We attack the mode of CFB, double CBC, double CFB et. al under the error oracle attack model.
在错误预言模型下对CFB、多重CBC、多重CFB等模式进行了攻击。
In this paper an attack model based on DFA is constructed and Z is employed to formally depict network attack.
文章建立了基于DFA的攻击模型,并在此基础上利用Z语言对之进行了有效的形式化描述。
Build up a differential fault attack model to cipher in satellite network and analyze rationality of the model and the attack process.
建立了卫星网络加密算法差分故障攻击模型,并对模型的合理性及攻击实现过程进行了阐述。
This paper presents a network attack model , which departs attack into several steps , and describes technology that hacker adopts during each attack step.
给出了一个网络攻击模型,该模型将攻击过程归纳为若干阶段,并详细地分析了黑客在各阶段所采用技术方法。
Investigation shows that the scheme is provable security under the blockwise adaptive attack model if the underlying block cipher is a pseudorandom permutation.
结果表明,在所用分组密码是伪随机置换的条件下,方案在分块适应性攻击模型下是可证明安全的。
Objective to explore the mechanism of human serum complement induced murine thymoma EL-4 cell lysis and to construct the complement non-lethal attack model on t lymphocytes.
目的探讨人血清补体杀伤小鼠胸腺瘤el - 4细胞的机制,建立补体杀伤t淋巴细胞的非致死模型。
The target detection model, booting attack model and using effect model of weapon are (presented) based on process analysis of the over-the-horizon (OTH) attack of the anti-ship missile.
通过对超视距空中机动目标的分析和合理的假设之后,提出了用空空导弹攻击超视距空中目标的基本模型。
The target detection model, booting attack model and using effect model of weapon are (presented) based on process analysis of the over-the-horizon (OTH) attack of the anti-ship missile.
介绍了空战中超视距多目标攻击过程,分析了多目标攻击过程的工作时序,及火控雷达对空空导弹截获概率的影响。
Based on traditional support system in wind tunnel testing, the combination support system measuring support interference on high angles of attack model in low speed wind tunnel was designed.
基于传统的风洞试验支撑设备,设计了用于低速风洞测量大攻角模型支架干扰的组合支撑设备。
To the specific features of wireless sensor network and attack models met with routing protocols, this paper presents an attack detection model of combined distribution based on grey theory (GADM).
针对无线传感器网络自身特殊性和路由协议面临的攻击类型,提出了一个基于灰理论的分布联合的攻击检测模型(GADM)。
One problem is that the classic Swiss banking model is also under regulatory attack.
我们的问题是经典的瑞士银行模式也在规章的攻击下。
The model also showed that once those T cells are released into the bloodstream, they can effectively attack HIV proteins, even when the virus mutates.
这个模型显示,一旦T细胞释放入血,它们就可以强烈攻击HIV蛋白,即使它们已经变异了。
The scalability benefit of the tag comes at the cost of sidestepping the Same Origin Policy security model, introducing potential attack vulnerabilities.
标记的可伸缩性优点的获得以避开同源策略安全性模型为代价,可能导致易于收到攻击。
The model can effectively build up a high efficient and reliable trust relationship between peers, prevent malicious attack and enhance security and efficiency of the P2P networks.
利用该模型可以在两个对等实体之间建立高效、可靠的信任关系,有效防止恶意攻击,提高P 2 P网络的效率和安全。
Fuzzy decision theory is introduced to solve this problem, and further the fuzzy decision model for lineup considering players' attack and defense ability is proposed.
将模糊决策理论引入到这一问题当中,提出了兼顾球员进攻和防守能力的出场阵容模糊决策模型。
Bayes classifier model is a powerful tool for classifying attack types in intrusion detection.
贝叶斯分类模型是入侵检测中用于攻击类型分类的有力工具。
In 2006, his colleague Matthew Bunn created a mathematical model predicting a 29 percent probability of a nuclear attack in the next 10 years.
2006年,他的同事马修·邦恩创建了一个数学模型,以此预测出未来10年核攻击概率为29%。
Three JSF versions are being developed: the F-35A conventional takeoff and vertical landing model, the F-35B short takeoff and vertical landing variant, and the F-35C carrier-based attack version.
目前3种类型的联合攻击战斗机正在开发:F -35 A条常规起飞垂直降落型战斗机、F - 35 B短距起飞和垂直降落改进型战斗机和f—35c舰载攻击机型战斗机。
An expert system of air attack target recognition model based on blackboard model is built after the target information is synthesized, it can simulate the recognition thought of the domain experts.
在对空袭目标信息进行综合利用的基础上,建立了基于黑板模型的多传感器空袭目标识别融合专家系统模型,模拟专家识别思维。
The mathematical model of reentry maneuvering trajectory is established. The fitting expression of aerodynamic coefficient function on velocity, attack of Angle and altitude is presented.
建立了再入机动弹道数学模型,给出了气动力系数为速度、迎角、高度的函数拟合式,进行了最佳再入机动弹道设计和仿真计算。
This paper introduces the attack form to IH system model, points out the necessary of adding authentication theory.
文章介绍了对现有信息隐藏系统模型的攻击形式,指出加入认证理论的必要性。
After researching theory of fuzzy math, this paper also designs an evaluation model of attack severity based on fuzzy math.
在研究模糊数学理论的基础上,设计了一个基于模糊数学的攻击危害度评判模型。
An attack effect evaluation model of computer network based on network entropy was proposed in this paper.
提出了一种基于网络信息熵的计算机网络攻击效果定量评估模型。
A kind of soft defense system model to distribute denial service attack is proposed.
提出了一种分布式拒绝服务攻击的软防御系统模型。
This model makes it hard to predict and prevent attack behaviors, and enhances the possibility of success attack.
这种模型使得攻击非常难以预测和防范,并大大提高了攻击成功的可能性。
This paper introduces the attack tree model, presents a network attack system based on attack tree, which can make attack scenario base on the target's practice and do it.
文章介绍了攻击树模型,提出了一种基于攻击树的网络攻击系统,它可以根据目标的实际情况制定出攻击策略,实施攻击。
Though the Empire uses a variety of fast-attack repulsorlift ground craft, its preferred speeder bike model is the Aratech 74-Z.
虽然帝国使用各种快攻型反重力地面交通工具,但其首选的飞行摩托型号是阿拉科技的74-Z。
A protocol attack description model for attack testing is proposed in this paper, along with the related protocol attack testing algorithms.
本文提出了一个面向测试的协议攻击描述模型,以及相应的协议攻击测试算法。
Based on the existing beyond visual range air fight, established the attack tactic assistance model.
基于现有超视距空战攻击战术,建立了攻击战术辅助决策模型。
Based on the existing beyond visual range air fight, established the attack tactic assistance model.
基于现有超视距空战攻击战术,建立了攻击战术辅助决策模型。
应用推荐