WCF supports mutual authentication, which identifies both the client and the service in tandem, to help in preventing man-in-the-middle attacks.
WCF提供相互认证,确定客户和串联使用,以帮助防止中间人攻击。
This protocol is used to provide confidentiality of secure information, such as user credentials and transaction information, and protection from man-in-the-middle attacks.
该协议用于提供安全信息(比如用户凭证和交易信息)的机密性,还提供了防止中间人攻击的保护。
The analysis of security for the cryptography demonstrates the cryptography can resist the message replay attacks and man in the middle attacks, and is feasible in practice.
对该密码安全体制进行安全分析后表明:该体制能有效地抵御网络中的消息重放攻击和中间人攻击,并在实际应用中有较高的可行性。
WTLS handshake protocol doesn't provide forward security, and lacks of user anonymity when not in the anonymous mode. It is vulnerable to man-in-the-middle attacks in completely anonymous mode.
WTLS握手协议不满足前向安全性,非匿名验证模式下不满足用户匿名性,完全匿名模式下易遭受中间人攻击。
Los Angeles - The catastrophe unfolding in Gaza has the dark force of a recurring Middle Eastern nightmare: Scattered guerrilla-like attacks from the weak lead to massive retaliation by the strong.
洛杉矶消息:展现在加沙的灾难蕴含着再现中东恶魔的力量:力量软弱的游击战似的分散袭击导致力量强大一方的大规模报复;
The biggest difficulty is that by squeezing the pirates hard in the Gulf of Aden the naval task forces have created a “balloon effect”, spreading attacks out to the middle of the Indian Ocean.
最大的难点是,海军军事力量在亚丁湾附近极力打压海盗,海盗却像气球一样反弹起来:海盗的袭击范围甚至扩展到了印度洋的中部。
Overhauled Concordes returned to service two months after the Sept. 11 terrorist attacks, in the middle of one of aviation's worst slumps and a miserable global economy.
“9·11”恐怖袭击两个月后,通过检查的协和式飞机恢复了航行,然而此时正值航空业的一次最大萧条期以及全球经济不景气。
That a drone aircraft had come across the Canadian border in the middle of the night and carried out the latest of many attacks?
要是那架无人飞机是半夜从加拿大边境飞过来的,实施了最近许多次轰炸中的新进的一次,那会怎样?
In the middle of 1996, it was clear that we didn't have all the answers on how to deal with attacks on Americans in this country and overseas, and that the problem would be with us for years to come.
1996年中期,显然我们在如何应付针对国内外美国人进行的袭击上还没有完整的答案,在未来几年,这个问题还将伴随着我们。
The biggest difficulty is that by squeezing the pirates hard in the Gulf of Aden the naval task forces have created a "balloon effect", spreading attacks out to the middle of the Indian Ocean.
最大的难点是,海军军事力量在亚丁湾附近极力打压海盗,海盗却像气球一样反弹起来:海盗的袭击范围甚至扩展到了印度洋的中部。
In trigeminal neuralgia (tic douloureux), Brief attacks of severe shooting pain along a Branch of the trigeminal nerve (in front of the ear) usually Begin after middle age, more often in women.
三叉神经痛(痛性抽搐)以沿三叉神经任何分支(位于耳前)的短暂剧烈枪击痛为主要特征,通常在进入中年后发病,好发于女性。
However, without signed manifests, it is difficult to ensure that the application installer is not tampered in man-in-the-middle security attacks.
然而,在没有签名清单的情况下,很难确保应用程序安装程序在受到中间人安全攻击时不被篡改。
The following attacks should be considered into account: man-in-middle, spoofing, sniffing and Denial of services.
以下袭击,应考虑到:人在中间,欺骗,嗅探和拒绝服务。
The following attacks should be considered into account: man-in-middle, spoofing, sniffing and Denial of services.
以下袭击,应考虑到:人在中间,欺骗,嗅探和拒绝服务。
应用推荐