A new secure watermarking scheme is proposed, which resists efficiently the current known watermarking protocol attacks.
提出了一个安全的数字水印方案,该方案能够比较有效的抵抗现有已知的几种协议攻击。
In the third chapter, we first detail some watermarking attacks including watermark removal attacks, cryptographic attacks and protocol attacks.
在第三章中,我们首先详细介绍了水印去除攻击、密钥攻击及协议攻击。
By using network interceptor and system call interceptor, it resists all kinds of protocol attacks, operation system attacks and application attacks.
通过网络截获器和系统调用截获器,对各种各样的协议攻击、操作系统攻击和应用程序攻击进行防范。
This protocol is used to provide confidentiality of secure information, such as user credentials and transaction information, and protection from man-in-the-middle attacks.
该协议用于提供安全信息(比如用户凭证和交易信息)的机密性,还提供了防止中间人攻击的保护。
While I won't cover any IP-level attacks in this article, I do want to discuss IP in a little more detail as it is the underlying protocol of ICMP and TCP.
尽管我将不在本文中介绍任何IP级别的攻击,但我确实需要稍微详细地讨论IP,因为它是ICMP和TCP的底层协议。
Traffic analysis attacks attempt to glean information about a message or protocol by observing which parties are talking to whom, and in some cases how much data is being transferred.
流量分析即通过监测通信方以及传输的数据量来收集关于消息或协议的信息。
It is TCP/IP protocol family defects that cause some ulterior persons to make up numerous attacks on Internet.
IP协议簇本身的缺陷是导致别有用心者构造现今互联网上众多攻击的原因。
An IPS monitors for behavior anomalies that indicate hard-to-spot HTTP-based attacks and those from remote-call-procedure, Telnet- and address-resolution-protocol spoofing, among others.
一个IPS系统可以监控异常的行为,发现非常隐蔽的基于HTTP的攻击,以及来自远程调用过程、Telnet和地址解析协议欺骗的攻击。
On base of analysis of watermarking attacks on digital images, the paper presents a digital image copyright protection protocol based on digital watermarking technology.
在分析数字图像中数字水印所受各种攻击的基础上,给出了一个基于数字水印技术的数字图像版权保护安全协议框架。
After analyzing the OSPF routing protocol, the author describes a statistical mechanism against the attacks of OSPF routing protocol.
对路由OSPF协议进行分析研究后,对它可能受到的攻击,阐述了一种基于统计的实时检测方法。
In this paper it introduced new types of attacks called multi-protocol guessing attacks, which can exist when protocols are mixed.
现引入一种新类型攻击称为多协议猜测攻击,它可以存在于混合协议中。
This paper mainly discusses the influence of network performance under internal attacks in MANET and security routing protocol.
本文主要研究移动自组网络中内部攻击对网络性能的影响以及安全路由协议。
The security analyses show that the improved authentication protocol is much stronger against these three kinds of attacks than the traditional protocol.
相应的安全性分析明确给出了考虑这三种攻击时,改进的认证协议比以前的协议更加强健。
In fact, a lot of network attacks are to abuse different network protocols and several new attacking methods violate the protocol standard.
事实上,大量的网络攻击都是对不同的网络协议进行滥用,很多新型的攻击方法都违背了协议标准。
This way improved its security against password guessing attacks and password leaking without any change of the original protocol framework.
该方法在保持原有协议的基本体系不变的前提下,较大地提高了安全性,有效地防范了口令猜测攻击和口令泄漏等。
EKE is a kind of key exchange protocol based on week password and can resist offline dictionary attacks by use of symmetric key encryption and public key encryption.
EKE协议是基于弱口令的密钥交换协议,通过使用对称密钥加密体制和公钥加密体制,能够很好地抵抗离线字典攻击。
Moreover, this protocol can defend any cheats and attacks, and it is secure, efficient, simple and practical.
并能抵抗各种欺骗和攻击,是一个安全、高效、简单、实用的协议。
Via address resolution protocol in data link layer, hackers can launch various attacks, such as IP conflict attack, ARP deceive attack and ARP overflow attack.
利用数据链路层地址解析协议(ARP)可以进行IP冲突、ARP欺骗、ARP溢出等方式的网络攻击。
The analysis results show that the proposed protocol can prevent network from some common routing attacks.
分析表明该协议能够抵御多种常见的路由攻击。
There are many kinds of ways of attacks on authentication protocol, but replay attacks and type flaw attacks account for more than 90 percent of them.
对认证协议的攻击形式有很多,但已构成的攻击事例中,百分之九十以上是重放攻击和类型缺陷攻击。
The protocol is proved to be AKE secure and resistant to the attacks of adaptive adversaries and malicious insiders.
提出的组密钥交换协议经过证明具有AKE安全,并且能够抵抗适应性敌手攻击和恶意参与者攻击。
The new protocol satisfies all the requirements of the confidentiality and unforgeability by signcryption protocol, and it can defend against all those current attacks.
该协议满足数字签密协议的机密性、不可伪造性等要求,并能抵抗目前情况下的各种攻击。
WTLS handshake protocol doesn't provide forward security, and lacks of user anonymity when not in the anonymous mode. It is vulnerable to man-in-the-middle attacks in completely anonymous mode.
WTLS握手协议不满足前向安全性,非匿名验证模式下不满足用户匿名性,完全匿名模式下易遭受中间人攻击。
The protocol USES HMAC to guarantee the client being active, then protects leasing from attacks. 5 in the aspect of UOWHF discovery, tree-Shoup construction is put forward in this paper.
该协议灵活运用HMAC,确保代理每次租借时客户总是“激活的”,从而尽量避免恶意攻击。
The protocol USES HMAC to guarantee the client being active, then protects leasing from attacks. 5 in the aspect of UOWHF discovery, tree-Shoup construction is put forward in this paper.
该协议灵活运用HMAC,确保代理每次租借时客户总是“激活的”,从而尽量避免恶意攻击。
应用推荐