1) inference attack
推断攻击
3) Inversion attack
逆推攻击
1.
The research is focused on inversion attack on feedforward model of a linear feedback shift register with division circuit and generalized feedforward model founded on linear recursion sequence, so that advice on being resistant to inversion attack is presented.
本文研究了对基于除法电路设计的线性反馈移位寄存器前馈模型以及对基于线性递归变换设计的推广的前馈模型的逆推攻击问题,并据此提出抗逆推攻击的设计策略。
4) interrupted attack
阻断攻击
1.
Paper proves the protocol can withstand the passive attack of adversary under the DDH assumption,and the protocol can withstand the interrupted attack and key-control attack from malicious participants under the DL assumption and the random oracle model.
对Burmester等人提出的非认证组密钥协商协议的安全性进行了深入分析,指出该协议不能抵抗内部恶意节点发起的密钥协商阻断攻击和密钥控制攻击。
5) intrusion diagnosis
攻击诊断
6) attack interdiction
攻击阻断
补充资料:抽样推断
抽样推断是在随机抽样基础上推论有关总体的情况,即用样本对从中抽取样本的那个总体的数量特征作出具有一定可靠程度的估计和判断。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条