竊聽者 的英文怎麼說

中文拼音 [qiètīngzhě]
竊聽者 英文
interceptor
  • : Ⅰ動詞(偷) steal; pilfer Ⅱ副詞(暗中; 偷偷 地) secretly; surreptitiously; furtively Ⅲ代詞[書面語] (謙指自已) i
  • : 動詞1 (用耳朵接受聲音) hear; listen 2 (聽從; 接受) obey; accept; heed 3 (治理; 判斷) superv...
  • : Ⅰ助詞1 (用在形容詞或動詞後面 或帶有形容詞或動詞的詞組後面 表示有此屬性或做此動作的人或事物) 2 ...
  • 竊聽 : eavesdrop; wiretap; bug; intercept; tap竊聽電話機 detectophone; 竊聽錄音機 dictograph; 竊聽器 bug...
  1. Guarantees that the data passed between the requester and provider is protected from eavesdroppers

    保證請求方和提供方之間傳輸的數據不會被竊聽者取。
  2. The main feature of such protocol is that it is more sensitive to the attack of the eavesdropper

    這種協議的特點是對于竊聽者的攻擊行為更加敏感,安全性更強。
  3. Obtaining money on false pretences perhaps or some obscurer charge heard in camera under the official secrets act

    也許是說謊騙錢,或是根據「公務員保密條例」到的某種莫名其妙的罪名。
  4. The information gained by the eavesdropper through interception is a very important criterion for judging the success of the key transmission and a necessary parameter for the privacy amplification

    竊聽者通過所獲取的信息量是決定密鑰傳輸是否成功的重要指標,同時也是保密增強這一技術環節的必要參數。
  5. The library reserves the right to suspend or to withdraw library use privileges from members who mutilate books or other library materials, disturb other users, repeatedly fail to return library materials by the due date, fail to follow library regulations, or repeatedly violate accrs lan regulations

    如違反本規則或電腦使用規定、偷或蓄意毀棄損壞本館館藏圖書資料、或干擾其他讀,經本館人員規勸不,本館得視行為情節,隨時請其離館並暫停其閱覽資格或注銷閱覽權利。
  6. When the code is captured by the sniffers, they may determine that they have got another form of the secret and the next step is to decrypt the secret from the disordered code

    但是網路上的竊聽者一旦截獲這些信息,他們就得到了秘密消息的另外一種形式,餘下的工作就是怎麼破譯出秘密消息。
  7. It is unconditionally secure ( i. e. secure against a spy who has sufficient time and computer power ), and needless of any private key exchange before the actual communication

    量子密碼具有無條件安全的特性(即不會遭受擁有足夠時間和計算機能力的竊聽者攻擊的危險) ,而在實際通信發生之前,不需要交換私鑰。
  8. With prime minister costas karamanlis and most of his cabinet on the " hit list, " rumours abound that the ruling conservatives, whose popularity ratings have nosedived, may be forced to call early elections because of disgruntlement with their handling of the matter

    由於總理卡拉曼利斯和大部分內閣成員都在被竊聽者名單上,有傳聞說卡拉曼利斯政府的支持率已明顯下降,甚至可能導致被迫提前宣布大選。
  9. As connoisseurs of recent italian scandals know, phone - tapping is often central to the unfolding drama

    最近義大利的八卦熱心都知道,電話成了場上的主角。
  10. In the traditional cryptography, there is one sender, one receiver and an active or a passive eavesdropper who is an opponent

    在傳統保密通信中,有一個發送方、一個接收方和一個敵方,敵方可能是主動攻擊也可能是被動竊聽者
  11. Trouble is, the design of wep allows eavesdroppers to decode the wep - encrypted messages fairly simply, and thus gain access to networks and data

    問題是, wep的設計使竊聽者能夠相當簡單地譯碼wep加密的消息,從而獲得對網路和數據的訪問。
  12. To help protect the data transferred between clients and servers from eavesdroppers, you should encrypt it by using digital certificate technology

    為了幫助保護客戶端和服務器之間傳輸的數據免於被竊聽者取,您應該使用數字證書技術對數據進行加密。
  13. Heisenberg " s uncertainty principle guarantees that no eavesdropper can escape detection because of the fact that the eavesdropper cannot measure the signals without disturbing them

    根據海森堡測不準原理,任何竊聽者無法量子密碼通信中的信息而不被發現。
  14. Because of the objective factors, such as the detector noise and misalignments, it is very important to make a detailed study of the attacking methods for the sake of practicality

    由於客觀因素的影響,比如探測器的噪聲、失調等,為了確保量子密鑰分配方案的實用性,研究竊聽者採取的方式是十分重要的。
  15. Goodness, as a subject for art, risks falling prey to piety and wishful thinking, but “ the lives of others, ” one of the nominees for this year ' s best foreign - language film oscar, never sacrifices clarity for easy feeling

    把善作為藝術的主題,便有可能會淪為道德說教或是癡人說夢,然而《風暴》此次獲奧斯卡最佳外語片提名便勝在保全了清晰的內涵卻又不失深刻。
  16. The quantum communication can be divided into two stages : in the first stage, the quantum communication is conducted and cryptographic key communication is finished through the quantum channel ; in the second stage, the negotiation of cryptographic key is achieved in order to measure whether any bug exists or not, and then confirms the final cryptographic key, at this time the quantum communication is accomplished

    在bb84協議中,量子通信實際上由兩個階段完成:第一階段通過量子通道進行量子通信,進行密鑰的通信;第二階段在經典通道中進行,主要負責密鑰的協商,探測竊聽者是否存在,然後確定最後的密鑰。
  17. The former was confiding to the latter his grief and fear, for it was the second time within a month that death had suddenly and unexpectedly entered that house which was apparently destined to destruction by some exterminating angel, as an object of god s anger.

    他們談話的那兩個人,一個是那座房子的主人,一個是醫生。前正在向後訴說他的憂心和恐懼,因為在一個月內,這已是死神第二次進入那座房子了。 」
  18. " since cc3 adopts an ip - based tetra system, it provides an effective and efficient call set up with more reliable routing capabilities, " the spokesman said. " it also enables good voice quality by prioritising voice packets and allows various types of data to be carried in the same ip manner. security features include encryption and authentication of users to prevent eavesdropping by unauthorised elements, " he added

    他續說:此通訊系統亦會善用話音封包以確保優良的話音質素,以及容許以同樣的網際網路規約方式處理多種資料,而在保安方面,則包括加密技術及核實使用身分以防止及未經授權接達系統等功能。
  19. Practical implementations of quantum key distribution systems use attenuated laser pulses as the signal source rather than single photons. the channels used to transmit are lossy. on the basis of above two points, a combining eavesdropping strategy of intercept - resend and beam - splitting is discussed in terms of eavesdropper ' s technology requirement and detection efficiency and dark count of single - photon counter

    主要工作包括以下三部分:一、基於實際量子密鑰分配( qkd )系統中所使用的強衰減的激光脈沖不是單光子,量子密鑰分配的通道不是無損耗的,光子計數器存在探測效率和暗計數以及竊聽者的技術能力也不是無限的這些具體問題。
  20. In the modern communication society, there is wide spread need of secure transmission of secret information, such as the commercial trade and the communication in network, which need to be on the guard of the attack of the eavesdropper

    當今信息社會對于保密信息的安全傳輸有著廣泛的需求,商業貿易、網路通信等都需要防範竊聽者的侵入。同時,計算機的飛速發展使破譯手段越來越高。
分享友人