• After reviewing these protocols, it is proved that these protocols still suffer from the password guessing attack, and the attacker against the E-SAKA protocol can get the session key.

    通过分析发现E - SAKA协议及其改进算法仍然受到密钥猜测攻击并且E - SAKA协议中攻击者获得会话密钥。

    youdao

  • After reviewing these protocols, it is proved that these protocols still suffer from the password guessing attack, and the attacker against the E-SAKA protocol can get the session key.

    通过分析发现E - SAKA协议及其改进算法仍然受到密钥猜测攻击并且E - SAKA协议中攻击者获得会话密钥。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定