• Man-in-the-middle attacks are not possible.

    可能发生中间人攻击

    youdao

  • It can often help prevent ARP-based Man-in-the-Middle attacks.

    这种技术常常用于帮助防御基于ARP的中间人攻击

    youdao

  • WCF supports mutual authentication, which identifies both the client and the service in tandem, to help in preventing man-in-the-middle attacks.

    WCF提供相互认证确定客户串联使用帮助防止中间人攻击

    youdao

  • This protocol is used to provide confidentiality of secure information, such as user credentials and transaction information, and protection from man-in-the-middle attacks.

    协议用于提供安全信息(比如用户凭证交易信息)机密性,还提供了防止中间人攻击的保护

    youdao

  • WTLS handshake protocol doesn't provide forward security, and lacks of user anonymity when not in the anonymous mode. It is vulnerable to man-in-the-middle attacks in completely anonymous mode.

    WTLS握手协议满足前向安全性,非匿名验证模式满足用户匿名性,完全匿名模式下遭受中间人攻击

    youdao

  • The analysis of security for the cryptography demonstrates the cryptography can resist the message replay attacks and man in the middle attacks, and is feasible in practice.

    密码安全体制进行安全分析后表明:该体制有效地抵御网络中的消息重放攻击中间人攻击,实际应用中较高的可行性

    youdao

  • However, without signed manifests, it is difficult to ensure that the application installer is not tampered in man-in-the-middle security attacks.

    然而没有签名清单的情况下,很难确保应用程序安装程序受到中间人安全攻击时被篡改

    youdao

  • The following attacks should be considered into account: man-in-middle, spoofing, sniffing and Denial of services.

    以下袭击考虑到:人在中间欺骗嗅探拒绝服务

    youdao

  • The following attacks should be considered into account: man-in-middle, spoofing, sniffing and Denial of services.

    以下袭击考虑到:人在中间欺骗嗅探拒绝服务

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定