查询词典 sneak attack
- 与 sneak attack 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Trip:A bearhound that jits with a bite attack can attempt to trip its opponet(+12 check modifier) as a free action without having to make a touch attack or provoking attacks of opportunity.
绊摔:熊猎犬在用啮咬(+12)命中敌人后,以一个自由动作绊摔对方,即使绊摔鉴定失败,对方也不能反绊摔熊猎犬。
-
To address this problem, a new method of security analysis of QKD protocols is introduced. Based on the equivalence attack model of QKD protocols which is refered to Biham's proving, the protocol is divided into two parts: the body and the attack, then a Petri-net model of BB84 is obtained, and a security analysis is followed.
为了简化量子密码协议的安全性证明以及建立一种通用的证明方法,基于Petri 网提出一种量子密钥分配协议的形式化分析方法,根据Biham 的等效对称化攻击模型,将协议分为主体模型和攻击模型两部分,建立了BB84 协议的Petri 网模型,然后对模型进行安全性分析,分析结果表明, BB84协议是无条件安全的。
-
The chess pieces are used to both attack and defend from attack, against the other players chessmen.
的棋子被用来攻击和防守都免受攻击,对其他球员棋子。
-
Draconic Outburst (11th level): When you spend an action point to make an attack, each enemy adjacent to you takes damage equal to 5 + your Constitution modifier when you resolve the attack.
强烈爆发(11级):当你使用一个行动点进行攻击时,你可以决定每个邻近的敌人受到5+体质调整值的伤害。
-
We formalized a notion of security for partial delegation with warrant proxy signature schemes, i.e., existentially unforgeability under an adaptive chosen-message attack and an adaptive chosen-warrant attack. We compare the new model with the previous formal models and identify their weakness.
重新给出了具有证书的部分代理签名的安全定义,即适应性选择消息攻击和适应性选择授权文件攻击下的不可存在性伪造,建立了形式化安全模型。
-
We formalize a notion of security for proxy multi-signature and multi-proxy signature, i.e., existentially unforgeability under an adaptive chosen-message attack and an adaptive chosenwarrant attack.
本文给出了代理多重签名和多重代理签名的安全定义,即适应性选择消息攻击和适应性选择授权文件攻击下的不可存在性伪造,并建立了形式化安全模型。
-
They had the ability to launch an attack to the southeast, or a flanking attack on the Eighth Army.
他们拥有向东南方向发动进攻或侧击第8集团军的能力。
-
In this AACS-compatible JEF system, many attack points exist and can be explored to defend it. Furthermore, multiple attack points can form multi-point collusion attacks, which also engage the proposed system.
在本技术中,我们探讨了许多可能的攻击点以及抵抗措施,此外,我们提出了多重攻击点所产生的串谋攻击以及合适的抵抗对策。
-
IT者网站提供英文翻译,未经授权请勿转载】 Atttack incident data-base according to network hacker (Web Hacking Incidents Database, by Web application safe and allied WASC initiates) year reports information shows, filch gold or the biggest motivation that purloin data still is not hacker attack, although involve data in recent years,larcenous attack shows clear ascendant trend.
黑客攻击网站的主要目的是损毁网站声誉?根据网络黑客攻击事件资料库(Web Hacking Incidents Database,由Web应用安全联盟WASC发起的)的年度报告信息显示,窃取钱财或者盗取数据仍然不是黑客攻击的最大动机,虽然近年来涉及数据盗窃的攻击呈明显上升趋势。
-
The maximum of the L/D appear at about 30-degree angle of attack. The bugle of the reentry module drops the trim angle. Pyrochemistry reaction largen Ca, Cn, diminish L/D and the trim angle. The variational tendency of aerodynamic characters with angle of attack in high altitude (higher than 105km) is different from that of in low altitude (lower than 105km).
返回舱凸出物使配平攻角减小;高温热、化学非平衡效应使轴向力和法向力系数有所增大,升阻比在数值上有所减小,配平攻角略有降低;返回舱0°~180°攻角范围内的气动力特性高空(105km以上)随攻角的变化趋势与低空(105km以下)的变化趋势不同。
- 相关中文对照歌词
- Atak Of Da Bal-Hedz
- Attack
- Heart Attack
- Heart Attack
- Mr. Universe
- Attack
- Heart Attack
- Heart Attack Man
- Heart Attack
- Penguin Attack
- 推荐网络例句
-
The shaping method of noncircular part and the tool holder's radial motion characters in noncircular turning process are discussed in detail in the thesis.
论文详细研究了非圆零件的成型方法和加工过程中刀架的径向运动规律。
-
I have not really liked him,I do not like his this kind of disposition.
我没有真的喜欢他,我不喜欢他的这种性格。
-
As we know the price of traditional product is composed of the cost and the profit of the company involving market competition, monopolizes and many other factors.
我们知道作为传统的商品,定价的模式往往是在成本的基础上增加厂商的预计利润而形成其价格,当然也要考虑到市场竞争、垄断等其他方面的因素。