| 1. | Guarantees that the data passed between the requester and provider is protected from eavesdroppers 保证请求方和提供方之间传输的数据不会被窃听者窃取。 |
| 2. | The main feature of such protocol is that it is more sensitive to the attack of the eavesdropper 这种协议的特点是对于窃听者的攻击行为更加敏感,安全性更强。 |
| 3. | In the traditional cryptography , there is one sender , one receiver and an active or a passive eavesdropper who is an opponent 在传统保密通信中,有一个发送方、一个接收方和一个敌方,敌方可能是主动攻击者也可能是被动窃听者。 |
| 4. | Trouble is , the design of wep allows eavesdroppers to decode the wep - encrypted messages fairly simply , and thus gain access to networks and data 问题是, wep的设计使窃听者能够相当简单地译码wep加密的消息,从而获得对网络和数据的访问。 |
| 5. | To help protect the data transferred between clients and servers from eavesdroppers , you should encrypt it by using digital certificate technology 为了帮助保护客户端和服务器之间传输的数据免于被窃听者窃取,您应该使用数字证书技术对数据进行加密。 |
| 6. | Heisenberg " s uncertainty principle guarantees that no eavesdropper can escape detection because of the fact that the eavesdropper cannot measure the signals without disturbing them 根据海森堡测不准原理,任何窃听者无法窃听量子密码通信中的信息而不被发现。 |
| 7. | When the code is captured by the sniffers , they may determine that they have got another form of the secret and the next step is to decrypt the secret from the disordered code 但是网络上的窃听者一旦截获这些信息,他们就得到了秘密消息的另外一种形式,余下的工作就是怎么破译出秘密消息。 |
| 8. | It is unconditionally secure ( i . e . secure against a spy who has sufficient time and computer power ) , and needless of any private key exchange before the actual communication 量子密码具有无条件安全的特性(即不会遭受拥有足够时间和计算机能力的窃听者攻击的危险) ,而在实际通信发生之前,不需要交换私钥。 |
| 9. | The information gained by the eavesdropper through interception is a very important criterion for judging the success of the key transmission and a necessary parameter for the privacy amplification 窃听者通过窃听所获取的信息量是决定密钥传输是否成功的重要指标,同时也是保密增强这一技术环节的必要参数。 |
| 10. | Because of the objective factors , such as the detector noise and misalignments , it is very important to make a detailed study of the attacking methods for the sake of practicality 由于客观因素的影响,比如探测器的噪声、失调等,为了确保量子密钥分配方案的实用性,研究窃听者采取的窃听方式是十分重要的。 |