流量分析即通过监测通信方以及传输的数据量来收集关于消息或协议的信息。
Traffic analysis attacks attempt to glean information about a message or protocol by observing which parties are talking to whom, and in some cases how much data is being transferred.
通过定量分析传感器节点的通信能量消耗,建立了聚类首领剩余能量与通信流量的关系模型。
Through analyzing communication energy dissipation of wireless sensor nodes quantitatively, the relational model of cluster heads' residual energy and communication traffic was established.
常用的加密、签名技术仅可以保障通信内容本身的秘密性,不能抵抗流量分析攻击。
Commonly used encryption and signature technology can only protect their communications secrets, but can not resist flow attacks.
IP数据网络流量分析模型的研究一直是通信网络性能分析中一个及其重要的问题。
One of the focuses of any performance evaluation of IP data networks is their analytical Modeling of traffic source.
匿名通信可以有效地隐藏发送者或接收者的身份以及通信双方之间的关联关系,以抵抗流量分析攻击,保护用户的隐私。
Anonymous communications can hide the sender, the recipient, and their relation of them, thus can resist the flow attack and protect the privacy of users.
匿名通信可以有效地隐藏发送者或接收者的身份以及通信双方之间的关联关系,以抵抗流量分析攻击,保护用户的隐私。
Anonymous communications can hide the sender, the recipient, and their relation of them, thus can resist the flow attack and protect the privacy of users.
应用推荐