTABLISHMENT
KEY ESTIMATE
KEY EVALUATION
KEY EXCHANGE
KEY EXCHANGE ALGORITHM
KEY EXCHANGE PROTOCOL
KEY EXCHANGE SYSTEM
KEY EXCHANGE VIA A THIRDPARTY
KEY EXHAUSTION
KEY EXHAUSTION ATTACK
KEY EXPANSION
KEY EXPANSION ALGORITHM
KEY EXTENSION
KEY EXTRACTION
KEY FILL
KEY FILL DEVICE
KEY FORMAT
KEY GEN
KEY GENERATING MODULE
KEY GENERATION
KEY GENERATION ALGORITHM
KEY GENERATION AND DISTRIBUTION SYSTEM
KEY GENERATION FUNCTION
KEY GENERATION UNIT
KEY GENERATOR
KEY GENERATOR CONTROLLER
KEY GENERATOR MODULE
KEY HANDLING
KEY HASH
KEY HASH(ING)
KEY HASH(ING)
KEY HASHING
KEY HOLDER
KEY ID
KEY IDENTIFICATION
KEY IDENTIFIER
KEY IDENTIFIER PARAMETER
KEY IN
KEY INDEX
KEY INDEX SIGNAL
KEY INDEXING
KEY INJECTION
KEY INJECTOR
KEY INJECTOR PORT
KEY INPUT
KEY INPUT ALGORITHM
KEY INSERTION
KEY INSERTION UNIT
KEY INSTALLATION
KEY INSTALLATOR
KEY INTEGER
KEY INTERCHANGE KEY
KEY INTERCHANGE SYSTEM
KEY LIBRARY
KEY LIFE
KEY LIFETIME
KEY LIST
KEY LOAD
KEY LOAD BUTTON
KEY LOADER
KEY LOADER MODULE
KEY LOADING
KEY LOADING DEVICE
KEY LOCK
KEY LOCK PROTECTION
KEY LOCK SYSTEM
KEY LOCKED EQUIPMENT
KEY LOSS
KEY MANAGEMENT ALGORITHM
KEY MANAGEMENT CENTER
KEY MANAGEMENT FACILITIES
KEY MANAGEMENT FACILITY
KEY MANAGEMENT INFORMATION
KEY MANAGEMENT MECHANISM
KEY MANAGEMENT MODULE
KEY MANAGEMENT OPERATION
KEY MANAGEMENT PROCEDURE
KEY MANAGEMENT PROGRAM
KEY MANAGEMENT PROTOCOL
KEY MANAGEMENT SCHEME
KEY MANAGEMENT STANDARD
KEY MANAGEMENT SYSTEM
KEY MANAGEMENT UNIT
KEY MANAGEMENT WORKSTATION
KEY MANAGER
KEY MATRIX
KEY MEDIUM
KEY MEMORY
KEY NEGOTIATION
KEY NOTARIZATION SYSTEM
KEY NUMBER
KEY OF DIRECTORY
KEY OF UNLIMITED LENGTH
KEY PAD
KEY PAIR
KEY PARAMETER
KEY PASSING
KEY PERIOD
KEY PHRASE
KEY PRODUCING UNIT
KEY PROGRAM
KEY PROM
KEY PROTECTION
KEY PUNCHED CARD
KEY PURCHASE ATTACK
KEY RECEIVER
KEY RECOVERY
KEY REDUNDANCE
KEY REENTRY
KEY REGISTER
KEY RELOADING PROCEDURE
KEY REPORT
KEY RESTORATION
KEY RETRIEVAL
KEY ROUTING
KEY SAFEGUARDING SCHEME
KEY SCHEDULE
KEY SCHEDULE ALGORITHM
KEY SEARCH
KEY SEARCH WORK
KEY SEARCHING TECHNIQUE
KEY SECRECY
KEY SECURITY
KEY SELECTION
KEY SELECTION SIGNAL
KEY SELECTION SWITCH
KEY SEPARATION
KEY SEQUENCE
KEY SEQUENCE CHARACTER
KEY SEQUENCE PERIOD
KEY SEQUENCE SYMBOL
KEY SERVER
KEY SERVICE
KEY SERVICE MESSAGE
KEY SET
KEY SETTING
KEY SETUP
KEY SHARING
KEY SHARING METHOD
KEY SHARING PROTOCOL
KEY SHARING TECHNIQUE
KEY SHEDULE ALGORITHM
KEY SIZE
KEY SOURCE
KEY SPACE
KEY SPACE ANALYSIS
KEY STARTING POINT
KEY STOR(AG)E
KEY STOR(AG)E
KEY STORAGE
KEY STORE
KEY STREAM
KEY STREAM ALGORITHM
KEY STREAM GENERATOR
KEY STREAM PERIOD
KEY STRING
KEY STROKE DYNAMICS
KEY STROKE PATTERN
KEY SUPPLIER
KEY SWITCH
KEY SYMBOL
KEY SYSTEM
KEY TABLE
KEY TAG
KEY TAPE
KEY TEXT
KEY THE PASSWORD
KEY TRANSFER
KEY TRANSFER CHAIN
KEY TRANSFER DEVICE
KEY TRANSFER PROTOCOL
KEY TRANSLATION CENTER
KEY TRANSPORT DEVICE
KEY TRANSPORT MODULE
KEY TRANSPORTS
KEY TRIAL
KEY UNCERTAINTY
KEY UPDATE
KEY UPDATE SCHEDULE
KEY UPDATING
KEY USAGE CONTROL
KEY USER
KEY VALUE
KEY VARIABLE
KEY VARUABLES GENERATOR
KEY VECTOR
KEY VERIFICATION
KEY VERIFIER
KEY WHEEL
KEY WORD
KEY WORD GENERATOR
KEY ZEROIZATION
KEY ZEROIZING
KEY,NSECRET SHARING SCHEME
KEY'S CARDINALITY
KEYAUTOKEY
KEYAUTOKEY CIPHER
KEYBIT
KEYBIT STREAM
KEYBOARD
KEYBOARD ENTRY DEVICE
KEYBOARD INPUT
KEYBOARD KEY
KEYBOARD LOCK
KEYBOARD LOCK(OUT)
KEYBOARD LOCK(OUT)
KEYBOARD LOCKOUT
KEYBOARD MODE
KEYBOARD REGIME
KEYBOARD USAGE ANALYSIS
KEYBOARDING
KEYBOARDLOCKING
KEYCARD
KEYCARRYING MODULE
KEYCHANGERING PROCEDURE
KEYCHANGING OPERATION
KEYCHECK VALUE
KEYCONTROLLED ALGORITHM
KEYCONTROLLED PERMUTATION
KEYDEPENDANT MESSAGE
KEYDEPENDED PERMUTATION
KEYDEPENDENT
KEYDEPENDENT ALGORITHM
KEYDEPENDENT COMPUTATION
KEYDEPENDENT SUBSTITUTE
KEYDEPENDENT SUBSTITUTION
KEYDEPENDENTSCRAMBLING
KEYED (CRYPTO)SYSTEM
KEYED (CRYPTO)SYSTEM
KEYED ACCESS
KEYED ALGORITHM
KEYED CIPHER
KEYED CRYPTOSYSTEM
KEYED ENCRYPTION
KEYED RANDOM PERMUTATION
KEYED SYSTEM
KEYED TRANSFORM
KEYED TRANSFORM(ATION)
KEYED TRANSFORM(ATION)
KEYED TRANSFORMATION
KEYENCRYPTING KEY
KEYENTERED VERIFIER
KEYFILL OPERATION
KEYHANDLING PROCEDURE
KEYHANDLING SYSTEM
KEYING
KEYING DYNAMICS
KEYING IN
KEYING INFORMATION
KEYING VARIABLE
KEYINSERTION SET
KEYKEY PAIR
KEYLENGTH CYBERPUNK
KEYLESS ACCESS CONTROL
KEYLESS CIPHER
KEYLESS CRYPTOALGORITHM
KEYLESS CRYPTOALGORITM
KEYLESS CRYPTOGRAPHY
KEYLESS TRANSFORM
KEYLESS TRANSFORM(ATION)
KEYLESS TRANSFORM(ATION)
KEYLESS TRANSFORMATION
KEYLOAD PROCEDURE
KEYLOCK SWITCH
KEYMANAGEMENT CRYPTOALGORITHM
KEYMANAGEMENT CRYPTOALGORITM
KEYMANAGEMENT SERVICE
KEYMINIMAL (CRYPTO)SYSTEM
KEYMINIMAL (CRYPTO)SYSTEM
KEYMINIMAL CIPHER
KEYMINIMAL CRYPTOSYSTEM
KEYMINIMAL SYSTEM
KEYNEGOTIATION METHOD
KEYNEGOTIATION PROCESS
KEYNEGOTIATION TECHNIQUE
KEYONLY CRYPTANALYSIS
KEYOPERATED
KEYOPERATED INTERLOCK
KEYOPERATED LOCK
KEYOPERATED SWITCH
KEYOUTOFN SCHEME
KEYPAD
KEYPAD ENTRY
KEYPHRASE
KEYPOWER BACKUP
KEYRELATED INFORMATION
KEYS
KEYS HIERARCHY
KEYSEARCH CRYPTANALYSIS
KEYSEARCHING METHOD
KEYSEARCHING TECHNIQUE
KEYSEED
KEYSELECTIVE NETWORK
KEYSHARING
KEYSPACE EXPLORATION
KEYSTORAGE
KEYSTORAGE BATTERY
KEYSTORAGE UNIT
KEYSTREAM SEQUENCE
KEYSTREAM STRING
KEYVARIABLE
KEYWORD
KILLER
KK
KMC
KMF
KN PROBLEM
KNAPPSACK
KNAPSACK ALGORITHM
KNAPSACK CIPHER
KNAPSACK CRYPTOALGORITHM
KNAPSACK CRYPTOALGORITM
KNAPSACK HASH FUNCTION
KNAPSACK PROBLEM
KNAPSACK PUBLIC KEY (CRYPTO)SYSTEM
KNAPSACK PUBLIC KEY (CRYPTO)SYSTEM
KNAPSACK PUBLIC KEY CRYPTOSYSTEM
KNAPSACK PUBLIC KEY SYSTEM
KNAPSACK SET
KNAPSACKBASED (CRYPTO)SYSTEM
KNAPSACKBASED (CRYPTO)SYSTEM
KNAPSACKBASED CRYPTOSYSTEM
KNAPSACKBASED SYSTEM
KNOWLEDGE BASE
KNOWLEDGE BASE MANAGEMENT SYSTEM
KNOWLEDGE BASE SYSTEM
KNOWLEDGE BASED ACCESS CONTROL
KNOWLEDGEABLE INTRUDER
KNOWN PLAINTEXT ATTACK SECURE
KNOWN PLAINTEXT CRYPTANALYSIS
KNS
KOLMOGOROV COMPLEXITY
T: 141