英语人>网络例句>可攻击的 相关的搜索结果
网络例句

可攻击的

与 可攻击的 相关的网络例句 [注:此内容来源于网络,仅供参考]

Firstly, some basic concepts about ECC are introduced;then the scalar multiplication under affine coordinate is discussed, we make a research and analysis of the side channel attack of scalar multiplication used in portable device, give out a new scalar multiplication algorithm which has the advantage of efficiency over other protected algorithm; and an improvement of the standard scalar multiplication algorithm proposed by IEEE1363 is made with the efficiency increasing by about 10%; at last, we deal with the using of complex multiplication in scalar multiplication algorithm, we generalize the methods and deduce a complete computing procedure, with proposing a new method which used several different fast endomorphism ,we give out an approach to boost the scalar multiplication with fast endomorphism.

本文首先介绍了椭圆曲线密码的有关基本概念;其次介绍了椭圆曲线上点的标量乘法在仿射坐标下的计算,对一般便携设备上的椭圆曲线点的标量乘法的边信道攻击做了研究与分析,给出了一种在效率上优于其它可抵抗边信道攻击的标量乘法的新算法,并对IEEE P1363 标准给出的标量乘法做了改进,使得标量乘法的运算效率提高了近10%;最后介绍了利用复乘计算标量乘法的方法,对已有的方法进行总结归纳,得出完整的计算过程,并针对两类超奇异椭圆曲线给出了一种利用多个可快速计算的复乘的标量乘法,得出一类普遍的结果,并给出了进一步用复乘加快标量乘法的思路。

But this kind of invasion cannot avoid the detection of IDS using the protocol analysis technology.(2) In the invasion activities of hackers using TCP, the actions about scanning and Denial of Service utilizing the three-handshake protocol are general. The characteristics of the actions are dynamic for its lie on a series of packets from beginning to end. So the IDS using the traditional pattern match technology cannot detect these actions effectively, but the IDS using the protocol analysis technology can do its.

2在利用TCP协议进行的黑客活动中,比较常用的是利用三次握手过程进行扫描行为和拒绝服务攻击,这类攻击的特征必须根据前后的一系列数据包才能确定,因此攻击特征具有动态性,很不适合于采用模式匹配作为信息检测技术的IDS,但协议分析技术可较为迅速地检测出这类攻击。

The attack's nuisance value is increased because mobile phone networks also send notifications of new voicemail by sms,so an attacked phone may stop advising of new voice messages too,it warned.

它警告:这种攻击的危害增长是因为移动电话网络也会通过短信发送新语音邮件的通知。所以受到攻击的手机可也以停止新的语音信息的提示。

The attack's nuisance value is increased because mobile phone networks also send notifications of new voicemail by sms, so an attacked phone may stop advising of new voice messages too, it warned.

它5800xm最新软件:这种攻击的危害增长是因为移动电话网络也会通过短信发送新语音邮件的通知。所以受到攻击的软件可也以停止新的语音信息的提示。

The attacks nuisance value is increased because mobile phone networks also send notifications of new voicemail by sms,so an attacked phone may stop advising of new voice messages too,it warned.

它警告:这种攻击的危害增长是因为移动电话网络也会通过短信诺基亚手机5300价位新语音邮件的通知。所以受到攻击的手机可也以停止新的语音信息的提示。

The attacks nuisance value is increased because mobile phone networks also send notifications of new voicemail by SMS, so an attacked phone may stop advising of new voice messages too, it warned.

它警告:这种攻击的危害增长是因为移动电话网络也会通过短信发送新语音邮件的通知。所以受到攻击的手机可也以停止新的语音信息的提示。

Social aggression is a trainable trait, meaning it can be directed and controlled.

这是可训练的攻击形式,也就是说可被指引和控制。

The campaign was quite creative, there were many new tricks like the attackable rock and capturing the castle when it was damaged enough.

这部战役极富创意。有很多新的技术效果,比如可攻击的岩石、攻击城堡从而占领它。

The scheme adopts a multi-agent system and a threshold secret share technology, in which the secret information and the shares are carried by many different agents, adopts D-H key exchange technology to encrypt intermediate result to hide real intention of agent, to protect the privacy of agents and to enhance the reliability and the fault-tolerance capability of the mobile agent system. A mobile agent with limited authorization can sign a message on behalf of a user at far-end without divulging the user s private key. In order to avoid rebuilder attack the time-stampe mechanism is adopted.

运用信息加密和身份认证技术,实现了移动Agent和Agent平台间双向身份认证,有效地防止了恶意Agent对Agent平台的攻击或越权访问以及恶意Agent平台对Agent的攻击;引入远端可信任的代理平台作为数据处理平台,采用多代理系统和门限秘密共享技术,将加密信息和密钥由多

Came to the lava cliffs fall zone, take the left side of the road directly in a group of birds where there are two columns below, the jump down (not dead, I am sleepy in this place as long as two hours), skip left after the first go, be reminded to observe, and now moving about in the magma, but can only be waist high magma, there is a need to see more of the terrain, do not waste HP, now jumped down, back to the left跳崖Department, went to is located in Magma, Fire Dragon Shou equipment can move around a half height of magma, first up, get a weapon, and then down, has been in the end, to continue filing filed walk inside the wind can be magic, the way to the red chest is a green precious stones, to increase the wind magic attack, and get back only to return to bandage things MM has emerged, but said a few left, and then returning to fight BOSS, the BOSS to attack his tail, the beginning of the head is of no use, finished BOSS, while red chest after using wind magic jump can be achieved

掉下悬崖来到了熔岩地带,直接走左边的路,在一群鸟的地方,下面有两根柱子处,往下跳(不会死的,我在这个地方困了2个小时之久),跳下后先往左走,得到火龙守,现在可以在岩浆中走动了,但是只能是下半身高的岩浆,所以要多看地形,不要白白浪费HP,现在可以往下跳了,回到跳崖处往左,来到岩浆地处,装备火龙守,可在半身高岩浆里走动,先往上,拿到武器一把,再往下,一直到底,存档处存档继续往里走可得到风魔法,途中的红宝箱是绿宝石,增加风魔法攻击的,等回来时才能拿,返回事绷带MM又出现了,不过说了几句就走了,然后返回途中打BOSS,此BOSS要攻击他的尾巴,开始时打头是没有用的,打完BOSS,途中红宝箱利用跳后的风魔法可以取得

第1/15页 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

On the other hand, the more important thing is because the urban housing is a kind of heterogeneity products.

另一方面,更重要的是由于城市住房是一种异质性产品。

Climate histogram is the fall that collects place measure calm value, cent serves as cross axle for a few equal interval, the area that the frequency that the value appears according to place is accumulated and becomes will be determined inside each interval, discharge the graph that rise with post, also be called histogram.

气候直方图是将所收集的降水量测定值,分为几个相等的区间作为横轴,并将各区间内所测定值依所出现的次数累积而成的面积,用柱子排起来的图形,也叫做柱状图。

You rap, you know we are not so good at rapping, huh?

你唱吧,你也知道我们并不那么擅长说唱,对吧?