Furthermore, the proposed scheme can withstand conspiracy attack.
此外,该方案能够抵抗合谋攻击。
But in the existing threshold signature scheme, conspiracy attack is still a problem which is difficult to solve.
但在现有的门限签名方案中,合谋攻击一直是一个难以解决的问题。
Wireless Sensor Network (WSN) was usually vulnerable to conspiracy attack from its adversaries when using bivariate polynomial key pre-distribution protocol.
无线传感器网络在应用二元多项式密钥预分配协议时,通常容易遭受到敌方的合谋攻击。
Though the analysis and combining group signature technology to threshold based group signature scheme, a threshold based group signature scheme with against conspiracy attack was proposed.
在分析的基础上,有效地将群签名与门限群签名技术融合在一起,提出了一个能抵抗合谋攻击的门限群签名方案。
But, though the Chinese onslaught looks fractious and pell-mell, conspiracy theorists smell a state-driven attack on the commanding heights of Australia's economy.
虽然中国人的攻击看起来有些暴躁和忙乱,但在这波旨在控制澳大利亚经济高度的攻击中,阴谋论者似乎嗅到了一丝国家主使的气息。
But, though the Chinese onslaught looks fractious and pell-mell, conspiracy theorists smell a state-driven attack on the commanding heights of Australia's economy.
虽然中国人的攻击看起来有些暴躁和忙乱,但在这波旨在控制澳大利亚经济高度的攻击中,阴谋论者似乎嗅到了一丝国家主使的气息。
应用推荐