3) activity attacks
活动攻击
1.
Some digital signature schemes used today are based on public key systems, and the public key is saved in the key directory of a third trusting party, so activity attacks and collusion attacks take place easily.
现有的一些数字签名算法都是基于公钥密码体制 ,并且公钥都是保存在可信任的第三方维护密钥目录里 ,很容易遭受到活动攻击和假冒攻击 ,针对这些缺点 ,提出了基于自证明公钥系统的多重数字签名算法。
4) dynamic attack
动态攻击
1.
In this paper, a secret sharing scheme against dynamic attack is proposed.
文章提出了一个可抗动态攻击的门限密钥共享方案 ,采用了密钥链和身份链 ,实现了系统密钥的自动更新和参与者的子密钥自动更新。
5) passive attack
被动攻击
1.
With respect to information hiding system under passive attacks,a concrete statistical model of information hiding system was built and its performance was analyzed,including security,distortion distance metric,and channel capacity.
针对被动攻击下的信息隐藏系统,建立一个具体的信息隐藏统计模型,从安全性、失真距离度量、信道容量3个角度全面分析该模型。
6) slide attack
滑动攻击
1.
This paper discusses the basic principle of the slide attack thought, and proposes a concept of the interrup- tion slide attack.
论文讨论了滑动攻击的基本原理,提出了截断滑动攻击的概念,利用截断滑动攻击分析了改进的LEX流密码算法。
补充资料:发动
①使开始:~战争ㄧ~新攻势。②使行动起来:~群众。③使机器运转:天气太冷,柴油机不容易 ~。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条