• Users may select encryption without specifying authentication, but this action leaves the packets vulnerable to active attacks, which can lead to an outside entity breaking the encryption.

    用户可以选择不用特定认证进行加密但是这样容易受到攻击导致让别人破坏加密。

    youdao

  • A simple hash, as sometimes used in HTTP Basic authentication, is subject to replay attacks because one can easily sniff the traffic and replay the hash without knowing the password.

    简单的哈(例如有时HTTP基本身份验证中使用哈希)易受到回复攻击的威胁,因为攻击者可以很容易地探查通信能够在知道密码的情况下回复哈希。

    youdao

  • The security analyses show that the improved authentication protocol is much stronger against these three kinds of attacks than the traditional protocol.

    相应的安全性分析明确给出了考虑攻击时,改进认证协议以前的协议更加强健。

    youdao

  • This scheme only need execute one times public key Authentication, so that reduced the computation, furthermore, its security was better in power analysis attacks.

    为了克服这些问题,结合目前的抗功耗加密算法设计和哈希签名方案,文中提出了抗功耗攻击的快速哈希签名方案。

    youdao

  • Traditional password authentication schemes are vulnerable to replay attacks because of the fixed password and unchanged messages submitted by users for verification.

    由于每次登录时用户提交认证信息都是固定不变传统口令认证机制容易遭受回放攻击

    youdao

  • By the way of encryption, message authentication, and digital signature, the Call System can defense the interior attacks and achieves fine-grained security.

    通过呼叫数据进行加密、消息认证数字签名,防止内部攻击实现安全细粒度控制

    youdao

  • Security mechanism adds authentication and encryption mechanisms to MAC frame to defense MAC layer security attacks.

    安全机制通过增加MAC认证保密防御MAC的安全攻击

    youdao

  • The security of its authentication mechanism is studied, indicating that it can protect against the common types of attacks.

    认证机制安全性进行了研究,分析表明抵抗常见类型攻击。

    youdao

  • Forever, many hackers attack means, such as phishing and SQL injection attacks, start from the identity authentication.

    目前的很多黑客攻击手段钓鱼攻击、SQL注入攻击等各种网络攻击方式都是身份认证开始的。

    youdao

  • The main advantages include better session key management, improved security, greater availability, anti denial of service attacks and simple authentication.

    新结构在密钥管理、全可靠性以及认证方法方面都传统的结构有较大改进

    youdao

  • WCF supports mutual authentication, which identifies both the client and the service in tandem, to help in preventing man-in-the-middle attacks.

    WCF提供相互认证确定客户串联使用帮助防止中间人攻击

    youdao

  • Simulation tests show that the identity authentication model can stand with password attacks, filtrate out invalid login requests availably, and have advantages of good robustness and reliability.

    仿真实验表明身份认证模型能够承受各种口令攻击有效过滤非法用户的登录请求,具有好的棒性可用性。

    youdao

  • There are many kinds of ways of attacks on authentication protocol, but replay attacks and type flaw attacks account for more than 90 percent of them.

    认证协议攻击形式很多已构成的攻击事例中,百分之九十以上是放攻击类型缺陷攻击。

    youdao

  • Traditional ID authentication combines a user name and a password, which is not sufficient enough to assure the security of application systems in an environment full of hackers network attacks.

    传统身份认证只是一种用户口令的简单组合充满黑客和攻击网络环境下这种认证方式已经不能充分保证应用系统安全

    youdao

  • MCPK-based security with routing protocols, OLSR neighbor detection stage by the introduction of secure authentication mechanisms to prevent wormhole attacks.

    采用基于MCPK安全路由协议通过在OLSR邻居探测阶段引入安全验证机制预防虫洞攻击

    youdao

  • MCPK-based security with routing protocols, OLSR neighbor detection stage by the introduction of secure authentication mechanisms to prevent wormhole attacks.

    采用基于MCPK安全路由协议通过在OLSR邻居探测阶段引入安全验证机制预防虫洞攻击

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定