Nonce is required to prevent replay attacks.
需要Nonce以防止重播攻击。
Object cache to defend against replay attacks.
使高速缓存抵御重播攻击(replay attacks)。
However, SSL can protect applications from replay attacks.
而ssl能保护应用免遭再现攻击。
Furthermore, we analyze its efficiency and its ability to resist replay attacks.
然后分析了该协议抵抗重放攻击的能力和运行效率。
In this case replay attacks from server to client is acceptable and not an issue.
在这种情况下,重放攻击从服务器到客户端是可以接受的,不是一个问题。
When used in conjunction with nonce and timestamp checking, this can effectively thwart replay attacks.
将nonce与时间戳检查一起使用时,可以有效地阻止回复攻击。
There are subtle issues of cryptography, replay attacks, and various other forms of attack that are easily overlooked.
加密、重播攻击和其中各种形式的攻击中有各种细微问题容易被忽视。
While the id is randomly generated, it is still subject to replay attacks because it does not timeout (except when idle).
虽然该ID是随机生成的,但是它仍然受重播攻击的影响,因为它没有超时(除非处于空闲状态)。
This paper brought forward a novel taxonomy of replay attacks after studied the attribute of replay attacks to various protocols.
在详细研究攻击实例的基础上,从攻击成功的根本原因出发,提出了一种新的重放攻击分类方法。
Prevent replay attacks: Ensure that the reply that XKMS service sends for a request is not captured by an unauthorized third party.
防止重复攻击(replay attack):确保XKMS服务为某请求发送的回复不被未经授权的第三方捕获到。
Results show that the method using symbol model checker can discover replay attacks upon some cryptographic protocols and is effective.
结果表明,利用符号模型检测方法分析并发现密码协议重放攻击的漏洞是一种行之有效的方法。
There are many kinds of ways of attacks on authentication protocol, but replay attacks and type flaw attacks account for more than 90 percent of them.
对认证协议的攻击形式有很多,但已构成的攻击事例中,百分之九十以上是重放攻击和类型缺陷攻击。
Traditional password authentication schemes are vulnerable to replay attacks because of the fixed password and unchanged messages submitted by users for verification.
由于每次登录时用户提交的认证信息都是固定不变的,传统的口令认证机制容易遭受回放攻击。
The analysis of security for the cryptography demonstrates the cryptography can resist the message replay attacks and man in the middle attacks, and is feasible in practice.
对该密码安全体制进行安全分析后表明:该体制能有效地抵御网络中的消息重放攻击和中间人攻击,并在实际应用中有较高的可行性。
SAML provides protection from replay attacks by requiring the use of SSL encryption when transmitting assertions and messages specifically to prevent interception of assertions.
SAML提供了避免重播攻击的保护。SAML要求在传输断言和消息时使用ssl加密,以专门防止断言被拦截。
A simple hash, as sometimes used in HTTP Basic authentication, is subject to replay attacks because one can easily sniff the traffic and replay the hash without knowing the password.
简单的哈希(例如有时在HTTP基本身份验证中使用的哈希)易受到回复攻击的威胁,因为攻击者可以很容易地探查到通信并能够在不知道密码的情况下回复哈希。
Because a signature alone does not guarantee that the sender is who they say they are, the message transmission is vulnerable to techniques such as replay attacks by some malicious third party.
因为仅仅有数字签名并无法保证发送方就是他们自己所声称的人,消息的传输很容易遭受恶意第三方诸如再现攻击等技术的袭击。
The data transmitted over the network is susceptible to network attacks like snooping the network traffic, non-repudiation, tampering the data, spoofing, hijacking, and capture-replay.
在网络上传输的数据容易受到各种网络攻击,例如嗅探网络传输、不可抵赖性、篡改数据、欺骗、拦截和捕捉回复。
But it still has some security hidden troubles, for instance: replay attack, password guessing, inter-session chosen plaintext attacks.
但仍存在一些隐患,例如:重放攻击、密码猜测、会话中选择明文攻击等等。
But it still has some security hidden troubles, for instance: replay attack, password guessing, inter-session chosen plaintext attacks.
但仍存在一些隐患,例如:重放攻击、密码猜测、会话中选择明文攻击等等。
应用推荐