「“eavesdropper”」的含义 (noun)
词类(英语单词分类):名词
[偷偷地听谈话的人]用来表示。
中文翻译:[偷听的人]
参考:「eavesdropper」示例短语列表
“eavesdropper”的同义词列表。 让我们按顺序来记住吧!。
“eavesdropper”是一个英语单词,有几个不同的含义。 让我们用例句来解释每个的含义和用法!
| 英语 | 含义(中文翻译) | 详细解释! |
| eavesdropper | 窃听者,窃听者 | (听私人谈话) |
| Marcia always likes to know what other people think, so she’s a frequent eavesdropper. | ||
| 玛西娅总是想知道别人在想什么,所以她经常偷听。 | ||
eavesdropper是一个英语单词,有几个不同的含义。 让我们用例句来解释每个的含义和用法!
An
eavesdropper
does not impersonate a user.
窃听者
无法冒充用户。
An
eavesdropper
records conversations for later replay.
窃听者
记录对话并稍后回放。
This system does not provide adequate protection from replay attacks where an
eavesdropper
gains remote user ids and remote passwords.
该系统无法针对
窃听者
获取远程用户 ID 或密码的重放攻击提供足够的保护。
This might allow an
eavesdropper
to determine a valid user name and password and use it to gain access to the network by posing as a valid user.
因此,
窃听者
可以通过查找有效的用户名和密码并冒充有效用户来访问网络。
That is, the function of the trojan that activates the microphone of the device by transforming it into an
eavesdropper
and recording the audio around.
也就是说,该特洛伊木马能够通过将设备变成
窃听器
并将音频录制到周围环境来激活设备的麦克风。
So, if you are worried about the NVR
eavesdropper
, you can hide the NVR in some hard to find locations, such as the attic, the ceiling, the inner wall, the closet, and even the crawl space.
如果您担心您的 NVR
被窃听
,您可以将您的 NVR 隐藏在阁楼、天花板、内墙、壁橱甚至狭窄空间等困难的地方。
In addition, security against an
eavesdropper
with any computational ability, that is, information theoretical security, is veried basing on the unpredictability of the physical phenomenon of noise.
此外,基于噪声物理现象的不可预测性,可以证明任何计算能力的
窃听者
都无法破译的安全性,即信息论安全[3]。
An
eavesdropper
who can observe the initial messages for a connection can determine its sequence number state, and may still be able to launch sequence number guessing attacks by impersonating that connection.
可以观察连接的第一条消息的
窃听者
可以确定其序列号的状态,并且可以通过冒充连接来发起序列号猜测攻击。
As free space optical communication is conducted in line-of-sight within a nar-row beam extent, an
eavesdropper
is obliged to wiretap at the edge of the beam.
光空间通信是利用传播较窄的光束进行视距通信,因此
窃听者
别无选择,只能在光束边缘等不利情况下进行窃听。
Hence, the upper limit of the amount of information leaked to the
eavesdropper
can be esti-mated based on the physical condition, and utilization of the physical layer is therefore potentially feasible.
因此,从实现的角度来看,可以给出可以泄露给
窃听者
的信息量的上限,并且因此可以预期物理层密码术的使用。
However, these methods require estimating the information leaked against the
eavesdropper
in design-ing the encoding, which deteriorates convenience much compared with modern cryptography that guarantees its security by the computational cost.Hence, these encoding methods were not established as mainstream techniques to be used with current networks.
然而,它距离现代密码学的便利性还很远,它可以根据所需的计算量来保证安全,例如在代码设计时需要估计泄露给
窃听者
的信息量,并且它已成为当前的主流。网络。那从未发生过。
At present, we are endeavoring to solve this problem involving physical layer cryptography in free space optical communication, by studying methods to estimate the ability of an
eavesdropper
with certain detection sys-tems, as well as developing the practical protocol mentioned above.Acknowledgmentsis study was commissioned from Impulsing Paradigm Change rough Disruptive Technologies Program (ImPACT) designed by the Council for Science, Technology and Innovation, via JST.
目前,在量子ICT高级开发中心,在开发上述实用协议的同时,我们也在研究用于估计和检测
窃听者
能力的系统,以解决光空间通信中物理层密码学的问题。正面解决这个问题。
The ability of an
eavesdropper
to monitor the network is generally the biggest security problem that administrators face in an enterprise.
窃听者的
网络监控通常是公司内管理员面临的最大安全问题。
There, we would sit to eavesdrop, but now an
eavesdropper
finds a flame in wait for him.
我们坐在那里
听
。但对于那些倾听的人来说,一颗警惕的、燃烧的星星正在等待着。
The client successfully obtains the output of quantum computer by using both measurement outcomes sent by the quantum server and the secret key that the client has, while the quantum server (or any
eavesdropper
) cannot gain any useful information about the client’s inputs, algorithms, and outputs.
客户可以从他们持有的信息和发送
给他们的
测量结果中了解量子计算的输出。另一方面,服务器端可以证明,无论客户端发送什么信息,它都无法获取客户端正在执行的计算的输入、内容或输出的信息。
These finite data result in estimation errors and sampling errors.This observation implies the need of sophisticated statistical, JST Quantum Computation and Information Project and NEC Lab., constructed a QKD system that ensures the upper bound of
eavesdropper
‘s knowledge on the final key, based on the theory developed by Dr. Hayashi of our project.
)在现实情况下,用于估计的样本数量是有限的,信号处理的码长也是有限的,因此会出现估计误差和采样误差,需要进行详细的统计处理。在JST量子信息系统中广岛先生基于 Hayashi 先生(现东北大学)、
长谷川
先生和NEC系统平台实验室的田中开发了它,并实际生成了具有安全保证的最终密钥。
This is the least secure option because the names of internal network servers that the DirectAccess client is attempting to resolve can be sent out to Internet-facing DNS servers, allowing an
eavesdropper
between the DirectAccess client and the Internet-facing DNS server to determine the names of internal network servers.
DirectAccess 客户端尝试解析的内部网络服务器名称被发送到面向 Internet 的 DNS 服务器,该服务器可以确定 DirectAccess 客户端和面向 Internet 的 DNS 服务器之间
拦截的
内部网络服务器名称。这是最不安全的选项。
However, such an
eavesdropper
can also hijack existing connections, so the incremental threat isn’t that high.
然而,此类
窃听者
也可以劫持现有连接[11],因此增加的威胁并不显着。
This protects your password and optionally your data, preventing an
eavesdropper
from capturing or stealing them as they travel over the network.
如果您不记得密码,则
每次
连接到该站点时都需要输入密码。
Do they have a ladder [leading up to heaven] whereby they eavesdrop? If so, let their
eavesdropper
produce a manifest authority.
或者他们有一个梯子可以爬上天堂并听到它的
秘密
吗?然后让听到的人拿出明确的证据。
听听“ eavesdropper ”的陆地声音(发音)!
读法是【ˈiːvzˌdrɒp·ər】。 听下面的视频并大声发音【ˈiːvzˌdrɒp·ər】。

