英语人>网络例句>eavesdropper 相关的网络例句
eavesdropper相关的网络例句

查询词典 eavesdropper

与 eavesdropper 相关的网络例句 [注:此内容来源于网络,仅供参考]

And the system works not only when there is an intelligent eavesdropper on the line, but also when data become corrupted accidentally.

这个系统能发现的不光是一个在线的有智能的窃听者,同样的,数据被意外窜改时,其也同样有作用。

By means of this algorithm an eavesdropper is unable to get any meaningful information about the source,which we call practical security.

应用该算法,窃听者得不到关于信源的任何有意义的信息,称之为弱安全。

According to this definition of deceiving, there is no addressee condition for deception, and it is possible to deceive an eavesdropper.

根据对欺骗的这一定义,对欺骗来说没有被表达者条件,所以有可能欺骗一个偷听者。

That is, any eavesdropper can elicit some information about the secrets from the public annunciations of the legal users.

也就是说,任何窃听者都可以从合法用户的公开声明中得到部分秘密信息。

He denounced the watergate eavesdropper on American, as a member of the table tennis team for diplomatic relations in China, the credit.

他告发了水门事件的窃听者,作为美国乒乓球队的一员到了中国,为中美建交立下了功劳。

The aim of the steganography is to confuse the illegal eavesdropper not knowing where the secret information has.

本文对信息隐匿技术进行了研究,主要研究了将灰度图像作为秘密信息嵌入到掩护媒体中,进行秘密通信的信息隐匿技术算法。

In the modern communication society, there is wide spread need of secure transmission of secret information, such as the commercial trade and the communication in network, which need to be on the guard of the attack of the eavesdropper.

当今信息社会对于保密信息的安全传输有着广泛的需求,商业贸易、网络通信等都需要防范窃听者的侵入。

It is difficult for an eavesdropper to extract information about chaotic systems for every bit of pseudo-random number generator is generated from three different chaotic orbits.

因为伪随机数发生器的每一位是由三个不同的混沌轨道产生的,所以对攻击者来说,提取混沌系统信息是非常难的。

To show the security of this scheme, we present an explicit relation between the information that an eavesdropper can elicit and the corresponding error rate he/she would introduce.

为了说明协议的安全性,文中给出了窃听者可以提取到的信息量与她将引入的相应的错误率之间的具体关系。

Otherwise, a malicious eavesdropper on any router between your server and the end user can very easily sniff the sensitive information out of the network packets.

否则,恶意的监听者就可以在你的应用程序与最终用户之间的任何路由器上通过数据包探嗅到那些敏感的信息。

第2/3页 首页 < 1 2 3 > 尾页
推荐网络例句

Since historical times,England ,where the early inhabitants were Celts, has been conquered three times .

从有历史以来,英国,在此地早期居住的是凯尔特人,已经被征服了三次。

Bluetooth OBEX File Transfer Enables the sending and receiving of files on your phone via Bluetooth.

蓝牙OBEX文件移动允许经过蓝牙传送和接受文件。。。。

The almost sure central limit theorem is a pop topic of the probability research in recent years,because it has many actual applications in the random analogue.

中文摘要:几乎处处中心极限定理是近几十年概率论研究的一个热门话题。它之所以引起人们的注意是由于它在随机模拟方面的实际应用参见Fisher