x
uploads/eavesdropper.jpg

eavesdropper 偷聽的人。

eb

Thrown out of his honourable employment in england , through too much unsuccessful hard swearing there - not because he was not wanted there : our english reasons for vaunting our superiority to secrecy and spies are of very modern date - he knew that he had crossed the channel , and accepted service in france : first , as a tempter and an eavesdropper among his own countrymen there : gradually , as a tempter and an eavesdropper among the natives 他在英國丟掉了那份體面的差使是因為多次咬著牙作偽證失敗,而不是因為那兒不需要偽證。我們英國人夸耀自己鄙視干涉隱私和密探行當的種種根據,其實是新近才出現的。巴薩心里明白,他跨過海峽到法國來當差,起初是在自己的僑胞之間做套誘和竊聽的工作,后來逐漸干到法國人當中去了。

Practical implementations of quantum key distribution systems use attenuated laser pulses as the signal source rather than single photons . the channels used to transmit are lossy . on the basis of above two points , a combining eavesdropping strategy of intercept - resend and beam - splitting is discussed in terms of eavesdropper ' s technology requirement and detection efficiency and dark count of single - photon counter 主要工作包括以下三部分:一、基于實際量子密鑰分配( qkd )系統中所使用的強衰減的激光脈沖不是單光子,量子密鑰分配的信道不是無損耗的,光子計數器存在探測效率和暗計數以及竊聽者的技術能力也不是無限的這些具體問題。

This paper makes an extension to the model of strand space in theorem . whereas the hash function in key agreement protocol , using the honest function , we expansion the capacity of the eavesdropper and the correlative theories in strand space . given the strand space of wtls from the simplified model in 4 . 2 . 2 , combining the concept of ideal and honest function , we analysed the security and authentication of wtls , and pointed out a limitation of the mend of paulson ’ s weaker theorem about tls ’ s main secret 本文首先從理論上對串空間模型進行了擴展,針對密鑰協商協議中的單向hash函數,利用誠實函數的概念,擴充了攻擊者能力,同時也擴展了串空間中的相關定理;在對wtls協議進行安全分析時,首先給出了協議的一個簡化形式,得到了wtls串空間,并結合理想和誠實函數的概念,分析了wtls協議的秘密性和認證性,指出了paulson關于tls主秘密的弱理論改進的缺陷。

Having known well on the study of the current situation about quantum cryptographic key , the rr quantum cryptographic key distribution protocol is concerned in this paper . the protocol includes the preparation of the secret - key 、 the eavesdropper detection 、 secret - key correction and privacy amplification 在深入調查量子密碼研究現狀的基礎上,本文針對rr協議進行了分析與研究,主要包括密鑰制備、竊聽者檢測、數據糾錯以及隱私放大等過程的實現方法。

In the new model , the legitimate partners can control the error bit rate of the eavesdropper ' s channel by adjusting their virtual binary symmetric channels . when our new model is implemented , the problem of receiving synchronization of the partners will not occur 在該模型中,通信雙方使用虛擬的二元對稱信道來控制竊聽方接收信道的誤比特率,而且使用該模型也不存在信息接收同步的問題。

In the modern communication society , there is wide spread need of secure transmission of secret information , such as the commercial trade and the communication in network , which need to be on the guard of the attack of the eavesdropper 當今信息社會對于保密信息的安全傳輸有著廣泛的需求,商業貿易、網絡通信等都需要防范竊聽者的侵入。同時,計算機的飛速發展使破譯手段越來越高。

Quantum key distribution is based on the heisenberg ' s uncertainty principle which guarantees that no eavesdropper can escaped detection . a linchpin technology of quantum key distribution is single photon which is foundation of security 根據量子力學中的海森伯不確定性原理及未知單光子態不可克隆原理,任何竊聽者無法竊聽量子密碼通信中的信息而不被發現。

Natasha blushed at these recollections , and tried as it were to excuse herself , as though there were something to be ashamed of in the emotion to which prince andrey had unwittingly played the eavesdropper 一提起這些往事,她滿面通紅,極力地為她自己的舉動辯護,在安德烈公爵意識到他無意中偷聽了她的話時,心中仿佛有點兒不好意思。

The information gained by the eavesdropper through interception is a very important criterion for judging the success of the key transmission and a necessary parameter for the privacy amplification 竊聽者通過竊聽所獲取的信息量是決定密鑰傳輸是否成功的重要指標,同時也是保密增強這一技術環節的必要參數。

At last , a maximum disturbance bound is derived for a given mean photon number and transmission length . eavesdropper can be detected with the bound . 2 采用了分束與breidbart基相結合的竊聽策略討論了竊聽問題并給出了合法用戶在篩選后的密鑰中所能容忍的誤碼率上限公式。

Otherwise , a malicious eavesdropper on any router between your server and the end user can very easily sniff the sensitive information out of the network packets 否則,惡意的監聽者就可以在你的應用程序與最終用戶之間的任何路由器上通過數據包探嗅到那些敏感的信息。

Heisenberg “ s uncertainty principle guarantees that no eavesdropper can escape detection because of the fact that the eavesdropper cannot measure the signals without disturbing them 根據海森堡測不準原理,任何竊聽者無法竊聽量子密碼通信中的信息而不被發現。

So sure was salomon that rivals were out to nab its trading secrets that it had the curtains of its boardroom treated to shield it from electronic eavesdroppers 薩洛蒙如此安全可靠,極力保守他的交易秘密,以至于他們的會議室的窗簾被處理成屏蔽電子竊聽器的。

To help protect the data transferred between clients and servers from eavesdroppers , you should encrypt it by using digital certificate technology 為了幫助保護客戶端和服務器之間傳輸的數據免于被竊聽者竊取,您應該使用數字證書技術對數據進行加密。

Hong kong lives much of its life in public and the open windows of summer , in particular , make every tram passenger an unwitting eavesdropper on everyday living 仲夏時分,香港人都喜歡打開窗戶,電車乘客不知不覺間便能窺探人們日常的生活細節。

Trouble is , the design of wep allows eavesdroppers to decode the wep - encrypted messages fairly simply , and thus gain access to networks and data 問題是, wep的設計使竊聽者能夠相當簡單地譯碼wep加密的消息,從而獲得對網絡和數據的訪問。

In the traditional cryptography , there is one sender , one receiver and an active or a passive eavesdropper who is an opponent 在傳統保密通信中,有一個發送方、一個接收方和一個敵方,敵方可能是主動攻擊者也可能是被動竊聽者。

The main feature of such protocol is that it is more sensitive to the attack of the eavesdropper 這種協議的特點是對于竊聽者的攻擊行為更加敏感,安全性更強。

Guarantees that the data passed between the requester and provider is protected from eavesdroppers 保證請求方和提供方之間傳輸的數據不會被竊聽者竊取。