The way of attack signature detection has advantage of high accuracy.
基于攻击特征的检测具有准确性高的优点;
The technique is attractive because it is adaptive and requires no attack signature database, Evans says.
Evans称,由于它是自适应的,不需要攻击特征数据库,所以该技术很有吸引力。
The detection ways of matching attack signature was adopted in Process, its principle is same as most anti-virus software which require high efficiency.
在处理过程中采用了对攻击特征进行匹配的检测方式,其实现原理同大多数杀毒软件类似,对效率的要求极高。
In the classic XML signature attack.
在传统的XML签名攻击中。
Such an attack is related to how Rails verifies message digests in the cookie store and might allow an attacker to determine when a forged signature is partially correct.
这种攻击和Rails验证储存在cookie中的消息摘要有关,这个缺陷允许一个攻击者来决定伪造签名能够在什么时候通过验证。
If an attacker re-sends the request to the Amazon SQS service, the repetition of its signature identifies the request as a capture-replay attack, and Amazon Web Services blocks the it.
如果攻击者重新向AmazonSQS服务发送请求,则重复的签名表示该请求属于捕获重放攻击,AmazonWeb服务将会阻塞它。
Besides having the basic properties of the proxy signature, the new scheme prevents proxy misuse, original signer's forgery and public key substitution attack.
此外,该方案不仅满足代理签名的基本性质,还避免了代理权滥用、原始签名人伪造和公钥替换攻击。
Through the cryptanalysis of a verifiable threshold signature scheme presented by Zhang and Wen, concluded it not only exist collusion attack and forgery attack, but have no undeniability.
对张劼等人提出的一类可验证的门限签名方案进行了安全性分析,发现它存在安全漏洞,容易受到合谋攻击和伪造攻击,并且不具备不可否认性。
But in the existing threshold signature scheme, conspiracy attack is still a problem which is difficult to solve.
但在现有的门限签名方案中,合谋攻击一直是一个难以解决的问题。
A forgery attack is presented on the self-certified signature scheme.
本文对一种自证明签名方案实施了伪造攻击。
In this paper, an efficient total ordering directed transitive signature scheme is proposed and its security against adaptive chosen-message attack is proved.
该文提出一个高效的全序有向传递签名方案,并证明该方案在选择明文攻击下是安全的。
A new secure watermarking protocol which is based on digital signature is proposed through discussing about the attack over watermarking and the security leak of DHWM protocol.
论文在论述数字水印应用面临的攻击和DHWM协议存在安全隐患的基础上,提出了一种新的基于数字签名的安全数字水印协议。
It is shown here that S-L-H scheme is insecure against the public key substitution attack and an improved threshold proxy signature scheme is proposed.
这里指出s - L - H方案不能抵抗公钥替换攻击,并给出了一个改进的门限代理签名方案。
For resisting the adaptive chosen message attack and improving the sign generation efficiency, a signature scheme based on the strong RSA assumption is described in this paper.
为了抵抗自适应选择信息攻击,提高签名生成效率,提出一种基于强rsa假设的签名方案。
This proposed scheme can not only efficiently resist birthday attack, but also improve the security of digital signature.
它能够有效抵抗生日攻击,从而提高了数字签名的安全性。
The certificateless signature scheme can suffer from public key replacement attack so that any one can forge a valid signature on any message.
该方案能受到替换公钥攻击,以至于任何人都能对任何消息成功伪造签名。
Based on the analysis of attack scheme, an improved proxy multi-signature scheme was proposed.
在全面分析攻击方案的基础上,构造了一种增强的代理多重签名方案。
The paper proposed a new concept: the attack based on identical base construction, and explicitly indicated that defects could be avoided in designing digital signature.
针对此问题,提出同底构造攻击的概念,并明确指出,在进行数字签名设计时,必须回避这种现象。
Though the analysis and combining group signature technology to threshold based group signature scheme, a threshold based group signature scheme with against conspiracy attack was proposed.
在分析的基础上,有效地将群签名与门限群签名技术融合在一起,提出了一个能抵抗合谋攻击的门限群签名方案。
This paper analyzes the security of a certificateless proxy signature scheme and shows that it is insecure against the public key replacement attack in certificateless cryptosystems.
对无证书代理签名方案进行安全性分析,指出该方案对于公钥替换攻击是不安全的,并给出具体的攻击方法。
The attack USES a technique, known at XML signature wrapping or XML rewriting, that has been known since 2005 and exploits a weakness in the way Web services validate signed requests.
攻击采用了一种在XML签名包装或XML重写中认出的技术,它2005年就为人所知,并利用了网络服务验证签名需求的弱点。
It is a crux for security of ring signature that exposure of secret keys can be a devastating attack on cryptosystem which ring signature base on.
作为环签名基础的公钥加密体制,存在着密钥泄露的问题,对于环签名的安全性来说是致命的。
Having classified the attack information of the attacked objections, one can create the signature of the intrusion data in the same class with LCS (longest common substring) algorithm.
并根据目标对攻击信息进行分类,用LCS算法在同类攻击数据中生成网络病毒的特征。
Through the cryptanalysis of a new threshold proxy signature scheme based on bilinear pairings, it is found that the scheme cant resist forgery attack and public-key substitute attack.
给出了对一个已有的高效无证书签名方案的替换公钥攻击,表明了在该方案中,攻击者可以通过替换签名者公钥伪造签名;进而针对该攻击提出了改进方案。
Through the analysis of two proxy blind signature schemes, we want to prove that this two proxy blind signature schemes can not resist forgery attack and both have linkability.
对两个代理盲签方案及其安全性进行分析,证明了这两个方案不具有不可伪造性和不可链接性。
After analyzing a proxy blind signature scheme proposed by Huang et al., it was pointed out that the scheme was insecure against the original signer and signature receiver's forgery attack.
通过对黄辉等人提出的代理盲签名方案的分析,指出该方案不满足不可伪造性,原始签名者和签名接收者都可以伪造代理签名者的盲签名。
After analyzing a proxy blind signature scheme proposed by Huang et al., it was pointed out that the scheme was insecure against the original signer and signature receiver's forgery attack.
通过对黄辉等人提出的代理盲签名方案的分析,指出该方案不满足不可伪造性,原始签名者和签名接收者都可以伪造代理签名者的盲签名。
应用推荐