personate

  • v.扮演;伪装;冒充
  • adj.伪装的

过去式: personated 现在分词: personating 过去分词: personated 第三人称单数: personates

personatepersonate

verb

1
attribute human qualities to something
The Greeks personated their gods ridiculous
Synonym: personify
2
pretend to be someone you are not;sometimes with fraudulent intentions
She posed as the Czar's daughter
Synonym: pose impersonate

数据来源:WordNet

  1. Hooks was known for personating first ladies , playing Sasi dinner waitresses and southern bells .

    胡克斯因扮演第一夫人而闻名于世,她出演过Sasi餐馆的女服务员和南方的钟声。

  2. For he was personating a steamboat .

    他这是在扮演一只蒸汽轮船。

  3. With the development of information science and computer technology , Human-computer communication becomes the key technology for computer system to be personate and intelligent .

    随着信息科学与计算机技术的发展,和谐自然的人机通信越来越成为计算机系统人性化、智能化工作的关键技术。

  4. However , the weakness of these systems gives illegal users the chance to personate the legal user to login system , consequently cause the legal user lose their interest .

    然而这些认证系统存在的弱点使得非法用户能够冒充合法用户登录系统,给用户造成无法挽回的损失。

  5. Tea table , resemble an elf same , in the beautification of the bedroom personate is worn indispensable costar part .

    茶几,就像一个小精灵一样,在居室的美化中饰演着不可或缺的配角角色。

  6. The Greeks personated their gods ridiculous .

    希腊人把他们的上帝拟人化,说它非常荒谬。

  7. Now , the malicious software can be used to filch secret information , send junk e-mails , personate somebody else illegally , and so on .

    现在的大多数恶意软件都用来窃取机密信息、发送垃圾邮件、冒充身份网上窃取资料等。

  8. The scheme canot only against personating STA , AP and AS and messages replay attacks , but also can against DoS attacks effectively .

    新机制不仅能有效防范STA、AP、ASU的假冒、消息重放等攻击,还具有很强的抗击拒绝服务攻击的能力。

  9. In PAM based system , one administrator who has the privilege to configure authentication policy is necessary , so the administrator can personate any other user to login the system by bypassing authentication mechanisms .

    因为PAM必须赋予某个管理员配置认证机制的权限,这样该管理员就可通过旁路认证机制,以任何身份登录系统,获取该身份的权限。

  10. In order to address the problems in similar protocols that malicious nodes can join into the network by personating new nodes after compromising the initial key , a secure bloom filter based node addition scheme is provided .

    为了解决同类协议中普遍存在的恶意节点在捕获初始密钥的情况下伪装成新节点加入网络的问题,本文还提出了一种基于安全布隆过滤器的新节点加入机制。

  11. Based on the status of library personated service and hotspot study , the literacy demands of personated service to librarians in university library are analyzed and some important methods to improve university librarian 's literacy are also put forward .

    基于图书馆个性化服务现状与热点研究,分析了高校图书馆个性化服务对馆员的素质要求,提出了提高高校图书馆员素质的重要途径。

  12. In the reference of the paper , some efficient VES schemes are proposed , but all of them are potentially based on the hypothesis that the Prover is truthful . So it is weak for attack of personating the Prover .

    文献犤1犦~犤3犦都提出了一些有效的VES方案,但是它们都潜在地假设Prover是诚实可信任的,这对冒名Prover攻击是脆弱的。

  13. The author believed that the theory had been continuing and evolving since its birth from the primitive and personated values of nature , but all forms can be dated back to two sources : Plato 's extrinsic teleology and Aristotle 's intrinsic one .

    认为目的论自从在原始的拟人化的自然观中诞生以来就一直绵延不绝,但从渊源上讲不外柏拉图的外在目的论与亚里士多德的内在目的论两种。