说明:双击或选中下面任意单词,将显示该词的音标、读音、翻译等;选中中文或多个词,将显示翻译。
您的位置:首页 -> 词典 -> 插入攻击
1)  interpolation attacks
插入攻击
1.
The complexity and the degree of the algebraic expression for the Sbox are symbols of resistance of block ciphers against the interpolation attacks.
插入攻击是一种针对代数式次数和复杂程度低的分组密码的攻击方法。
2)  interpolation attack
插值攻击
1.
Due to the property that the 3-round Advanced Encryption Standard(AES) ciphertexts have a polyno-mial expression with a low degree of less than 255,a method of interpolation attack on the round-reduced AES is presented,that is,through the Lagrange interpolation formula,the polynomial with 254 degrees can be obtained using 255 values.
针对AES(Advanced Encryption Standard)算法3轮加密后的密文代数表达式具有的次数较低(低于255)的特点,提出了低轮AES密码的插值攻击方法。
2.
In this article,we introduce the basic theory and several major methods o f interpolation attack firstly;then,our con-clusion on polynomial expression is given;at last,we analyze how to chose the field and give the conclusions.
首先简介了插值攻击的基本原理和几种实施方法。
3)  intrusion attack
入侵攻击
1.
Thus the firewalls then can prevent those intrusion attacks from being gotten into the intranet.
本研究分析与评估了防火墙与入侵检测系统的特点和弱点,提出一个理论模型,建立防火墙与入侵检测系统的联动机制,可由入侵检测系统拦截的攻击警告,修改防火墙的规则设定,使得防火墙可以阻止该入侵攻击。
4)  injection attack
注入攻击
1.
Hidden field to protect against malicious script injection attacks,SQL injection attacks and database security issues such as an indepth analysis and research,given the appropriate security configuration strategies,as well as specific program design techniques,reducing the hacking site chance to improve the security of the site.
针对隐藏域保护、恶意脚本注入攻击、SQL注入攻击以及数据库安全保护等问题进行了深入的分析和研究,给出了相应的安全配置策略,并提出了具体的程序设计技巧,降低了黑客入侵网站的机率,提高了网站的安全性。
5)  SQL injection attacks
SQL注入攻击
1.
A New Strategy for Preventing SQL Injection Attacks;
SQL注入攻击的一个新的防范策略
2.
Research on technique of SQL injection attacks and detection;
SQL注入攻击及其防范检测技术研究
3.
According to the security of database,introducesthe concept of SQL injection atta-cks,and analyses detailedly some methods of attacking,puts forward many measures to protect from SQL injection attacks,which reduces extremely possibility of SQL injection attacks and try best to protect database,and finally uses a project example to explain how to use ASP.
NET下数据库的安全性,介绍了SQL注入攻击的概念,详细分析了几种攻击方式,并提出一些防范SQL注入攻击的措施,极大地减少SQL注入攻击的可能性,尽可能保证数据库安全,最后通过项目实例说明如何运用ASP。
6)  SQL Injection Attack
SQL注入攻击
1.
Discussion on the principle and recovery of SQL injection attack;
浅议SQL注入攻击的原理及防御
2.
SQL Injection Attack and the Solution to Prevent it Based on ASP.NET;
基于ASP.NET的SQL注入攻击及防范解决方案
3.
This article introduces a typical application layer attacks against networks,SQL injection attack.
介绍了一种典型的针对网络应用层的攻击——SQL注入攻击,在分析了SQL注入攻击的形式、特点及攻击手法的基础上提出了一种基于规则的检测SQL注入攻击的方法,并给出了在Snort中的实现形式,使得SQL注入攻击在网络边缘就被识别并阻隔,以此保护服务器及内部网络的安全。
补充资料:插入载体
分子式:
CAS号:

性质:在基因工程早期用过这种概念,指来自天然的载体用酶打开一个切口,从而使外源DNA片段而引起的突变。 

说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条