入侵容忍,intrusion tolerance
1)intrusion tolerance入侵容忍
1.Design of voting algorithms and synchronous scheme of intrusion tolerance database;入侵容忍数据库的选举算法和同步方案设计
2.Solution of security database based on multi-layer intrusion tolerance;基于多级入侵容忍的数据库安全解决方案
3.Digital Signature Based on Elliptic Curve Cryptography and Its Application in Intrusion Tolerance CA;基于ECC的数字签名及其在入侵容忍CA中的研究
英文短句/例句

1.Research and Implementation of the Intrusion Detector for Intrusion Tolerant Databases;入侵容忍数据库入侵检测器的研究与实现
2.Security Analysis of Intrusition Tolerance System Based on Petri Nets;基于Petri网的入侵容忍系统的性能评价
3.Research and Design of Web Server Intrusion-Tolerant System;Web服务器入侵容忍系统的研究和设计
4.Research on the Theory and Applied Technology of Network Intrusion Tolerance网络入侵容忍的理论及应用技术研究
5.Intrusion-tolerant key distribution scheme based on RSA基于RSA的入侵容忍密钥分发方案
6.A Survey of Security Quantitative Analysis for Intrusion Tolerant System入侵容忍系统的安全性量化方法分析
7.Architecture for Database Security Based of Intrusion-tolerance基于入侵容忍的数据库安全体系结构
8.Model Design of Intrusion Tolerant System Based on Byzantine Protocol基于拜占庭协议的入侵容忍系统模型设计
9.Threshold Password-enabled Based on Distribute Intrusion-Tolerant Protect Private Key基于门限加密技术的全分布入侵容忍私钥保护
10.Algorithms of Sequence Analysis and Theirs Applications in Intrusion Tolerance;序列分析算法及其在入侵容忍中的应用研究
11.Digital Signature Based on Elliptic Curve Cryptography and Its Application in Intrusion Tolerance CA;基于ECC的数字签名及其在入侵容忍CA中的研究
12.Application Research of the Intrusion Tolerance System Based on Biological Immune Theory;免疫原理在入侵容忍系统中的应用研究
13.Research and Implementation of PKI Trust Model and Certificate Authority Based on Intrusion Tolerance;PKI信任模型及入侵容忍CA的研究与实现
14.The Research of an Intrusion Tolerant System Based on Code Access Control;基于代码安全控制的入侵容忍系统的研究
15.Research on the Model of Intrusion Tolerance System and the CA Scheme Based on Threshold;入侵容忍系统模型及基于门限的CA方案研究
16.The Research of Database Security Based on Intrusion Tolerance Technique;基于入侵容忍技术的数据库安全的研究
17.Research of Realization Approach for Intrusion Tolerant System Based on Combined Strategy;基于组合策略的入侵容忍系统实现方法研究
18.Study and Implement on Intrusion Tolerant Techniques Based on Process Migration;基于进程迁移的入侵容忍技术的研究与实现
相关短句/例句

intrusion tolerant入侵容忍
1.An intrusion tolerant KDC scheme for multicast communication;一种入侵容忍的广播通讯KDC方案
2.Research of Realization Approach for Intrusion Tolerant System Based on Combined Strategy;基于组合策略的入侵容忍系统实现方法研究
3.In this paper an intrusion tolerant CA system was presented.提出了一个入侵容忍CA(Certificate Authority,认证中心)系统,在此系统中构造了一个基于椭圆曲线密码体制的(t,n)门限签密方案,该方案是数字签名和公钥加密的有机集成,不仅减少了系统的开销,并使得系统能探测故障服务器和克服签密合成者的欺骗。
3)intrusion-tolerant入侵容忍
1.Authentication System with Intrusion-tolerant Feature;具有入侵容忍特性的身份认证系统
2.Threshold Password-enabled Based on Distribute Intrusion-Tolerant Protect Private Key;基于门限加密技术的全分布入侵容忍私钥保护
3.The Research and Implementation on Threshold Password-Enabled Based of Intrusion-Tolerant Protect Private Key;基于门限加密技术的入侵容忍私钥保护应用研究
4)intrusion tolerance容忍入侵
1.Secure intrusion tolerance scheme based on proactive secret sharing;基于主动秘密共享的安全容忍入侵方案
2.Research of intrusion tolerance middleware model based on interceptor;基于拦截器的容忍入侵中间件模型研究
3.Design of intrusion tolerance application server based on voting algorithm;基于大数表决机制的容忍入侵应用服务器设计
5)intrusion-tolerant容忍入侵
1.The Design of an Intrusion Detection System Based on Proactive Intrusion-tolerant Technology;一种基于先应式容忍入侵技术的入侵检测系统的设计与研究
2.An adaptive intrusion-tolerant approach to protecting operation security of cryptographic protocols一种自适应容忍入侵的密码协议安全运行防护系统
6)Intrusion tolerant容忍入侵
1.A Based Intrusion Tolerant CA Scheme;一种基于容忍入侵技术的CA方案
2.Then based on the digital signatrue scheme we introduced a intrusion tolerant CA scheme.基于Feldman可验证秘密共享技术和零知识证明方法,提出了一种计算上安全的数字签名方案,并在此基础上提出了一个容忍入侵的CA方案;通过对CA系统的可用性、机密性和抗假冒服务器攻击等方面的分析,得知方案较为完善。
3.Current intrusion tolerant systems have some limits on adaptability.针对容忍入侵系统中自适应能力较差的问题,提出了一种基于自适应大数表决机制的容忍入侵系统模型。
延伸阅读

容忍区间容忍区间tolerance intervals ,rz,其中 无一三止生三竺三生.、2-一兰~夕(尤一劝2. nn一1万=]具体地,取T,=无一ks和兀=无+ks,其中常数k称为容忍乘数,它是如下方程的解: _「_了叉十ks一a、. P丈中l止二‘二一二几二--一二二1+ t\『/ _了无一ks一“、、〕 一。l~全匕一二之兰一一止生})p卜二下, \叮/)而中(x)是标准正态律的分布函数,而且这里k二k(n,下,P)与a和少无关.这样建立的容忍区间有如下性质:区间(无一ks,无+ks)以置信概率?至少包含变量X!,…,X。的正态分布的概率质量的1田P%. 在存在概率密度f(x)二F‘(x)的条件下,事件资F(几)一F(T、))川的概率不依赖于F(x),当且仅当容忍界限是顺序统计虽(order statistic).正是这一事实.是建立非参数(亦称分布自由)容忍区间的一般方法的基础.设X(’)一(x(。l),…,戈。。户根据样本X、,1二,戈建立的顺序统计量向量,而 TI=x(。r〕,爪=x(“),1蕊r