Based on the analysis of attack scheme, an improved proxy multi-signature scheme was proposed.
在全面分析攻击方案的基础上,构造了一种增强的代理多重签名方案。
The necessity of correlation technology that navigation warfare requires through the analysis of attack and defense is discussed.
从进攻与防御两方面探讨了导航战对相关技术的需求。
So, I was especially interested in the results of some related data analysis that I worked on for on the recently released Symantec Report on Attack Kits and Malicious Websites.
因此,我对于工作中得出的相关数据分析结果非常的感兴趣,这些数据最近发表在赛门铁克关于攻击工具和恶意站点的报告中。
During the forensic analysis, I acquired two attack tools that were used in almost all cases, so here is a short description of them.
经过分析,我获取了目前使用最广泛的两种攻击工具,以下对它们进行简短说明。
This is the first time that scientists have done a systematic analysis of how genes can influence the effect of coffee on heart attack risk.
报道说,这是科学家们首次对基因如何影响咖啡对心脏病发作危险的作用进行系统的分析研究。
A type of statistical analysis used to study high-energy physics and stock market fluctuations could yield a new Angle of attack in the fight against the virus that causes AIDS.
一种统计方法主要用于研究高能物理和股市波动,现在有可能在人类对抗艾滋病的战役中开辟新的战场。
The virus could attack the analysis by exhausting the patience of such an analyser.
病毒就可能通过消磨此类分析器的耐性来攻击该分析。
An example of attack on the flow analysis stage was discussed in the section entitled 'promises of formal analyses'.
在‘形式分析的承诺’这个小节中讨论了一个攻击流分析阶段的例子。
The extended honest ideal model not only inherits its original characters, but also is adaptive for the analysis of guessing attack.
扩展的诚实理想分析模型不仅继承了原理论的有关性质,而且适应猜测攻击的分析。
In chapter four, a brief review of fast correlation attacks is given, then an attack to generalized self-shrinking sequences is discussed by combining with entropy analysis.
第四章简单介绍了当前一个主流的攻击方法—快速相关攻击,并结合熵分析对广义自缩序列的安全性进行了讨论。
Based on abduction inference, a method of network attack process analysis for incident response was designed.
针对事后入侵响应,提出了一种基于引理推理的攻击过程分析方法。
Based on the description of the algorithm, experimental results and attack analysis are given.
在描述算法的基础上,给出了实验结果及攻击分析。
The frequency and complexity of network attack behaviors make securities withstand more difficult the method of analysis on network attack behaviors have been given more attention by people.
网络攻击行为的频度和复杂性使安全防御的难度越来越大。网络攻击行为分析方法因而引起人们的关注。
In this dissertation, we study the technologies and application of these two situations, our attentions focused on image scramble, image hiding, hiding analysis and attack.
本论文在信息隐藏方面的主要工作就是围绕这两种应用展开的,内容涉及图像置乱、图像信息隐藏和隐藏分析和攻击技术等方面。
In the end, the paper proposed a way of hiding attack technique composed by data analysis, characteristic filter, hypothesis inspection and syncretism decision-making.
提出了一种由数据分析、特征滤波器、假设检验、融合决策等过程组成的隐藏攻击方法。
Analysis and evaluates the characteristics of typical attack scenarios from the aspects of the possibility, ability of concealment, release rate and harmfulness of the possible attacks.
从袭击发生的可能性、隐蔽性、生化制剂的释放速度和危害性这四个方面,对典型生化袭击场景的特性进行了分析和评价。
GSK had already submitted its own pooled analysis to the FDA, which suggested that short-term use of rosiglitazone might increase the risk of heart attack by some 30-40%.
GSK已经向FDA提交了他们自己的混合分析,认为短期服用罗格列酮可能增加约30 - 40%的心脏病发作的危险。
This paper gives a general analysis of the working principle of the ARP, the security vulnerabilities of the ARP, the way of the attack and the protecting method.
文章在分析ARP协议工作原理、安全缺陷、攻击原理和攻击方式的基础上,详细论述了基于ARP协议攻击的防御方法。
In this paper, the principles and the attack methods of the overflows are discussed, and the main features of the exploits are given after the analysis on the exploits.
该文先讨论了缓冲区溢出漏洞的产生原理和一般的攻击手段,然后分析了利用缓冲区溢出漏洞的攻击代码,给出了攻击代码的主要特征。
The paper summarized the method of attack patterns describing and analysis the method's advantage and disadvantage.
本文主要总结攻击模式的表示方法,并对各种方法进行分析。
In 2007, the FDA slapped a warning on Avandia's label after a meta-analysis showed that users faced an increased risk of heart attack and death from cardiovascular problems.
2007年,FDA在经过多因素分析后要求在文迪雅的标签上做出警示,提示患者文迪雅将会增加心脏病发作和心血管疾病死亡的风险。
The method of DPA may attack on encrypted FPGA effectively, which does not need complex analysis to encryption arithmetic and obtains ciphertext and information.
差分功率分析(DPA)方法可有效地对加密的集成电路芯片进行攻击解密,它绕过了加解密算法繁琐的数学分析,从而获取密码和信息。
Homeostasis attack of this kind of scheme is also proposed with known plaintext, all of these could make up the shortcoming of theory analysis.
最后给出了对该类方案的已知明文的同态攻击方法,弥补了该类方案理论分析上的不足。
Later we will analysis the method of its attack on the human body.
后来我们将分析其对人体的攻击方法。
The target detection model, booting attack model and using effect model of weapon are (presented) based on process analysis of the over-the-horizon (OTH) attack of the anti-ship missile.
通过对超视距空中机动目标的分析和合理的假设之后,提出了用空空导弹攻击超视距空中目标的基本模型。
The target detection model, booting attack model and using effect model of weapon are (presented) based on process analysis of the over-the-horizon (OTH) attack of the anti-ship missile.
通过对超视距空中机动目标的分析和合理的假设之后,提出了用空空导弹攻击超视距空中目标的基本模型。
应用推荐