1) aggressive stealpass
攻击性断传
2) weaning aggression
断奶性攻击
4) interrupted attack
阻断攻击
1.
Paper proves the protocol can withstand the passive attack of adversary under the DDH assumption,and the protocol can withstand the interrupted attack and key-control attack from malicious participants under the DL assumption and the random oracle model.
对Burmester等人提出的非认证组密钥协商协议的安全性进行了深入分析,指出该协议不能抵抗内部恶意节点发起的密钥协商阻断攻击和密钥控制攻击。
5) intrusion diagnosis
攻击诊断
6) inference attack
推断攻击
补充资料:连续性与非连续性(见间断性与不间断性)
连续性与非连续性(见间断性与不间断性)
continuity and discontinuity
11an父ux泊g四f“山。麻以角g、.连续性与非连续性(c。nt,n琳t:nuity一)_见间断性与不间断性。and diseo红ti-
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条