• 方案通过移动IP注册消息的认证避免了针对注册过程假冒攻击重发攻击

    By using authentication, this solution avoids the counterfeit attack and replay attack directed against the Mobile IP register process.

    youdao

  • 方案提出了成功假冒攻击源测定算法,其中采用了汇聚节点监控排查恶意区域、普通节点认证转发报警消息机制。

    In addition, the succeeded masquerader detection algorithm is proposed in this scheme. In this algorithm, the sink node monitors and examines the malicious region.

    youdao

  • 攻击可以恶意软件假冒网站得到检查SHA- 1哈希验证任何系统信任

    An attacker can allow its malware or fake site to be checked for SHA-1 hashes to verify the trust of any system.

    youdao

  • 同时指出了另外缺陷攻击可以假冒原始签名人将任何消息代理签名委托给任何代理人。

    It is pointed out that they have the same defect in security which is the attacker can forge an effective signer to actualize an attack of public key replace.

    youdao

  • 该文给出一种攻击方案表明他们的方案不安全任何代理签名接收者可以假冒代理人任意消息生成有效的签名。

    However, their scheme is insecure by presenting a forgery attack, any receiver can impersonate the proxy signer to sign any message without holding the responsibility.

    youdao

  • YBX代理多重签名方案安全攻击者在不知道原始签名者密钥的情况下,能够伪造代理签名密钥,假冒代理签名者对文件进行签名。

    The proxy multi-signature scheme called YBX is not safe. An attacker can forge the key pair of proxy signature without the original private key, and disguise himself as proxy to sign document.

    youdao

  • 通过假冒、重放等攻击系统安全性进行分析,证明系统安全可行。

    The higher security of system was proved by the analysis of masquerade and reply attacks.

    youdao

  • 通过假冒、重放等攻击系统安全性进行分析,证明系统安全可行。

    The higher security of system was proved by the analysis of masquerade and reply attacks.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定