authenticates

authenticates
au'then·ti·cate || -keɪt v. confirm, verify; show to be authentic

English contemporary dictionary. 2014.

Игры ⚽ Поможем решить контрольную работу

Look at other dictionaries:

  • SiteKey — is a web based security system that provides one type of mutual authentication between end users and websites. Its primary purpose is to deter phishing.SiteKey has been deployed by several large financial institutions since 2006, including Bank… …   Wikipedia

  • CrushFTP Server — Developer(s) Ben Spink Stable release 5.7.0 / May 24, 2011 Operating system Mac OS X Linux Unix Windows Type Secure W …   Wikipedia

  • Secure cryptoprocessor — A secure cryptoprocessor is a dedicated computer on a chip or microprocessor for carrying out cryptographic operations, embedded in a packaging with multiple physical security measures, which give it a degree of tamper resistance. The purpose of… …   Wikipedia

  • Hamachi — Infobox Software name = Hamachi caption = Screenshot of Hamachi developer = LogMeIn Inc. latest release version = 1.0.3.0 latest release date = Aug 18, 2008 operating system = Microsoft Windows, Linux, Mac OS X genre = P2P, VPN | license =… …   Wikipedia

  • Security and safety features new to Windows Vista — There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.Beginning in early 2002 with Microsoft s announcement of their Trustworthy Computing… …   Wikipedia

  • Electronic authentication — (E authentication) is the process of establishing confidence in user identities electronically presented to an information system. E authentication presents a technical challenge when this process involves the remote authentication of individual… …   Wikipedia

  • Key Wrap — constructions are a class of symmetric encryption algorithms designed to encapsulate (encrypt) cryptographic key material. The Key Wrap algorithms are intended for applications such as (a) protecting keys while in untrusted storage, or (b)… …   Wikipedia

  • Comparison of open source configuration management software — This is a comparison of free (libre) and open source configuration management software. Contents 1 Basic properties 2 Platform support 3 Short descriptions 4 Refere …   Wikipedia

  • Windows Vista networking technologies — This article is part of a series on Windows Vista New features Overview Technical and core system Security and safety Networking technologies I/O technologies Management and administration Removed features …   Wikipedia

  • CAVE-based Authentication — Articleissues context = September 2008 deadend = September 2008 intromissing = September 2008 jargon = September 2008 unreferenced = September 2008 wikify = September 2008 CAVE based Authentication a.k.a. HLR Authentication, 2G Authentication,… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”