upload
Alliance for Telecommunications Industry Solutions
Industria: Telecommunications
Number of terms: 29235
Number of blossaries: 0
Company Profile:
ATIS is the leading technical planning and standards development organization committed to the rapid development of global, market-driven standards for the information, entertainment and communications industry.
In cryptography, a bit or a string of bits appended to a message either for filtering purposes or to cause the message to contain an even multiple of the number of bits required by the cryptographic algorithm. 2. One or more bits appended to a message in order to cause the message to contain the required number of bits or bytes.
Industry:Telecommunications
In cryptography, a 64-bit binary sector that may be attached to the beginning of a message.
Industry:Telecommunications
In cryptographic applications, the two prime numbers, namely p and q, whose product pq is the modulus n.
Industry:Telecommunications
In conference calling, the state prior to the receipt of a "conference invocation request," or after a particular conference has ended.
Industry:Telecommunications
In conference calling, the served user's (or controller's) reference to the conference itself.
Industry:Telecommunications
In computing, a group of bits or characters that occupies one or more storage locations and is treated by computers as a unit. Synonym machine word.
Industry:Telecommunications
In conference calling, the state in which conference resources have been allocated to the specified conference and at least one party has a connection to the conference. That connection could be either active or held.
Industry:Telecommunications
In conference calling, the state in which the conference is active but without a controller. This state is possible when two or more conferees exist on an active conference and the controller successfully disconnects himself/herself.
Industry:Telecommunications
In COMSEC, a logic bomb to be activated at a predetermined time. 2. A resident computer program that triggers an unauthorized act at a predefined time.
Industry:Telecommunications
In computing, an address that designates the storage location of an item of data to be treated as an operand.
Industry:Telecommunications
© 2024 CSOFT International, Ltd.