impersonation attack
基本解釋
- [計(jì)算機(jī)科學(xué)技術(shù)]假冒攻擊偽裝攻擊冒名頂替攻擊
英漢例句
- At last, the reasons for the success of impersonation attack have been analyzed and countermeasures against these attacks have been brought forward as well.
并分析了攻擊成功的原因,給出了克服攻擊的改進(jìn)措施。
202.14.238.38 - Their size parameters, the largest probability of a successful impersonation attack and the largest probability of a successful substitution attack are computed;
并計(jì)算了相關(guān)參數(shù)及成功偽造和成功替換的最大概率; - Given the condition of the intractability of the elliptic curve discrete logarithm problem, the proposed scheme was proved secure against forged user attack, impersonation attack and replay attack.
最后證明所提出的方案在橢圓曲線離散對(duì)數(shù)難解假設(shè)下能有效抵抗偽造用戶攻擊,冒充攻擊和重放攻擊,具有較好的安全性。
kns50.chkd.cnki.net - The number of impersonation attacks online is on the rise because the tools to attack are more easily available and the targets more numerous.
FORBES: King Richard III: Villain, Hero, Or Tragic Victim Of Identity Theft?
雙語(yǔ)例句
權(quán)威例句
詞組短語(yǔ)
- key compromise impersonation attack 密鑰泄露偽裝攻擊
- server compromised impersonation attack 服務(wù)器假冒攻擊
- password -compromise impersonation attack 口令泄露偽造攻擊
短語(yǔ)
專業(yè)釋義
- 假冒攻擊
- 偽裝攻擊
- 冒名頂替攻擊