• 证明了方案安全满足完全匿名性完全可追踪

    The scheme was verified to satisfy the security demand of full anonymity and full traceability.

    youdao

  • 完全匿名电子现金很容易被拷贝后重复使用,所以公平的电子现金被要求必要时机能够撤销其匿名性

    Due to the inborn nature of easy duplication and reuse of E-cash, it is a requisite that the anonymity of E-cash be removed on certain occasions when necessary.

    youdao

  • WTLS握手协议满足前向安全,非匿名验证模式满足用户匿名完全匿名模式下遭受中间人攻击

    WTLS handshake protocol doesn't provide forward security, and lacks of user anonymity when not in the anonymous mode. It is vulnerable to man-in-the-middle attacks in completely anonymous mode.

    youdao

  • WTLS握手协议满足前向安全,非匿名验证模式满足用户匿名完全匿名模式下遭受中间人攻击

    WTLS handshake protocol doesn't provide forward security, and lacks of user anonymity when not in the anonymous mode. It is vulnerable to man-in-the-middle attacks in completely anonymous mode.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定