匿名
- 与 匿名 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Handling anonymous FTP. The home directory of this user is the root of theanonymous FTP area.
用于处理匿名FTP的用户名,该用户的home目录即为匿名用户的根目录。
-
A completely trusted third party is not necessary in our scheme. It makes the system model simpler and reinforces undeniability and anonymousness of cash-publishing bank, therefore strengthens security of whole system and anonymousness of E-Cash. The application of self-certified public key policy also can lighten the burden of verifying cash for corporation and depositing bank.
该方案不需要完全可信的第三方,系统模型更加简单;增强了发币银行的不可否认性和匿名性,从而增强了整个系统的安全性和电子现金的匿名性;同时,自证明公钥体制的应用也减轻了商家及其存款银行验证电子现金的负担。
-
For call up the Chinese people We need dial three times, total 27 numbers, then dail-up to the receiver number, but on the dialogist's mobile phone the number is not pressented, or displaid "anonymith calling", some receivers will not like to connect it, because of anonymith…..
在芝加哥给咱们中国打电话先要分三次一共拨27个号码,然后才能拨对方电话号码,拨通后,对方手机上不显示芝加哥的电话号码,或者只显示为"匿名电话",对方有的人会因为这个"匿名电话"而不愿接呢
-
Analysis shows that the algorithm can provide high-level anonymous,dynamically ensconce the source address,has less bandwidth cost,has less encryption times and shorter time delay.So the algorithm can provide high quality anonymity communication in IP layer in mobile Internet.
分析表明,该算法动态隐藏源地址,匿名度高,带宽消耗低,加解密次数少,时延短,可以为移动互联网络提供优质的网络层匿名通信服务。
-
According to randomness and fuzziness of anonymity, a fuzzy pattern recognition model is presented based on entropy and least generalized weighted distance, which makes the membership vector of anonymity grades have a desirable dispersive property.
鉴于匿名的随机性和模糊性特点,提出了基于联合熵和最小加权广义距离的模糊模式识别方法,实现了系统匿名等级隶属度向量的离散化。
-
Then, considering the knowledge represented by a set of frequent patterns, we investigate the problems of preserving sensitive patterns in data sharing, hiding sensitive patterns in frequent pattern sharing, and also blocking inference channels in frequent pattern sharing. The main contributions are as follows:(1) For the problem of preserving anonymity in data sharing, we propose a clustering-based approach for implementing l-diversity.
本文首先研究了数据共享中匿名保护问题,接着以频繁模式为知识的表现形式,研究了数据共享中的敏感模式保护,频繁模式共享中的敏感模式隐藏,以及频繁模式共享中的推理控制等问题,主要的研究成果如下:(1)针对数据共享中的匿名保护问题,提出了一种基于聚类的l-多样化实现方法。
-
Then, considering the knowledge represented by a set of frequent patterns, we investigate the problems of preserving sensitive patterns in data sharing, hiding sensitive patterns in frequent pattern sharing, and also blocking inference channels in frequent pattern sharing.
本文首先研究了数据共享中匿名保护问题,接着以频繁模式为知识的表现形式,研究了数据共享中的敏感模式保护,频繁模式共享中的敏感模式隐藏,以及频繁模式共享中的推理控制等问题,主要的研究成果如下:(1)针对数据共享中的匿名保护问题,提出了一种基于聚类的l-多样化实现方法。
-
Free anonymous proxy surfing software which you can use together with a wide variety of web applications web browsers, Instant Messengers, Internet Relay Chat (IRC, etc. to ensure your anonymity when you surf the Internet.
免费匿名代理上网软件,您可以使用同各式各样的Web应用( Web浏览器,即时通讯,互联网中继聊天系统等),以确保您的匿名性,当你进行网上冲浪。
-
An anonymity metrics model with three properties based on joint entropy is given in this paper. The three properties are identifiable, linkable and traceable respectively.
提出了基于联合熵的多属性匿名度量模型,该模型基于识别性、连接性、跟踪性等匿名属性。
-
In the opening session I had a question in regards to item level permissions and anonymous access, for instance if you break inheritance at a folder level to assign unique permissions you will not be able to allow anonymous access from that point on.
在开幕会议上,我遇到一个关于项目级权限和匿名访问的问题,例如如果你断开一个项目与父文件夹层的继承关系,而赋予它独有权限,那么你就不能使得这个项目被匿名访问。
- 推荐网络例句
-
Do you know, i need you to come back
你知道吗,我需要你回来
-
Yang yinshu、Wang xiangsheng、Li decang,The first discovery of haemaphysalis conicinna.
1〕 杨银书,王祥生,李德昌。安徽省首次发现嗜群血蜱。
-
Chapter Three: Type classification of DE structure in Sino-Tibetan languages.
第三章汉藏语&的&字结构的类型划分。