说明:双击或选中下面任意单词,将显示该词的音标、读音、翻译等;选中中文或多个词,将显示翻译。
您的位置:首页 -> 词典 -> 口令泄露伪造攻击
1)  password-compromise impersonation attack
口令泄露伪造攻击
2)  key compromise impersonation attack
密钥泄露伪装攻击
1.
Researches show that the protocol can not resist the key compromise impersonation attack.
研究结果发现,该协议不能抵抗密钥泄露伪装攻击。
3)  forgery attack
伪造攻击
1.
Analysis and Forgery Attack to Authorised Group Signature Scheme;
对授权群签名方案的分析及伪造攻击
2.
A new forgery attack on message recovery signatures;
具有消息恢复签名方案的伪造攻击
3.
A class of threshold signature scheme based on ElGamal is improved,in which dealer right can be restricted,it can prevent forgery attack for security.
本文对基于ElGamal体制的一类门限签名方案进行改进,改进后的方案能够限制分发者的权限,防止了伪造攻击,从而提高了安全性能。
4)  forge attack
伪造攻击
1.
Based on security analysis on Hsu scheme,an improved threshold proxy signature scheme was proposed,which effectively overcomed the disadvantage of Hsu scheme which couldn t stand the internal conspiracy attack and the forge attack.
在对Hsu等的方案进行安全性分析的基础上,提出了一种改进的门限代理签名方案,该方案有效地克服了Hsu方案不能有效抵抗内部协作伪造攻击的不足。
2.
There is forge attack in the scheme.
分析了一种批量签名的安全性,这种签名是不安全的,签名方案存在伪造攻击。
5)  password attack
口令攻击
6)  forgery attack
伪造签名攻击
1.
Two forgery attacks and their corresponding conspiracy attacks are proposed against the(t,n) threshold signature scheme without a trusted party worked out by Wang Bin and Li Jian-hua(the WL Scheme for short).
针对王斌和李建华的无可信中心(t,n)门限签名方案(简称王-李方案),给出两种伪造签名攻击及相应的合谋攻击。
2.
The results show that the proposed scheme can not only resist conspiracy attacks and forgery attacks essentially,but also provide anonymity and traceability simultaneously.
结果表明:该方案不仅能够从根本上抵抗合谋攻击和伪造签名攻击,而且在保证匿名性的前提下,能够真正实现签名成员身份的可追查性,同时通过构造安全的分布式密钥生成协议保证群私钥的不可知性,因此比现有方案具有更高的安全性。
补充资料:战役伪装(见伪装)


战役伪装(见伪装)
campaign camouflage

盆罢盘鉴,zhuQng.叹供脚衣气camPalgn camoutlage)见伪装。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条