• To make an attack, the attacker needs to buy several SSL certificates from CAs who sign certificates with the MD5 algorithm.

    实现攻击攻击需要使用MD 5算法签署证书CA购买若干ssl证书。

    youdao

  • This attack doesn't mean that all Internet or SSL security has been compromised, but it does mean vendors should move away from using the MD5 signing algorithm.

    这种攻击并不意味着整个互联网或者SSL安全已经突破的确意味着厂商应该不再用MD 5作为签名算法

    youdao

  • So it is necessary to adopt one encrypt intensity high algorithm encrypt some important data, in order to prevent that legal users operate over authority, illegal user attack viciously.

    因此必要采用一种加密强度比较的加密算法来加密一些重要数据防止合法用户越权操作非法用户的恶意攻击

    youdao

  • Experimental results show that, this algorithm is able to resist local cropping attack.

    实验表明算法能够很好抵抗局部剪切攻击

    youdao

  • The image watermarking algorithm design and the attack way are opposite to and promotional of each other.

    图像水印算法设计攻击技术互相促进对立面

    youdao

  • It has profited from the domestic and foreign research results, in this foundation, it discussed automatic production of attack path, as well as attack graph algorithm comparison.

    同时,借鉴国内外研究成果基础上,探讨攻击路径自动生成算法以及对攻击图相关的算法之间的优缺点进行了比较。

    youdao

  • Testing a bit more than a thousand values against the server may take few minutes, in which the victim session is likely to remain active. This is the outline of an attack algorithm.

    服务器测试几千以上可能要花分钟段时间受害者可能仍然活跃

    youdao

  • The Bayesian Optimization Algorithm (BOA) was introduced to tackle the coordination attack problem.

    贝叶斯优化算法(BOA)引入协同攻击优化领域

    youdao

  • Unfortunately, this is not a very secure hash function, it can be a dictionary attack to break algorithm similar to the command-line application!

    不幸的是,这个哈希函数不是非常安全可以通过字典攻击算法被破解类似命令行应用程序!

    youdao

  • Experimental results show that the improved algorithm has stronger ability to resist differential attack, and the avalanche effect of.

    实验结果表明改进算法差分攻击抵抗能力有所提高,雪崩效应趋合理。

    youdao

  • Experiment results show that this algorithm can restore distortion caused by global and local or no-linear geometrical attack, and it is practical and effective.

    实验结果表明算法可以全局局部非线性几何攻击恢复失真实用有效的。

    youdao

  • Especially, the masking design in S-box of advanced encryption standard can make the algorithm safer to against linear attack.

    特别对于高级加密标准算法S设计增加掩码设计可以加强抗线性攻击安全程度

    youdao

  • Experimental results show that the algorithm maintains the quality of the original image and is robust to non-geometric attack and loss compression.

    实验表明算法较好地保持原始图像品质几何攻击有损压缩具有较好的稳健性。

    youdao

  • Experimental results show that this algorithm has a good hiding effect and is robust for single attack and even collage attacks.

    实验结果表明算法隐藏效果,并且单一攻击多种复合攻击具有很好的棒性。

    youdao

  • Experiment verifies that this algorithm, depending on the foundation of not reducing the quality of video, can resist multiple disturbance and attack, and have good stability and robust.

    实验证明视频数字水印算法降低视频质量基础上,能够抵抗多种干扰攻击具有良好稳定性棒性,并验证了以上分析。

    youdao

  • Based on the description of the algorithm, experimental results and attack analysis are given.

    描述算法基础给出实验结果攻击分析

    youdao

  • The new algorithm notably reduces the decoding complexity of the fast correlation attack algorithm.

    算法显著地降低快速相关攻击算法译码复杂度

    youdao

  • The experimental results show that this algorithm possesses better invisibility and has good robustness to clipping, noise, filtering and JPEG compression attack.

    实验结果表明算法具有较好的不可见性剪切噪声污染滤波JPEG压缩攻击具有良好鲁棒性

    youdao

  • The analysis indicates that the encryption algorithm not only can effectively resist cipher-text-only attack but also chosen-plaintext attack.

    分析表明,该文所设计的加密算法不但抵抗密文攻击而且有效地抵抗选择明文攻击。

    youdao

  • In this algorithm, an extended directed graph is used to show attack types and their relations, while the correlation is performed according to the method of forwards matching and absent matching.

    算法采用表示攻击类别及其逻辑关系按照前向匹配缺项匹配方式对报警进行关联

    youdao

  • The experimental results prove that this algorithm is invisible, robust against the attack of JPEG compression, noise and cut-and-paste attack.

    实验结果证明算法具有良好的不可见性JPEG压缩噪声攻击剪切攻击都有很好的棒性。

    youdao

  • A improved algorithm that builds security channel is provided, the new algorithm not only against known-plaintext attack, but also enhance efficiency of operation for encryption and decryption.

    提出一种改进安全信道建立算法新的算法能够承受已知明文攻击,同时提高加、解密运算效率

    youdao

  • The process and algorithm of target distribution and attack sequence in multi target attacking are introduced, and the validity of the algorithm is proved by simulation.

    介绍了目标攻击目标分配攻击排序过程算法,并用仿真验证了算法的有效性

    youdao

  • This paper analyzes current solutions and proposes a protocol to solve false destination sequence attack in AODV by introducing an algorithm of reputation rating updating.

    该文针对AODV协议中的虚假目的序列号攻击以及已有解决方案中的缺陷,引入信誉值更新算法,设计种基于AODV入侵识别协议。

    youdao

  • This paper analyzes current solutions and proposes a protocol to solve false destination sequence attack in AODV by introducing an algorithm of reputation rating updating.

    该文针对AODV协议中的虚假目的序列号攻击以及已有解决方案中的缺陷,引入信誉值更新算法,设计种基于AODV入侵识别协议。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定