1. Notifiers make anonymous communication between objects in a system possible.
事件通知使得系统中各对象间可以实现匿名通信。

来自互联网

2. The definition and relative theories of anonymous communication were summarized.
对匿名通信的基本概念及相关理论进行了较为全面的整理。

来自互联网

3. One of the key problems in the mobile communication is the anonymous communication.
移动通信中的一个重要的安全问题是身份匿名。

来自互联网

4. A technique of anonymous communication over the Internet, Onion Routing, is studied in this paper.
本文研究了一种因特网上的匿名通讯技术- - -洋葱路由技术。

来自互联网

5. This thesis investigated key issues in the anonymity and performance of P2P anonymous communication system.
本文探讨了P2P匿名通信系统的安全与性能方面的关键问题。

来自互联网

6. Current anonymous communication systems were analysed and the important attack forms in them were introduced.
在此基础上对于目前不同的匿名通信系统进行了分析和评价,并介绍了重要的攻击形式。

来自互联网

7. Therefore, anonymous communication system can not only provide anonymous protection but also prevent anonymity abuse.
因而,匿名系统能在提供匿名保护的同时,有效地防止匿名滥用。

来自互联网

8. Therefore, anonymous communication system can not only provide anonymous protection but also prevent anonymity abusing.
因而,匿名系统能在提供匿名保护的同时,有效地防止匿名滥用。

来自互联网

9. Onion routing is used for anonymous communication over a public network. Its anonymous connections are bidirectional and near real-time.
洋葱路由技术在公网上提供双向、实时的匿名通信,其面向连接和严格的源路由方式导致效率低、扩展性差。

来自互联网

10. A secure electronic voting scheme based on anonymous communication channel is proposed by using group signature protocol and timed commitment protocol.
利用群签名协议和时限承诺协议,本文给出了一种新的基于匿名通讯信道的安全电子投票方案。

来自互联网

11. In order to hide the identities in anonymous communication in Ad Hoc networks, the nodes use the pseudonyms to replace the real identities of the nodes.
在自组网的匿名通信中,节点通常用伪身份来代替节点的真实身份进行通信并不断变更伪身份,从而达到隐藏节点真实身份的目的。

来自互联网

12. Two models of statistical attack in anonymous communication system and the quantitative analysis of their attacking abilities are presented in this paper.
提出了匿名通信系统中的两种统计型攻击模型,对两种攻击模型的攻击能力作了定量的分析。

来自互联网

13. The anonymous communication technology based on P2P has been playing an important role for protecting the privacy of clients, and has received a rapid development recently.
基于P 2 P的匿名通信作为有效保护网络通信中用户隐私信息的重要技术正得到飞速发展。

来自互联网

14. Based on the realization of anonymous communication simulation and evaluation platform, an evaluation experiment for anonymous communication systems is represented in the paper.
在匿名通信系统仿真评估平台的实现基础上,本课题进行了匿名通信系统的仿真评估实验。

来自互联网

15. The calculated data show that both of the two kinds of attacking method can efficiently destroy the anonymity degree in anonymous communication system under certain circumstances.
计算数据表明,在一定条件下,两种统计型攻击方法可以有效地破坏匿名通信系统中发送者的匿名度。

来自互联网

16. By using the results of this classification, the supply for a strategy of defense to anonymous communication system can be offered, thus the anonymous degree can be further improved.
利用该分类结果,可以为匿名通信系统中的攻击提出对应的防御策略,进一步提高匿名通信系统的匿名度。

来自互联网

17. This mechanism, however, can result in extra overhead in performance such as communication delay and participant payload, which may affect the applications of anonymous communication systems.
在性能方面,这种机制导致系统中产生额外的开销,如通信延时、负载等。

来自互联网

18. TOR is an anonymous communication technology based on source routing. It has many features such as perfect for-warding security, separation of protocol from anonymity, and integrity checking, etc.
TOR是一种基于重路由的匿名通信技术,具有完善的前向安全机制、匿名性与协议分离、完整性检测等特点。

来自互联网

19. The Scitter object used for communication fundamentals and for anonymous (non-authenticated) access to Twitter.
Scitter对象,用于通信基础和对Twitter的匿名(无身份验证)访问。

来自互联网

20. However, there exist different opinions and concrete legislation solutions, both in theory and in practice, about how to design the anonymous Internet communication monitoring exception.
然而,对于匿名网络通讯监听除外究竟该如何进行设定的问题,理论界存在着诸多不同意见,实践中也有不同的具体法律解决方式。

来自互联网

21. As a new communicative method, anonymous Internet communication has a bright prospect in the modern society, and also takes an important role in the monitoring actions.
匿名网络通讯作为一种新兴通讯方式在现代社会广泛使用,具有广阔发展前景,同时它在监听活动中也愈发显得重要。

来自互联网

22. Network Information security includes context security and the anonymous property of Network Communication.
网络信息安全包括信息内容的加密及通讯的匿名性质。

来自互联网

23. Communication patterns are also affected by whether participants' identities are known, anonymous, or pseudonymous.
沟通参与者的身份是公开的还是匿名的抑或使用笔名的,对沟通模式也有影响。

来自互联网

24. The analysis showed, the anonymous technology introduced by this paper has a high degree of anonymity, can provide a smooth communication services for the mobile Internet.
分析表明,采用所提方案的系统匿名度较高,可以为移动互联网络提供较好的网络层匿名通信服务。

来自互联网

25. It provides anonymous connections which prevent both eavesdropping and traffic analysis from revealing the identifying information of the correspondent and the content of the communication.
该技术所建立的匿名连接可以有效的防止监听和通信量分析攻击,不暴露通信者的身份信息以及通信的内容。

来自互联网

26. "Economic Research", "Management World", "Accounting Research" and other magazines anonymous reviewers, the National Natural Science Foundation of communication evaluation experts.
《经济研究》、《管理世界》、《会计研究》等杂志匿名审稿人,国家自然科学基金通讯评议专家。

来自互联网

27. "Economic Research", "Management World", "Accounting Research" and other magazines anonymous reviewers, the National Natural Science Foundation of communication evaluation experts.
《经济研究》、《管理世界》、《会计研究》等杂志匿名审稿人,国家自然科学基金通讯评议专家。

来自互联网