该方案通过对移动IP注册消息的认证,避免了针对注册过程的假冒攻击和重发攻击。
By using authentication, this solution avoids the counterfeit attack and replay attack directed against the Mobile IP register process.
该方案也提出了成功假冒攻击源测定算法,其中采用了汇聚节点监控排查恶意区域、普通节点认证转发报警消息机制。
In addition, the succeeded masquerader detection algorithm is proposed in this scheme. In this algorithm, the sink node monitors and examines the malicious region.
攻击者可以让其恶意软件或假冒网站得到检查SHA- 1哈希以验证的任何系统的信任。
An attacker can allow its malware or fake site to be checked for SHA-1 hashes to verify the trust of any system.
同时,也指出了另外一个缺陷即攻击者可以假冒原始签名人将任何消息的代理签名权委托给任何代理人。
It is pointed out that they have the same defect in security which is the attacker can forge an effective signer to actualize an attack of public key replace.
该文给出的一种攻击方案表明他们的方案是不安全的,任何代理签名的接收者都可以假冒代理人对任意的消息生成有效的签名。
However, their scheme is insecure by presenting a forgery attack, any receiver can impersonate the proxy signer to sign any message without holding the responsibility.
YBX代理多重签名方案是不安全的,攻击者在不知道原始签名者密钥的情况下,能够伪造代理签名密钥,假冒代理签名者对文件进行签名。
The proxy multi-signature scheme called YBX is not safe. An attacker can forge the key pair of proxy signature without the original private key, and disguise himself as proxy to sign document.
通过假冒、重放等攻击对系统安全性进行分析,证明了系统的安全可行。
The higher security of system was proved by the analysis of masquerade and reply attacks.
通过假冒、重放等攻击对系统安全性进行分析,证明了系统的安全可行。
The higher security of system was proved by the analysis of masquerade and reply attacks.
应用推荐