码迷,mamicode.com
首页 >  
搜索关键字:side-channel attack    ( 514个结果
Leetcode dfs N-Queens
N-Queens  Total Accepted: 14054 Total Submissions: 54127My Submissions The n-queens puzzle is the problem of placing n queens on an n×n chessboard such that no two queens attack each other...
分类:其他好文   时间:2014-09-10 09:39:00    阅读次数:272
ZOJ 2587 Unique Attack (判断最小割的唯一性)
ZOJ 2587 Unique Attack 链接:http://acm.zju.edu.cn/onlinejudge/showProblem.do?problemId=1587 题意:N 台超级计算机连成一个网络。M 对计算机之间用光纤直接连在一起,光纤的连接是双向的。数据可以直接在有光纤直接连接的计算机之间传输,也可以通过一些计算机作为中转来传输。 有一群恐怖分子计划攻击网络。他...
分类:其他好文   时间:2014-09-06 21:19:53    阅读次数:300
URAL 1141. RSA Attack RSA加密算法
题目来源:URAL 1141. RSA Attack 题意:给你e n c 并且有m^e = c(mod n) 求 m 思路:首先学习RSA算法 here  过程大致是 1.发送的信息是m 2.随机选择两个质数 p和q, n = q*p, n的欧拉函数值φ(n)= (p-1)*(q-1)这个需要证明  3.选择一个与φ(n)互质的并且小于φ(n)的数e, 计算c = m^e(mod...
分类:其他好文   时间:2014-08-31 15:52:31    阅读次数:262
Identifying a distributed denial of service (DDOS) attack within a network and defending against such an attack
The invention provides methods, apparatus and systems for detecting distributed denial of service (DDoS) attacks within the Internet by sampling packe...
分类:Web程序   时间:2014-08-27 00:19:47    阅读次数:362
DDoS ATTACK PROCESSING APPARATUS AND METHOD IN OPENFLOW SWITCH
An OpenFlow switch in an OpenFlow environment includes anattack determination module to collect statistical information on packet processing with resp...
分类:移动开发   时间:2014-08-27 00:16:26    阅读次数:377
N-Queens
The n-queens puzzle is the problem of placing n queens on an n×n chessboard such that no two queens attack each other.Given an integer n, return all d...
分类:其他好文   时间:2014-08-27 00:11:56    阅读次数:308
N-Queens
N-Queens  Total Accepted: 12866 Total Submissions: 49759My Submissions The n-queens puzzle is the problem of placing n queens on an n×n chessboard such that no two queens attack each oth...
分类:其他好文   时间:2014-08-24 22:21:03    阅读次数:166
UVA - 10237 Bishops
A bishop is a piece used in thegame of chess which is played on a board of square grids. A bishop can only movediagonally from its current position and two bishops attack each other if oneis on the pa...
分类:其他好文   时间:2014-08-23 15:26:31    阅读次数:286
Chapter 2 User Authentication, Authorization, and Security(3):保护服务器避免暴力攻击
暴力攻击(Brute-force attack)是通过几乎所有可能的字符组合尝试破解密码,或者使用一个字典表,包含几乎所有可能的密码来实现密码破解的方法。如果你的密码很简单,那么很快就会被破解。所以,测试密码是非常重要的。...
分类:其他好文   时间:2014-08-22 16:29:39    阅读次数:221
Slow HTTP Denial of Service Attack
整改建议 1.中断使用URL不支持HTTP方法访问的会话 2.限制HTTP头及包长至一个合理数值 3.设置一个绝对的会话超时时间 4.服务器支持backlog的情况下,需设置一个合理的大小 5.设置一个最小的入站数据传输速率渗透状况:安全扫描+手工测试。漏洞原理:扫描发现Web服务器或应用...
分类:其他好文   时间:2014-08-21 11:05:33    阅读次数:229
514条   上一页 1 ... 46 47 48 49 50 ... 52 下一页
© 2014 mamicode.com 版权所有  联系我们:gaon5@hotmail.com
迷上了代码!