Hai cercato la traduzione di uc da Persiano a Inglese

Contributi umani

Da traduttori professionisti, imprese, pagine web e archivi di traduzione disponibili gratuitamente al pubblico.

Aggiungi una traduzione

Persiano

Inglese

Informazioni

Persiano

uc

Inglese

uc

Ultimo aggiornamento 2014-10-18
Frequenza di utilizzo: 1
Qualità:

Riferimento: Wikipedia

Persiano

توزیع‌های بلند مدت آن همچنین از پروؤه‌های سان مایکروسیستمز و uc berkeley daedelus و carnegie mellon monarch نیز می‌آمدند.

Inglese

long-running contributions have also come from sun microsystems, the uc berkeley daedelus, and carnegie mellon monarch projects it used.

Ultimo aggiornamento 2016-03-03
Frequenza di utilizzo: 1
Qualità:

Riferimento: Wikipedia

Persiano

او درخواست پذیرش از دانشگاه سانتاکلارا (santa clara) کرد و از مدرسه uc در شهر سن دیگو در رشته پزشکی فارغ‌التحصیل شد.

Inglese

the following year, he entered the university of california, san diego, school of medicine, where he earned his m.d.

Ultimo aggiornamento 2016-03-03
Frequenza di utilizzo: 1
Qualità:

Riferimento: Wikipedia

Persiano

":* typex –:* jn-25 –:* naval cypher 3 –مقاله اصلی _ رمزنگاری کلید عمومی:* ace-kem – nessie::* ace encrypt –:* chor-rivest –:* پروتکل تبادل کلید دیفی-هلمن – cryptrec:* رمزنگاری منحنی بیضوی –:* psec-kem – nessie : ntt (japan); cryptrec::* ecies –::* ecies-kem –::* ecdh – cryptrec:* epoc –:* mceliece –:* niederreiter cryptosystem –:* آراس‌ای –::* rsa-kem – nessie::* rsa-oaep – cryptrec:* rabin cryptosystem –::* rabin-saep –::* hime(r) –:* threshold cryptosystem –:* xtr –مقاله اصلی _کلید رمزمقاله اصلی _ key authentication:* x.509 –:* مرجع صدور گواهی دیجیتال –:* certificate revocation list –* id-based cryptography –* certificate-based encryption –* secure key issuing cryptography –* certificateless cryptography –حمل و نقل / تبادل* حمله مرد میانی –* needham–schroeder –* offline private key –* otway–rees –* trusted paper key –* wide mouth frog –مقاله اصلی _weak key* حمله لغت‌نامه‌ای –* related key attack –* key derivation function –* key strengthening –* password-authenticated key agreement –* passphrase –* salt –مقاله اصلی _تابع درهم‌سازی رمزنگارانه* کد اصالت‌سنجی پیام برپایه درهم‌سازی –:* emac – nessie selection mac:* کد اصالت‌سنجی پیام برپایه درهم‌ساز – nessie selection mac; iso/iec 9797-1, fips pub 113 and ietf rfc:* ttmac – (two-track-mac) nessie selection mac; k.u.leuven (belgium) & debis ag (germany):* umac – nessie selection mac; intel, unevada reno, ibm, technion, & uc davis* ام‌دی۵ – یکی از سری الگوریتم های هضم پیام توسط پروفسور ron rivest of mit; 128 bit digest* sha-1 – توسعه یافته توسط nsa;:* sha-256 – nessie تابع هش انتخابی, fips 180-2, 256 bit digest; cryptrec:* اس‌اچ‌ای-۲ – nessie تابع هش انتخابی, fips 180-2, 384 bit digest; cryptrec:* sha-512 – nessie تابع هش انتخابی, fips 180-2, 512 bit digest; cryptrec* ripemd-160 – در اروپا ripe توسعه پروژه , 160-bit digest;cryptrec* tiger – توسط ross anderson "et al.

Inglese

":* typex – wwii uk cypher machine*hybrid code/cypher combinations:* jn-25 – wwii japanese navy superencyphered code; many variants:* naval cypher 3 – superencrypted code used by the royal navy in the 30s and into wwiiasymmetric key algorithms:* ace-kem – nessie selection asymmetric encryption scheme; ibm zurich research)::* ace encrypt –:* chor-rivest –:* diffie-hellman – key agreement; cryptrec recommendation:* el gamal – discrete logarithm:* elliptic curve cryptography – (discrete logarithm variant:* psec-kem – nessie selection asymmetric encryption scheme; ntt (japan); cryptrec recommendation only in dem construction w/sec1 parameters::* ecies – "elliptic curve integrated encryption system", certicom corporation::* ecies-kem –::* ecdh – "elliptic curve diffie-hellman key agreement", cryptrec recommendation:* epoc –:* merkle–hellman knapsack cryptosystem – knapsack scheme:* mceliece –:* niederreiter cryptosystem –:* ntruencrypt –:* rsa – factoring::* rsa-kem – nessie selection asymmetric encryption scheme; iso/iec 18033-2 draft::* rsa-oaep – cryptrec recommendation:* rabin cryptosystem – factoring::* rabin-saep –::* hime(r) –:* threshold cryptosystem –:* xtr –==keys==authentication* public key infrastructure –:* x.509 –* public key certificate –:* certificate authority –:* certificate revocation list –* id-based cryptography –* certificate-based encryption –* secure key issuing cryptography –* certificateless cryptography –* merkle tree –transport/exchange* diffie–hellman –* man-in-the-middle attack –* needham–schroeder –* offline private key –* otway–rees –* trusted paper key –* wide mouth frog –weak keys* brute force attack –* dictionary attack –* related key attack –* key derivation function –* key strengthening –* password –* password-authenticated key agreement –* passphrase –* salt –==cryptographic hash functions==* message authentication code –* keyed-hash message authentication code –:* emac – nessie selection mac:* hmac – nessie selection mac; iso/iec 9797-1, fips pub 113 and ietf rfc:* ttmac – (two-track-mac) nessie selection mac; k.u.leuven (belgium) & debis ag (germany):* umac – nessie selection mac; intel, unevada reno, ibm, technion, & uc davis* md5 – one of a series of message digest algorithms by prof ron rivest of mit; 128 bit digest* sha-1 – developed at nsa 160-bit digest, an fips standard; the first released version was defective and replaced by this; nist/nsa have released several variants with longer 'digest' lengths; cryptrec recommendation (limited):* sha-256 – nessie selection hash function, fips 180-2, 256 bit digest; cryptrec recommendation:* sha-384 – nessie selection hash function, fips 180-2, 384 bit digest; cryptrec recommendation:* sha-512 – nessie selection hash function, fips 180-2, 512 bit digest; cryptrec recommendation* sha-3 – originally known as keccak; was the winner of the nist hash function competition using sponge function.

Ultimo aggiornamento 2016-03-03
Frequenza di utilizzo: 1
Qualità:

Riferimento: Wikipedia
Attenzione: contiene formattazione HTML nascosta

Ottieni una traduzione migliore grazie a
8,927,575,363 contributi umani

Ci sono utenti che chiedono aiuto:



I cookie ci aiutano a fornire i nostri servizi. Utilizzando tali servizi, accetti l'utilizzo dei cookie da parte nostra. Maggiori informazioni. OK