• The way of attack signature detection has advantage of high accuracy.

    基于攻击特征检测具有准确性优点

    youdao

  • The technique is attractive because it is adaptive and requires no attack signature database, Evans says.

    Evans由于自适应的,需要攻击特征数据库,所以技术有吸引力

    youdao

  • The detection ways of matching attack signature was adopted in Process, its principle is same as most anti-virus software which require high efficiency.

    处理过程中采用攻击特征进行匹配的检测方式实现原理大多数杀毒软件类似,对效率的要求极高。

    youdao

  • In the classic XML signature attack.

    传统XML签名攻击中。

    youdao

  • Such an attack is related to how Rails verifies message digests in the cookie store and might allow an attacker to determine when a forged signature is partially correct.

    这种攻击Rails验证储存cookie中的消息摘要有关,这个缺陷允许一个攻击决定伪造签名能够什么时候通过验证。

    youdao

  • If an attacker re-sends the request to the Amazon SQS service, the repetition of its signature identifies the request as a capture-replay attack, and Amazon Web Services blocks the it.

    如果攻击者重新向AmazonSQS服务发送请求重复签名表示请求属于捕获重放攻击,AmazonWeb服务将会阻塞它。

    youdao

  • Besides having the basic properties of the proxy signature, the new scheme prevents proxy misuse, original signer's forgery and public key substitution attack.

    此外方案不仅满足代理签名基本性质,还避免了代理权滥用原始签名伪造公钥替换攻击。

    youdao

  • Through the cryptanalysis of a verifiable threshold signature scheme presented by Zhang and Wen, concluded it not only exist collusion attack and forgery attack, but have no undeniability.

    劼等提出的一类可验证的门限签名方案进行了安全性分析,发现存在安全漏洞,容易受到合谋攻击伪造攻击,并且具备不可否认性。

    youdao

  • But in the existing threshold signature scheme, conspiracy attack is still a problem which is difficult to solve.

    现有门限签名方案中合谋攻击一直一个难以解决问题

    youdao

  • A forgery attack is presented on the self-certified signature scheme.

    本文种自证明签名方案实施了伪造攻击

    youdao

  • In this paper, an efficient total ordering directed transitive signature scheme is proposed and its security against adaptive chosen-message attack is proved.

    该文提出一个高效有向传递签名方案,并证明该方案在选择明文攻击安全的。

    youdao

  • A new secure watermarking protocol which is based on digital signature is proposed through discussing about the attack over watermarking and the security leak of DHWM protocol.

    论文在论述数字水印应用面临的攻击DHWM协议存在安全隐患基础提出新的基于数字签名安全数字水印协议。

    youdao

  • It is shown here that S-L-H scheme is insecure against the public key substitution attack and an improved threshold proxy signature scheme is proposed.

    这里指出s - L - H方案不能抵抗公钥替换攻击给出一个改进门限代理签名方案。

    youdao

  • For resisting the adaptive chosen message attack and improving the sign generation efficiency, a signature scheme based on the strong RSA assumption is described in this paper.

    为了抵抗适应选择信息攻击提高签名生成效率,提出一种基于rsa假设签名方案

    youdao

  • This proposed scheme can not only efficiently resist birthday attack, but also improve the security of digital signature.

    能够有效抵抗生日攻击从而提高数字签名安全性

    youdao

  • The certificateless signature scheme can suffer from public key replacement attack so that any one can forge a valid signature on any message.

    方案受到替换公钥攻击以至于任何人都能任何消息成功伪造签名

    youdao

  • Based on the analysis of attack scheme, an improved proxy multi-signature scheme was proposed.

    全面分析攻击方案基础上,构造了一种增强代理多重签名方案。

    youdao

  • The paper proposed a new concept: the attack based on identical base construction, and explicitly indicated that defects could be avoided in designing digital signature.

    针对此问题,提出构造攻击概念明确指出进行数字签名设计时,必须回避这种现象

    youdao

  • Though the analysis and combining group signature technology to threshold based group signature scheme, a threshold based group signature scheme with against conspiracy attack was proposed.

    分析基础上,有效地签名门限群签名技术融合在一起,提出了一个抵抗合谋攻击的门限群签名方案

    youdao

  • This paper analyzes the security of a certificateless proxy signature scheme and shows that it is insecure against the public key replacement attack in certificateless cryptosystems.

    对无证书代理签名方案进行安全性分析,指出该方案对于公钥替换攻击不安全的,并给出具体的攻击方法。

    youdao

  • The attack USES a technique, known at XML signature wrapping or XML rewriting, that has been known since 2005 and exploits a weakness in the way Web services validate signed requests.

    攻击采用了一种在XML签名包装XML重写中认出技术2005年就为人所知利用网络服务验证签名需求的弱点

    youdao

  • It is a crux for security of ring signature that exposure of secret keys can be a devastating attack on cryptosystem which ring signature base on.

    作为签名基础公钥加密体制,存在着密钥泄露问题,对于环签名的安全性来说致命的。

    youdao

  • Having classified the attack information of the attacked objections, one can create the signature of the intrusion data in the same class with LCS (longest common substring) algorithm.

    并根据目标对攻击信息进行分类LCS算法同类攻击数据生成网络病毒特征

    youdao

  • Through the cryptanalysis of a new threshold proxy signature scheme based on bilinear pairings, it is found that the scheme cant resist forgery attack and public-key substitute attack.

    给出了一个已有的高效无证书签名方案替换公钥攻击表明了在方案中,攻击者可以通过替换签名者公钥伪造签名;进而针对该攻击提出了改进方案。

    youdao

  • Through the analysis of two proxy blind signature schemes, we want to prove that this two proxy blind signature schemes can not resist forgery attack and both have linkability.

    代理方案及其安全性进行分析证明两个方案具有不可伪造不可链接性。

    youdao

  • After analyzing a proxy blind signature scheme proposed by Huang et al., it was pointed out that the scheme was insecure against the original signer and signature receiver's forgery attack.

    通过黄辉等人提出代理签名方案的分析,指出方案不满足不可伪造性,原始签名者签名接收者都可以伪造代理签名者的盲签名。

    youdao

  • After analyzing a proxy blind signature scheme proposed by Huang et al., it was pointed out that the scheme was insecure against the original signer and signature receiver's forgery attack.

    通过黄辉等人提出代理签名方案的分析,指出方案不满足不可伪造性,原始签名者签名接收者都可以伪造代理签名者的盲签名。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定