• Additionally, the proposed scheme can efficiently withstand message replaying attack, forgery attack, Masquerade attack, guessing and stolen verifier attack and collusion attack.

    同时方案有效地抵抗攻击伪造攻击,猜测窃取攻击,扮演攻击用户合谋攻击等。

    youdao

  • How to defend detecting of the type and version number of operating system by network masquerade and avoid the attack of operating system hole is researched in this dissertation.

    本文主要讨论如何通过网络伪装防御操作系统真正类型及其版本被探测,进而避免遭受针对具体操作系统类型漏洞攻击

    youdao

  • How to defend detecting of the type and version number of operating system by network masquerade and avoid the attack of operating system hole is researched in this dissertation.

    本文主要讨论如何通过网络伪装防御操作系统真正类型及其版本被探测,进而避免遭受针对具体操作系统类型漏洞攻击

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定