• Blind SQL injection attacks are a well know and recognized form of code injection attack, but there are many other forms, some not so well documented or understood.

    SQL攻击一种为人熟知代码注入攻击形式但是很多其他形式有些尚未得到很好的记载和了解。

    youdao

  • Newer modifications include Blind XPath injection, which reduces the knowledge required to mount the attack.

    更新修改中还包括暗藏xpath注入降低了安置攻击所需知识

    youdao

  • The focus of this article is a specific type of code injection attack: the Blind XPath injection.

    本文主要介绍代码注入攻击一种特殊类型XPath

    youdao

  • An emerging threat, first outlined by Amit Klein in a paper in 2004, is the blind XPath injection attack (see Resources).

    最近开始出现种威胁(最初AmitKlein于2004年篇论文中概述)XPath攻击(请参阅参考资料)。

    youdao

  • This attack functions almost exactly like the blind SQL injection attack but, unlike SQL injection attacks, few people know about XPath injection attacks or take precautions against them.

    这种攻击运作SQL攻击几乎完全相似,SQL注入攻击不同的是,几乎没什么了解XPath盲注攻击其进行预防。

    youdao

  • It's difficult to detect blindly the image rotation Angle in blind watermarking under geometry attack.

    几何攻击检测数字水印难点图像旋转角度检测。

    youdao

  • Liberal organizations committed to civil liberty will assist Washington in demonizing its next target for military attack while turning a blind eye to the war crimes of President Obama.

    致力于公民自由自由组织协助华盛顿妖魔化下一个军事攻击目标巴马的战争罪行视而不见

    youdao

  • To raise the attack of defence, the technology of arm must be grasped and utilized in defence, at the same time in match blind use of the hand habits at will must also be avoided.

    为了提高防守攻击性必须重视对防守时手臂技术掌握运用同时比赛必须避免盲目、随意习惯

    youdao

  • Through the analysis of two proxy blind signature schemes, we want to prove that this two proxy blind signature schemes can not resist forgery attack and both have linkability.

    代理方案及其安全性进行分析证明两个方案具有不可伪造不可链接性。

    youdao

  • In this paper, a routing strategy that can adapt to the extension of network is proposed to attack the problem of blind routing in P2P search.

    针对现有P 2 P检索路由盲目性问题论文给出了能够适应网络可扩展性的路由查询机制。

    youdao

  • After analyzing a proxy blind signature scheme proposed by Huang et al., it was pointed out that the scheme was insecure against the original signer and signature receiver's forgery attack.

    通过黄辉等人提出代理签名方案的分析,指出方案不满足不可伪造性,原始签名者签名接收者都可以伪造代理签名者的盲签名。

    youdao

  • After analyzing a proxy blind signature scheme proposed by Huang et al., it was pointed out that the scheme was insecure against the original signer and signature receiver's forgery attack.

    通过黄辉等人提出代理签名方案的分析,指出方案不满足不可伪造性,原始签名者签名接收者都可以伪造代理签名者的盲签名。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定