impersonation attack
基本解释
- [计算机科学技术]假冒攻击伪装攻击冒名顶替攻击
英汉例句
- At last, the reasons for the success of impersonation attack have been analyzed and countermeasures against these attacks have been brought forward as well.
并分析了攻击成功的原因,给出了克服攻击的改进措施。
202.14.238.38 - Their size parameters, the largest probability of a successful impersonation attack and the largest probability of a successful substitution attack are computed;
并计算了相关参数及成功伪造和成功替换的最大概率; - Given the condition of the intractability of the elliptic curve discrete logarithm problem, the proposed scheme was proved secure against forged user attack, impersonation attack and replay attack.
最后证明所提出的方案在椭圆曲线离散对数难解假设下能有效抵抗伪造用户攻击,冒充攻击和重放攻击,具有较好的安全性。
kns50.chkd.cnki.net - The number of impersonation attacks online is on the rise because the tools to attack are more easily available and the targets more numerous.
FORBES: King Richard III: Villain, Hero, Or Tragic Victim Of Identity Theft?
双语例句
权威例句
词组短语
- key compromise impersonation attack 密钥泄露伪装攻击
- server compromised impersonation attack 服务器假冒攻击
- password -compromise impersonation attack 口令泄露伪造攻击
短语
专业释义
- 假冒攻击
- 伪装攻击
- 冒名顶替攻击