说明:双击或选中下面任意单词,将显示该词的音标、读音、翻译等;选中中文或多个词,将显示翻译。
您的位置:首页 -> 词典 -> 瞬时攻击
1)  zero-day attack
瞬时攻击
1.
The current status of development in firewall technology and the active-defense thought in face of the zero-day attack has been analyzed and studied,as well as the active-defense in firewall system.
分析和研究了防火墙的技术发展现状以及面对瞬时攻击的主动防御思想,探讨了防火墙系统中主动防御。
2.
This paper analyzes and researches the evolution of firewall technology and active prevention against “Zero-day Attack”, and discusses the implement mechanism of Active Prevention’s Mechanism in Firewall System.
分析和研究了防火墙的技术发展现状以及面对瞬时攻击的主动防御思想,探讨了防火墙系统中主动防御的实现机制。
2)  impact time
攻击时间
1.
Therefore,it is important to control both impact time and impact angle for flight vehicle’s homing problem simultaneously.
在攻击无人机群协同攻击中,为了提高机群的整体突防能力,达到最佳的攻击和作战效能,有必要同时控制无人机的攻击角度和攻击时间。
2.
The virtual-leader is introduced,which would fly straightly to the target from the designated impact angle at the designated impact time.
构造一枚虚拟领弹按指定的攻击时间和攻击角度以直线飞向目标。
3)  timing attack
计时攻击
1.
The most widely accepted defense against timing attacks is to perform RSA blinding,which has a performance penalty.
为了防御计时攻击,一般采用以"绑定法"为代表,影响运算性能的模幂算法。
2.
This paper describes the basic concept, principles, and history of timing attack, the readers can thus have a basic understanding of this area.
计时攻击是指攻击者通过分析执行加密算法所需要的时间,从而获取密钥信息的攻击方式。
3.
The most widely accepted defense against timing attacks is to perform RSA blinding,which has a performance penalty.
为了防御计时攻击,一般采用以“绑定法”为代表,影响运算性能的模幂算法。
4)  timing attack
定时攻击
1.
Researching on timing attack at the accelerating implementation algorithm of RSA
加速RSA算法的定时攻击研究
2.
This thesis firstly introduces the basic theory of timing attack and the discription of the related algorithms, and then taking the modular exponentiations for example, emulates the attack process, finally analysises the advantages, several prob- lems waiting for further study and the trend of timing attack.
定时攻击是指攻击者试图通过分析执行加密算法所需要的时间,从而对加密系统进行的破解攻击。
5)  timing attack
时间攻击
1.
A timing attack to rerouting-based anonymous communication was presented according to these problems.
本文分析了重路由匿名系统的抗攻击性问题,重点分析了一种针对重路由匿名通信系统的时间攻击方式。
2.
This paper,proposes a general anonymous communication model based on rerouting,and a timing attack model also has been presented according to this model.
时间攻击是指对手研究信息穿过系统的时间来找出信息发送者和接收者之间的相关性,对支持交互式的低延时匿名通信系统形成一种巨大威胁。
6)  timing attacks
时间攻击
1.
Timing attacks aimed at a cryptosystem has caused great interest,but the vulnerability of elliptic curve crytptology to timing attacks has not been widely studied.
加密体制的时间攻击已经引起了人们的关注 ,而有关椭圆曲线加密算法ECC的时间攻击的研究相对较少 ,就在这方面作一下探讨。
2.
On the other hand,we study the ability of the generators to resist the timing attacks.
针对缩减类序列目前研究存在的主要问题,利用概率理论和时间攻击技术分析了输出率为1/r的缩减类生成器的存储空间,指出具有该输出率的缩减类型序列生成器的存储空间不能为空。
3.
Timing attacks aimed at a cryptosystem has been attracted great interest,but the vulnerability of Elliptic Curve Cryptology to timing attacks has not been widely studied.
加密体制的时间攻击已经引起了人们的关注,而有关椭圆曲线加密算法ECC的时攻击的研究相对较少,本文就在这方面作一下探讨。
补充资料:RSCG01-5000管式超高温瞬时(UHT)杀菌机

应用:
应用于乳品、果汁或茶等流体物料,在管式热交换器中对物料进行超高温瞬时杀菌处理(UHT)。

工作原理:
该设备为全自动设备,其运行操作可以分为以下四个步骤:
1. 设备预杀菌
2. 物料杀菌
3. 无菌中间清洗
4. 最终清洗
     在正式生产前,设备在高压下进行30分钟的热水循环,以完成对设备物料通道的预杀菌处理,随后,将设备逐步冷却到生产温度,然后进入待料状态。
当下游设备(包装机、无菌罐等)准备就绪后,即可进行生产(物料杀菌)。
每个生产周期结束后,都要用碱液或酸液对系统进行清洗。
在设备的设计中采用了再生热交换技术,提高热传输效率,节约能源。

设备组成及技术指标:
由物料桶、输送泵、管式换热器、保持器、过热水系统、CIP清洗系统及控制系统等组成。
操作系统采用图象式人机对话操作界面,便于随时直观地掌握设备各组件的运行状态;控制系统对设备进行温度实时控制、采集和存储。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条