• Ithas the function to monitor a network and to protocol attacks.

    的主要功能监控网络转向攻击。

    youdao

  • It has the function to monitor a network and to protocol attacks.

    功能监测网络协议的攻击。

    youdao

  • A new secure watermarking scheme is proposed, which resists efficiently the current known watermarking protocol attacks.

    提出安全的数字水印方案方案能够比较有效抵抗现有已知几种协议攻击。

    youdao

  • In the third chapter, we first detail some watermarking attacks including watermark removal attacks, cryptographic attacks and protocol attacks.

    第三章中我们首先详细介绍了水印去除攻击密钥攻击协议攻击。

    youdao

  • By using network interceptor and system call interceptor, it resists all kinds of protocol attacks, operation system attacks and application attacks.

    通过网络截获系统调用截获器,各种各样协议攻击操作系统攻击和应用程序攻击进行防范。

    youdao

  • This protocol is used to provide confidentiality of secure information, such as user credentials and transaction information, and protection from man-in-the-middle attacks.

    协议用于提供安全信息(比如用户凭证交易信息)机密性,还提供了防止中间人攻击的保护

    youdao

  • While I won't cover any IP-level attacks in this article, I do want to discuss IP in a little more detail as it is the underlying protocol of ICMP and TCP.

    尽管将不在本文介绍任何IP级别攻击,但我确实需要稍微详细地讨论IP,因为ICMPTCP底层协议

    youdao

  • Traffic analysis attacks attempt to glean information about a message or protocol by observing which parties are talking to whom, and in some cases how much data is being transferred.

    流量分析通过监测通信以及传输的数据收集关于消息协议信息

    youdao

  • It is TCP/IP protocol family defects that cause some ulterior persons to make up numerous attacks on Internet.

    IP协议簇本身的缺陷导致别有用心者构造现今互联网众多攻击的原因。

    youdao

  • An IPS monitors for behavior anomalies that indicate hard-to-spot HTTP-based attacks and those from remote-call-procedure, Telnet- and address-resolution-protocol spoofing, among others.

    一个IPS系统可以监控异常行为发现非常隐蔽的基于HTTP的攻击,以及来自远程调用过程、Telnet地址解析协议欺骗的攻击。

    youdao

  • On base of analysis of watermarking attacks on digital images, the paper presents a digital image copyright protection protocol based on digital watermarking technology.

    分析数字图像中数字水印所受各种攻击基础给出一个基于数字水印技术的数字图像版权保护安全协议框架。

    youdao

  • After analyzing the OSPF routing protocol, the author describes a statistical mechanism against the attacks of OSPF routing protocol.

    对路由OSPF协议进行分析研究它可能受到攻击阐述一种基于统计实时检测方法。

    youdao

  • In this paper it introduced new types of attacks called multi-protocol guessing attacks, which can exist when protocols are mixed.

    引入一种新类型攻击称为协议猜测攻击,可以存在于混合协议中。

    youdao

  • On the analysis of BAN-logic and some possible attacks, the protocol is secure.

    通过BAN逻辑及各种可能攻击分析证明协议是安全的。

    youdao

  • This paper mainly discusses the influence of network performance under internal attacks in MANET and security routing protocol.

    本文主要研究移动网络内部攻击网络性能影响以及安全路由协议。

    youdao

  • The security analyses show that the improved authentication protocol is much stronger against these three kinds of attacks than the traditional protocol.

    相应的安全性分析明确给出了考虑攻击时,改进认证协议以前的协议更加强健。

    youdao

  • In fact, a lot of network attacks are to abuse different network protocols and several new attacking methods violate the protocol standard.

    事实上大量网络攻击都是不同的网络协议进行滥用很多新型攻击方法都违背协议标准

    youdao

  • This way improved its security against password guessing attacks and password leaking without any change of the original protocol framework.

    方法在保持原有协议基本体系不变的前提下,较大地提高安全性,有效地防范口令猜测攻击口令泄漏等。

    youdao

  • EKE is a kind of key exchange protocol based on week password and can resist offline dictionary attacks by use of symmetric key encryption and public key encryption.

    EKE协议基于口令密钥交换协议通过使用对称密钥加密体制公钥加密体制,能够很好地抵抗离线字典攻击

    youdao

  • Moreover, this protocol can defend any cheats and attacks, and it is secure, efficient, simple and practical.

    抵抗各种欺骗攻击个安全高效简单实用协议

    youdao

  • Via address resolution protocol in data link layer, hackers can launch various attacks, such as IP conflict attack, ARP deceive attack and ARP overflow attack.

    利用数据链路地址解析协议(ARP)可以进行IP冲突、ARP欺骗、ARP溢出等方式的网络攻击

    youdao

  • The analysis results show that the proposed protocol can prevent network from some common routing attacks.

    分析表明协议能够抵御多种常见路由攻击

    youdao

  • There are many kinds of ways of attacks on authentication protocol, but replay attacks and type flaw attacks account for more than 90 percent of them.

    认证协议攻击形式很多已构成的攻击事例中,百分之九十以上是放攻击类型缺陷攻击。

    youdao

  • The protocol is proved to be AKE secure and resistant to the attacks of adaptive adversaries and malicious insiders.

    提出的组密钥交换协议经过证明具有AKE安全并且能够抵抗适应性敌手攻击恶意参与者攻击。

    youdao

  • The new protocol satisfies all the requirements of the confidentiality and unforgeability by signcryption protocol, and it can defend against all those current attacks.

    协议满足数字签密协议机密性、不可伪造性等要求抵抗目前情况下的各种攻击。

    youdao

  • WTLS handshake protocol doesn't provide forward security, and lacks of user anonymity when not in the anonymous mode. It is vulnerable to man-in-the-middle attacks in completely anonymous mode.

    WTLS握手协议满足前向安全性,非匿名验证模式满足用户匿名性,完全匿名模式下遭受中间人攻击

    youdao

  • The performance analysis results show that this protocol can resist many common attacks.

    分析表明抵抗多数常见攻击

    youdao

  • The protocol USES HMAC to guarantee the client being active, then protects leasing from attacks. 5 in the aspect of UOWHF discovery, tree-Shoup construction is put forward in this paper.

    协议灵活运用HMAC确保代理每次租借客户总是“激活”,从而尽量避免恶意攻击

    youdao

  • The protocol USES HMAC to guarantee the client being active, then protects leasing from attacks. 5 in the aspect of UOWHF discovery, tree-Shoup construction is put forward in this paper.

    协议灵活运用HMAC确保代理每次租借客户总是“激活”,从而尽量避免恶意攻击

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定