This keeps the role cookie from being exposed over the network and being used in a replay attack against your application 这可以使角色cookie不会公开在网络上,也不会被用在针对应用程序的重播攻击。
While the id is randomly generated , it is still subject to replay attacks because it does not timeout except when idle 虽然该id是随机生成的,但是它仍然受重播攻击的影响,因为它没有超时(除非处于空闲状态) 。
Also mobile ip technique brings potential secure problems , one of which is registration suffering denial of service attacks and replay attacks 另外,移动ip也带来了潜在的安全问题,其中注册过程可能遭受拒绝服务攻击和重放攻击。
If enterprise c re - sends the order to enterprise b then enterprise b will accept it as another order from enterprise a a replay attack by enterprise c 如果丙企业将该订单重复发送给乙企业,那么乙企业就会将其当作另一个来自甲企业的订单(来自丙企业的再现攻击) 。
Saml provides protection from replay attacks by requiring the use of ssl encryption when transmitting assertions and messages specifically to prevent interception of assertions Saml提供了避免重播攻击的保护。 saml要求在传输断言和消息时使用ssl加密,以专门防止断言被拦截。
It can provide security service that includes access control , integrality , authentication , replay attack protection , privacy and privacy of finite communication 通过ah和esp协议来以下的安全服务:访问控制,无连接完整性,数据源认证,重放攻击保护,机密性和有限的通信流保密性。
This is an effective defense against replay attacks , in which authentic packets are captured and then replayed onto the network at a later time in an attempt to disrupt service 这是防范再播放攻击的有效办法,这时,可信赖的包被俘获,然后在晚些时候,企图中断服务时再在网络上重新播放。
Because a signature alone does not guarantee that the sender is who they say they are , the message transmission is vulnerable to techniques such as replay attacks by some malicious third party 因为仅仅有数字签名并无法保证发送方就是他们自己所声称的人,消息的传输很容易遭受恶意第三方诸如再现攻击等技术的袭击。
Method clears the ticket from the authenticated browser session , your application can still be susceptible to a replay attack from an unwanted source that has " sniffed " an authentication ticket 方法会从通过身份验证的浏览器会话中清除票证,但您的应用程序仍然易于受到来自已“探查”到身份验证票证的有害源的重播攻击。
Also , a malicious enterprise a could repudiate the second order and claim that the second order is the result of a replay attack by a malicious enterprise c , even though enterprise a actually sent the order 同样,恶意的甲企业也可以抵赖第二份订单,并声称这第二份订单是恶意的丙企业再现攻击的结果,尽管事实上它是甲企业发送的订单。