1. Notifiers make anonymouscommunication between objects in a system possible.
事件通知使得系统中各对象间可以实现匿名通信。
来自互联网
2. The definition and relative theories of anonymouscommunication were summarized.
对匿名通信的基本概念及相关理论进行了较为全面的整理。
来自互联网
3. One of the key problems in the mobile communication is the anonymouscommunication.
移动通信中的一个重要的安全问题是身份匿名。
来自互联网
4. A technique of anonymouscommunication over the Internet, Onion Routing, is studied in this paper.
本文研究了一种因特网上的匿名通讯技术- - -洋葱路由技术。
来自互联网
5. This thesis investigated key issues in the anonymity and performance of P2P anonymouscommunication system.
本文探讨了P2P匿名通信系统的安全与性能方面的关键问题。
来自互联网
6. Current anonymouscommunication systems were analysed and the important attack forms in them were introduced.
在此基础上对于目前不同的匿名通信系统进行了分析和评价,并介绍了重要的攻击形式。
来自互联网
7. Therefore, anonymouscommunication system can not only provide anonymous protection but also prevent anonymity abuse.
因而,匿名系统能在提供匿名保护的同时,有效地防止匿名滥用。
来自互联网
8. Therefore, anonymouscommunication system can not only provide anonymous protection but also prevent anonymity abusing.
因而,匿名系统能在提供匿名保护的同时,有效地防止匿名滥用。
来自互联网
9. Onion routing is used for anonymouscommunication over a public network. Its anonymous connections are bidirectional and near real-time.
洋葱路由技术在公网上提供双向、实时的匿名通信,其面向连接和严格的源路由方式导致效率低、扩展性差。
来自互联网
10. A secure electronic voting scheme based on anonymouscommunication channel is proposed by using group signature protocol and timed commitment protocol.
利用群签名协议和时限承诺协议,本文给出了一种新的基于匿名通讯信道的安全电子投票方案。
来自互联网
11. In order to hide the identities in anonymouscommunication in Ad Hoc networks, the nodes use the pseudonyms to replace the real identities of the nodes.
12. Two models of statistical attack in anonymouscommunication system and the quantitative analysis of their attacking abilities are presented in this paper.
提出了匿名通信系统中的两种统计型攻击模型,对两种攻击模型的攻击能力作了定量的分析。
来自互联网
13. The anonymouscommunication technology based on P2P has been playing an important role for protecting the privacy of clients, and has received a rapid development recently.
基于P 2 P的匿名通信作为有效保护网络通信中用户隐私信息的重要技术正得到飞速发展。
来自互联网
14. Based on the realization of anonymouscommunication simulation and evaluation platform, an evaluation experiment for anonymous communication systems is represented in the paper.
在匿名通信系统仿真评估平台的实现基础上,本课题进行了匿名通信系统的仿真评估实验。
来自互联网
15. The calculated data show that both of the two kinds of attacking method can efficiently destroy the anonymity degree in anonymouscommunication system under certain circumstances.
计算数据表明,在一定条件下,两种统计型攻击方法可以有效地破坏匿名通信系统中发送者的匿名度。
来自互联网
16. By using the results of this classification, the supply for a strategy of defense to anonymouscommunication system can be offered, thus the anonymous degree can be further improved.
利用该分类结果,可以为匿名通信系统中的攻击提出对应的防御策略,进一步提高匿名通信系统的匿名度。
来自互联网
17. This mechanism, however, can result in extra overhead in performance such as communication delay and participant payload, which may affect the applications of anonymous communication systems.
在性能方面,这种机制导致系统中产生额外的开销,如通信延时、负载等。
来自互联网
18. TOR is an anonymouscommunication technology based on source routing. It has many features such as perfect for-warding security, separation of protocol from anonymity, and integrity checking, etc.
TOR是一种基于重路由的匿名通信技术,具有完善的前向安全机制、匿名性与协议分离、完整性检测等特点。
来自互联网
19. The Scitter object used for communication fundamentals and for anonymous (non-authenticated) access to Twitter.
Scitter对象,用于通信基础和对Twitter的匿名(无身份验证)访问。
来自互联网
20. However, there exist different opinions and concrete legislation solutions, both in theory and in practice, about how to design the anonymous Internet communication monitoring exception.
21. As a new communicative method, anonymous Internet communication has a bright prospect in the modern society, and also takes an important role in the monitoring actions.
22. Network Information security includes context security and the anonymous property of Network Communication.
网络信息安全包括信息内容的加密及通讯的匿名性质。
来自互联网
23. Communication patterns are also affected by whether participants' identities are known, anonymous, or pseudonymous.
沟通参与者的身份是公开的还是匿名的抑或使用笔名的,对沟通模式也有影响。
来自互联网
24. The analysis showed, the anonymous technology introduced by this paper has a high degree of anonymity, can provide a smooth communication services for the mobile Internet.
分析表明,采用所提方案的系统匿名度较高,可以为移动互联网络提供较好的网络层匿名通信服务。
来自互联网
25. It provides anonymous connections which prevent both eavesdropping and traffic analysis from revealing the identifying information of the correspondent and the content of the communication.
该技术所建立的匿名连接可以有效的防止监听和通信量分析攻击,不暴露通信者的身份信息以及通信的内容。
来自互联网
26. "Economic Research", "Management World", "Accounting Research" and other magazines anonymous reviewers, the National Natural Science Foundation of communication evaluation experts.
《经济研究》、《管理世界》、《会计研究》等杂志匿名审稿人,国家自然科学基金通讯评议专家。
来自互联网
27. "Economic Research", "Management World", "Accounting Research" and other magazines anonymous reviewers, the National Natural Science Foundation of communication evaluation experts.