PONS.com'u nasıl kullanmak istersin?

PONS Pur veya PONS Translate Pro'ya abone oldun mu?

Reklam ile PONS

PONS.com'u şimdiye kadar olduğu gibi reklam izlemesi ve reklam ile ziyaret et

İzlemeye ilişkin bilgileri veri koruma bilgilerinde ve gizlilik ayarlarında bulabilirsin.

PONS Pur

Üçüncü şahıslar tarafından reklam olmadan

Reklam izleme olmadan

Şimdi abone ol

PONS.com için ücretsiz bir kullanıcı hesabın olduğu takdirde, PONS Pur'a abone olabilirsin.

We process your data to deliver content or advertisements and measure the delivery of such content or advertisements to extract insights about our website. We share this information with our partners on the basis of consent and legitimate interest. You may exercise your right to consent or object to a legitimate interest, based on a specific purpose below or at a partner level in the link under each purpose. These choices will be signaled to our vendors participating in the Transparency and Consent Framework.

Cookies, device or similar online identifiers (e.g. login-based identifiers, randomly assigned identifiers, network based identifiers) together with other information (e.g. browser type and information, language, screen size, supported technologies etc.) can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here.

Advertising and content can be personalised based on your profile. Your activity on this service can be used to build or improve a profile about you for personalised advertising and content. Advertising and content performance can be measured. Reports can be generated based on your activity and those of others. Your activity on this service can help develop and improve products and services.

neer
encryption algorithm
Ver·schlüs·se·lungs·al·go·rith·mus <-, -algorithmen> ISIM eril
Verschlüsselungsalgorithmus
PONS OpenDict

Bir kelime, bir kelime grubu veya bir çeviri mi eklemek istiyorsunuz?

Lütfen PONS OpenDict için yeni bir giriş gönderin. Gönderilen öneriler PONS editörleri tarafından incelenir ve sonuçlara uygun şekilde dahil edilir.

Madde ekle
No example sentences available

No example sentences available

Try a different entry

Tek dilli örnekler (PONS yazı işleri tarafından onaylanmamıştır)
Gleichwohl werden immer wieder Verschlüsselungsalgorithmen geheim gehalten.
de.wikipedia.org
Die Geschwindigkeit hängt von der vom Angreifer verwendeten Soft- und Hardware sowie von dem verwendeten Verschlüsselungsalgorithmus ab.
de.wikipedia.org
Die anderen, etablierten Verschlüsselungsalgorithmen werden weiterhin unterstützt.
de.wikipedia.org
Beim Verbindungsaufbau legt der Server einen Verschlüsselungsalgorithmus fest.
de.wikipedia.org
Wegen seiner Länge und der mehrfach vorkommenden gleichen Buchstaben (e,r,o,n,l) eignet es sich besonders zur Veranschaulichung einfacher Verschlüsselungsalgorithmen.
de.wikipedia.org
İnternetten örnekler (PONS yazı işleri tarafından onaylanmamıştır)
[...]
Forscher des Horst Görtz Instituts für IT-Sicherheit (HGI) an der Ruhr-Universität Bochum haben die Verschlüsselungsalgorithmen des European Telecommunications Standards Institute (ETSI) geknackt und erhebliche Schwachstellen aufgedeckt.
[...]
aktuell.ruhr-uni-bochum.de
[...]
Researchers at the Horst Görtz Institute for IT-Security (HGI) at the Ruhr University Bochum (RUB) have cracked the encryption algorithms of the European Telecommunications Standards Institute (ETSI), which is used globally for satellite telephones, and revealed significant weaknesses.
[...]
[...]
Verschlüsselungsalgorithmen werden implementiert, um die Privatsphäre des Users zu schützen.
[...]
aktuell.ruhr-uni-bochum.de
[...]
Encryption algorithms are implemented to protect the privacy of the user.
[...]
[...]
Die kontinuierliche Anonymisierung und ein regelmäßig wechselnder Verschlüsselungsalgorithmus machen einen Rückschluss auf einzelne Kundeninformationen unmöglich.
[...]
www.telefonica.de
[...]
Continuous anonymisation and encryption algorithms that change regularly make it impossible to draw inferences from individual customer information.
[...]
[...]
Sicherheitsexperten analysieren potentiell vorhandene proprietäre Verschlüsselungsalgorithmen und deren Anwendung und unterstützen bei der Auswahl von geeigneten kryptographischen Algorithmen und der sicheren Anwendung derselben.
[...]
www.aisec.fraunhofer.de
[...]
Security experts analyse potentially available proprietary encryption algorithms and their applications, and provide support in the selection and secure use of suitable cryptographic algorithms.
[...]
[...]
Password-Reviver ermöglicht die Nutzung folgender symmetrischer Verschlüsselungsalgorithmen:
[...]
www.reviversoft.com
[...]
Password Reviver offers the following symmetric encryption algorithms:
[...]

Diğer dillerde ara: "Verschlüsselungsalgorithmus"

"Verschlüsselungsalgorithmus" tek dilli Almanca sözlüklerinde