《计算机网络 自顶向下方法》(第7版)答案(第八章)(四)

P16 This wouldn’t really solve the problem. Just as Bob thinks (incorrectly) that he is authenticating Alice in the first half of Figure 7.14, so too can Trudy fool Alice into thinking (incorrectly) t
相关文章
相关标签/搜索