From professional translators, enterprises, web pages and freely available translation repositories.
grid security requirements
الزامات امنیتی شبکه
Last Update: 2021-07-31
Usage Frequency: 1
Quality:
Reference:
an initialization vector has different security requirements than a key, so the iv usually does not need to be secret.
یک بردار مقداردهی اولیه (آیوی، iv) نیازمندیهای امنیتی متفاوتی نسبت به کلید دارد، بنابراین آیوی معمولا نیازی ندارد که مخفی باشد.
Last Update: 2016-03-03
Usage Frequency: 1
Quality:
Reference:
==see also==* interconnection* roaming* nni* peering* internetwork packet exchange*gprs roaming exchange (grx)== references ==* gsma ir.34 - inter-service provider ip backbone guidelines* gsma aa.80 - non-binding template agreement for ip packet exchange (ipx) services* gsma ir.77 - inter-operator ip backbone security requirements* gsma ir.40 - guidelines for ipv4 addressing and as numbering for grx/ipx network infrastructure and user terminals* aicent ipx white paper== external links ==* ipi and ipx related documents - ipi and ipx related documentation including white papers, brochures and technical and commercial specifications
* gsma ir.34 - inter-service provider ip backbone guidelines* gsma aa.80 - non-binding template agreement for ip packet exchange (ipx) services* gsma ir.77 - inter-operator ip backbone security requirements* gsma ir.40 - guidelines for ipv4 addressing and as numbering for grx/ipx network infrastructure and user terminals* ipi homepage – gsma ipi interworking initiative homepage* ipi and ipx related documents - ipi and ipx related documentation including white papers، brochures and technical and commercial specifications
Last Update: 2016-03-03
Usage Frequency: 1
Quality:
Reference: