intercepted message


intercepted message
перехваченное сообщение

English-Russian cryptological dictionary . 2014.

Смотреть что такое "intercepted message" в других словарях:

  • Message in a Bottle (Star Trek: Voyager) — Message in a Bottle Star Trek: Voyager episode The battle to retake USS Prometheus Episode no …   Wikipedia

  • Intercepted — Intercept In ter*cept , v. t. [imp. & p. p. {Intercepted}; p. pr. & vb. n. {Intercepting}.] [L. interceptus, p. p. of intercipere to intercept; inter between + capere to take, seize: cf. F. intercepter. See {Capable}.] [1913 Webster] 1. To take… …   The Collaborative International Dictionary of English

  • Woodrow Wilson: War Message — ▪ Primary Source       Germany s resumption of unrestricted submarine warfare on February 1, 1917, led the United States to break diplomatic relations on February 3. President Wilson continued to hope for peace, but events seemed to make American …   Universalium

  • Pearl Harbor advance-knowledge debate — The Pearl Harbor advance knowledge debate is a dispute over what, if any, advance knowledge American officials had of Japan s December 7, 1941 attack on Pearl Harbor.Ever since the Japanese attack there has been debate as to how and why the… …   Wikipedia

  • Signals intelligence in modern history — This article is a subset article of the article Signals intelligence, which addresses the unifying conceptual and technical factors and common technologies in this intelligence discipline. This article deals with signals intelligence in the… …   Wikipedia

  • Battle of Leyte Gulf — Infobox Military Conflict conflict=Battle of Leyte Gulf caption=The light aircraft carrier Princeton afire, east of Luzon, 24 October 1944. partof=the Pacific War, World War II date=23 October 1944 ndash; 26 October 1944 place=Leyte Gulf, The… …   Wikipedia

  • Man-in-the-middle attack — Not to be confused with Meet in the middle attack. In cryptography, the man in the middle attack (often abbreviated MITM), bucket brigade attack, or sometimes Janus attack, is a form of active eavesdropping in which the attacker makes independent …   Wikipedia

  • Three-pass protocol — In cryptography, the three pass protocol for sending messages is a framework which allows one party to securely send a message to a second party without the need to exchange or distribute encryption keys. This message protocol should not be… …   Wikipedia

  • Colossus computer — Colossus MkI/MkII A Colossus Mark 2 computer. The operator on the left is Dorothy Duboisson. The slanted control panel on the left was used to set the pin patterns on the Lorenz. The bedstead paper tape transport is on the right. Developer Tommy… …   Wikipedia

  • USS Yorktown (CV-5) — The third USS|Yorktown|CV 5, lead ship of her class of aircraft carriers of World War II, was sunk at the Battle of Midway.Early career Yorktown was laid down on 21 May 1934 at Newport News, Virginia, by the Newport News Shipbuilding and Drydock… …   Wikipedia

  • Harry Thompson (spy) — Harry Thomas Thompson (born 1908) was a former United States Navy yeoman who spied for Japan against the United States in 1934 ndash;35. He was the first American to be convicted of espionage since World War I.Thompson had been a Maryland farm… …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»

We are using cookies for the best presentation of our site. Continuing to use this site, you agree with this.