作者: Catherine A. Meadows , Catherine A. Meadows
DOI: 10.1007/BFB0000430
关键词:
摘要: … We note that this attack results in at worst a denial of service, since, although the intruder convinces A that a nonkey is a key, the intruder never learns the word that A accepts as a key, …