英语人>网络例句>attacks 相关的网络例句
attacks相关的网络例句

查询词典 attacks

与 attacks 相关的网络例句 [注:此内容来源于网络,仅供参考]

Although the types of Web attack have been evolving, Web attacks are existed specific characteristics. These characteristics will be assigned a term list according to the establishment of taxonomy. This research intends to provide a complete and explicit taxonomy for Web attacks.

即使如此,每一件 Web 攻击都存在著特殊特徵,将 Web 攻击的特殊特徵经过知识分类的建立,指派於分类表的术语清单中,以提供 Web 攻击详细的描述,为本研究关心的议题。

The results show that the proposed scheme can not only resist conspiracy attacks and forgery attacks essentially, but also provide anonymity and traceability simultaneously. In addition, itcan realize the unknowability ofgroup's secretby constructing a secure distributed key generation protoco.l As a resul,t the proposed scheme is more secure than the two schemes.

结果表明:该方案不仅能够从根本上抵抗合谋攻击和伪造签名攻击,而且在保证匿名性的前提下,能够真正实现签名成员身份的可追查性,同时通过构造安全的分布式密钥生成协议保证群私钥的不可知性,因此比现有方案具有更高的安全性。

Security analysis shows that this new scheme can not only resist the above-mentioned conspiracy attacks and forgery attacks essentially, but also provide anonymity and traceability simultaneously. Moreover, by constructing a secure distributed key generation protocol, the proposal realizes the unknowability of the group\'s secret.

分析表明:新方案能够根本抵抗合谋攻击和上述伪造签名攻击;在保证匿名性的同时可以真正实现签名成员身份的可追查性;通过引入可验证秘密共享并设计安全的分布式****生成协议,实现了****影子的可验证性以及群共享秘密的不可知性,系统安全性大大提高。

Almost all the elements for terror attacks were complete except for setting the zero hour for the attacks.

几乎恐怖袭击的所有要素都具备齐全,只是决定进攻的时间基地组织对前一次的袭击负责。

"For the day-to-day types of attacks people are dealing with, the goal of trying to determine where the attack originates remains very elusive because most of the attacks involve bots," Amoroso said.

如果仅就其所占用的带宽和每秒的数据流量来看,这次攻击的数量和规模在我们曾经见到过的类似攻击中也只能算是中等规模的攻击。

It is shown that the cryptosystem is secure against low-density attacks and the simultaneous Diophantine approximation attacks.

该算法是第一个基于背包问题的概率加密方案。

We also prove that the new scheme is not only indistinguishable against chosen-ciphertext attacks but also existentially unforgeable against chosen-message attacks.

可证明新方案在选择密文攻击下不可区分,在选择消息攻击下存在不可伪造。

Similar to the oxidation process of Si(111)-7×7 by water,the gradual insertion of S atom into Si_a-Si_s backbond is possible to occur,and the insertion pathway,which begins with directly destroying Si_a-Si_s backbonds by a foreign H_2S molecule,remains more favorable.However,when H_2S attacks at the Si_a site to split Si_a-Si_s backbond with its S or H atom,there is no distinct thermodynamical and kinetical difference between these two attacking behaviors,whereas Si_a-Si_s backbond is easilier broken when H_2O attacks at the Si_a site with its O atom.This mainly lies in the fact that the electronegativity of oxygen is larger than that of sulfur.

5类似于H_2O对Si(111)-7×7的氧化历程,S原子逐步插入Si_a-Si_s键是可以发生的,且H_2S直接打开Si_a-Si_s键进而使S原子插入的途径仍是动力学上较为有利的,但H_2S以S或H原子进攻Si_a位从而打开Si_a-Si_s键的两种反应机制在动力学和热力学上并没有表现出明显的差别,而当H_2O以O原子进攻Si_a位时,Si_a-Si_s键则较容易断裂,这应归因于O的电负性比S大。

The mobility and wireless links bring some problems which won't occur in lineate networks. Some technologies about security that used in lineate networks frequently become useless. In order to resist the attacks, we can take some traditional preventive measures, such as encryption and validation, but it's not enough for the security of MANET, because it can only reduce, not eliminate the attacks.

要抵抗对Ad Hoc网络的袭击,可以采用一些传统的入侵预防技术,比如加密和鉴权,但是入侵预防技术只能减少袭击的发生,不能完全消除袭击,因此,有必要引入入侵检测技术,在袭击的早期阶段就收集足够的袭击证据,采取相应的抵抗措施,使侵害损失大大降低。

The prisoners appeared to consider frontal attacks no less usual than outflanking attacks.

战俘们还指出正面攻击的次数不比侧翼攻击少。

第3/100页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
相关中文对照歌词
Mars Attacks
Panic Attacks
Gnars Attacks!
Lars Attacks!
Mars Attacks
推荐网络例句

I am accused of being overreligious," she said in her quiet, frank manner,"but that does not prevent me thinking the children very cruel who obstinately commit such suicide.""

客人们在卡罗利娜·埃凯家里,举止就文雅一些,因为卡罗利娜的母亲治家很严厉。

Designed by French fashion house Herm è s, this elegant uniform was manufactured in our home, Hong Kong, and was the first without a hat.

由著名品牌 Herm è s 设计,这件高贵的制服是香港本土制造,是我们第一套不配帽子的制服。

Do not 'inflate' your achievements and/or qualifications or skills .

不要 '夸大' 你的业绩或成果,条件或者技能。