Examples of using Cryptographic methods in English and their translations into Bulgarian
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Ecclesiastic
-
Computer
NET, WCF and additional cryptographic methods.
Cryptographic methods of information protection.
Information is additionally secured by cryptographic methods.
Cryptographic methods and applications of encryption.
Along with securing our information infrastructure, cryptographic methods are used in all sections.
Cryptographic methods are used to ensure the functioning and protection of the system.
Cryptocurrency- kind of digital currency, the creation andmonitoring of which is based on cryptographic methods.
This is also ensured by cryptographic methods to ensure the functioning and protection of the system.
Crypto currency is a kind of digital currency, the creation andcontrol of which is based on cryptographic methods.
Encryption- we apply cryptographic methods that convert certain information or data into a code to make it illegible to unauthorized users;
The crypto currency itself is a digital currency, the issue andcontrol of which are based on cryptographic methods.
Encryption- we apply cryptographic methods which convert certain information or data into a code to make it unreadable for unauthorized users;
Cryptocurrency is a type of digital currency, the issuing andaccounting of which are based on cryptographic methods.
Determining the procedure on implementation of cryptographic methods and means and arranging the process of putting into operation cryptographic networks;
Background A cryptocurrency is a type of digital currency whose issuance andcontrol are based on cryptographic methods.
Cryptocurrency[3] is a kind of digital currency, the creation, andcontrol over which is based on cryptographic methods.
The terms and conditions for the use,production and import of cryptographic methods and means for the protection of classified information are regulated by the Regulations on the Cryptographic Security of the Classified Information.
Cryptocurrency is a decentralized electronic currency,the operation of which is controlled by cryptographic methods.
(1) hardware and software- cryptographic methods and means and protection in transferring information, reliable and secure identification and authentication of the sender and the recipient of information and ensuring confidentiality, integrity of the transferred information.
Part of the NIST's effort will be a competition in which members of the public will devise andtest promising new cryptographic methods.
EConfidence SystemTM software product family for electronic signature management and protection of digital documents in corporate andInternet environment with cryptographic methods(digital signature and enciphering by cryptographic keys).
That is why it is important to mention that cloud-computing providers rely both on strict privacy policies and also on sophisticated security measures,such as proven cryptographic methods to authenticate users.
The hash is a code generated by running the actual transaction details through a cryptographic method.
Cryptocurrencies are legally digital financial assets designed to work as a means of exchange by using the cryptographic method of securing transactions in order to control the creation of additional currency units.
Development of mathematical methods for the design, evaluation and implementation of cryptographic primitives for data protection;
The threat of quantum computing being able to crack encryption methods currently used to protect critical data is being exploited by unscrupulous security suppliers, a cryptographic expert has warned.
Cryptographic key shall mean a method designed for concealing(coding) of exchanged information in a way, that it will remain intelligible only to the persons authorised therefore.
Method 3: Reregister the DLL files that are associated with Cryptographic Services.
Technically DKIM provides a method for validating a domain name identity that is associated with a message through cryptographic authentication.