• The attack described above enables the attacker to impersonate a victim, provided that such victim was assigned a cookie between the two samples the attacker made of the site cookies.

    上面所描述攻击可以使攻击者扮演一个受害者角色,假定这样的受害者分配到两个站点 cookie 构成的样例攻击者之间

    youdao

  • However, their scheme is insecure by presenting a forgery attack, any receiver can impersonate the proxy signer to sign any message without holding the responsibility.

    该文给出一种攻击方案表明他们的方案不安全任何代理签名接收者可以假冒代理人任意消息生成有效的签名。

    youdao

  • However, their scheme is insecure by presenting a forgery attack, any receiver can impersonate the proxy signer to sign any message without holding the responsibility.

    该文给出一种攻击方案表明他们的方案不安全任何代理签名接收者可以假冒代理人任意消息生成有效的签名。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定