A mathematical procedure for performing encryption on data. Through the use of an algorithm, information is made into meaningless cipher text and requires the use of a key to transform the data back into its original form. Blowfish, AES RC4, RC5, and RC6 are examples of encryption algorithms.
- end-user computing
Using a computer at the application level. The term end-user is used to distinguish the person for whom the product was designed from the person who programs, services, or installs the product. Developers working on a personal computer in a professional capacity, for example, are not considered end-users.
SIP or H.323 terminal or gateway. An endpoint can call and be called. It generates and terminates the information stream.
The code or software used as the basis for building a game. The game engine literally powers the entire game. Some developers license a game engine to other developers who build a new game based on the technology of the game engine.
(n.) In a biometric security system, a person who has a reference template in the system��s database. Compare with impostor.
(n.) In a biometric security system, the initial process of collecting biometric data samples from a person and subsequently storing the data in a reference template representing a user��s identity to be used for later comparison.