攻擊原 的英文怎麼說

中文拼音 [gōngyuán]
攻擊原 英文
aggressinogen
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • : Ⅰ形容詞1 (最初的; 原來的) primary; original; former 2 (沒有加工的) unprocessed; raw Ⅱ動詞(原...
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  1. The quadratic equation algorithm utilizes spa, dpa and principle of rsa - crt, converts the complicated prime factorization of a large composite number into finding the solution of a quadratic equation and gains the private key at last

    該方法綜合利用spa 、 dpa手段和rsa - crt演算法理,將rsa演算法的大數分解難題轉化為以私鑰p或q為解的二次方程,最終獲取演算法私鑰值。
  2. We vacate the judgment on remedies, because the trial judge engaged in impermissible ex parte contacts by holding secret interviews with members of the media and made numerous offensive comments about microsoft officials in public statements outside of the courtroom, giving rise to an appearance of partiality, ' ' the court said

    判決說: "由於傑克遜法官同外界進行了法律不允許的接觸,比如同媒體進行秘密談話,在法庭外公開對微軟做出了許多性的評論,因此給人留下一種對微軟持有偏見的印象,因此我們推翻判,以進行補救。
  3. We vacate the judgment on remedies, because the trial judge engaged in impermissible ex parte contacts by holding secret interviews with members of the media and made numerous offensive comments about microsoft officials in public statements outside of the courtroom, giving rise to an appearance of partiality, " the court said

    判決說: "由於傑克遜法官同外界進行了法律不允許的接觸,比如同媒體進行秘密談話,在法庭外公開對微軟做出了許多性的評論,因此給人留下一種對微軟持有偏見的印象,因此我們推翻判,以進行補救。
  4. Why is internet so frangible ? after analyzing many events of network attacks and invalid intrusions, we found that the frangibility of internet is due to lack of the firewall to protect the network security

    造成internet網路不安全局面的因很多,網路和非法入侵的手段也很多,但是究其根本因,是缺乏一個能保證網路高度安全的防火墻。
  5. Another reason is that it is loth to give ammunition to the protectionist lobby

    另一個因是它討厭給貿易保護主義議員(中國)提供彈藥。
  6. Information communication security, beijing, china, nov. 11 - 14, 1997, pp. 217 - 222. 11 michels m, p horster. on the risk of discruption in several multiparty signature schemes

    最後,我們指出chen等人提出的方案不能抵抗內部的一個根本因是在實際應用中,不能保證所有簽名者操作的「同時」 。
  7. 2 ) a new one time password authentication scheme. the original password authentication is vulnerable to guess attack and server personating attack. to overcome the vulnerability of this scheme, this paper designs a simple and efficient password authentication schema. the enhanced schema can improve the system ' s ability to defend all kinds of the attacks without using any cryptosystems

    2 )新的一次性口令認證機制。針對postgresql有認證機制具有易遭受口令猜測和服務器端假冒的缺陷,本文設計了一種簡單而有效的口令認證機制。該認證機制不需要使用任何加密系統,就能有效加強對各種手段的防範能力。
  8. With the conclusion of a burst activity, the lactic acid level is high in the body fluids, leaving the large animal vulnerable to attack until the acid is reconverted, via oxidative metabolism, by the liver into glucose, which is then sent ( in part ) back to the muscles for glycogen resynthesis

    由於突發性行為的結果,致使動物體液里的乳酸含量上升,在乳酸通過氧化新陳代謝、在肝臟里形成葡萄糖、回落到正常含量前,動物往往具有較強的性,那些生成的葡萄糖(一部分)然後輸送回肌肉進行糖二次合成。
  9. It was originally envisioned as an air superiority fighter for use against the soviet air force, but is equipped for ground attack, electronic warfare and signals intelligence roles as well

    這是來的設想,作為空中優勢戰斗機使用,為抗蘇聯空軍但配備用於地面,電子戰和信號情報的作用等
  10. ( 4 ) presents the methods of detecting and protecting the ip hijack and smurf attack based on analyzing their attacking principle

    ( 4 )在分析ip劫持和smurf實施理的基礎上,提出這兩種的檢測方法和防範技術。
  11. The termless security of quantum cryptographic key protocol is based on the quantum non - clone principle and heisenberg uncertainty principle. whilst, these two characteristics mentioned above contributes greatly to solve the problems of low transmitting rate, complicated operation and forge - identity assault in the bb84 protocol

    量子密鑰協議的無條件安全性能主要建立在量子不可克隆定理和heisenberg的測不準理兩大理論基礎上的,但也正是由於量子的這兩種特性導致在bb84協議中存在了傳輸效率低下、操作復雜、假冒身份等方面的問題。
  12. " the lord has rejected all my strong men in my midst ; he has called an appointed time against me to crush my young men ; the lord has trodden as in a wine press the virgin daughter of judah

    哀1 : 15主輕棄我中間的一切勇士、招聚多人文作大會我、要壓碎我的少年人主將猶大居民踹下、像在酒中一樣。
  13. Disney classic role, it is great tornado attack, a primitive tribal its appearance, everything has been very interesting, oh operations guide : about the use of the keyboard for movement on the key or the space bar hopping

    迪士尼經典的角色,它擅長的是旋風始部落中有它的出現,一切都變得十分有趣哦操作指南:使用鍵盤左右進行移動,上鍵或空格鍵跳躍
  14. Introduction : disney classic role, it is great tornado attack, a primitive tribal its appearance, everything has been very interesting, oh operations guide : about the use of the keyboard for movement on the key or the space bar hopping

    略:迪士尼經典的角色,它擅長的是旋風始部落中有它的出現,一切都變得十分有趣哦操作指南:使用鍵盤左右進行移動,上鍵或空格鍵跳躍
  15. Man continually wages war on them, for they contaminate food, carry diseases, or devour crops.

    人類不斷地向它們發出因是它們污染食品、傳染疾病或吞噬莊稼。
  16. At the same time, it also explains the theories on hacker attack as usual, including tcp syn flooding, ping flooding and udp flooding and so on

    文章在介紹相關安全防禦的同時對于常見的黑客攻擊原理也做了說明,包括tcpsyn湮沒、 ping湮沒、 udp湮沒等。
  17. Only with the deep understanding of the knowledge on the typical attack methords and theories, we can take some more effective and more specific defending measures, and decrease the loss to the lowest level

    只有對各種手段及攻擊原理有了深入認識,才能採取更有效、更有針對性的防範措施,從而把損失降低到最小程度。
  18. This paper introduces the typical attack methords and theories in internet, and discusses the security features and defending measures of intranet according the real state of dalian diesel group ' s intranet. based on this, the technology of firewall, anti - virus and intrusion detection is especially analysed

    本文詳細介紹了因特網上目前常見的各種手段和攻擊原理,並結合大連柴油機廠內部網路的實際情況對intranet的安全特性和防範措施進行了一定探討,其中重點分析了防火墻技術、防病毒技術和入侵檢測技術。
  19. Trace back algorithm for distributed denial of service attack

    分散式拒絕服務型攻擊原理及防範措施
  20. Analysis on principle and some defense strategy of attack of ddos

    攻擊原理剖析和防禦策略
分享友人