Furthermore, the proposed scheme can withstand conspiracy attack.
此外,该方案能够抵抗合谋攻击。
The scheme has the property of verification and can prevent inside member conspiracy attack.
该方案具有可验证性和防止内部成员合谋攻击;
The security analysis shows it can prevent plaintext attack, conspiracy attack and forging attack.
安全性分析表明该方案能够防止明文攻击、合谋攻击和伪造攻击。
Ths system can resist conspiracy attack, simplify the executing process and reduce the traffic cost.
新的方案不仅避免了同谋攻击,而且简化了原方案的执行步骤,降低了通信量。
But in the existing threshold signature scheme, conspiracy attack is still a problem which is difficult to solve.
但在现有的门限签名方案中,合谋攻击一直是一个难以解决的问题。
Wireless Sensor Network (WSN) was usually vulnerable to conspiracy attack from its adversaries when using bivariate polynomial key pre-distribution protocol.
无线传感器网络在应用二元多项式密钥预分配协议时,通常容易遭受到敌方的合谋攻击。
Though the analysis and combining group signature technology to threshold based group signature scheme, a threshold based group signature scheme with against conspiracy attack was proposed.
在分析的基础上,有效地将群签名与门限群签名技术融合在一起,提出了一个能抵抗合谋攻击的门限群签名方案。
But, though the Chinese onslaught looks fractious and pell-mell, conspiracy theorists smell a state-driven attack on the commanding heights of Australia's economy.
虽然中国人的攻击看起来有些暴躁和忙乱,但在这波旨在控制澳大利亚经济高度的攻击中,阴谋论者似乎嗅到了一丝国家主使的气息。
But, though the Chinese onslaught looks fractious and pell-mell, conspiracy theorists smell a state-driven attack on the commanding heights of Australia's economy.
虽然中国人的攻击看起来有些暴躁和忙乱,但在这波旨在控制澳大利亚经济高度的攻击中,阴谋论者似乎嗅到了一丝国家主使的气息。
应用推荐