Random network coding against the eavesdropping adversaries
一种防窃听的随机网络编码
This paper analyses of the submarine optical fible cable signals eavesdropping technology channels,discussed the waters of China′s submarine fiber optic cable for wiretap method,the United States nuclearpowered attack submarines" Jimmy·Carter,"the eavesdropping undersea fiber optic cable capacity.
分析了对海底光缆中的光信号进行窃听的技术途径,讨论对我国海域海光缆进行窃听的方法,研究了美国核动力攻击潜艇"吉米。
Based on optical fiber-bending radiation,four steps method for optical cable tapping,bending the optical fiber,collecting optical signals and demodulating information are proposed.
基于光纤弯曲辐射,提出了四步光缆窃听法,即"剥光缆,弯光纤,取信号,解信息"。
By analyzing Four Wave Mixing (FWM) theory, we propose a new tapping and attacking method by virtue of ROADM.
在分析四波混频理论的基础上,提出了借助可重构光分插复用器、基于四波混频效应实施光信道窃听和攻击的方法;仿真了对光信道窃听的可行性,并进行了攻击试验,这种攻击可导致通信系统服务质量明显下降,甚至出现服务拒绝。
In order to collect the information about the terrorism,the American government approved the" Patriot Act" and thus enlarged swiftly the power of the government for tapping and wiretap surveillance,which has been doubted by the public,but in the subsequent years,the American government still takes a series of measures to strengthen the surveillance procedure.
为了加强对恐怖主义的情报收集,美国政府通过《爱国者法》迅速扩大政府窃听及电讯监视的权力。
The works are as follows:1、Proposed a framework for security analysis, pointed out the parameters which related to security in address codes, analysed the securiyt performance from the perspective of two common eavesdropping methods, deduced the time eavesdropper required when taped single-signals from multiple users and the ability to tap a single user and multiple users.
完成的主要工作如下:(1)介绍了OCDMA安全性能分析的模型,指出了地址码中和安全性有关的几个参数,从两种常见窃听方式的角度定量分析了安全性能,推导出了窃听者从多个用户信号中窃听到单用户信号所需的时间,以及窃听单个用户和多个用户的能力。
Then it analyzes the wiretap and RTP injection attack.
文中介绍了基于SIP的VoIP系统中有关RTP的攻击,通过协议与报文分析,深入分析并实现了窃听攻击与RTP注入攻击,证明了这两种协议存在安全漏洞,最后提出了防范这些攻击的方案,为提高VoIP系统的安全性提供了参考。
It solves the security problems of interception, interference, forgery and replay, which endanger the messages delivered among computers in a cluster.
它解决了在构成集群的各个计算机之间传递消息所面临的被窃听、篡改、伪造和重放的安全性问题,独立于具体的下层网络协议,消耗系统资源少,并且具有可动态配置的优点。
intercept a message
窃听 [侦听] 通讯
listening device
ph.1. 窃听器,监听器
The act of installing such a device.
装设窃听器安装搭线窃听装置的行为
New Problems of Wiretap Channel and Wiretap Channel of Type II;
窃听信道及第二类窃听信道的新问题
swept the room for Bugs.
在房间里搜寻窃听器
The house is wiretapped.
那一家的电话被窃听。
Our telephone has been tapped.
我们的电话已被人窃听。
Monitor a suspected criminal's phone conversations.
窃听嫌疑犯的电话交谈
fit a listening device to(a telephone line)
在(电话线路)上装窃听器
Debug a conference room.
拆除会议室内的窃听器
search a room for bugs
搜查房间寻找窃听器
It is illegal to tap a telephone wire.
窃听电话是非法的。
plant a bug in an embassy
在大使馆内放置窃听器.
To install electronic eavesdropping equipment in(a room, for example.
安装窃听装置在(如屋子)里安装电子窃听装置
To monitor(a telephone line) by means of such a device.
窃听电话通过搭线窃听装置控制(一个电话线)
To connect a concealed listening or recording device to.
装设窃听器把隐藏的窃听或录音装置与…相连接
The probe microphone was a large, high-sensitivity microphone.
探头窃听器是一种大型高灵敏度窃听器。
The wiretap, the electronic eavesdroppers would have public approval.
那时,电话窃听,电子窃听将会为社会所认可。
CopyRight © 2020-2024 优校网[www.youxiaow.com]版权所有 All Rights Reserved. ICP备案号:浙ICP备2024058711号