• 然后分析了协议抵抗重放攻击能力运行效率

    Furthermore, we analyze its efficiency and its ability to resist replay attacks.

    youdao

  • 几天印度新闻台反复攻击情景丈夫关掉了电视

    Days later, with Indian news stations repeatedly replaying scenes from the attacks, her husband, who goes by the initials H.R., cut off the cable.

    youdao

  • 这种情况下重放攻击服务器客户端可以接受的,不是一个问题

    In this case replay attacks from server to client is acceptable and not an issue.

    youdao

  • 存在一些隐患例如重放攻击密码猜测会话选择明文攻击等等。

    But it still has some security hidden troubles, for instance: replay attack, password guessing, inter-session chosen plaintext attacks.

    youdao

  • 系统J2EE平台上实现有效解决重放攻击身份认证安全问题

    The system is implemented on J2EE platform and the secure problems such as reply-attack, identity authentication is solved effectively.

    youdao

  • 特点是网络用户可以自由选择口令,通过口令增加时间抵抗重放攻击

    Not only can the network users freely choose their preferred passwords, but the network system can also be protected against replaying by time stamping the password.

    youdao

  • 分析表明,改进后区域注册安全认证机制可以提供通信实体间的身份认证重放攻击

    The results show that the improved regional registration security authentication mechanism can offer identity authentication among communicate entities and resist playback attack.

    youdao

  • 结果表明利用符号模型检测方法分析发现密码协议重放攻击的漏洞种行之有效的方法

    Results show that the method using symbol model checker can discover replay attacks upon some cryptographic protocols and is effective.

    youdao

  • 同时方案有效地抵抗攻击伪造攻击猜测窃取攻击,扮演攻击用户合谋攻击等。

    Additionally, the proposed scheme can efficiently withstand message replaying attack, forgery attack, Masquerade attack, guessing and stolen verifier attack and collusion attack.

    youdao

  • 详细研究攻击实例基础上,从攻击成功的根本原因出发,提出一种新的重放攻击分类方法

    This paper brought forward a novel taxonomy of replay attacks after studied the attribute of replay attacks to various protocols.

    youdao

  • 实验结果表明协议避免单纯采用时间戳所带来时钟同步问题,具有较好的放攻击能力

    Experimental results show that, this protocol can effectively avoid the problem of clock synchronization when only use timestamp, and good anti-replay attack capacity.

    youdao

  • 认证协议攻击形式很多已构成的攻击事例中,百分之九十以上是放攻击类型缺陷攻击

    There are many kinds of ways of attacks on authentication protocol, but replay attacks and type flaw attacks account for more than 90 percent of them.

    youdao

  • 他们的方案中,用户随意更改口令远程系统需要存储用户口令验证表,防止重放攻击

    In their scheme users can change their passwords freely and the remote system does not need the directory of passwords or verification tables, and replay attack can be avoided.

    youdao

  • 方案能够进行双向身份验证有效地防止了冒充攻击重放攻击小数攻击从而提高了认证系统安全性

    This two-way identity authentication scheme effectively prevents imitate attack, replay attack and decimal fraction attack. And the security of authentication system is enhanced.

    youdao

  • 由此实现了双向身份验证,同时保证服务器用户安全可以有效的防止冒充攻击重放攻击小数攻击

    The two-way identity authentication is implemented and the security of the host and the users is assured, which can keep them from imitate attack, replay attack and small number attack.

    youdao

  • 如果攻击新向AmazonSQS服务发送请求签名表示请求属于捕获重放攻击,AmazonWeb服务将会阻塞

    If an attacker re-sends the request to the Amazon SQS service, the repetition of its signature identifies the request as a capture-replay attack, and Amazon Web Services blocks the it.

    youdao

  • 密码安全体制进行安全分析后表明:该体制有效地抵御网络中的消息重放攻击中间人攻击实际应用中较高的可行性

    The analysis of security for the cryptography demonstrates the cryptography can resist the message replay attacks and man in the middle attacks, and is feasible in practice.

    youdao

  • 攻击(Replay attack)防护每个发布U-Prove包含专门针对每个令牌的公钥只有验证方才知道

    Replay attack prevention: Each issued U-Prove token also contains a token-specific public key that is known only to the Prover.

    youdao

  • 应答攻击——实现恶意效果发送一个以前曾经有效消息,其中可能只是部分消息(安全令牌)。

    Replay attackRe-sending a previously valid message for malicious effect, possibly where only parts of the message (such as the security token) are replayed.

    youdao

  • 由于咒语重放形式出现,说明山谷里遭受伏地攻击詹姆莉莉之后死去

    Since the spells were happening in reverse, that would mean that James died after Lily during Voldemort's attack in Godric's Hollow.

    youdao

  • 攻击节点捕获网络正常路由分组,通过“隧道”将其传输给另一端合谋节点,合谋节点再将该分组重放到网络中。

    One attack node catches the routing packet in network and then transmits it to colluding node through "Tunnel". Colluding node retransmit the packet into the network directly.

    youdao

  • 这不不幸的是,防止重放攻击者。

    It does not, unfortunately, prevent playback from an attacker.

    youdao

  • 通过假冒重放攻击系统安全性进行分析,证明系统安全可行。

    The higher security of system was proved by the analysis of masquerade and reply attacks.

    youdao

  • 通过假冒重放攻击系统安全性进行分析,证明系统安全可行。

    The higher security of system was proved by the analysis of masquerade and reply attacks.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定