upload
Alliance for Telecommunications Industry Solutions
産業: Telecommunications
Number of terms: 29235
Number of blossaries: 0
Company Profile:
ATIS is the leading technical planning and standards development organization committed to the rapid development of global, market-driven standards for the information, entertainment and communications industry.
In cryptosystems, data appended to a message, that allow the intended recipient to verify the integrity of the content of the message.
Industry:Telecommunications
In cryptosystems, a bit string that is a function of data to which it is attached for the purpose of manipulation detection. Note 1: The resulting message (data plus MDC) may then be encrypted to achieve secrecy or data authentication. Note 2: The function used to generate the MDC must be public.
Industry:Telecommunications
In cryptology, the protection of keys against compromise.
Industry:Telecommunications
In cryptology, storage of cryptographic keys in such a manner as (a) to protect them against unauthorized use, disclosure, or tampering, and (b) to erase them and re-initialize equipment upon tampering.
Industry:Telecommunications
In cryptology, certificates in a certificate chain other than the first or end certificate.
Industry:Telecommunications
In cryptology, a condition of readiness associated with a key having no effective date. Note: A key is immediately activated (a) by the receiver when the RSM is sent in response to the KSM that carried that key, and (b) by the sender when the RSM is received in response to the KSM that carried the key.
Industry:Telecommunications
In cryptology and within particular elliptic curve parameters, a statistically unique and unpredictable integer in the interval , where n is the prime order of the base point G.
Industry:Telecommunications
In cryptography, the result of applying a cryptologic hash function to a message.
Industry:Telecommunications
In cryptography, the process of offset decrypting a key or set of keys using a transportation key shared with one center and then offset encrypting the same key or keys under a transportation key shared with a different center.
Industry:Telecommunications
In cryptography, the originator's confirmation of the integrity of the entire transaction, i.e., of both the transaction request and its transaction response.
Industry:Telecommunications