Chosen-Key Attack 选择密钥攻击
Compromised-Key Attack 盗取密钥攻击
Related-key attack 相关密钥攻击
Trojan Public Key Attack 木马公钥攻击
fake personal key attack [计] 伪造私人密钥破译
equivalent key attack algorithm 等效密钥攻击算法
stego-key attack 隐写密码攻击
collusion key attack 共谋密钥攻击
Trojan Wrapped Key Attack 加密的木马密钥攻击
This article proposed scans the model based on wooden horse's crack, and realized to its attack principle as well as the key attack technology has done the further research.
该文提出了基于木马的漏洞扫描模型,并对其攻击原理以及关键攻击技术实现作了进一步的研究。
At present, there are three kinds of traitor tracing schemes against collusion key attack, which are symmetrical traitor tracing schemes and dissymmetrical traitor tracing schemes;
目前,对抗共谋密钥攻击的叛徒追踪方案主要有对称追踪方案、非对称追踪方案、门限追踪方案;
Germany's attack has been weakened by the loss of some key players through injury.
德国队几名主力队员因伤不能上场,削弱了进攻力量。
应用推荐