×

假冒攻击 meaning in Chinese

impersonation attack

Examples

  1. 2 ) a new one time password authentication scheme . the original password authentication is vulnerable to guess attack and server personating attack . to overcome the vulnerability of this scheme , this paper designs a simple and efficient password authentication schema . the enhanced schema can improve the system ' s ability to defend all kinds of the attacks without using any cryptosystems
    2 )新的一次性口令认证机制。针对postgresql原有认证机制具有易遭受口令猜测攻击和服务器端假冒攻击的缺陷,本文设计了一种简单而有效的口令认证机制。该认证机制不需要使用任何加密系统,就能有效加强对各种攻击手段的防范能力。
  2. In a wireless mobile communication system , mutual authentication and key establishing protocols not only need to establish a shared key for encrypt information exchange in conversation on the basis of mutual authentication , but they also need to satisfy essential security requirements , including forward secrecy , impersonated attack and man - in - middle attack , etc
    摘要在无线通信系统中,相互认证和密钥建立协议不仅要在实现实体间的相互认证的基础上建立唯一的共享会话密钥,而且协议本身还应当满足一定的安全要求,如防止假冒攻击、服务的不可否认性等。

Related Words

  1. 假冒
  2. 假冒专利
  3. 假冒品
  4. 假冒的
  5. 反向假冒
  6. 假冒他人
  7. 假冒商品
  8. 假冒总统
  9. 假冒者
  10. 假冒知道
  11. 假冒的
  12. 假冒的签名
  13. 假冒公职人员
  14. 假冒国籍非法悬挂国旗的责任
PC Version

Copyright © 2018 WordTech Co.