说明:双击或选中下面任意单词,将显示该词的音标、读音、翻译等;选中中文或多个词,将显示翻译。
您的位置:首页 -> 句库 -> 攻击验证
1.
ANALYSIS AND VERIFICATION ON MULTI-PROTOCOL GUESSING ATTACKS BASED ON STRAND SPACE MODEL
基于串空间模型的多协议猜测攻击验证分析
2.
An Attack on a Verifiable Certificateless Ring Signcryption Scheme
对一种可验证无证书环签密方案的攻击
3.
Formal authentication based on identification of intruder role impersonate
基于攻击者的“角色冒充”的协议验证方法
4.
Attack on Security Protocol Based on Homomorphism and Its Formal Verification
基于同态的安全协议攻击及其形式化验证
5.
These weak points can result in the adversary to cheat the verification group by forgery and substitution attack.
这样的漏洞使得敌手可利用伪造攻击和替换攻击对验证组进行欺骗 ;
6.
Yet, experience proves that it rarely hurts to rake muck, even if in the short run, you're handing ammunition to the wrong man.
然而,经验证明搜集丑闻并使之曝光即使暂时攻击错了对象也无妨。
7.
The Research on Mixed Connection Verification Algorithm Against Denial of Service;
基于混合连接验证算法的拒绝服务攻击防御方法研究
8.
Studies on Character of Implicit Aggression in Different Aggression Scenes;
不同攻击情境下内隐攻击性特征的实验研究
9.
Relationship Between Rorschach Aggression Variables and Explicit Hostility;
罗夏测验攻击变量与外显攻击敌意的关系
10.
A Experimental Research on Aggression in Implicit Social Cognition;
攻击性的内隐社会认知实验研究——IAT测验在攻击性研究中的应用
11.
To set upon with violent force.
袭击,攻击以暴力攻击
12.
The rumours of an attack were later confirmed.
发动攻击的谣传后来得到了证实.
13.
In the past, ISPs have been vulnerable to such attacks.
过去已证实ISP易受这样的攻击。
14.
The proofs were attacked as unsound.
它的证明被攻击为是不可靠的。
15.
Countermeasures of Attacks for IEEE8021x Network Access Authentication Techniques;
IEEE802.1x网络访问认证技术的攻击应对策略
16.
Person-oriented argumentation and fallacy of personal abuse;
“针对人的”论证与“人身攻击”谬误
17.
Content Based Image Authentication Algorithm Robust to Geometric Attacks
抗几何攻击的图像内容认证算法研究
18.
The Experiment Study of Self-esteem and Aggressive Behavior;
个体自尊水平与攻击行为的实验研究