This article proposed scans the model based on wooden horse's crack, and realized to its attack principle as well as the key attack technology has done the further research.
该文提出了基于木马的漏洞扫描模型,并对其攻击原理以及关键攻击技术实现作了进一步的研究。
At present, there are three kinds of traitor tracing schemes against collusion key attack, which are symmetrical traitor tracing schemes and dissymmetrical traitor tracing schemes;
目前,对抗共谋密钥攻击的叛徒追踪方案主要有对称追踪方案、非对称追踪方案、门限追踪方案;
The appropriate key(s) will be shaded to indicate the type of attack(s) each technique helps to prevent.
对于每种技术,适当的方块将加上底纹,表示这种技术有助于防范的攻击类型。
Going back to the childhood example, your friend could encrypt the attack plans using his private key.
我们回到小孩的例子中,您的伙伴可以使用他的私钥来加密进攻计划。
The attack, thought up by hacker Samy Kamkar, exploits shortcomings in many routers to find out a key identification number.
这种由黑客萨米·卡门卡想出来的攻击方法,利用存在于很多路由器中的众多漏洞,查出一个关键的身份识别号。
While it's easy to point to one or two key measures for the prevention of the SQL injection attack, it's best to take a layered approach to the problem.
尽管采取一两项关键措施预防SQLInjection攻击是很容易的,但最好是对问题采用分层方法。
On the other hand, if I include the realm name and username, a key that falls victim to such an attack will only be compromised in one particular realm.
另一方面,如果我加入了域名和用户名,那么一个受到这种攻击的密钥将只会侵害特定的域。
It's a game played by children, but it's also a serious attack that can occur on public key infrastructures (PKI).
虽然这是孩子们玩的一个游戏,但却也是在公钥基础设施(PKI)上可能发生的一种很严重的攻击。
The key is that the attack is executed using well-defined APIs and protocols.
关键的问题是入侵者是使用定义良好的API和协议来进行攻击的。
Because the key to recovering from a heart attack is by restoring the blood flow to the heart as quickly as possible, silent heart attacks are even more deadly.
正是由于控制心脏病的发作的关键是尽快恢复心脏供血,因此隐性心脏病发作的致命率变得更高的。
This engagement might take the form. of arrest, dispersal or destruction, depending on the situation, but the key is to build a tactical system of attack that avoids assault.
这种战斗可能是以逮捕,驱散或者破坏的形式进行,依赖于当时的情形,但关键是建立一套避免强攻的战术攻击系统。
We know that Twitter's architecture has made it more vulnerable to this type of attack than Google or even Facebook, but in situations like this, communication is key.
我们知道Twitter的构架使得Twitter比Google和Facebook更容易遭到攻击,但是在这种情况下,沟通至关重要。
Replay attack prevention: Each issued U-Prove token also contains a token-specific public key that is known only to the Prover.
重放攻击(Replay attack)防护:每个发布的U-Prove令牌中还包含专门针对每个令牌的公钥,这只有验证方才知道。
In the modern air-defense system, it has been a key problem to the air-defense radars whether they have the abilities of countering anti - radiation weapon attack.
在现代防空系统中,是否具有抗反辐射武器攻击的能力已成为关系到防空雷达生死存亡的问题。
The key, security experts say, is to stay alert and vigilant, preventing an attack before it happens and that, in turn, demands good intelligence.
安全专家表示,关键是保持警惕,在袭击发生之前将它们阻止。反过来,这需要充分的情报。
Angle of attack and nose shape of bodies are key factors that asymmetric vortex occurs over slender bodies.
迎角、旋成体的外形,尤其是头部的几何形状是细长前体出现非对称涡的关键因素。
Besides having the basic properties of the proxy signature, the new scheme prevents proxy misuse, original signer's forgery and public key substitution attack.
此外,该方案不仅满足代理签名的基本性质,还避免了代理权滥用、原始签名人伪造和公钥替换攻击。
The distribution of the weight among the ingredients is a key problem in network attack effect evaluation.
网络攻击效果评估中指标之间权重分配是进行评估的一个关键问题。
It is shown that there is still an asymptotic perfect security of quantum key distribution under this attack strategy.
理论计算证明了量子密钥分配协议在这种攻击策略下仍具有足够的安全性。
Improved scheme has advantages of nonrepudiation, against he original signer's forgery attack and public key substitution attack etc.
改进的方案具有不可否认性,以及抵抗原签名人的伪造攻击和公钥替换攻击等优点。
Operations guide: key to control movement of the bar girls, and avoid drunkard entanglement key blanks by jumping drunkard head to attack them, air whereabouts can be ju.
操作指南:方向键控制酒吧女郎移动,躲避酒鬼的纠缠,按空格键跳到酒鬼的头上攻击他们,空中下落时可实现跳跃。
Improved schemes have advantages of nonrepudiation, using insecure channel, against the public key substitution attack and collusion attack etc.
改进后的方案具有不可否认性,不使用安全信道,以及抵抗公钥替换攻击和合谋攻击等优点。
It has features as follows: identity authentication, changeable communication key, secure against active and passive attack.
该方案具有:身份认证、可变密钥、抗主动和被动攻击的优点。
This scheme is the extension of the self-organized key management, and imports trust decision mechanism which promotes the system's ability of resisting mobile attack.
该方案是对自组织密钥管理的扩充,通过引入信任决策机制提高了系统抗漫游攻击的能力。
The fundamental security goal of verifier-based password-authenticated key exchange protocol is security against dictionary attack and server compromise attack.
基于验证元的口令认证密钥交换协议的最基本安全目标是抵抗字典攻击和服务器泄露攻击。
Attack, a method of resisting server compromise attack is given and a new password-based authenticated key agreement protocol is proposed.
针对服务器泄漏攻击,给出了抵抗这种攻击的方法,提出了一个新的基于口令的认证密钥协商协议。
This paper analyzes authentication and key distribution protocol of the procedure and security of UMTS. The vulnerability and possible attack to this protocol are described.
详细分析了UMTS认证和密钥分配协议的过程以及协议的安全性,找出协议中存在的弱点和可能的攻击,提出了公钥加密协议的改进方法。
The certificateless signature scheme can suffer from public key replacement attack so that any one can forge a valid signature on any message.
该方案能受到替换公钥攻击,以至于任何人都能对任何消息成功伪造签名。
Pluralist scholars launched a devastating attack on another of the key intellectual underpinnings of public administration: the concept of public interest.
多元主义学者们发动了一次致命的打击,这次,他们能的“靶子”是公共利益的概念——这是公共行政的智识基础。
Pluralist scholars launched a devastating attack on another of the key intellectual underpinnings of public administration: the concept of public interest.
多元主义学者们发动了一次致命的打击,这次,他们能的“靶子”是公共利益的概念——这是公共行政的智识基础。
应用推荐