可攻击的
- 与 可攻击的 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Aiming at the diversification of function system and homing modes in the development of submarine-launched torpedo, this paper analyses the advantages in operational application of wake homing torpedo based on its mechanism, such as stronger counter-countermeasure, higher speed, and higher target acquisition probability for selected target. It also analyses the limitations in tactics, such as limited attacking speed and the types of attackable targets, greater loss in torpedo range, difficult combination with wire-guidance, and inaccurate attack on moving targets.
针对国内外潜射鱼雷在功能体制和制导方式等技术环节多元化发展的局面,基于尾流自导鱼雷制导原理,分析了尾流自导鱼雷在作战使用上的技术优势:抗干扰能力强,适宜高速制,可选择攻击目标和捕获概率高;以及其战术局限性:可攻目标的类型及速度受限,鱼雷航程损失大,与线导结合困难,对机动目标攻击效果较差。
-
In this paper,we construct the transitive signature scheme based on bilinear pairings over elliptic curves or super elliptic curves,If one-more CDH problem is hard and standard signature scheme is unforgeable under adaptive chosen-message attack,our scheme is transitively unforgeable under adaptive chosen-message attack.
构造了基于椭圆曲线或超椭圆曲线上双线性对的可传递签名方案,并且证明了在one—more CDH问题是难的和标准签名方案是自适应选择信息攻击下不可伪造的条件下,该文的可传递签名是在自适应选择信息攻击下不可伪造的。
-
Security analysis shows that this new scheme can not only resist the above-mentioned conspiracy attacks and forgery attacks essentially, but also provide anonymity and traceability simultaneously. Moreover, by constructing a secure distributed key generation protocol, the proposal realizes the unknowability of the group\'s secret.
分析表明:新方案能够根本抵抗合谋攻击和上述伪造签名攻击;在保证匿名性的同时可以真正实现签名成员身份的可追查性;通过引入可验证秘密共享并设计安全的分布式****生成协议,实现了****影子的可验证性以及群共享秘密的不可知性,系统安全性大大提高。
-
They allow that the backend server could delegate the reader to identify the tag information. But the Fouladgar and Afifi's SiDES protocol will suffer from the replay attack, forgery attack, Denial-of-Service attack and fail to achieve the forward security. Although Lin's protocol uses timestamp to control the delegation, it does not keep forward security property under the same time frame.
在2007年,Fouladgar和Afifi首先提出了离线式SiDES协定,接著Lin也提出了TCD-RP协定,可让后端伺服器可以授权读取器辨识标签的资讯,但Fouladgar和Afifi的SiDES定理,会遭受重送攻击、伪造攻击、阻断服务攻击以及不具有向前安全性的特性;而Lin的协定虽然使用时戳来做授权的控制,但在相同的时间区段下运作,并不具有向前安全性的特性。
-
At-Will Attack Powers:'''When a power or some other effect lets you use an at-will attack power, you can choose to use one of your augmentable at-will attack powers, but you must use it unaugmented.
随意攻击威能:'''当一项威能或其他效应让你使用随意攻击威能时,你可以选择去使用你的任一项可强化随意威能,但你必需无强化地使用它。
-
Denial of Service is a deathful attack concept.
拒绝服务攻击 Denial of Service是一个非常致命的攻击概念,它让伺服器资源耗尽,直至不能提供服务,可分为本地攻击及网路攻击两种。
-
Active attack cryptanalysis based and fully scalable FGS encryption algorithm Aimed to the weakness of the current selective encryption algorithms in the sense of cryptanalysis, we design a active spacial—temporal correlation attack scheme and propose a both encryption strategies on base-layer and enhancement-layer. Not only the general FGS stream encryption is dealt with but also the case of FGST (fine granularity sealable temporal) is also well addressed.
2基于主动攻击安全的充分可扩展FGS加密算法针对目前压缩视频流加密算法所经常采用的选择加密方法,通过进行主动时域、空域相关性攻击,指出该类算法存在的问题,包括对于FGS基本层单独加密的安全分析,然后设计实现了基本层和增强层同时加密的安全策略,为保证FGS充分可扩展功能,算法同时还支持细粒度时域可扩展编码FGST(fine granularity scalable temporal)的情况。
-
The main function of this system is to implement automatic analysis of malicious codes'attacking behavior by the dynamical analyzing method. The system has the flowing characteristics: 1 Automatizing the malicious codes analyzing flow which includes the attack information collection, the attack information analysis and the attack recovery. 2 Collecting comparatively detailed attack information. 3 Detecting many kinds of automatic running techniques of malicious codes. 4 Detecting a kind of attack technique of hiding information in registration table and several kinds of attack techniques of hiding process. 5 Implementing visual show of attack reports. 6 Preventing attack from diffusing by the technique of virtual machine. 7 Detecting some new malicious codes.
该系统的主要功能是对恶意代码的攻击行为进行自动化分析,该系统采用的分析方法是一种恶意代码的动态分析方法,该系统具有以下特点:1实现了恶意代码分析流程自动化,包括攻击信息收集、攻击信息分析和攻击恢复的自动化。2收集较全面的攻击信息。3实现了对恶意代码的多种自启动技术的检测。4实现了检测一种在注册表中进行信息隐藏的攻击技术和几种进程隐藏的攻击技术。5攻击报告可视化显示。6通过虚拟机技术防止攻击扩散。7能够检测到一些新出现的恶意代码。
-
The power also allows a character to move and attack normally while underwater, even with cutting weapons such as axes and swords and with smashing weapons such as flails, hammers, and maces, provided that the weapon is wielded in the hand rather than hurled.
本异能同样可以令受术者在水中如常移动和攻击,只要武器是手持挥舞而非投掷的,无论是挥砍武器或钝击武器(比如链枷、战锤和硬头锤)都可如常进行攻击。
-
6 Chapter 10 Computer and Network Security 10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches 10.1.2 KINDS OF SECURITY BREACHES A human who exploits a vulnerability perpetrates an attack on the system.
人可利用脆弱性对系统进行罪恶的攻击。人可利用脆弱性对系统进行罪恶的攻击。
- 推荐网络例句
-
On the other hand, the more important thing is because the urban housing is a kind of heterogeneity products.
另一方面,更重要的是由于城市住房是一种异质性产品。
-
Climate histogram is the fall that collects place measure calm value, cent serves as cross axle for a few equal interval, the area that the frequency that the value appears according to place is accumulated and becomes will be determined inside each interval, discharge the graph that rise with post, also be called histogram.
气候直方图是将所收集的降水量测定值,分为几个相等的区间作为横轴,并将各区间内所测定值依所出现的次数累积而成的面积,用柱子排起来的图形,也叫做柱状图。
-
You rap, you know we are not so good at rapping, huh?
你唱吧,你也知道我们并不那么擅长说唱,对吧?