匿名通信是网络与通信领域的热门课题。
Anonymity communication is a hot topic in the area of network and communication.
事件通知使得系统中各对象间可以实现匿名通信。
Notifiers make anonymous communication between objects in a system possible.
对匿名通信的基本概念及相关理论进行了较为全面的整理。
The definition and relative theories of anonymous communication were summarized.
本文研究的是在纯p 2 P网络模型中的匿名通信系统。
This paper researches an anonymity communication under pure P2P net model.
本文探讨了P2P匿名通信系统的安全与性能方面的关键问题。
This thesis investigated key issues in the anonymity and performance of P2P anonymous communication system.
提出了一种匿名算法,通过在IP层动态变化源地址,实现匿名通信。
This paper presents an anonymity algorithm, which dynamically changes source address in IP layer to make a anonymity communications.
在此基础上对于目前不同的匿名通信系统进行了分析和评价,并介绍了重要的攻击形式。
Current anonymous communication systems were analysed and the important attack forms in them were introduced.
在匿名通信系统仿真评估平台的实现基础上,本课题进行了匿名通信系统的仿真评估实验。
Based on the realization of anonymous communication simulation and evaluation platform, an evaluation experiment for anonymous communication systems is represented in the paper.
提出了匿名通信系统中的两种统计型攻击模型,对两种攻击模型的攻击能力作了定量的分析。
Two models of statistical attack in anonymous communication system and the quantitative analysis of their attacking abilities are presented in this paper.
基于P 2 P的匿名通信作为有效保护网络通信中用户隐私信息的重要技术正得到飞速发展。
The anonymous communication technology based on P2P has been playing an important role for protecting the privacy of clients, and has received a rapid development recently.
论文对该模型的可撤销匿名通信过程进行了描述,并且对该模型的系统性能和安全性进行了分析。
Then, this paper describes the process of communication and revocation, analyses the security and capability of the system.
分析表明,采用所提方案的系统匿名度较高,可以为移动互联网络提供较好的网络层匿名通信服务。
The analysis showed, the anonymous technology introduced by this paper has a high degree of anonymity, can provide a smooth communication services for the mobile Internet.
计算数据表明,在一定条件下,两种统计型攻击方法可以有效地破坏匿名通信系统中发送者的匿名度。
The calculated data show that both of the two kinds of attacking method can efficiently destroy the anonymity degree in anonymous communication system under certain circumstances.
利用该分类结果,可以为匿名通信系统中的攻击提出对应的防御策略,进一步提高匿名通信系统的匿名度。
By using the results of this classification, the supply for a strategy of defense to anonymous communication system can be offered, thus the anonymous degree can be further improved.
洋葱路由技术在公网上提供双向、实时的匿名通信,其面向连接和严格的源路由方式导致效率低、扩展性差。
Onion routing is used for anonymous communication over a public network. Its anonymous connections are bidirectional and near real-time.
TOR是一种基于重路由的匿名通信技术,具有完善的前向安全机制、匿名性与协议分离、完整性检测等特点。
TOR is an anonymous communication technology based on source routing. It has many features such as perfect for-warding security, separation of protocol from anonymity, and integrity checking, etc.
首先描述了匿名通信的起源,并从匿名属性、对手能力和网络类型三个方面对匿名通信的基本框架进行了阐述。
The origin of anonymity communication was first outlined, and the framework of anonymity communication in terms of anonymity property, adversary capability and network type were described.
匿名通信可以有效地隐藏发送者或接收者的身份以及通信双方之间的关联关系,以抵抗流量分析攻击,保护用户的隐私。
Anonymous communications can hide the sender, the recipient, and their relation of them, thus can resist the flow attack and protect the privacy of users.
在自组网的匿名通信中,节点通常用伪身份来代替节点的真实身份进行通信并不断变更伪身份,从而达到隐藏节点真实身份的目的。
In order to hide the identities in anonymous communication in Ad Hoc networks, the nodes use the pseudonyms to replace the real identities of the nodes.
通过模拟实验和对相关数据的分析,证明该系统在保持可扩展性的同时,具有较强的抵抗节点失效的能力,较好地解决了匿名通信效率问题。
This system is proved more resistant to peer failure without loss of extensibility and can solve the communication efficient problem better by simulation experiment and data analysis.
黑客可以绕开数据和通话收费,拨打匿名电话(毒品贩子求之不得),并且可能会破坏手机通信塔。
From here, hackers could then circumvent data and call payments, make anonymous phone calls "desirable to drug dealers" and even initiate commands to render cell towers inoperable.
Scitter对象,用于通信基础和对Twitter的匿名(无身份验证)访问。
The Scitter object used for communication fundamentals and for anonymous (non-authenticated) access to Twitter.
移动通信中的一个重要的安全问题是身份匿名。
One of the key problems in the mobile communication is the anonymous communication.
盲签名是一种特殊的数字签名,在有匿名性要求的网络通信中具有独特的地位和作用。
Blind signature is a special kind of digital signature, which has particular status and effect in network communication requiring anonymity.
因为是匿名的,通信的每个对象都不知道其他对象的相关信息,因此通信的过程依赖于其在与谁进行通信。
Because they are anonymous, objects communicating have no knowledge of one another and therefore are independent of the object they are communicating with.
该技术所建立的匿名连接可以有效的防止监听和通信量分析攻击,不暴露通信者的身份信息以及通信的内容。
It provides anonymous connections which prevent both eavesdropping and traffic analysis from revealing the identifying information of the correspondent and the content of the communication.
该方案除了满足投标者匿名、投标价保密、不可否认性、强可验证性等安全要求外,还具有技术简单、通信量小、随机标价、限时强迫兑现等优点。
This scheme can satisfy all the secure requirement of sealed-bid auction stated such as bidder anonymity, bid secrecy, bidder default, verification, and has the advantages of simple technique, sm...
该方案除了满足投标者匿名、投标价保密、不可否认性、强可验证性等安全要求外,还具有技术简单、通信量小、随机标价、限时强迫兑现等优点。
This scheme can satisfy all the secure requirement of sealed-bid auction stated such as bidder anonymity, bid secrecy, bidder default, verification, and has the advantages of simple technique, sm...
应用推荐