authenticating, agent

authenticating, agent
agent m chargé de reconnaître l'authenticité de qqch

English-French legislative terms. 2015.

Игры ⚽ Поможем написать реферат

Regardez d'autres dictionnaires:

  • Cisco NAC Appliance — Cisco NAC Appliance, formerly Cisco Clean Access (CCA), is a network admission control (NAC) system developed by Cisco Systems designed to produce a secure and clean network environment the NAC appliance is however still referred to as Cisco… …   Wikipedia

  • Dynamic Host Configuration Protocol — DHCP redirects here. For other uses, see DHCP (disambiguation). A DHCP Server settings tab The Dynamic Host Configuration Protocol (DHCP) is a network configuration protocol for hosts on Internet Protocol (IP) networks. Computers that are… …   Wikipedia

  • Simple Mail Transfer Protocol — This article is about the Internet standard for electronic mail transmission. For the email delivery company, see SMTP (company). Internet protocol suite Application layer …   Wikipedia

  • Computational trust — In Information security, computational trust is the generation of trusted authorities or user trust through cryptography. In centralised systems, security is typically based on the authenticated identity of external parties. Rigid authentication… …   Wikipedia

  • Air waybill — (AWB) or air consignment note refers to a receipt issued by an international courier company for goods and an evidence of the contract of carriage, but it is not a document of title to the goods. Hence, the AWB is non negotiable.The AWB has a… …   Wikipedia

  • OpenID — The OpenID logo OpenID is an open standard that describes how users can be authenticated in a decentralized manner, eliminating the need for services to provide their own ad hoc systems and allowing users to consolidate their digital… …   Wikipedia

  • Stolen and missing moon rocks — Of the 270 Apollo 11 Moon Rocks and Apollo 17 Goodwill Moon Rocks that were given to the nations of the world by the Nixon Administration approximately 180 are currently unaccounted for. Many of the moon rocks that are accounted for have been… …   Wikipedia

  • Duress code — A duress code is a covert signal used by an individual that is under duress to indicate their state. The term duress code typically refers to a signal embedded in normal communication, such as a word or phrase used during conversation to alert… …   Wikipedia

  • Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in …   Wikipedia

  • Europe, history of — Introduction       history of European peoples and cultures from prehistoric times to the present. Europe is a more ambiguous term than most geographic expressions. Its etymology is doubtful, as is the physical extent of the area it designates.… …   Universalium

  • issuer — Corporation, governmental bodies, and other entities that issue and distribute securities. With respect to obligations on or defenses to investment securities issuer includes a person who: (a) places or authorizes the placing of his name on a… …   Black's law dictionary

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”