leak n. 1.漏洞,漏罅,裂缝。 2.漏;漏水,漏气,漏出,渗漏;泄漏。 3.漏出物;【电学】漏电,漏泄电阻。 4.〔俚语〕撒尿。 a leak detector 检漏气。 a leak in the boiler 锅炉的裂缝。 A small leak will sink a great ship. 〔谚语〕小患不治成大灾。 spring [start] a leak 出漏洞,生漏缝。 stop [plug] a leak 塞漏洞。 officially inspired leaks 官方故意透露的消息。 do [have, take] a leak 〔俚语〕撒尿。 vi.,vt. 1.(使)漏,(使)渗。 2.(使)漏出,使泄漏。 The roof leaks. 屋顶漏水。 leak off 漏泄。 leak out 漏出;泄漏。
Risks include , but are not limited to , leaking information and data loss 存在的风险包括(但不限于)泄露信息和数据丢失。
Some commentators have suggested that a person who has made an unauthorized disclosure should have a defence if the leaked information had previously been made available to the public 有论者建议,如某人未经授权披露的资料事前已为公众所知,则该人应可以此为免责辩护理由。
Used properly - with a key of sufficient length and an encryption mode that doesn t leak information about the plaintext - most modern algorithms are reasonably safe against cryptanalytic attacks 如果使用得当使用足够长的密钥和不会泄漏关于明文的信息的加密方式大多数现代算法在密码分析攻击面向都有一定的安全性。
This is especially important in a hosting scenario where a custom site - map provider , if not implemented correctly , could leak information or contain default configuration settings that are not secure 在宿主方案中,这一点尤其重要,因为如果没有正确实现,自定义站点地图提供程序可能会泄露某些信息,或包含不安全的默认配置设置。
When performed the cryptographic computation , the smart card will leak information , namely timing of operations , power consumptions , electromagnetic emissions , etc . power analysis attacks use this information to break the secret key 芯片在执行加密运算时硬件本身会泄露一些信息,如能量消耗、电磁辐射等。能量分析攻击利用此信息进行分析,便可获得和密码相关的一些有用信息。
In this thesis intrusion is a conception of broad sense . it includes that crackers acquire the system control right beyond legal scope , and some behavior harmful to systems such as collection of leak information , denial of service 本文中的“入侵” ( intrusion )是个广义的概念,不仅包括被发起攻击的人(如恶意的黑客)取得超出合法范围的系统控制权,也包括收集漏洞信息,造成拒绝访问( denialofservice )等对计算机系统造成危害的行为。
At first , the meaning and its essentiality of interception technology on computer video - leaking information is explained . the growing history and general situation of this kind of interception technology are summarized , and the main work of this paper is pointed out 文章首先系统地介绍了研究计算机视频泄漏信息截获技术对保障计算机信息安全有重要的意义,阐述了该技术的发展概况及本文工作的重点是在实用化过程中的几个关键技术的解决方案。
In this paper , the theory of interception technology on computer video - leaking information is discussed , several key techniques and practicable methods are described in detail . the proto type of an instrument designed by us for intercepting computer video - leaking information is introduced . the performance of this proto type is proved to be right with the results of large amount of test 本文详细讨论了计算机视频泄漏信息截获技术的有关理论,并阐述了该技术在实用化过程中几个关键技术的机理及实现方法,最后通过大量系统的实验对有关技术方案进行了验证,对仪器整体性能作了评测。
The third , after theoretically analyzing , the following practicable methods are put forward : 1 ) automatically pick - up the synchronous information by analyzing the spectrum of intercepted video - leaking information ; 2 ) realizing the phase lock and the electronic image stabilization by integral - projection and differential - positioning ; 3 ) improving the effect of accumulation mean filter and the pectination filter by using electronic image stabilization ; 4 ) automatically adjusting image acquisition parameters by detecting the image entropy , therefore the quality acquired image is improved ; 5 ) to realize the quantitative test of a leaking extent , a standard test picture was designed . finally , a proto type for leaking information processing based on our techniques mentioned above and the virtual instrument principle was designed and tested 在理论分析的基础上,提出了以下的实用技术: 1 )用谱分析方法从截获的信息中自动提取同步信息; 2 )用积分投影、微分定位的方法进行相位检测,实现可靠的锁相和电子稳像; 3 )将电子稳像技术用于重加滤波和梳状滤波的滤波方法,改进了滤波效果; 4 )通过检测图像信息熵实现图像采集参数的自动调整,改进了图像采集的质量; 5 )设计了用于仪器定标的标准测试图,可以对泄漏信息进行定量检测。