scheme of attack 中文意思是什麼

scheme of attack 解釋
進攻計劃
  • scheme : n 1 計劃;方案;路線;設計。2 系統;配合;組織。3 綱目;表;清單;分類表;大綱。4 謀劃,策劃;詭...
  • of : OF =Old French 古法語。
  • attack : vt 1 攻擊 (opp defend)。2 非難,抨擊。3 著手,動手,投入。4 (疾病)侵襲。5 【化學】腐蝕。n 1 ...
  1. 2 ) a new one time password authentication scheme. the original password authentication is vulnerable to guess attack and server personating attack. to overcome the vulnerability of this scheme, this paper designs a simple and efficient password authentication schema. the enhanced schema can improve the system ' s ability to defend all kinds of the attacks without using any cryptosystems

    2 )新的一次性口令認證機制。針對postgresql原有認證機制具有易遭受口令猜測攻擊和服務器端假冒攻擊的缺陷,本文設計了一種簡單而有效的口令認證機制。該認證機制不需要使用任何加密系統,就能有效加強對各種攻擊手段的防範能力。
  2. Under assumptions of kea3, a decision diffie - hellman and a variant of target collision resistance tcrv, the new scheme is proved secure against indistinguishable adaptive chosen ciphertext attack ind - cca2

    Rd提出的elgamal deg方案具有相同的效率和帶寬,而deg方案在2004年亞密會上證明為選擇密文攻擊ind - cca1安全,而新的體制則是ind - cca2安全的。
  3. In this paper, the mechanism, methods of and countermeasures to denial of services attacks are discussed. after that, several packet marking schemes for traceback are reviewed and some improvements to the basic packet marking scheme are given, which reduce the workload and false positive rate in the attack tree reconstruction. knowing that in existing packet marking schemes, router marks packets with fixed probability, which results in that many packets are required in path reconstruction and that attacker could encumber path reconstruction via spoofed marking information

    在本文中,我們首先研究了拒絕服務攻擊的攻擊機制、方法及其對策,並對以包標記的方式追蹤拒絕服務攻擊的來源的各種方法進行了深入的研究,分析了它們各自的優缺點,並對基本包標記方案作了改進,使得其攻擊路徑重構時的運算量和重構的誤報率在原有基礎上大為降低,達到或超過了其他一些方案的水平。
  4. In the following part, trajectory design and computation are given, including fight scheme and control & navigation laws. through the design and computation, the profile of attack angle, trajectory angle and pitch angle are designed. these works provide theoretical fundamentals for dynamics analysis and practical trajectory design

    第三部分內容是對導彈的彈道進行設計與計算,給出導彈在各段的飛行方案或導引規律。設計出導彈在整個飛行過程中的質點彈道,迎角、彈道傾角和俯仰角等參量在導彈攻擊目標過程中的變化規律,為進一步的質點系彈道和動態分析提供理論基礎。
  5. It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem

    最後,就有關ddos攻擊反向追蹤問題,從四個方面對其解決方案進行了研究:在分析比較幾種反向追蹤演算法的基礎上,著重研究了代數方法編碼反向追蹤信息的方案,該方案把追蹤重構問題當作多項式重構問題,使用代數編碼理論技術提供魯棒的傳送和重構方法,是dos攻擊過程中的反向追蹤問題的一種新的解決方法; ddos陷阱作為反向追蹤的工具,引誘攻擊者相信自己成功與所需的傀儡主機通話,令人信服地模擬出潛在ddos攻擊體系結構;基於源的ddos防禦方法作為反向追蹤有用的補充,將防禦系統部署在源網路,通過監控雙向流量檢測攻擊和限制速率終止來自源的攻擊;基於向後倒推的防禦ddos的路由機制把ddos攻擊看作擁塞控制問題,添加功能到每個路由器來檢測並優先丟棄可能屬于攻擊的包,通過向後倒推上級路由器也得到通知而把這樣的包丟棄。
  6. Both systems are used to decrease the damages due to the compromise of secret key. a new strong ( t, n ) - key - insulated public - key encryption scheme based on the cdh assumption is proposed according to the ( t, n ) - key - insulated public - key encryption model and security definition presented by yevgeniy - jonathan - moti. the new scheme has been proved against chosen - cipertext attack in random oracle

    採用yevgeniy - jonathan - moti提出( t , n )密鑰隔離公鑰加密的一般模型和安全性定義,提出基於cdh假設的強( t , n )密鑰隔離公鑰加密方案,並依據其安全性定義證明新方案在隨機神諭模型下是抗選擇密文攻擊的。
  7. Paulucci, in raising objections to tolls scheme, proposed a plan of direct advance and attack, which he declared to be the only means of extricating us from our present precarious position, and from the trap so he called the drissa camp in which we were placed. during all this discussion, pfuhl and his interpreter woltzogen who was his mouth - piece in the court world were silent

    按他的話說,這個計劃能使我們從無所適從和我們所處的陷阱中擺脫出來他是這樣稱呼德里薩陣地的,在進行這些爭論時,普弗爾和他的翻譯官沃爾佐根他與宮廷關系的橋梁沉默不語。
  8. In the new guidance scheme, the flight trajectory restrained by a function of energy is tracked by commanding both the angle of attack and angle of bank

    控制攻角和傾斜角,用來跟蹤一由能量函數界定的飛行軌跡。該控制方案包括一個軌跡規劃器和一個控制律。
  9. The scheme is more efficient than the basic cramer - shoup ' s encryption scheme while its security against adaptive chosen cipher - text attack can be proved under the hardness assumption of decisional difhe - hellman problem. 2. study existing digital signature and develop an efficient digital signature based on certificate data

    在分析基本數字簽名方法的基礎上,設計並實現了基於離散對數困難問題( dlp ) ,輔以hash函數和公鑰證書進行簽名和驗證簽名的數字簽名方法。
分享友人