AK

(redirected from Any key)
Also found in: Encyclopedia, Wikipedia.
Category filter:
AcronymDefinition
AKAlaska (US postal abbreviation)
AKAcknowledge
AKAnimal Kingdom (Disney World theme park)
AKAuckland, New Zealand
AKAlicia Keys (singer)
AKArbeitskreis (German: Working Party)
AKAcknowledgment
AKAss Kisser
AKActinic Keratosis
AKAsahi Kasei (manufacturer; various locations)
AKApplied Kinesiology
AKAbove Knee (amputation)
AKAny Key
AKAndrei Kirilenko (basketball player)
AKAtomic Kitten (band)
AKArmia Krajowa (Home Army, the Polish Resistance, WWII)
AKArbeiterkammer (Austrian trade union)
AKCommercial Cargo Ship (US DoD ship designation)
AKAga Khan (title of leader of a sect within the Ismaili branch of Islam)
AKAamir Khan (Indian actor)
AKAss Kicking
AKAdenylate Kinase
AKAnthony Kiedis (member of Red Hot Chili Peppers)
AKAstigmatic Keratotomy (eye surgery)
AKAlles Klar (German: All Right, Okay)
AKAvtomat Kalashnikova (Soviet assault rifle)
AKAzad Kashmir
AKAsh Ketchum (Pokémon)
AKApplication Kit
AKAll Knowing
AKAllgemeine Kredit (German: General Credit)
AKAvada Kedavra (Harry Potter)
AKAwesome Kids
AKAndrew Kim
AKAudio Karate (band)
AKAuthorization Key
AKAlternate Key (database theory)
AKAviation Storekeeper
AKArmeekorps (German Army corps)
AKAutomatKarbin (Swedish assault rifle)
AKAdaptation Kit
AKData Acknowledgment (ANSI)
AKAdvanced Kaizen (methodology)
AKAlte Kaker (Yiddish: Old Timer)
AKAnime Kingdom
AKAurora Knights (gaming clan)
AKKnight of the Order of Australia (Obsolete)
AKAutomatic Keying
AKAbu Khader Group (Amman, Jordan)
AKAtari Karts (Atari Jaguar video game)
AKAscension Kit (NetHack)
AKAnte Calendas (Latin: Before the Calends, epigraphy)
AKAnatomic Kinesiology
AK(USN Rating) Aviation Storekeeper
AKAutomatic/Assault Rifle/Carbine/Cannon (Swedish military)
Copyright 1988-2018 AcronymFinder.com, All rights reserved.
References in periodicals archive ?
And because the probability that x and y do not share any keys is [[bar.P].sub.xy], the average communication complexity is O((t +1) x ([[log.sub.2]L] + [absolute value of CT]) + [P.sub.xy] x([[log.sub.2]N] + 2([[log.sub.2]L] + [absolute value of CT]) + (n - 1).
The most challenging part of any key management system is ensuring that, once a key has been exposed or retired, or the data media on which it was stored has been lost, deleted, stolen, or replaced so it cannot be recovered by any malicious party.
"Top-flight key control systems feature advanced technologies that will instantly and automatically tell the system when any key has been removed.