• Notifiers make anonymous communication between objects in a system possible.

    事件通知使得系统对象可以实现匿名通信

    youdao

  • The definition and relative theories of anonymous communication were summarized.

    匿名通信基本概念相关理论进行了较为全面的整理。

    youdao

  • One of the key problems in the mobile communication is the anonymous communication.

    移动通信中的一个重要的安全问题身份匿名。

    youdao

  • A technique of anonymous communication over the Internet, Onion Routing, is studied in this paper.

    本文研究了一种因特网匿名通讯技术- - -洋葱路由技术。

    youdao

  • This thesis investigated key issues in the anonymity and performance of P2P anonymous communication system.

    本文探讨了P2P匿名通信系统安全性能方面关键问题

    youdao

  • Current anonymous communication systems were analysed and the important attack forms in them were introduced.

    此基础上对于目前不同的匿名通信系统进行了分析评价,介绍了重要攻击形式

    youdao

  • Therefore, anonymous communication system can not only provide anonymous protection but also prevent anonymity abuse.

    因而匿名系统提供匿名保护同时,有效防止匿名滥用

    youdao

  • Therefore, anonymous communication system can not only provide anonymous protection but also prevent anonymity abusing.

    因而匿名系统提供匿名保护同时,有效防止匿名滥用

    youdao

  • Onion routing is used for anonymous communication over a public network. Its anonymous connections are bidirectional and near real-time.

    洋葱路由技术公网上提供双向实时匿名通信面向连接严格的源路由方式导致效率低、扩展性差。

    youdao

  • A secure electronic voting scheme based on anonymous communication channel is proposed by using group signature protocol and timed commitment protocol.

    利用签名协议时限承诺协议,本文给出种新的基于匿名通讯信道安全电子投票方案

    youdao

  • In order to hide the identities in anonymous communication in Ad Hoc networks, the nodes use the pseudonyms to replace the real identities of the nodes.

    组网匿名通信中,节点通常身份代替节点真实身份进行通信并不断变更伪身份,从而达到隐藏节点真实身份的目的。

    youdao

  • Two models of statistical attack in anonymous communication system and the quantitative analysis of their attacking abilities are presented in this paper.

    提出了匿名通信系统中的统计攻击模型,对两种攻击模型的攻击能力定量分析

    youdao

  • The anonymous communication technology based on P2P has been playing an important role for protecting the privacy of clients, and has received a rapid development recently.

    基于P 2 P匿名通信作为有效保护网络通信中用户隐私信息重要技术得到飞速发展

    youdao

  • Based on the realization of anonymous communication simulation and evaluation platform, an evaluation experiment for anonymous communication systems is represented in the paper.

    匿名通信系统仿真评估平台实现基础课题进行了匿名通信系统的仿真评估实验

    youdao

  • The calculated data show that both of the two kinds of attacking method can efficiently destroy the anonymity degree in anonymous communication system under certain circumstances.

    计算数据表明,在一定条件下,统计攻击方法可以有效地破坏匿名通信系统中发送者的匿名

    youdao

  • By using the results of this classification, the supply for a strategy of defense to anonymous communication system can be offered, thus the anonymous degree can be further improved.

    利用分类结果可以匿名通信系统中的攻击提出对应防御策略进一步提高匿名通信系统匿名

    youdao

  • This mechanism, however, can result in extra overhead in performance such as communication delay and participant payload, which may affect the applications of anonymous communication systems.

    性能方面,这种机制导致系统产生额外开销通信延时负载等。

    youdao

  • TOR is an anonymous communication technology based on source routing. It has many features such as perfect for-warding security, separation of protocol from anonymity, and integrity checking, etc.

    TOR一种基于路由的匿名通信技术具有完善的安全机制、匿名协议分离完整性检测等特点。

    youdao

  • The Scitter object used for communication fundamentals and for anonymous (non-authenticated) access to Twitter.

    Scitter对象用于通信基础Twitter匿名(无身份验证)访问

    youdao

  • However, there exist different opinions and concrete legislation solutions, both in theory and in practice, about how to design the anonymous Internet communication monitoring exception.

    然而对于匿名网络通讯监听除外究竟该如何进行设定的问题,理论界存在着诸多不同意见实践有不同的具体法律解决方式

    youdao

  • As a new communicative method, anonymous Internet communication has a bright prospect in the modern society, and also takes an important role in the monitoring actions.

    匿名网络通讯作为一种新兴通讯方式现代社会广泛使用,具有广阔发展前景,同时它在监听活动中也愈发显得重要

    youdao

  • Network Information security includes context security and the anonymous property of Network Communication.

    网络信息安全包括信息内容加密通讯匿名性质

    youdao

  • Communication patterns are also affected by whether participants' identities are known, anonymous, or pseudonymous.

    沟通参与者身份公开的还是匿名抑或使用笔名的,对沟通模式有影响

    youdao

  • The analysis showed, the anonymous technology introduced by this paper has a high degree of anonymity, can provide a smooth communication services for the mobile Internet.

    分析表明,采用提方案系统匿名较高可以移动互联网络提供较好的网络层匿名通信服务

    youdao

  • It provides anonymous connections which prevent both eavesdropping and traffic analysis from revealing the identifying information of the correspondent and the content of the communication.

    技术所建立匿名连接可以有效的防止监听通信量分析攻击,不暴露通信身份信息以及通信内容

    youdao

  • "Economic Research", "Management World", "Accounting Research" and other magazines anonymous reviewers, the National Natural Science Foundation of communication evaluation experts.

    经济研究》、《管理世界》、《会计研究》杂志匿名审稿人国家自然科学基金通讯评议专家

    youdao

  • "Economic Research", "Management World", "Accounting Research" and other magazines anonymous reviewers, the National Natural Science Foundation of communication evaluation experts.

    经济研究》、《管理世界》、《会计研究》杂志匿名审稿人国家自然科学基金通讯评议专家

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定