• 预定义客户端证书防御执行中间人攻击复杂攻击者。

    Predefined client certificates guard against a sophisticated attacker performing a man-in-the-middle attack.

    youdao

  • 这种情况中,信任证书中的通用可以防止中间人攻击的发生。

    This is where the chain of trust and the common name on a certificate can prevent this from occurring.

    youdao

  • 目的解决目前WTLS协议缺乏前向安全性、无法抵抗中间人攻击问题。

    Aim In order to solve the trouble of the lack of forward secrecy and intermediator attack in current WTLS protocol.

    youdao

  • 协议用于提供安全信息(比如用户凭证交易信息)机密性,还提供了防止中间人攻击保护

    This protocol is used to provide confidentiality of secure information, such as user credentials and transaction information, and protection from man-in-the-middle attacks.

    youdao

  • 现在我们来修改消息就像使用中间人攻击黑客那样

    Now let's modify the message, as a hacker might using a "man in the middle" attack

    youdao

  • 虽然不是SSL标准一部分但是这个步骤却是高度建议的,它可以防止中间人攻击

    This is not part of the SSL standard, but is highly recommended to prevent a man in the middle attack (MITM).

    youdao

  • 这种技术常常用于帮助防御基于ARP的中间人攻击

    It can often help prevent ARP-based Man-in-the-Middle attacks.

    youdao

  • 目前基于公钥加密会话密钥交换方案容易受到中间人攻击且效率不

    Most current cryptography and session key exchange schemes based on public key are vulnerable to intermediate attack and have low efficiency.

    youdao

  • 密码安全体制进行安全分析后表明:该体制有效地抵御网络中的消息重放攻击中间人攻击实际应用中较高的可行性

    The analysis of security for the cryptography demonstrates the cryptography can resist the message replay attacks and man in the middle attacks, and is feasible in practice.

    youdao

  • 然而没有签名清单的情况下,很难确保应用程序安装程序受到中间人安全攻击被篡改

    However, without signed manifests, it is difficult to ensure that the application installer is not tampered in man-in-the-middle security attacks.

    youdao

  • 通过引入群公钥证书密钥中结合群以及成员的长期密钥和临时密钥,提供了隐含密钥认证,以有效对抗中间人攻击

    The PAGKA protocol suite is communication efficient, and has the following cryptographic properties such as key independence, implicit key authentication, perfect forward secrecy and resistance .

    youdao

  • 公司最后发现他们的网络正在遭受中间人攻击

    The company finally realizes that their network is suffering a man-in-the-middle attack.

    youdao

  • 最后论文PEAP协议执行过程进行了详细的分析,此基础上指出存在的缺点,即容易受到中间人攻击

    Finally, the thesis analyzes the PEAP protocol's implementation process in detail and points out it's disadvantages, that is, it suffers middleman attack easily.

    youdao

  • 一类会话劫持叫做中间人攻击攻击利用探测程序可以观测到设备之间通信收集发送出去数据

    Another type of session hijacking is known as a man-in-the-middle attack, where the attacker, using a sniffer, can observe the communication between devices and collect the data that is transmitted.

    youdao

  • 下面哪种加密技术可以最好保护无线网络遭受中间人攻击

    Which of the following encryption techniques will BEST protect a wireless network from a man-in-the-middle attack?

    youdao

  • 下面哪种加密技术可以最好保护无线网络遭受中间人攻击

    Which of the following encryption techniques will BEST protect a wireless network from a man-in-the-middle attack?

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定