1) brute-force attack
穷尽攻击
1.
As the encryption system is apt to be cracked by brute-force attack, a general encryption system model is established, which is immune from this attack and also can be used for text, voice or picture data encryption with keys of any length.
针对加密系统易遭到穷尽密钥攻击的情况,利用杂凑函数和对称密码,设计出一种可有效地抗穷尽攻击的通用文件加密系统模型。
2) exhaustive attack
穷举攻击
3) DES-brute-force
DES穷举攻击
1.
As a part of the grid system, the control system of the computational node is designedand implemented, and the system gotvery good effect when carrying through thetest of DES-brute-force.
此系统在DES穷举攻击实验中取得了非常好的效果,其它一些密码计算任务类似地也可用此系统分布式地实现。
4) Exhaust search attack
穷搜索攻击
5) Resource-Depletion DoS Attack
资源耗尽型DoS攻击
1.
The Application of Client Puzzle Protocol to Defend against Resource-Depletion DoS Attack;
Client Puzzle协议在防御资源耗尽型DoS攻击中的应用
6) exhaustive service
穷尽服务
1.
This paper studies asymmetric exhaustive service polling system with Bernoulli feedback,gives the distributions of queue lengths and sojoun times,and obtains some other results,in stationary condition.
研究了具有贝努里反馈的非对称穷尽服务轮询系统。
2.
The exhaustive service polling system with bulk arrival,and the distribution and mean of the queue length and the cycle time,service time and interval time of the server and the distributions of sojourn times are studied.
研究了具有批到达非对称的穷尽服务轮询系统的各站轮询时刻的平均队长、服务器的轮询周期和在各站的停留时间、访问间隔时间等的分布与均值以及顾客逗留时间的分布。
3.
This paper studies exhaustive service polling system with bulk arrival and Bernoulli feedback,gives the distributions of sojourn times,and some other results in stationary condition.
研究了具有批到达和贝努里反馈的穷尽服务轮询系统,给出了在平稳状态下逗留时间的分布以及其他一些结果。
补充资料:穷尽
尽头;止境:科学的发展是没有穷尽的。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条