然后分析了该协议抵抗重放攻击的能力和运行效率。
Furthermore, we analyze its efficiency and its ability to resist replay attacks.
几天后,印度新闻台反复重放攻击的情景,她的丈夫关掉了电视。
Days later, with Indian news stations repeatedly replaying scenes from the attacks, her husband, who goes by the initials H.R., cut off the cable.
在这种情况下,重放攻击从服务器到客户端是可以接受的,不是一个问题。
In this case replay attacks from server to client is acceptable and not an issue.
但仍存在一些隐患,例如:重放攻击、密码猜测、会话中选择明文攻击等等。
But it still has some security hidden troubles, for instance: replay attack, password guessing, inter-session chosen plaintext attacks.
系统在J2EE平台上实现,有效的解决了重放攻击、身份认证等安全问题;
The system is implemented on J2EE platform and the secure problems such as reply-attack, identity authentication is solved effectively.
特点是网络用户可以自由选择其口令,通过对口令增加时间戳还可抵抗重放攻击。
Not only can the network users freely choose their preferred passwords, but the network system can also be protected against replaying by time stamping the password.
分析表明,改进后的区域注册安全认证机制可以提供通信实体间的身份认证和抗重放攻击。
The results show that the improved regional registration security authentication mechanism can offer identity authentication among communicate entities and resist playback attack.
结果表明,利用符号模型检测方法分析并发现密码协议重放攻击的漏洞是一种行之有效的方法。
Results show that the method using symbol model checker can discover replay attacks upon some cryptographic protocols and is effective.
同时该方案能有效地抵抗重放攻击,伪造攻击,猜测和窃取攻击,扮演攻击及用户合谋攻击等。
Additionally, the proposed scheme can efficiently withstand message replaying attack, forgery attack, Masquerade attack, guessing and stolen verifier attack and collusion attack.
在详细研究攻击实例的基础上,从攻击成功的根本原因出发,提出了一种新的重放攻击分类方法。
This paper brought forward a novel taxonomy of replay attacks after studied the attribute of replay attacks to various protocols.
实验结果表明,该协议能避免单纯采用时间戳所带来的时钟同步问题,具有较好的抗重放攻击能力。
Experimental results show that, this protocol can effectively avoid the problem of clock synchronization when only use timestamp, and good anti-replay attack capacity.
对认证协议的攻击形式有很多,但已构成的攻击事例中,百分之九十以上是重放攻击和类型缺陷攻击。
There are many kinds of ways of attacks on authentication protocol, but replay attacks and type flaw attacks account for more than 90 percent of them.
在他们的方案中,用户能随意更改口令,远程系统不需要存储用户的口令表或验证表,并能防止重放攻击。
In their scheme users can change their passwords freely and the remote system does not need the directory of passwords or verification tables, and replay attack can be avoided.
此方案能够进行双向的身份验证,有效地防止了冒充攻击、重放攻击和小数攻击,从而提高了认证系统的安全性。
This two-way identity authentication scheme effectively prevents imitate attack, replay attack and decimal fraction attack. And the security of authentication system is enhanced.
由此实现了双向的身份验证,同时保证了服务器和用户的安全,可以有效的防止冒充攻击、重放攻击、小数攻击。
The two-way identity authentication is implemented and the security of the host and the users is assured, which can keep them from imitate attack, replay attack and small number attack.
如果攻击者重新向AmazonSQS服务发送请求,则重复的签名表示该请求属于捕获重放攻击,AmazonWeb服务将会阻塞它。
If an attacker re-sends the request to the Amazon SQS service, the repetition of its signature identifies the request as a capture-replay attack, and Amazon Web Services blocks the it.
对该密码安全体制进行安全分析后表明:该体制能有效地抵御网络中的消息重放攻击和中间人攻击,并在实际应用中有较高的可行性。
The analysis of security for the cryptography demonstrates the cryptography can resist the message replay attacks and man in the middle attacks, and is feasible in practice.
重放攻击(Replay attack)防护:每个发布的U-Prove令牌中还包含专门针对每个令牌的公钥,这只有验证方才知道。
Replay attack prevention: Each issued U-Prove token also contains a token-specific public key that is known only to the Prover.
应答攻击——为实现恶意的效果,重新发送一个以前曾经有效的消息,其中可能只是重放部分消息(如安全令牌)。
Replay attack — Re-sending a previously valid message for malicious effect, possibly where only parts of the message (such as the security token) are replayed.
由于咒语以重放形式出现,说明在高锥克山谷里遭受伏地魔攻击时詹姆在莉莉之后死去。
Since the spells were happening in reverse, that would mean that James died after Lily during Voldemort's attack in Godric's Hollow.
攻击节点捕获网络中正常路由分组,通过“隧道”将其传输给另一端合谋节点,合谋节点再将该分组重放到网络中。
One attack node catches the routing packet in network and then transmits it to colluding node through "Tunnel". Colluding node retransmit the packet into the network directly.
这不,不幸的是,防止重放从攻击者。
It does not, unfortunately, prevent playback from an attacker.
通过假冒、重放等攻击对系统安全性进行分析,证明了系统的安全可行。
The higher security of system was proved by the analysis of masquerade and reply attacks.
通过假冒、重放等攻击对系统安全性进行分析,证明了系统的安全可行。
The higher security of system was proved by the analysis of masquerade and reply attacks.
应用推荐