... 显形假冒 express passing off 假冒攻击 impersonation attack 原假冒 Orijinarufeiku ...
基于20个网页-相关网页
... Phaeoisariopsis personate 花生黑斑病 personate attack 假冒攻击 role personate game 角色扮演游戏 ...
基于8个网页-相关网页
·2,447,543篇论文数据,部分数据来源于NoteExpress
该方案通过对移动IP注册消息的认证,避免了针对注册过程的假冒攻击和重发攻击。
By using authentication, this solution avoids the counterfeit attack and replay attack directed against the Mobile IP register process.
该方案也提出了成功假冒攻击源测定算法,其中采用了汇聚节点监控排查恶意区域、普通节点认证转发报警消息机制。
In addition, the succeeded masquerader detection algorithm is proposed in this scheme. In this algorithm, the sink node monitors and examines the malicious region.
攻击者可以让其恶意软件或假冒网站得到检查SHA - 1哈希以验证的任何系统的信任。
An attacker can allow its malware or fake site to be checked for SHA-1 hashes to verify the trust of any system.
应用推荐