• 提供了辅助方法避免跨站伪造攻击

    Helpers added to prevent cross-site request forgery attacks.

    youdao

  • 本文种自证明签名方案实施了伪造攻击

    A forgery attack is presented on the self-certified signature scheme.

    youdao

  • 可以保证特征图像之间一一映射关系避免伪造攻击

    That can ensure the one to one mapping relationship between the feature set and the image, and avoid the counterfeit attack.

    youdao

  • 安全性分析表明方案能够防止明文攻击合谋攻击伪造攻击

    The security analysis shows it can prevent plaintext attack, conspiracy attack and forging attack.

    youdao

  • 标准模型证明抵抗签名伪造攻击具有无条件匿名性。

    It is proved to be unforgeable in the standard model, and is unconditionally anonymous.

    youdao

  • 方案不仅抵抗一切伪造攻击而且具有可转换可收回特性

    The new scheme not only can resist all forgery attacks, but also has the properties of convertibility and retraction.

    youdao

  • 这样漏洞使得敌手可利用伪造攻击替换攻击验证进行欺骗

    These weak points can result in the adversary to cheat the verification group by forgery and substitution attack.

    youdao

  • 方案不仅抵抗伪造攻击满足代理签名性质而且具有前向安全

    The scheme not only can effectively resist the forgery attacks and satisfy all security properties of proxy signature, but also has the properties of forward security.

    youdao

  • 分析显示两个方案抵抗任何人(包括KGC)的伪造攻击合谋攻击

    Analysis results show the two schemes can resist any forgery attacks and conspired attacks (including KGC).

    youdao

  • 改进方案具有不可否认性,以及抵抗签名人伪造攻击公钥替换攻击优点

    Improved scheme has advantages of nonrepudiation, against he original signer's forgery attack and public key substitution attack etc.

    youdao

  • 利用两个伪造攻击任何原始签名人都伪造一个有效代理多重数字签名

    Using these forgery attacks, anyone of original signers can produce a valid proxy multi-signature.

    youdao

  • 分析显示两个方案抵抗任何(包括KGC)伪造攻击满足签名者无条件匿名性。

    Analysis results show the two schemes can resist forgery attacks and conspired attacks (including KGC), and can meet with the requirements of unconditional anonymity of signers.

    youdao

  • 同时方案有效地抵抗攻击伪造攻击猜测窃取攻击,扮演攻击用户合谋攻击等。

    Additionally, the proposed scheme can efficiently withstand message replaying attack, forgery attack, Masquerade attack, guessing and stolen verifier attack and collusion attack.

    youdao

  • 利用这些方案计算机系统不仅监测控制口令的使用,而且可以抗击许多对口令伪造攻击

    By using these schemes, computer system can not only supervises and controls all passwords, but also withstand all attack of forging password.

    youdao

  • 提高恢复水印算法抵抗伪造攻击的能力,提出一种用于图像篡改检测恢复的安全双水印算法。

    To improve the security against the counterfeiting attack, this paper proposes a secure dual watermark scheme for image tamper detection and recovery.

    youdao

  • 为了抵抗原始签名伪造攻击改进代理签名密钥生成过程,改进方案进行了安全性分析

    To eliminate the original signers forgery attacks, a modification of the proxy key generation stage is proposed. Security analysis of the improved scheme is also presented.

    youdao

  • 一种基于双线性对的新型门限代理签名方案进行了密码分析,发现门限代理签名方案不能抵抗伪造攻击公钥替换攻击

    Through the cryptanalysis of a threshold proxy signature scheme in literature, the scheme could not resist insider attacks and public-key substitute attacks.

    youdao

  • 劼等提出的一类可验证的门限签名方案进行了安全性分析,发现存在安全漏洞,容易受到合谋攻击伪造攻击并且具备不可否认性。

    Through the cryptanalysis of a verifiable threshold signature scheme presented by Zhang and Wen, concluded it not only exist collusion attack and forgery attack, but have no undeniability.

    youdao

  • 该文提出了一种伪造攻击方案指出的方案不安全的,任一群成员撤消中心的帮助下可以利用自己秘密参数任何消息生成有效签名

    This paper will show that Zhang et al. 's scheme is insecure, any group member colludes with repeal center can generate a valid group signature without using his secret parameters.

    youdao

  • 但是公司他们攻击竞争对手发布伪造信息就是违法

    But it's illegal for a company to ask them to attack competitors, or post fake information.

    youdao

  • 这样就可以开始SOAP消息填充伪造消息内容了,由于签名验证无误,攻击者定义的任何一个操作都可以被有效地执行了。

    The filling of the empty SOAP body with bogus content can now begin, as any of the operations denied by the attacker can be effectively executed due to the successful signature verification.

    youdao

  • 知道一点,假设攻击构造了一条IC MP回应消息中包含伪造任意主机a地址192.168.2.2

    Knowing this, imagine that an attacker constructs an ICMP echo message containing the spoofed source address of some arbitrary Host a, such as 192.168.2.2, in its header.

    youdao

  • 这种攻击Rails验证储存cookie中的消息摘要有关,这个缺陷允许一个攻击决定伪造签名能够什么时候通过验证。

    Such an attack is related to how Rails verifies message digests in the cookie store and might allow an attacker to determine when a forged signature is partially correct.

    youdao

  • 个是CSRF (CrossSiteRequest Forgery,跨站点伪造请求攻击),允许攻击绕过基于cookie身份认证,前些天曾在Blog上介绍过这种攻击

    CSRF (Cross Site Request Fogery) allows attackers to bypass cookie based authentication. I blogged about it a while ago.

    youdao

  • 论文继续描述一些攻击社会标签系统方法,它们只需要通过建立极少的一些伪造用户来实现,伪造量只需要系统所有用户数的0.03%。

    The paper goes on to describe a few methods of attacking social tagging systems that require creating remarkably few fake accounts, as few as 0.03% of the total accounts in the system.

    youdao

  • 现实世界中,我们通过视觉验证签名即使如此,老练攻击者还是可以伪造一个签名,大多数都无法将它原始签名区别开来。

    In the real world, we validate signatures by sight, even though a skilled attacker can reliably forge a signature that most people cannot distinguish from the original.

    youdao

  • 如果攻击可以篡改认证硬件可能伪造数字数据直接发射设备中。

    If an attacker can tamper with the authentication hardware, it might be possible to inject falsified digital data directly into the device.

    youdao

  • 标记XSS攻击结合一起时—在已归档攻击常见用户可以知情情况下轻松地凭证执行一些操作因此伪造的。

    When this tag is placed with an XSS attack - which are the most common of the documented attacks - users can easily do something with their credentials without knowing it - thus, the forgery.

    youdao

  • 通过要求表单提交包含有效认证密钥然后才能处理可以使攻击者更难伪造其他用户提交的表单。

    By requiring that a form submission contains a valid authorization key before processing, you make it much more difficult for someone to forge a form submission for another user.

    youdao

  • 恶意客户机使用虚假地址伪造一个IP报文时,TCP出现问题,这会大量 TCPSYN报文攻击服务器

    The problem that can occur with TCP is when a rogue client forges an IP packet with a bogus source address, then floods a server with TCP SYN packets.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定