• September 21, 2005 21 Sep'05

    security token (authentication token)

    A security token (sometimes called an authentication token) is a small hardware device that the owner carries to authorize access to a network service.  Continue Reading

  • September 21, 2005 21 Sep'05

    elliptical curve cryptography (ECC)

    Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys.  Continue Reading

  • September 21, 2005 21 Sep'05

    pseudonymous profile

    A pseudonymous profile is a collection of information about a particular computer user that identifies the user either by their computer's IP address or by a randomly-generated nickname.  Continue Reading

  • September 21, 2005 21 Sep'05

    trusted computing base (TCB)

    The trusted computing base (TCB) is everything in a computing system that provides a secure environment.  Continue Reading

  • September 21, 2005 21 Sep'05

    Klez

    Klez (pronounced KLEHZ) is an Internet worm that launches automatically when a user previews or reads an e-mail message containing Klez on a system that has not been patched for a vulnerability in Microsoft Internet Explorer mail clients.  Continue Reading

  • September 21, 2005 21 Sep'05

    deniable encryption

    Deniable encryption is a type of cryptography that allows an encrypted text to be decrypted in two or more ways, depending on which decryption key is used.  Continue Reading

  • September 21, 2005 21 Sep'05

    Nimda

    First appearing on September 18, 2001, Nimda is a computer virus that caused traffic slowdowns as it rippled across the Internet, spreading through four different methods, infecting computers containing Microsoft's Web server, Internet Information ...  Continue Reading

  • September 21, 2005 21 Sep'05

    CRAM (challenge-response authentication mechanism)

    CRAM (challenge-response authentication mechanism) is the two-level scheme for authenticating network users that is used as part of the Web's Hypertext Transfer Protocol (HTTP).  Continue Reading

  • September 21, 2005 21 Sep'05

    network forensics

    Network forensics is the capture, recording, and analysis of network events in order to discover the source of security attacks or other problem incidents.  Continue Reading

  • September 21, 2005 21 Sep'05

    Palladium

    Palladium is a plan from Intel, AMD, and Microsoft to build security into personal computers and servers at the microprocessor level.  Continue Reading

  • September 21, 2005 21 Sep'05

    Information Awareness Office (IAO)

    Created in response to the terrorist attack of September 11, 2001, the Information Awareness Office (IAO) is a branch of the United States Defense Advanced Research Agency (DARPA) that aims to gather massive amounts of intelligence through ...  Continue Reading

  • September 21, 2005 21 Sep'05

    cryptographic checksum

    A cryptographic checksum is a mathematical value (called a checksum) that is assigned to a file and used to "test" the file at a later date to verify that the data contained in the file has not been maliciously changed.  Continue Reading

  • September 21, 2005 21 Sep'05

    information signature

    To fight terrorism, the Information Awareness Office (IAO) of the U.S. Defense Advanced Research Projects Agency (DARPA) is planning to develop a system that uses a super database of recorded online transactions and analytical programming that will ...  Continue Reading

  • September 21, 2005 21 Sep'05

    lawful interception (LI)

    Lawful interception (LI) is the legally sanctioned official access to private communications, such as telephone calls or e-mail messages.  Continue Reading

  • September 21, 2005 21 Sep'05

    whack-a-mole

    Whack-a-mole is the pursuit of a particular person known to have sent spam.  Continue Reading

  • September 21, 2005 21 Sep'05

    MICR (magnetic ink character recognition)

    MICR (magnetic ink character recognition) is a technology used to verify the legitimacy or originality of paper documents, especially checks.  Continue Reading

  • September 21, 2005 21 Sep'05

    P3P (Platform for Privacy Preferences)

    P3P (Platform for Privacy Preferences) is a protocol that specifies a way to determine if a Web site's security policies meet a user's privacy requirements.  Continue Reading

  • September 21, 2005 21 Sep'05

    counterfeit detector pen

    A counterfeit detector pen is a felt tip pen containing an iodine solution that can be used to help identify computer-generated counterfeit bills.  Continue Reading

  • September 21, 2005 21 Sep'05

    voiceprint

    A voiceprint is a set of measurable characteristics of a human voice that uniquely identifies an individual.  Continue Reading

  • September 21, 2005 21 Sep'05

    inverse mapping

    Inverse mapping is a procedure used to create associations between real or virtual objects that involves some type of reversal of another process or concept.  Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close