词汇 | example_english_eavesdropper |
释义 | Examples of eavesdropperThese examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors. From a quantum perspective, the randomness takes the form of entanglement with an environment that the eavesdropper does not have access to. Actual readers become like eavesdroppers who overhear a conversation that is not really meant for their hopelessly-biased ears. The audience roles that he identified are addressee, auditor, overhearer, and eavesdropper. The goal is to reduce the amount of information available to an eavesdropper to a trivial level. The added randomness reduces the final size of the secret key, but it reduces even more the information that the eavesdropper has. As readers, we are at once drawn into the role of eavesdroppers overhearing two persons engaged in what seems like an intimate conversation. Since the total amount of entanglement is limited, this reduces the entanglement of the key with the eavesdropper, and thus reduces the information available to the eavesdropper. Fearing eavesdroppers, however, they communicated guardedly. This ancient power has been used by the justices against eavesdroppers, night walkers, and common scolds. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 Thirty or 40 years' ago eavesdroppers and people who opened other people's letters were considered beyond the pale. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 The third purpose of clause 47 is to reassure people that their private telephone conversations are secure from eavesdroppers and snoopers. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 It is quite a different proposition from being an unwilling eavesdropper to someone else's conversation. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 However, they may supply enough information to allow an eavesdropper to deduce what the password is, using a dictionary attack or brute-force attack. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. All three points need to be monitored for unauthorized activity and need to be secured against hackers or eavesdroppers. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. An eavesdropper would hear both sides of the conversation. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. He was only full of praise for "lauzengiers", the spies and eavesdroppers who forced lovers into ever more secrecy. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. This breaks the link between the source of the request and the destination, making it harder for eavesdroppers to trace end-to-end communications. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Since most email is sent as plaintext, a message containing a password is readable without effort during transport by any eavesdropper. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Deterministic encryption can leak information to an eavesdropper, who may recognize known ciphertexts. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The authentication relies on a pre-shared secret (e.g., password), which is protected (i.e., remains unrevealed) to an eavesdropper preventing an off-line dictionary attack. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. She began writing poetry at age five and claims to have become an expert eavesdropper by the age of twelve. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The end users have the same experience as single frequency simplex but an eavesdropper with one receiver would only hear one side of the conversation. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. This ensures reasonable protection from eavesdroppers and man-in-the-middle attacks, provided that adequate cipher suites are used and that the server certificate is verified and trusted. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The signal received by the eavesdropper does also depend on the frequency where the emanations are detected. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. And it normally does so, in order to avoid the subscriber from being identified, and tracked by eavesdroppers on the radio interface. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors. |
反思网英语在线翻译词典收录了377474条英语词汇在线翻译词条,基本涵盖了全部常用英语词汇的中英文双语翻译及用法,是英语学习的有利工具。