Search results

Jump to navigation Jump to search
  • ...r authentication, with optional features, which provide certain aspects of communications security#sequential integrity|sequential integrity.<ref name=RFC4302>{{citation ...ty Payload (ESP) protocol offers the same set of services, and also offers communications security#content confidentiality|content confidentiality.<ref name=RFC4303>{{citatio
    5 KB (761 words) - 16:22, 30 March 2024
  • {{r|Communications security}}
    399 bytes (46 words) - 19:04, 28 February 2010
  • ...em (SINCGARS)''' is the name of a family of military radios and associated communications security equipment, principally used for ground-based, short-range communications fo
    3 KB (476 words) - 16:23, 30 March 2024
  • {{r|Communications Security Establishment}}
    1 KB (162 words) - 04:53, 31 May 2012
  • In computer and communications security dependent on [[public key infrastructure]] (PKI), a '''certification author
    646 bytes (92 words) - 05:48, 8 April 2024
  • 7 KB (976 words) - 13:59, 30 May 2024
  • ===Communications Security Establishment (CSE)=== {{main|Communications Security Establishment}}
    8 KB (1,088 words) - 22:10, 22 June 2024
  • {{r|Communications Security Establishment}}
    3 KB (425 words) - 08:32, 22 June 2024
  • {{r|Communications Security Establishment}} {{r|Government Communications Security Bureau}}
    3 KB (403 words) - 08:32, 22 June 2024
  • '''HAVE QUICK II''' is the name of a family of military radios and associated communications security equipment, principally used for aircraft, shipboard, satellite, and other a
    4 KB (694 words) - 16:22, 30 March 2024
  • ...bution system]], be [[encryption|encrypted]] into "BLACK" information by a communications security system, or both.
    4 KB (639 words) - 05:49, 8 April 2024
  • ...o-ground and air-to-air is ITU Frequency Bands|ultra-high frequency (UHF). Communications security devices now may be separate; reduction in the number of separate radio and
    2 KB (278 words) - 18:47, 3 April 2024
  • Computer and communications security mechanisms that depend on [[public key cryptography]] require confidence i
    2 KB (365 words) - 05:49, 8 April 2024
  • ...ment Communications Headquarters, with functions similar to the Canadian [[Communications Security Establishment]] or the U.S. [[National Security Agency]].
    5 KB (854 words) - 08:32, 22 June 2024
  • More a part of communications security than true intelligence collection, SIGINT units still may have the responsi :# '''Communications security (COMSEC):''' "Friendly or enemy COMSEC breaches. Linkage of codes or codewo
    12 KB (1,821 words) - 06:04, 8 April 2024
  • ...d probably make the Japanese, who were generally overconfident about their communications security,<ref name=Kahn1996 /> believe their cryptosystem was secure. No operations
    6 KB (896 words) - 20:45, 2 April 2024
  • ...nications security#content confidentiality|content confidentiality]] and [[communications security#atomic integrity|atomic integrity]] to messages, but does not provide seque ...ecurity#sequential integrity|sequential integrity]], and may help ensure [[communications security#nonrepudiation |nonrepudiation]].
    12 KB (1,744 words) - 05:48, 8 April 2024
  • (temporary note) I really could use help on [[communications security]], which doesn't have metadata because I'm not happy with the title, which
    5 KB (780 words) - 19:42, 15 February 2009
  • ...lection]] although it has access to signals intelligence produced by the [[Communications Security Establishment]] and through close relationships with allies. A 2007 stateme
    14 KB (2,044 words) - 21:46, 22 June 2024
  • Communications security is provided by an external TSEC/KG-40 cryptography|encryptor. ==Electronic protection and communications security==
    14 KB (2,111 words) - 16:23, 30 March 2024
View ( | ) (20 | 50 | 100 | 250 | 500)