... asynchronous attackn.异步冲击 substitution attack替代攻击 Triple pivot attack三中锋进攻 ...
基于96个网页-相关网页
·2,447,543篇论文数据,部分数据来源于NoteExpress
These weak points can result in the adversary to cheat the verification group by forgery and substitution attack.
这样的漏洞使得敌手可利用伪造攻击和替换攻击对验证组进行欺骗;
Furthermore, using zero knowledge idea, a general approach to withstanding the public key substitution attack is given.
进一步利用零知识的思想给出了抵抗公钥替换攻击的一般方法。
Improved scheme has advantages of nonrepudiation, against he original signer's forgery attack and public key substitution attack etc.
改进的方案具有不可否认性,以及抵抗原签名人的伪造攻击和公钥替换攻击等优点。
应用推荐