简体版 繁體版 English 한국어
登録 ログイン

acoustic cryptanalysisの例文

例文モバイル版携帯版

  • As with any system which involves the user entering a password, the master password may also be attacked and discovered using key logging or acoustic cryptanalysis.