您要查找的是不是:
- Nonce is required to prevent replay attacks. 需要Nonce以防止重播攻击。
- Furthermore, we analyze its efficiency and its ability to resist replay attacks. 然后分析了该协议抵抗重放攻击的能力和运行效率。
- You can use replay attacks to create data integrity issues as well as denial-of-service attacks. 重播攻击可用于造成数据完整性问题以及拒绝服务攻击。
- This paper brought forward a novel taxonomy of replay attacks after studied the attribute of replay attacks to various protocols. 在详细研究攻击实例的基础上,从攻击成功的根本原因出发,提出了一种新的重放攻击分类方法。
- As mentioned above, a replay attack by some malicious third party is the most convenient attack. 正如上文所提到的,来自某个恶意第三方的再现攻击是最容易遭受到的攻击。
- Traitor tracing schemes play an important role in tracing and identifying the traitors in conspiracy and replay attack. 叛徒追踪方案是在共谋密钥攻击和重放攻击中追踪及识别叛徒的有效措施。
- Furthermore,the new scheme appends time stamp to signature,and it can resist against replay attack. 并在签名中加入时间戳,增加了抵御重发攻击的能力。
- This keeps the role cookie from being exposed over the network and being used in a replay attack against your application. 这可以使角色cookie不会公开在网络上,也不会被用在针对应用程序的重播攻击。
- Thus, the continuity of sequence number information is kept, possible replay attack is efficiently prevented, and session security after restore is ensured. 从而保持了序列号信息的连续性,有效地防止可能出现的重放攻击,保证了恢复后的会话安全性。
- This is an effective defense against replay attacks, in which authentic packets are captured and then replayed onto the network at a later time in an attempt to disrupt service. 这是防范再播放攻击的有效办法,这时,可信赖的包被俘获,然后在晚些时候,企图中断服务时再在网络上重新播放。
- The system doesn′t need any password list. Using only one password,a registered user can log in the different services and get session keys. This scheme can withstand replay attack and impersonation attack. 方案中的服务器不需要存储口令表;经过注册的用户只需一个口令即可登录系统中不同的服务器;并生成与服务器之间的会话密钥;该方案可抵抗重放、伪装等入侵攻击.
- The total number of packets that contained an invalid sequence number since the computer was last started. Increases in this counter might indicate a network problem or replay attack. 在此计算机上次启动后包含无效序列号的数据包总数。此计数器值上升表明可能有网络问题或重播攻击。
- Method clears the ticket from the authenticated browser session, your application can still be susceptible to a replay attack from an unwanted source that has "sniffed" an authentication ticket. 方法会从通过身份验证的浏览器会话中清除票证,但您的应用程序仍然易于受到来自已“探查”到身份验证票证的有害源的重播攻击。
- This is an effective defense against replay attacks,in which authentic packets are captured and then replayed onto the network at a later time in an attempt to disrupt service. 这是防范再播放攻击的有效办法,这时,可信赖的包被俘获,然后在晚些时候,企图中断服务时再在网络上重新播放。
- The enemy army crumpled up under our attacks. 敌军在我军的攻击下垮了。
- England were worsted in the replay. 英格兰队在重赛中败北。
- If the enemy attacks, take evasive action. 如果敌人进攻,就避其锋芒。
- The rebels made regular attacks on the railways. 叛军不时地袭击铁路。
- Terrorist attacks made our position very unhealthy. 在恐怖分子的袭击下我们面临生命危险。
- The teams finished level, so they'll replay the match on Wednesday. 两个队打成平局,所以他们将在星期三再赛一场。