繁體版 English
登录 注册

假冒攻击的英文

发音:  
"假冒攻击"怎么读用"假冒攻击"造句

英文翻译手机手机版

  • impersonation attack

例句与用法

  • 2 ) a new one time password authentication scheme . the original password authentication is vulnerable to guess attack and server personating attack . to overcome the vulnerability of this scheme , this paper designs a simple and efficient password authentication schema . the enhanced schema can improve the system ' s ability to defend all kinds of the attacks without using any cryptosystems
    2 )新的一次性口令认证机制。针对postgresql原有认证机制具有易遭受口令猜测攻击和服务器端假冒攻击的缺陷,本文设计了一种简单而有效的口令认证机制。该认证机制不需要使用任何加密系统,就能有效加强对各种攻击手段的防范能力。
  • In a wireless mobile communication system , mutual authentication and key establishing protocols not only need to establish a shared key for encrypt information exchange in conversation on the basis of mutual authentication , but they also need to satisfy essential security requirements , including forward secrecy , impersonated attack and man - in - middle attack , etc
    摘要在无线通信系统中,相互认证和密钥建立协议不仅要在实现实体间的相互认证的基础上建立唯一的共享会话密钥,而且协议本身还应当满足一定的安全要求,如防止假冒攻击、服务的不可否认性等。
用"假冒攻击"造句  
假冒攻击的英文翻译,假冒攻击英文怎么说,怎么用英语翻译假冒攻击,假冒攻击的英文意思,假冒攻擊的英文假冒攻击 meaning in English假冒攻擊的英文假冒攻击怎么读,发音,例句,用法和解释由查查在线词典提供,版权所有违者必究。