1.
Technology of using association analysis to improve signature-based intrusion detection;
采用关联分析改进基于攻击签名的入侵检测的技术
2.
Attack Based Research on Security Analysis of Digital Signature;
基于攻击的数字签名安全性分析研究
3.
Analysis of Some Attacks against the Schnorr Signature Scheme
对Schnorr签名方案几种攻击的分析
4.
An Attack on Digital Signature Protocol Based on Intruder's Role Impersonate
基于角色冒充对数字签名协议的攻击(英文)
5.
The Design and Realization of a Strong Proxy Signature Against DLC Attack;
一种可抗DLC攻击的强代理签名方案设计与实现
6.
Defence of False-Signatures-Based Dos Attacks in Wireless Sensor Networks
无线传感器网络中基于假签名DoS攻击的防御
7.
Insider attack of threshold-proxy threshold-signature scheme
一种门限代理门限签名方案的内部攻击
8.
INTERNAL ATTACK AGAINST A THRESHOLD MULTI-PROXY MULTI-SIGNATURE SCHEME
一种门限多代理多签名方案的内部攻击
9.
There are problems with the signature. Click the signature icon for details.
签名有问题。单击签名图标可获得详细信息。
10.
There are problems with the signature. Click the signature button for details.
该签名有问题。单击签名按钮可获取详细信息。
11.
The president of Peru called upon an agreement for the presidential candidates to avoid personal attach.
秘鲁呼吁总统候选人签君子协议不搞人身攻击。
12.
Signcryption Key Encapsulation in Insider Security Mode
内部攻击者安全模式下的签密密钥封装
13.
Reverse attacking model of RFID tag anti-counterfeit system for agricultural product
农产品电子标签防伪系统逆向攻击模型
14.
An Attack on a Verifiable Certificateless Ring Signcryption Scheme
对一种可验证无证书环签密方案的攻击
15.
The Fail-stop signature is a very secure system, even though the attacker gains signature key, it is difficult to forge signature.
防失败签字是一种十分安全的签字体制,即使攻击者得到签字密钥后也难以伪造签字。
16.
Click the right mouse button to change your e-mail signature
单击鼠标右键可更改电子邮件签名
17.
"Large, aggressive shark (Carcharodon carcharias, family Lamnidae), considered the species most dangerous to humans."
鲭鲨科大型攻击性鲨鱼,学名为Carcharodon carcharias。
18.
one who attacks the reputation of another by slander or libel.
靠诽谤和中伤来攻击他人名誉的人。