• 匿名通信网络通信领域热门课题

    Anonymity communication is a hot topic in the area of network and communication.

    youdao

  • 事件通知使得系统对象可以实现匿名通信

    Notifiers make anonymous communication between objects in a system possible.

    youdao

  • 匿名通信基本概念相关理论进行了较为全面的整理。

    The definition and relative theories of anonymous communication were summarized.

    youdao

  • 本文研究的是p 2 P网络模型中的匿名通信系统

    This paper researches an anonymity communication under pure P2P net model.

    youdao

  • 本文探讨了P2P匿名通信系统安全性能方面关键问题

    This thesis investigated key issues in the anonymity and performance of P2P anonymous communication system.

    youdao

  • 提出匿名算法通过IP动态变化地址实现匿名通信

    This paper presents an anonymity algorithm, which dynamically changes source address in IP layer to make a anonymity communications.

    youdao

  • 此基础上对于目前不同的匿名通信系统进行了分析评价,介绍了重要攻击形式

    Current anonymous communication systems were analysed and the important attack forms in them were introduced.

    youdao

  • 匿名通信系统仿真评估平台实现基础课题进行了匿名通信系统的仿真评估实验

    Based on the realization of anonymous communication simulation and evaluation platform, an evaluation experiment for anonymous communication systems is represented in the paper.

    youdao

  • 提出了匿名通信系统中的统计攻击模型,对两种攻击模型的攻击能力定量分析

    Two models of statistical attack in anonymous communication system and the quantitative analysis of their attacking abilities are presented in this paper.

    youdao

  • 基于P 2 P匿名通信作为有效保护网络通信用户隐私信息重要技术得到飞速发展

    The anonymous communication technology based on P2P has been playing an important role for protecting the privacy of clients, and has received a rapid development recently.

    youdao

  • 论文模型的可撤销匿名通信过程进行了描述并且对该模型系统性能安全性进行了分析

    Then, this paper describes the process of communication and revocation, analyses the security and capability of the system.

    youdao

  • 分析表明,采用提方案系统匿名较高可以移动互联网络提供较好的网络层匿名通信服务

    The analysis showed, the anonymous technology introduced by this paper has a high degree of anonymity, can provide a smooth communication services for the mobile Internet.

    youdao

  • 计算数据表明,在一定条件下,统计攻击方法可以有效地破坏匿名通信系统中发送者的匿名

    The calculated data show that both of the two kinds of attacking method can efficiently destroy the anonymity degree in anonymous communication system under certain circumstances.

    youdao

  • 利用分类结果可以匿名通信系统中的攻击提出对应防御策略进一步提高匿名通信系统匿名

    By using the results of this classification, the supply for a strategy of defense to anonymous communication system can be offered, thus the anonymous degree can be further improved.

    youdao

  • 洋葱路由技术公网上提供双向实时匿名通信面向连接严格的源路由方式导致效率低、扩展性差。

    Onion routing is used for anonymous communication over a public network. Its anonymous connections are bidirectional and near real-time.

    youdao

  • TOR一种基于路由的匿名通信技术具有完善的安全机制、匿名协议分离完整性检测等特点

    TOR is an anonymous communication technology based on source routing. It has many features such as perfect for-warding security, separation of protocol from anonymity, and integrity checking, etc.

    youdao

  • 首先描述了匿名通信起源匿名属性、对手能力网络类型三个方面匿名通信基本框架进行了阐述

    The origin of anonymity communication was first outlined, and the framework of anonymity communication in terms of anonymity property, adversary capability and network type were described.

    youdao

  • 匿名通信可以有效地隐藏发送或接收者身份以及通信双方之间关联关系,以抵抗流量分析攻击保护用户隐私

    Anonymous communications can hide the sender, the recipient, and their relation of them, thus can resist the flow attack and protect the privacy of users.

    youdao

  • 组网匿名通信中,节点通常身份代替节点真实身份进行通信并不断变更伪身份,从而达到隐藏节点真实身份的目的。

    In order to hide the identities in anonymous communication in Ad Hoc networks, the nodes use the pseudonyms to replace the real identities of the nodes.

    youdao

  • 通过模拟实验对相关数据分析证明系统保持可扩展性的同时,具有强的抵抗节点失效的能力,较好地解决匿名通信效率问题

    This system is proved more resistant to peer failure without loss of extensibility and can solve the communication efficient problem better by simulation experiment and data analysis.

    youdao

  • 黑客可以绕开数据通话收费拨打匿名电话(毒品贩子求之不得),并且可能会破坏手机通信

    From here, hackers could then circumvent data and call payments, make anonymous phone calls "desirable to drug dealers" and even initiate commands to render cell towers inoperable.

    youdao

  • Scitter对象用于通信基础Twitter匿名(无身份验证)访问

    The Scitter object used for communication fundamentals and for anonymous (non-authenticated) access to Twitter.

    youdao

  • 移动通信中的一个重要的安全问题身份匿名

    One of the key problems in the mobile communication is the anonymous communication.

    youdao

  • 签名一种特殊数字签名,匿名要求网络通信具有独特地位作用

    Blind signature is a special kind of digital signature, which has particular status and effect in network communication requiring anonymity.

    youdao

  • 因为匿名通信的每个对象知道其他对象相关信息,因此通信的过程依赖于其在与谁进行通信

    Because they are anonymous, objects communicating have no knowledge of one another and therefore are independent of the object they are communicating with.

    youdao

  • 技术所建立匿名连接可以有效的防止监听通信分析攻击,不暴露通信身份信息以及通信内容

    It provides anonymous connections which prevent both eavesdropping and traffic analysis from revealing the identifying information of the correspondent and the content of the communication.

    youdao

  • 方案除了满足投标者匿名投标价保密、不可否认性、强可验证安全要求具有技术简单通信量小、随机标价、限时强迫兑现等优点。

    This scheme can satisfy all the secure requirement of sealed-bid auction stated such as bidder anonymity, bid secrecy, bidder default, verification, and has the advantages of simple technique, sm...

    youdao

  • 方案除了满足投标者匿名投标价保密、不可否认性、强可验证安全要求具有技术简单通信量小、随机标价、限时强迫兑现等优点。

    This scheme can satisfy all the secure requirement of sealed-bid auction stated such as bidder anonymity, bid secrecy, bidder default, verification, and has the advantages of simple technique, sm...

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定