Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 106

Useful Expressions

Since 1998
박 동국 (DongGook Park)

Writing
“우위 , “능가 , 더 낫다
edge on/over sb/sth: a slight advantage over sb/sth
 a
decisive/slight/clear/great/decisi
ve military edge over the
enemies
 The company needs to improve
its competitive edge.
 They have the edge on us.
 His cars have the edge over
his rivals’.
 Their strategy still has the
edge over more recent
approaches.
 For intuitive and qualitative
understanding, the sinusoids
have the edge over
exponentials. Fortunately, this
difficulty can be overcome
readily because of close
connection between exponential
and Fourier spectra.
 So far, theories and models that
make the frame-content
distinction have the edge over
any that lack it.
 The ILECs have the edge over
the network components
because their networks were
built over the past 120 years.
 The first providers to implement
the AIN features will have the
edge over taking the customer
base.
 Again, radio solutions appear to
have the edge over those
offered by the fixed network;
unique line-to-meter mapping is
not a relevant issue and the
flexibility provided by the mobile
network’s separation between
telephone number and user
identity is also beneficial.
 It is fair to warn that in the
context of Predicate Logic
Hilbert-style proofs have the
edge over Equational-style
proofs. The former are amenable
to the methodology of
removing/inserting quantifiers so
that between the removal and
insertion one can use Boolean
techniques, notably the all-
powerful Post’s Theorem (2.2.1).
 imilarly, how do we know that
the electronic mail attachment
actually came from the stated
sender or that it was not
changed in transit? Here
cyberspace has the edge over
noncyberspace. Technologies are
available that help us to verify
the mail sender (authentication)
and the validity of the message
(integrity).
 Linksys's system has the edge
over Orinoco's because it's a
little cheaper (under $350 total
for Linksys, versus almost $400
total for Orinoco), but both are a
cinch to install.
 Given the differences among the
means of the three groups, you
might think at first glance that
Method B has the edge over
Method A, and that Methods B
and A are both superior to
Method C. As it happens,
however, these differences,
considered in and of themselves,
are well within the range of mere
random variability.
 It gives them the edge over
their competitors.
 However, it is the constant,
systematic exploration, bit by
bit, never losing what has been
found, that gives RMHC the
edge over our GA.
 Ericsson’s experience of
providing longterm support and
of upgrades gives it the edge
over other retailers of telecom
management systems, such as
large computer companies,
management consultants,
systems integrators, and small
companies with niche products.

“언급 , “달리 , “otherwise


 In this unit all logarithms are to
base 2 unless otherwise
stated. 특별한 경우를 제외하고는,
달리 언급이 없는 한
 In much of our discussion, the
input is assumed to start at t =
0, unless otherwise
mentioned.
 We shall assume that the
systems discussed in this
section are in zero state unless
mentioned otherwise. Under
these conditions, the zero-state
response will be the total
response of the system.
“수단 , “방법
 Cellular phones, personal digital
assistants (PDAs), and various
other forms of wireless devices
are taking the world by storm,
opening new avenues for
development as well as a whole
host of challenges for
developers.
 The increasingly powerful
applications that run your
business may open new
avenues for productivity, but
they also open new
vulnerabilities.
 Even for medium-size
businesses, PKI can be the ticket
to e-business growth -- reducing
risk, driving cost efficiencies,
and opening new avenues of
profitability.
 With Vault Registry,
organizations can establish the
level of trust needed to conduct
e-business with confidence on
the Internet ― thus reducing
risk, driving cost efficiencies,
and opening new avenues for
commerce.
 The Internet is a growing
phenomenon, nobody disputes
that, and the large commercial
enterprises active in our daily
lives look to exploit any and
every avenue open to them to
market and sell their products.

“도입 , 단계별 도 입, 점진 적 도입
 The new series of course in the
curriculum is being phased
into the program beginning in
the fall of 1999. The new
curriculum will be completely
implemented by the fall of 2000.
 The new tax will be phased in
over the next two years.
 Most of the measures will be
phased in over a year.

“별개 의, “다른 , 전혀 별개의 , 전혀 다른 , 또 다른 이슈


/문제 /얘기 , “other, “different
 … with the exception of
exponentiation, which presents
a totally different problem …
a whole other
 These methods are all effective;
the question of which is more
efficient is a whole other issue,
one that we do not (often) raise
in this book.
 But that is a whole other story
with more of a social than a
technical bent!
 What about negation? That is a
whole other story. We’ll be
discussing it later in the course.
 There is a whole other risk to
cracking passwords, creating
lists, and using them to create
new accounts.
 In addition, there is a whole
other class of attacks that
firewalls cannot deal with.
 Don’t leave your backup disks or
tapes sitting on the shelf next to
your computer: Store them in a
fireproof box or safe ― and store
at least one set at a whole
other location.
 How to find these n solutions is
however a whole other topic
(and as soon as the coefficients
are not constant a very difficult
one).
 That was a whole other level of
effort and that 뭩 what I founded
the company to do.
 Oh, that’s a whole other story.
We have a whole session for
query.
 Virtual routing is a whole other
topic, and an important one,
since there have been several
highly significant breakthroughs
in this area, and it is key to
implementing truly cost-
effective, scalable VPNS.
 The actual conducting of
exercises, proof of concept,
implementation of recovery
plans and risk mitigation is a
whole other arena.

“필연 적으로
of necessity; necessarily; inevitably
 In the final FA, this state has of
necessity an a, b loop going
back to itself.
 Many of the jobs are, of
necessity, temporary.
 This is, of necessity, a brief
and incomplete account.
 The care of old people
necessarily involves quite a lot
of heavy lifting.

~인 한 , “한
as/so long as
 This is nice as long as nothing
goes wrong.
 You can go out to play as long
as you stay in the back yard.
 As long as we keep playing
well, we’ll keep winning games.
 We’ll go as long as the weather
is good.
 So long as there is a demand
for these drugs, the financial
incentive for drug dealers will be
there.

“한번 에
 The example we gave required
fives states primarily because an
FA can read only one letter from
the input string at a time.
Suppose we designed a more
powerful machine that could
read either one or two string at
a time.

“이동
 we go straight to the final
state 3.
 All words other than Λ go to
the right state and stay there.
 This then transports us to sate
2.
 To get back to the final state,
we must proceed to state 4
and then to state 3.
 We stay in the start state until
we read our first a. This moves
us to the middle state. If the
very next letter is another a,
we move to the + state, where
we must stay and eventually be
accepted.
 Recapitulating what we
know: If an input string begins
with an a and then has some b’s,
it must have 3 b’s to return us
to state 3, or 6 b’s to make the
trip twice, or 9 b’s, or 12 b’s and
so on. 정리, 요약
 When in the middle state, an a
sends us to nirvana, where
ultimate acceptance awaits us,
whereas a b sends us back to
start, hoping for the first a of a
double letter.
 If we start with an a, we take the
high road and jump back and
forth between the two top
states ending on the right (at +)
only if the last letter read is a b.
If the first letter read is a b, we
go south. Here, we get to the
+ on the bottom only when we
read a as the last letter.
 However, when a pair of
unmatched letters is read (either
ab or ba), the machines flips
over to the unbalanced state,
which signifies that it has read
an odd number of a’s and an
odd number of b’s.

그 다음 , “다음 , “then
 The machine will accept all
words with b as the third letter
and reject all other words. States
1 and 2 are only waiting states
eating up the first two letters of
input. Then comes the decision
at state 3. A word that has
fewer than three letters cannot
qualify, and its path ends in one
of the first three states, none of
which is designated +. Once we
get to state 3, only the low road
leads to acceptance. 소진

 SSO programs are used to allow


a user to authenticate himself
once, and from then on be able
to access additional network
resources without providing
additional passwords. 그 다음부터

• Although we usually don’t care about what happens
inside the machine (unless some kind of break-
down occurs and we suffer a loss), we should realize
that somehow the machine is keeping track of the
coins we insert, until the correct total has been in-
serted. Only then, and not before, does the vending
machine output the desired soft drink. 개의치 않는
다; 손해보다; 그 다음에 가서야만, 그 전에는 절대로 안
한다, “then

“hope
 In this characterization, if we
read a b while in state 2, we go
to state 3, hoping for another
b, whereas if we read an a in
state 3, we go to state 2,
hoping for a baby a.

“그치 다, 끝나 다
wait sth out: if you wait out an event, period, or time, espe-
cially an unpleasant one, you wait for it to finish/end; to wait un-
til an unpleasant event has finished; to wait until the end of
 Let’s find a place where we can
wait out the storm.
 We have already discovered the
existence of a double letter in
the input string and we are
going to wait out the rest of
the input sequence and then
announce acceptance when it
is all over.
 If neither can be arranged, then
the object might need to wait
out a previous request before
proceeding.

“다 써버 리면 , 다 떨어지 면, “out
 We’re out of milk.
 They’ve run out of ideas.
 You’re out of luck ― she left
ten minutes ago.
 We start at the minus sign and
proceed along the indicated
edges until we are out of input
letters.
 A good programmer would
employ instead what is called a
Boolean flag; let us call it E for
even. If the number of letters
read so far is indeed even, then
E should have the value TRUE.
If the number of letters read is
not even, then E should have
the value FALSE. Initially, we set
E equal to TRUE, and every
time we read a letter, we
reverse the value of E until we
have exhausted the input
string. When the input letters
have run out, we check …

“미지 의, “uncharted
 Not uncommonly, studies of
this kind which relate to
relatively uncharted areas
raise more issues than they
solve. 흔히, 드물지 않게
 If we had started with the final
picture and tried to interpret its
meaning, we would be sailing
uncharted waters.
 The party is sailing in
uncharted waters (= a
situation it has not been in
before).
 This new project will take us
into uncharted territory.
 This type of work is uncharted
territory for us.
 Other career seekers are more
interested in venturing into
uncharted waters.
 Some developmental paths are
blocked, while potentially novel
ones lead off into uncharted
terrain.
 I was moving into uncharted
territory (= a completely new
experience) with this
relationship.

“이해
“understand
 Graph theory is an exciting
subject in its own right, but for
our purposes there is no real
need to understand directed
graphs in any deeper sense
than as a collection of circles
and arrows. 더 깊이 이해할 필요는
없다
“grasp (have/get a ~ grasp of)
 To have a proper grasp of
convolution operation, we should
understand the graphical
interpretation of convolution.
Such a comprehension also
helps in evaluating the
convolution integral of more
complicated signals.
 It's remarkable that the
Egyptians of 1850 BC (and
probably much earlier) had
already developed this crude
version of the "Sieve of
Eratosthenes", and seemed to
have a grasp of the difference
between prime and composite
numbers.
 You should have a healthy
grasp of shell programming
techniques now that you have
gone through the previous
chapters.
 It is helpful and almost
necessary to have a good
grasp of the information which
might be required to complete
the specification by embodying
the assumptions and the
resulting decisions which are
appropriate.
 It's therefore important to have
a solid grasp of the following
topics covered in C++NPv1
before reading this book:
 To estimate the appropriate level
of investment in security, it is
useful to have a sound grasp
of the probability of different
levels of damage.
 Of all the types of security
experts that are out there, those
that concentrate on NT networks
seem to have a better grasp
of databases such as Microsoft
SQL.
 As far as substance goes, this is
a pretty trivial proof. But it is
important to have a good
grasp of the form of the proof,
and particularly the form of the
inductive step.
 One of the more interesting
findings obtained employing the
simultaneous presentation of
items is that monkeys appear to
have a better grasp of an
overall sequence of events than
do pigeons.
 He has a good grasp of
German grammar.
 let’s first take a look at what
Acrobat is and what PDF is, and
let’s try to get a grasp on
some of the many options you
have for working with PDF files
in Acrobat
 These complex formulae are
beyond the grasp of the
average pupil.
 At this point, the HTML file has
gotten well beyond the
grasp of your average HTML
author.
 VBA can be difficult to grasp at
first, but it becomes easier with
practice [동사로 바로 쓰는 경우]

“지정
 Let us also designate state x
as the starting state and state z
as the only final state.

“even so, 그렇기 는 하나 ; 그렇 다 하더라 도; 그런 데도


= despite that
 It does not do anything like
print out or play music. Even
so, we shall stick to the
terminology “finite automaton.”
 I know he's only a child, but
even so he should have known
that what he was doing was
wrong.
 There are a lot of spelling
mistakes; even so, it’s quite a
good essay.
 The bus was only half full. Even
so, a young man asked Nina if
the seat next to her was taken...

“읽는 방법 , “발음
 C(n, r) is pronounced “n-
choose-r”.
 The term FA is read by naming
its letters, so we say “an FA”
even though it stands for “a
finite automaton” and we say
“two FAs” even though it stands
for “two finite automata.”

“선택 , “choice
 … pick a password or pass
phrase of their own choice. 고
르다
 One small difference between
these two situations is that in
the child's game the number of
pieces of input is determined by
whether either player has yet
reached a final state, whereas
with the computer the number
of pieces of input is a matter of
choice made before run time.
Still, the input string is the sole
determinant as to whether the
game child or the computer
child wins his or her victory. 결정

“결정 , “determinant, “determination


 Similar to type-specific access
control, static inheritance also
simplifies both debugging and
managing access control
because the ACL on an object is
usually the sole determinant
of access to that object.
 In 1958, in "The Rise of the
Meritocracy, 18702033" Michael
Young envisaged a world in
which intelligence was the sole
determinant of status in
society: re-reading it today it
sometimes seems quaint, but
sometimes uncannily accurate
and trenchant.
 The argument begins with a
claim for philosophical reflection
as the sole determinant of
truth in the full sense.
 One point of view would be that
to the extent that there are no
semantic rules governing such
things, the sole determinant
is what the speaker has in mind.
 Still, the input string is the sole
determinant as to whether the
game child or the computer
child wins his or her victory.
 The determination of what
state is next is automatic
(involuntary and mechanical),
not willful, just as the motion of
the hands of a clock is
automatic, while the motion of
the hands of a human is
presumably the result of desire
and thought. We present the
precise definition below.
Automaton comes to us from
the Greek, so its correct plural is
automata. 유래

“다른 , “other
 , and some other solutions
have been proposed.
 The computer is also
deterministic, by which we mean
that, on reading one particular
input instruction, the machine
converts itself from the state it
was in to some particular
other state (or remains in the
same state if given a NO-OP),
where the resultant state is
completely determined by the
prior state and the input
instruction. No choice is
involved. No knowledge is
required of the state the
machine was in six instructions
ago. 뭔가 다른, 어떤 다른 특정한;
선택; 알 필요 없다

“문제 가 없으면 , “별일 이 없으면 , 잘 풀리면 , 일의 “진


행, “go
go well/smoothly/fine etc.
 If all goes well, the machine
outputs the number 7 and
terminates.
 The party went well.
 Everything’s going fine at the
moment.
 I feel very encouraged by the
way things are going.
 If all goes well, processing the
KRB_AS_REQ message results in
the creation of a ticket for the
client to present to the server.
 At this stage, system B will then
attempt to send back a SYN/ACK
packet to system A. If all goes
well, system A will send back an
ACK packet, and the connection
will move to an ESTABLISHED
state.
 If everything goes well, you
will not see any error
messages.
 If all goes well (or not so, if
you’re an administrator of the
system), you should see the
following result on the target
server:
 If all goes well, the hosts
communicate a random session
key, for further communication.
 If all goes well, the user is
authenticated and is given the
key K_tgs as proof.
 A few days later you'll get a
phone call from an investigator,
who wants to stop by your place
of business and make sure that
you are legitimate. If that goes
well, and it almost always does,
you get a machine.
 The third is to continue with
the examination in the hope
that all goes well. 계속, 바라다,
“hope

“치우 다, “치워 놓다 , “접어 두다 , “안 쓰다 , “shelf


(put) on the shelf:
1. not used/considered/wanted by anyone; inactive; useless
2. put aside as no longer used or desirable;
3. put aside/away temporarily; postponed
 Let’s set this knowledge aside
for the moment (for the sake
of learning how to use some of
the available tools in situations
where we don’t know if we have
an isomorphism).
 Let us put this game back on
the shelf and take another
example.
 Eventually, this combination of a
complex syntax, the need for
extensive training, and a lack of
analysis tools led us to put
RAISE on the shelf.
 We said it before, but it bears
repeating: Security is an
evolving process. You can’t just
finish it, put it on the shelf,
and move on to some other
problem. Security is a dynamic
part of your organization, and
your security plan should grow
and adapt with your
organization’s changing security
needs.
 Consider the use of a coffee mug
in the shop. What happens to it
in typical day ? ... it begins the
day clean on a shelf, it gets
filled with coffee, it gets put on a
tray, it gets delivered to the
customer, it is sipped by the
customer, it gets topped up by
the serving staff, it gets cleaned
in the dishwasher and finally
put back on the shelf.
 Particularly encouraging is the
fact that the ANDF-FS hasn’t
simply been put on the shelf
to gather dust: it is being
actively used, for reference
purposes, in connection with a
project to construct an
interpreter for ANDF-FS.
 The trouble is that the
Americans obsessed with their
purity of purpose, stubbornly
cling to an idea that should
either be dropped or at least put
on the shelf (Canadian Forum).
 We worked hard on a new idea,
but the boss put it on the
shelf as too expensive.

“질문 , “문제 제기 , “ask, “question


 With the presence of secure
transaction protocols, it is
reasonable to ask: why
bother with the server-side
security? ~이 있으므로, 있기 때문
에, 존재
 Let us now ask, “What stings
do not contain a double letter?”
Some examples are …
 Let us now ask in which
states is … true?
 Let us now ask whether the
Axiom of Linearity can be
proved or disproved in our
axiomatic theory of order.
 Let us now ask ourselves
what we are to think of Hume's
doctrine.
 Well, then, assuming that pain
ensues on the dissolution, and
pleasure on the restoration of
the harmony, let us now ask
what will be the condition of
animated beings who are
neither in process of restoration
nor of dissolution.
 Let us now ask what the force
would be between two charged
conductors in a dielectric.
 Let us now ask which
matrices A are similar to
diagonal matrices.
 Let us now ask whether it is
possible for any search
algorithm to exist that will, in
the worst and the average
cases, be able to find its target
using significantly fewer
comparisons of keys than
binary search.
 Let us now ask the question
given the data, and the
noninformative priors, what
might s be? This question
differs from the first one we
asked in that we are now not
interested in ?
 Let us now ask the analogous
question for vertices: when
does a graph G contain a closed
walk that contains every vertex
of G exactly once?
 Let us now ask: To what
extent can the program be
carried out? In order to study
this question fruitfully, one
must reformulate the program
in more precise terms.
 Let us now ask what benefit
can be derived from the valid
conclusion that car-type 5
thing-type.
 Let us now ask for the
probability that when the first
burnout occurs, it is the jth
component.
 Since there are context-free
languages that aren't regular
and thus can't be recognized by
DFAs and NFAs, we have a
natural question to ask: Are
there other kinds of automata
that will recognize context-free
languages? The answer is
yes! We'll discuss them in the
next section.

“arise, “발생 , “생긴 다, “question, “의문 점, “질


문, “문제
 In general, practically anything
can be a mathematical model so
long as it is a well-defined set
of rules for playing with some
abstract constructs, but the
obvious questions remains: a
mathematical model of what?
 This correspondence between
regular expressions and
languages leaves open two
other questions. We have
already seen examples where
completely different regular
expressions end up describing
the same language. Is there
some way of telling when this
happens? By “way” we mean,
of course, an algorithm. We
shall present an algorithmic
procedure in Chapter 11 to
determine whether or not two
regular expressions define the
same language.
Another fundamental
question is this: We have
seen that every regular
expression is associated with
some language; is it also true
that every language can be
described by a regular
expression? In our next
theorem, we show that every
finite language can be defined
by a regular expression. The
situation for languages with
infinitely many words is
different. ~의 경우는 상황이 다
르다 As to the first and
perhaps most important
questions, the question of
understanding regular
expressions, we have not a
clue.
 There are currently about 115
million telephones in the US,
and a natural question
arises as to whether it is
possible to assign numbers to
these telephones so that a
single error in dialing can be
corrected. 의문, 궁금
 The question arises as to
whether or not he knew of the
situation.
 A question arises about how
compact operators map
orthonormal families.
 The question arises from
elementary differential
equations: Solve dy/dx = f(x).
This really is a number of
questions: …
 Certain philosophical
questions arise on their own
quite naturally. Few persons
have to be prompted to ask
such questions as “ Are there
souls? ”, “ Is there a God? ”, …
 Authorization answers the
question “is X allowed to do Y
on Z'' for some principal X and
some action on some object.
This is basically a problem of
first expressing the
authorization, and then
evaluating it when the
authorization question
arises.
 Readers familiar with data
communication networks
realize that a myriad of
communication protocol
standards exist. Many of them
precede the Internet, so the
question arises, "Why did the
Internet designers invent new
protocols when so many
international standards already
existed?" The answer is
complex, but follows a simple
maxim: …
 But even if we all could agree
on a criterion of personhood,
such as the moment of
conception, the abortion debate
would not be over. For,
questions arise about
whether the mother's right of
self-determination overrides the
rights of the fetus.
 The question arises whether
there is a way to describe the
loop-computable functions
directly via basic functions and
closure operations.
 The question arises if there
is any good description for ...
 The question arises how
many of the 2k possible initial
vectors are of the special form
...
 Two questions arise
naturally: …
 The graph of a function is a
curve in the xy-plane. But the
question arises: Which curves
in the xy-plane are graphs of
functions? This is answered
by the following test.
 The question arises: Are
there any others? To answer
this question, recall that …
 The question arises: Is there
a …? The following theorem
says that this is true for
continuous functins.
 The question arises: Will our
strategy for integration enable
us to find the integral of every
continuous function? For
example, can we use it to
evaluate …? The answer is
no, at least not in terms of the
functions that we are familiar
with
 The question arises whether
this is recursion or not. I
usually take the position
that it is not.
 The question arises as to
how big a try block should be.
This depends on whether
you can recover from the
exception or not.
 If we give the name KT to the
thread that is executing Karel
and CT to the one executing
Carol, then the question
arises which thread executes
the method named in the
message. The answer may
be surprising at first, but
understanding this is very
important.
 The question arises of what
language to use for writing our
implementations. We have
chosen to use an existing
functional language, Miranda.
 The question arises,
therefore: how are we to
represent and manipulate
structured types in our small
Core language? In particular,
our goal is to avoid having data
type declarations in the Core
language altogether. The
approach we take breaks
into two parts: …
 Next the question arises of
how this primitive is
implemented.
 Serious security and privacy
questions arise if third
parties can read or tamper with
sensor data. 문제
 The important question
becomes: Should these
insecure computers be
tolerated given the nature of
modern computing
infrastructure? To this end, two
specific questions arise:
Should there be a standard of
care in securing network
computers against damage by
a third party? Should the law
allow the recovery of damages
from an entity whose insecure
computer network was used by
a third party to exact harm?
 In addition to the monitoring of
users described in the
preceding section, the
question arises of whether it
is possible to make
unauthorized phone calls at
someone else‘s expense.
 Thus, the question arises of
whether UMTS still offers
options for the installation of
the procedures described
above.
 The question arises,
however, whether these
existing and evolving payment
systems adequately address all
of the possible market
interactions online. Put
another way, are the vendors
capable of creating new
products and pricing schemes
to fully extract consumer
surplus?
 And now the question
arises: "How is metaphysics,
as a natural disposition,
possible?" In other words, how

 When a revoke operation is
performed by one of the
grantors, the question arises
as to which authorizations
need to be revoked from among
the ones the revokee (the
subject from whom the
authorization is being revoked)
has granted. There are two
basic approaches. The first
approach, proposed by
Griffiths and Wade [S] for
System R [8], assigns a
timestamp to each
authorization, and the
semantics of the revoke
operation is baaed on the
temporal relationships among
all authorizations. When an
authorization a is revoked from
a subject s, any authorization a’
that was granted by s is
automatically revoked ifs does
not possess another
authorization for a at the time
when a’ was granted. The
second approach differs
from the first in that it does
not assign timestamps to
authorizations and, therefore,
does not take temporal
relationships among grant
operations into account.

“need: (조동사적 용법) ~만 하면 된다 , 안 해도 된



used to state that sth is/was not necessary or that only very little
is/was necessary; used to ask if sth is/was necessary:
 We need only show that at
least one regular expression
exists.
 You needn’t finish that work
today.
 You needn’t have hurried (= it
was not necessary for you to
hurry, but you did)
 I need hardly tell you (= you
must already know) that the
work is dangerous.
 If she wants anything, she need
only ask.
 All you need bring are sheets.
(cf. All you need to do is
complete this form. = All you
need do is …)
 Need you have paid so much?

“번갈 아, “교차
 The language associated with
(ab)* is words with alternating
a’s and b’s, whereas the
language associated with a*b* is
only strings where all the a’s (if
any) precede all the b’s (also if
any).

at work: “작용하 고 있다 , 일하 고 있다 , “work


1. having an effect on sth; in operation; to be having an effect,
usually an obvious or bad effect;
2. busy doing sth; working
 … but many other factors are at
work, which make this
statement an oversimplification.
요인이 작용
 She suspected that secret
influences were at work.
 It is important to understand the
powerful economic and social
forces at work behind our own
actions.
 It seems as though forces of
destruction are increasingly at
work throughout society.
 Section 6.4 provides another
opportunity to see orthogonal
projections at work, creating a
matrix factorization widely used
in numerical linear algebra.
 The inverse power method k is
now at work.
 Cubic convergence is so
spectacular we must see it at
work.
 However, we will see that
there is a certain conservation
principle at work here, which
implies that the bigger the
kernel, the smaller the image, so
the less likely it is that there will
be even one solution.
 Which counting principle is at
work here?
 Note that induction is at work
in this definition: we are really
defining join(x, y) by induction
on the length of x.
 Intuitively, there are two forces
at work. First, the gambler’s
wealth has random upward and
downward swings due to runs of
good and bad luck. Second, her
wealth has a steady, downward
drift because she has a small
expected loss on every bet. The
situation is illustrated below:
 The homework problems are
sometimes quite challenging
because we want you to spend a
significant amount of time
thinking about the concepts that
are at work here.
 The two examples above have
shown the method at work in
situations where it was
atypically accurate.
 This effect, called Simpson's
paradox, was at work in your
comparison of Our town Hospital
and Overlook Medical Center
yesterday.
 There is a fundamental
mathematical principle at work
here.
 Both the security and hacker
communities are constantly at
work finding flaws in COTS that
software vendors and security
firms generally correct quickly.
 … we have what appears to
be some sort of distributive
law at work. 일종의 ~으로 보이
는것
 He is still at work on painting.
 I’m at work on a new project
now.
 The salvage teams are already
hard at work trying to deal with
the spilled oil...
 Danger − men at work

it may (very) well be that ~: “가능성 , 일 수 있


다, “may
 It may very well be that many
uses of … assume that only one
option or the other obtains. This
is particularly so when it is
impossible for both to obtain at
the same time.
 The ultimate status of an
argument depends on the
interaction between all available
arguments: it may very well
be that argument defeats
argument , but that is in turn
defeated by a third argument
 His position in any case could
not have been other than
extremely miserable, yet it may
very well be that he found
some advantages in it.
 If something were to be shown
from premises, both of which are
views generally accepted, but
not accepted with like
conviction, it may very well be
that the conclusion shown is
something held more strongly
than either.
 It may very well be that it is
more efficient to first compute
the whole DFA and then just run
it.
 For an explicit knowledge of the
principle it may very well be
that experience is required, and
we certainly come to learn
geometry, for example, in this
way; we do not possess an
explicit 84 85 86 87.
 It may very well be that the
influence of Buddhist philosophy
on world affairs is only now in its
opening stages.
 Nations do not like each other,
never have liked each other; and
it may very well be that
school textbooks help this
inclination to dislike.
 It may very well be that he
got his knowledge of Hebrew in
reading for the Church; and
there was always something of
the clergyman or the
schoolmaster in his dress and
air.
 It may very well be that for
inputs of very great size, the
running times for two different
algorithms become almost
indistinguishable.
 It may very well be that even
though there are many possible
factors leading to memory
errors, the vast majority of those
errors can be traced to a few
significant factors.
 However, it may very well be
that your organization has more
than one policy on a particular
topic depending on the situation
or systems involved.
 … or discrete-logarithm-like
systems over elliptic curves, it
may very well be that smaller
parameters are possible with the
same level of security as the
regular systems over finite
fields. However, many
questions regarding EC-
systems are still open at this
moment, making it unclear what
the future of these systems will
be.
 Now it may very well be that
the data that you place in your
personal computer, may require
those kinds of controls, but for
the most part, persona1
computers will not.
 In the RIP-stop application it
may very well be that
provable destruction of a key is
all you need, and anything else
can be built on top of that given
various external services such as
perhaps secure time.
 Despite public comments by Sun
and Microsoft management that
each product will take the
dominant position, it may very
well be that Java and ActiveX
coexist with the users' needs
determining which one will be
used at any given time.
 Of course, it may well be that
these estimates of loss are low,
because companies are
reluctant to publicize
occurrences of
 It may well be that in the
future, when the sale of
proprietary databases will
assume economic significance,
the possibility of abuse of
proprietary rights by licensed
organizations and authorized will
be an important issue. At that
point an appropriate technology
for resource control will be
essential.
 It is by no means obvious what
justifies the applicability of
mathematics in general to what
lies outside it, and it may well
be that the reduction of
mathematics to set theory does
not supply such a justification.
 In other words, it may well be
that the proof of Proposition 4 is
very faulty indeed, or to put it
more bluntly, that it is no proof
at all.
 If t is not so dynamic for users
though, it may well be that it
be included as a parameter in
the user's public key certificate.
 The commercial Internet market
is currently at a very early stage
of its growth, but its
development since 1989 has
been so explosive and its growth
potential is still so large that it
may well be a breakthrough
technology with respect to the
acceptance of information
technology, and especially
networked multimedia services,
in the home.

“여기 다, “간주
 …, but it is more correct to
think of this “+” as offering
alternatives in forming words. 더
옳다

“제약 , “제한 적
 We shall soon see that this
language-defining tool is of
limited capacity in that there
are many interesting languages
that cannot be defined by
regular expressions, which is
why this volume has more than
100 pages.
 Perhaps the most important
property of these channels is
that the return feedback channel
from the clients to the server is
typically of limited capacity,
or is non-existent.
 Controlling access to services is
something that is very
desirable in most environments.
The services may be of limited
capacity, or they may contain
information that is not meant
for public access. Thus the
provider of a service wants to
somehow make sure that only
authorized access is allowed. In
some cases it is even necessary
to know the identity of the
person or entity accessing the
service.
 It is an abstraction, of course,
since any real computer has
registers with a limited
capacity.
 The nodes contain resources of
limited capacity.

“more
 It was more of a holiday than a
training exercise. (be more of ~
than ~ = be ~ rather than ~)
 A degree is more of a hindrance
than a help in British industry.

 We might define a language by
the symbols: L5 = {xn for n = 1
4 9 16 ... } but now the symbols
are becoming more of an IQ
test than a clear definition. ~라
기 보다 ~에 더 가깝다
“주의 , “조심 , “wary, “careful, “caution
 As a final note in this section,
we should be wary that we
have sometimes used recursive
definitions to define membership
in a set …
 One should be wary that
Euclidean angles in this model
do not accurately depict the true
hyperbolic angles.
 Although this may be true, one
must be wary that the
mathematics was not studied
with this application in mind.
 In dealing with radio signals,
you must be wary that you no
longer have the “security” or
physicality of a hardwired line.
 Even though this individual
presents you with a paper copy
of a warranty, you may be
wary that their vehicle is not
trustworthy.
 Therefore, when using this
approach, the verifier must be
wary that this could result in
particular attacks on the
protocols being missed, due to
the limitations of the calculus.
 Be wary of strangers who offer
you a ride.
 Teachers have to be careful
when criticizing pupils.
 You must be careful who you
accept a lift from.
 Be careful that the medicine is
kept away from children.
 People should be more careful
about the things they say.
 She was careful to keep her
records up to date.
 Here we should again be very
careful to observe that …
 Care should be taken so as
not to confuse this with + as
an exponent. 혼동하지 않도록 주의
 This cautions us against
thinking of the * as a normal
algebraic exponent.
 Tony cautioned against
misrepresenting the situation…
 The statement clearly was
intended to caution Seoul
against attempting to block the
council’s action again…
 However, the distributive law
must be used with extreme
caution. Sometimes, it is
difficult to determine whether
the law is applicable.

“괄호
 The first contains unbalanced
parentheses; the second
contains the forbidden substring
… The first … The fourth has a
close parenthesis before the
corresponding open
parenthesis. “)”, “(“

“뜻, “의미 , “mean


 Now what would it mean to
take strings from S* and
concatenate them?
 In order to reason and argue
about authentication protocols,
we must first of all define what
we mean by "authentication".
~이 무슨 뜻인지를, 무엇을 뜻하는
지를
 In proofs, "B sees {X}sA "
should be taken to mean ( is
taken to mean ) B has received
a message containing a data
item Y, and has verified the
format of Y to be that of a
signature on X using a key
corresponding to the public
signature key which B associates
with A. ~라는 의미로 이해해야 한
다, 해석해야 한다, ~을 뜻한다, 의미
한다; 확인

“조건 , “condition
on (the) condition that: only if; provided that
 They will give us the money on
one condition--that we pay it
back within six months.
 He was released on bail on
condition that he did not go
within half a mile of his mother's
address.
 They agreed to lend us the car
on condition that (= only if)
we returned it before the
weekend.
 Reproduction of all or part of this
work is permitted for educational
or research use on condition
that this copyright notice is
included in any copy.
 I’ll come to the party on the
condition that you don’t wear
those ridiculous trousers!
 This is not to say that S+ cannot,
in general, contain the word Λ. It
can, but only on the condition
that S contains the word Λ
initially, In this case Λ is in S+.
 They agreed under the
condition that the matter be
dealt with promptly.
 Under these conditions, the
fire can be rapidly controlled.
 Under what conditions do
plants grow best?

“개수
 Λ plus all strings of a's and b's in
which the a's occur in even
clumps. 짝수 개
 Λ plus all strings of a's and b's
except those that start with b
and those that contain a double
b … By the phrase “double b”,
we mean the substring bb.

“순서 설명 , 배열 , 나열 , “위치 , “order


 Notice that when we wrote out
the first several words in the
language, we put them in size
order (words of shortest length
first) and then listed all the
words of the same length
alphabetically. We shall
usually follow this method of
sequencing a language. This
ordering is called lexicographic
order. In a dictionary, the word
aardvark comes before cat; in
lexicographic ordering it is
the other way. Whereas both
orderings are useful for the
problem of searching for a given
word, in the list for infinite sets
lexicographic ordering has some
distinct advantages. In the
language just above, there are
infinitely many words that start
with the letter a and they all
come alphabetically before
the letter b. When listed in the
usual alphabetical order, the
first five words of this language
are A- a- aa- aaa- aaaa and the
three-dot ellipsis ". . ." would not
inform us of the real nature of
the language.
 we may generate the words in
size order, smallest first.
 …, while words in ENGLISH-
SENTENCES are restricted to
juxtaposing only words from
ENGLISH-WORDS in an order
that complies with the rules of
grammar.
 … all strings of a's and b's except
those that start with b and …
 Yes, we will renew the contract
next year on the condition that
we make money on the deal.

“방향 , “쪽, “편, “왼, “오른


 Since we are working on a finite
machine, we can only show
finite subsets of Z. Imagine,
however, that H extends
infinitely (in both directions)
with the same pattern. 양쪽으로,
방향
 Comparing the coefficients of x
on both sides gives the relation
… 양 쪽 계수를 비교하면
 The left side of figure 1-4
shows the key protocols for Web
communications. At the
bottom is the IP. At the right
side of the figure indicates, SSL
adds security by acting as a
separate security protocol,
inserting itself between the HTTP
application and TCP. 왼 쪽, 맨 아
래 쪽, 오른 쪽
 Assume the mobile station starts
off associated with AP1 at the
left side of the diagram
because it was powered on in
AP1's coverage area. As the
mobile station moves towards
the right, it must eventually
associate with AP2 as it leaves
AP1's coverage area. 왼 쪽, 오른

 … and the operator << indicates
that what appears to the right
of the operator is to be sent to
the output stream, count. The
operator << points in the
direction that the data flows 
from the variable or string on
the right to the output
destination on the left. 방향, 지
시, 가리킨다, 오른 쪽, 왼 쪽
 len = str1.length( );
The above is an assignment
statement and works in the
usual two-step way:
1. The expression on the right
of the “=“ is evaluated.
2. The resulting value is stored
in the variable on the left of
the “=“ sign.
The right-hand side of this
particular assignment
statement…
 The right-hand side function
looks very much like a
mathematical equation: a left-
hand side and a right-hand
side separated by a colon-equal
sign.
 For each other +, we must
decide whether to choose the
right-side expression or the
left-side expression.
 If x and y are words of length m
and n, then x y is the word of
length m + n obtained by
placing x to the left of y. 왼
쪽, 오른 쪽
 Then, if B is to the right of A,
the number of x-units in the
segment AB is equal to x2 – x1. ~
의 오른 쪽에 있다
 For each word in S* every b must
have an a immediately to its
left.
 The rightmost one is the one
that gets filled by the entries
from the list Range[500]. The
next one to the left belongs to
the pure function in the
argument to NestList, while the
leftmost one belongs to the
predicate that is mapped down
the resulting list. 제일 오른 쪽, 그
다음으로 왼쪽에 있는 것, 제일 왼쪽

 By acting as a new protocol, SSL
requires very few changes in the
protocols above and below.
The HTTP application interfaces
with SSL nearly the same way it
would with TCP in the absence of
security. 아래 위에 있는
 However, note that assigning
one array variable to another
one makes a copy of the first, so
that component assignments to
either one don’t affect the
other. 어느 한 쪽, 다른 한 쪽
 Referring to Figure 45 and
viewing from left to right,
decipherment begins with the
arrival of a message. 그림을 보
면; 왼쪽에서 오른쪽으로 보면
 Starting at the bottom-left
vertex and going around
counter-clockwise: u + 2*v,
u + 3*v, 2*u + 3*v, 2*u +
2*v. 좌하귀에서 시작하여 반시계
방향으로 돌면서
“중간 (“해당)
 In our hierarchy of algebraic
structures, an integral domain
belongs between a
commutative ring with unity and
a filed, as we shall now show.
~의 중간에 속한다, 해당된다; 이제
보이겠다.
 If the masses are equal, the
center of gravity lies halfway
between them. 중간에 놓인다
 One dress was too elegant, the
other too casual; she had
nothing in-between.
 Most of us work in organizations
that fall somewhere in-
between. 중간 쯤에 해당
 The answer probably falls
somewhere in the middle.
 In the breakdown (분류) of
security according to what you
know, what you have, and what
you are, authentication tokens
fall in the middle category
(passwords are in the first, and
biometric devices the third).

“seem
 This may seem like belaboring
a trivial point, but the
significance of being careful
about this distinction will
emerge over and over again.

“다시 , 처음부 터 다시 시작 /반복


(all) over again: if you do sth all over again, you repeat it from
the beginning
 As soon as the amount
deposited equals or exceeds $1
the machine releases a bottle of
juice. The next coin deposited
starts the process over again.
 He did the work so badly that I
had to do it all over again
myself.
 I had to write the essay all over
again.
 If the dialup password is entered
correctly, the user is granted
access to the system, as
illustrated in the preceding
example. If the dialup password
is incorrect, however, the login is
aborted, and the user is forced
to start over again.
 Type y if you are sure the
settings you entered are correct.
If you choose n, you will go back
to the interface selection menu
and be forced to enter all the
information over again.

“모두 , “전부 , “합해 서


 Altogether 680 women took
part in the conference.
 Moreover, there are altogether
2n − 2 minus signs.
 Any set of k girls know
altogether at least k boys.
 Since there are only n! chains
altogether, we see that …
 This makes altogether 6 triples,
as required.
 In this book we are going to see
altogether more than a
hundred applications of the
symbolic method.
 There were five people
altogether.
 How much do I owe you
altogether?
 You owe me $68 altogether.
 Thus, altogether, there are 2 ⋅
3! ⋅ 2! = 24 ways.
 Since G has only 480 elements
altogether, we have now
arrived at a contradiction. We
conclude that there is no such
group G.
 We see that in this way we can
eliminate the edge from stae 1
to state 2, bypassing state 2
altogether. 완전히 (used to
emphasize that something has
been done completely or has
finished completely)
 When taken together, the
protocols of the various layers
are called the protocol stack. 모
두 합해서, 합치면, 모으면
 On the wall are rows of stickers,
35 in all, each representing a
team victory.
 The first three phases (cookie,
exchange, and identification)
must be carried out in their
entirety (= whole extent)
before any Security Association
can be used. 수행; 전부, 모두, 완전

“즉시 , 지체 없이
right away/off: immediately, without delay
 I want it sent right away.
 I told him right off what I
thought of him.
 I could tell right off that
something was wrong.
 He wants to see you right
away…
 Right off I want to confess that
I was wrong.

“note, “주목 , 관찰
 Most notable is the fact
that… 가장 주목할 만한 것은…
 Note that …
 We note that many variations
of ER diagrams are in use, and
no widely accepted standards
prevail. The presentation in this
chapter is representative of
the family of ER models and
includes a selection of the most
popular features. 전형적, 대표적
 We should note that this use
of the plus sign is consistent
with the principle that in these
expressions plus means choice.
 We should take particular
note of the fact that although
this proof looks like a proof by
constructive algo, it is not that
at all.
 Whilst it may be of
questionable value to
consider the efficiency of
incomplete protocols, it is also
interesting to note that …
 It is of interest to note that

 Before leaving this example,
let us note that although the
second recursive definition is
still harder to use (in proving
that given numbers are even)
than the two nonrecursive
definitions, it does have some
advantages. 마치기 전에
 Further, note that each
department has at most one
manager, as before, because of
the key constraint.
 Finally, we note that a foreign
key could refer to the same
relation.
 Before discussing record
formats, we note that …
 To derive these probabilities, we
simply note that …
 note that, in contrast to the
earlier example, a second CDB is
needed.
 The key to drawing one is to
note that a curve of order n is a
curve of order n-1 followed by an
L followed by a curve of order n-
1 traversed in reverse order and
that the same instructions,
except with the middle L
changed to an R, traverse the
curve in reverse order.
 Please note that this is the
book's primary case study
example of a detailed use case;
it shows many common
elements and issues.
 Last, but not least, it is
important to note that
Contemporary Cryptography
addresses only the materials
that are published and available
in the open literature.
 In either case, it is important
to note that cryptographic
applications may consist of
multiple (sub)protocols, that
these (sub)protocols and their
concurrent executions may
interact in some subtle ways,
and that these interactions and
interdependencies may be
exploited by various chosen-
protocol attacks (see, for
example, [7] for the notion of a
chosen-protocol attack).
 It is, however, important to
note that a complexity-based
proof is not absolute and that it
is only relative to the (assumed)
intractability of the underlying
mathematical problem(s).
 Again, it is important to note
that most parts of modern
cryptography rely on
intractability assumptions and
that relying on such assumptions
seems to be unavoidable today
(see Chapter 21).
 But note that none of these
functions has been shown to be
one way and that it is
theoretically not even known
whether one-way functions
really exist.
 Also, note that …
 Again, note that …
 At this point it is important
to note that …
 First of all, it is important to
note that a vector of random
variables (associated with the
same discrete probability space
or random experiment) can
always be viewed as a single
random variable.
 It is interesting to note that
knowing the public encryption
key is of almost no help at all in
finding the decryption key.
 Note that the product P of
these common factors must be
the gcd of x and y. To see this,
note that P|x and P|y, and
furthermore:
 Note that with data hiding,
backward standard compliance
is automatically achieved, since
the hidden data is simply
ignored by a decoder which is
not designed to exploit it.
 Note that in many cases a
fast algorithm exists to speed up
the exhaustive search of all the
possible shifted version of w.
 There is one thing that we
must notice about this
machine; it will also accept
words in which some bbb can
occur before the first aaa and
then has another bbb later. 한 가
지 주목할 점

“observation, “관찰 , 주목
 From these observations we
consider the following concepts.
 Before continuing, we make a
few observations about …
 When we look back at the partial
orders in parts (b), (c), and (d) of
Example 7.38, the following
observations come to light.
다음 사항들을 발견하게 된다.
 The crucial observation here
is that …
 This observation provides us
with a procedure for
determining voltage polarities in
coupled circuits.
 This observation provides us
with our fundamental notion of
a practical algorithm.
 This observation provides
the motivation for the
construction of a grammar GT
that is equivalent to G and
contains only variables that
derive terminal strings.
 This observation provides
the motivation for the action
to take when a collision is
detected.
 This observation provides
the basis for reasoning about
derivable judgements by rule
induction.
 This observation provides a
basis for characterizing the
number of extant or active
sessions in this infinite-server
system.
 This observation provides a
scientific basis for a homeland
security strategy: Given that we
cannot afford to protect
everything equally, our
prevention strategy should focus
on the hubs of scale-free
networks, or the clusters in
small-world networks.
 This observation provides a
way to compute …
 This observation provides a
simple but useful test for
divergence.
 This observation provides a
broader perspective on the
phenomenon of Westernization
in Africa.
 This observation provides a
method to improve the
approximation of binomial
probabilities.
 This observation provides a
partial answer to the second
question as well.
 This last observation
provides a constraint for the
linear programming problem
which needs to be solved to find
the linear possibility regression.
 This observation provides
the connection with one of the
main examples which motivates
this general development,
namely the ‘stable elements’
formula of Cartan and Eilenberg
[16].
 A stronger system would use
more bits, and this
observation provides the
opportunity to discuss how the
strength of a cyptographic
system can be measured in bits

“만병 통치약
 a one-size-fits-all attitude,
method, plan etc is designed to
please everyone or be suitable
for every situation, often with
the result that it is not
successful;
 a one-size-fits-all approach to
education
 a one-size-fits-all public
education program
 Given the current state of the art
in this area, we are convinced
that no one-size-fits-all
approach will succeed at all
institutions.

“완성 하다
“round something ↔ off/out: to finish an activity or complete
something in a good or suitable way; to make an experience
more through or complete; finish; to do something as a way of
ending an event, performance, etc in a suitable or satisfactory
way
 She rounded off the tour with a
concert at Carnegie Hall.
 African percussion and Native
American flute rounded out the
show.
 You can round off the evening
with a visit to the nightclub.
 She rounded off the meal with
some cheese.
 It was a perfect way to round
off the season.
 Prices are rounded off to the
nearest dollar.
 …, and additional advanced
courses to round out the
curriculum.

그 자체 로, 그 자체 가
 But, just as importantly, a
formal semantics is seen to be a
valuable reasoning tool in its
own right.
 While these distinction are easy
to understand in their own
right, it is important to
recognize that …
 In particular, since the n-th
extension Sn of S is a source in
its own right, we may apply
the Noiseless Coding Theorem to
Sn, to get …

at the same time: 동시에


 The main requirements were to
keep the changes required to a
minimum and at the same
time minimise the
computational overhead at the
user’s end. 최소화하다; 이용자
측의, 이용자 쪽의
 PKC alleviates some of the
problems of symmetric key
systems, but at the same time
creates some new ones of its
own. 그 자신의
 … At the same time, the
project course experience is very
likely to come toward the end of
a student’s undergraduate
program.

~에 따라
 The expenses you claim can
vary enormously, depending
on travel distances involved.
 … This additional work can and
should vary based on
institutional mission, the areas
of concentration offered by a
given institution, and individual
student choice.

“remain, “남은 과제 , 남은 일, 추후 과제 , 추후 연구 ,
남아 있다 .
 Much remains to be done to
realize the promise of RBAC.
 Where appropriate, we comment
how the new extensions apply to
these logics; further such
examination remains to be
done.
 Several points remain to be
settled.
 There remained a few jobs still
to be finished.
 A great many things remain to
be done (= have not yet been
done).
 Major questions remain to be
answered about his work.
 There remained one significant
problem.
 The wider problem remains.
it remains to be seen: it will only be known later; it is not yet
certain; 불확실, 두고 봐야 안다
 It remains to be seen whether
you are right.
 It remains to be seen who will
win.
 It remains to be seen
whether the operation was
successful.
 It remains to be seen
whether her parliamentary
colleagues will agree.
 It remains possible that bad
weather could tear more holes
in the tanker’s hull.
 The question remains
whether he was fully aware of
the claims.

couch sth in/as sth: to express sth in a


particular way; “표현
 I don’t understand this form –
it’s all couched in legal
terminology.
 The offer was couched in legal
jargon.
 The letter was deliberately
couched in very vague terms.
 The new centre-right
government’s radical objectives
are often couched in moderate
terms.
 Couch your questions in terms
of your audience might use,
such as, “ How do we handle
complex service issues?”

“더 좋은 , 더 나은 , “better
better still (also even better): used to say that a particular
choice would be more satisfactory; 더 좋은 것은, 아예
 Why don’t you give her a call or,
still better, go and see her?
 I started to hunt for a cheap
restaurant or, better still, a
snack shop.
 … Better still, eliminate the
subtitle altogether. Less is more.
 Come for a weekend or, better
still, come for a whole week.

“표현 하다 , “말하 다, 설명 하다 , 다루다


do justice to sb/sth; do sb/sth justice:
- treat or represent sb/sth good, beautifcul etc in a way that is as
good as they deserve
- treat sb/sth in a way that is fair and shows their true qualities
 The photo doesn’t do her
justice.
 The postcard doesn’t do justice
to the wonderful scenery.
 No words can do justice to the
experiece.
 They are after all very simple
situations which hardly do
justice to the complexities of
real life.
articulate: to express your ideas or feelings clearly/coherently in
words
 Many people are unable to
articulate the unhappiness
they feel.
 I was feeling emotions that I
found difficult to articulate.
 I found myself unable to
articulate my feelings.
 Many people are opposed to the
new law, but have had no
opportunity to articulate their
opposition.
 She struggled to articulate her
thoughts.
 It is the school’s duty to
articulate its practices to
parents.
 The president has been accused
of failing to articulate an
overall vision in foreign affairs.
 Each individual strategy
articulated in section 7.6 seeks
to accomplish much more that
what we describe here.

be/fall prey/victim to sth “희생 , “제물


 Police fear that more pensioners
could fall prey to the thieves.
 Many small birds and rodents
fall prey to the domestic cat.
 Street children in this part of the
world often fall prey to drug
dealers.
 They are prey to nameless
fears.
 Breastfed babies are less likely
to fall victim to stomach
disorders.
 Young men are more likely to
fall victim to violence.
 What’s worse, they fall prey to
the presentation-as-document
syndrome.
 In 1948, Gandhi fell victim to a
member of a Hindu gang.
 The company has fallen victim
to increased competition.

“serve the needs/interests of sb/sth: 요구 에 부


응하 다, 요구 를 충족 /만족 시키다
 research projects that serve the
needs of industry
 Everything you say and do in
your presentation must serve
the needs of your audience.
 The new plan serves our
needs perfectly.
 Both serves the same purpose.

home in on sth: “목표 , “대상


1 to aim at sth and move straight towards it
 The missile homed in on the
target.
 a shark homing in on its victim
2 to direct your thoughts/attention/efforts to sth/sb
 I began to feel I was really
homing in on the answer.
 The investigation homed in on
the town of Carlton
 He homed in on the one weak
link in the argument
 The report homed in on the
weakness in the management
structure.

“light: “조명 , “부각


cast/shed/throw light on something: to provide new informa-
tion that makes a difficult subject or problem easier to understand
조명하다, 부각시키다, 알리다
 Melanie was able to shed some
light on the situation.
 These discoveries may throw
new light on the origins of the
universe.
 As an economist, he was able to
shed some light on the
problem.
 Recent research has thrown
new light on the causes of the
diseases.
 A new approach offers an
answer, and may shed light on
an even bigger question.
 Its proof resembles quite closely
that of Lemma 7.2, but first an
example to shed some light
on its proof
bring to light; be brought to light, come to light: to make
new information to people; known become known
 This evidence did not come to
light until after the trial.
 The mistake was only brought
to light some years later.
 Fresh evidence has recently
come to light which suggests
that he didn’t in fact commit the
murder.
 These facts have only just been
brought to light.
 This process may bring to light
interesting facts that might
otherwise have remained
hidden.

“가끔 , “occasion
on occasion(s): sometimes but not often; occasionally
 On occasion prisoners were
allowed visits from their families.
 He has, on occasion, made a
small mistake.
 He has been known on
occasion to lose his temper.
 He translated not only from the
French but also, on occasion,
from the Polish.
 As we have emphasized on
several occasions in this
report, … 몇 번에 걸쳐, 수차 (數
次), several times

“정도 , “degree, “extent


 Denial of service, unlike
authentication, is a
matter/question of degree. 정
도의 문제
 “That’s really bad”. “Well, it’s all
a matter/question of degree
(= there are other things better
and other things worse).”
 The first change is a matter of
degree, the second is a
fundamental shift.
 There were some degree of
truth in what she said.
 The number of terrorist attacks
has increased to a terrifying
degree.
 I have to warn you that there is
a degree of (= some) danger
involved in this.
 There isn’t the slightest
degree of doubt that he’s
innocent. 의심의 여지가 없다, 의문
의 여지
 This job demands a high
degree of skill.
 To what degree can parents be
held responsible for a child’s
behaviour?
 Most pop music is influenced, to
a greater or lesser degree,
by the blues.
 Generally, the programs of the
president and the proposals of
the governor appear to differ in
degree and emphasis rather
than ideology. 정도의 차이
 However, there will be
differences in the extent to
which their honesty has to be
trusted. 정도의 차이가 있다
 Thus, every command must be
checked individually to establish
whether and to what extent it
takes “assume” properties into
account. 얼마만큼, 어디까지
partly / to a degree / to some degree / to a certain
degree/extent: 부분적으로, 어느 정도
 Some built-in functions are
actually implemented, wholly
or in part, outside of the
kernel!
 The deadline for applications is
being extended, in part
because of the postal strike.
 His reluctance to help could, in
part, be explained by his poor
eyesight.
 Her success was due in part to
luck.
 In part this attitude was due to
fear of trade union and
employee reactions.
 To some extent, the tension
between the government and
encryption systems is easing in
this arena.
 To some extent, these
shortcomings are addressed
through datacom services
available from GSM operators.
 To some degree I think that’s
right, but there are other factors
which affect the situation.
 To a degree, it is possible to
educate oneself.
 I agree with you to a certain
degree.
 I met a number of sportsman
who had achieved a measure
of success (= some success).
to a considerable extent: 상당히, 상당한 정도로
(※ to a great/large extent)
 To a considerable extent, the
same is true for computer
networking hardware.
 To a considerable extent,
Aristotle's testimony lets one
subtract Plato from his own
dialogues and see the Socratic
remainder.
 To a considerable extent his
procedure is in accord with this
declaration of intent.
 We see that the efficiency of an
algorithm is to a considerable
extent much more important
than the technology used to
execute it.
 Obviously, then, the classic view
of enthusiasm has to a
considerable extent been
determined by the negative
connotations attached to the
word.
 all this was to a considerable
extent borrowed from
Buddhism)
 these movements were to a
considerable extent instigated
by Russia.
 This particularly applies to those
which we can take to have been
written in Plato's earlier years,
but it is also true, to a
considerable extent, of a
notably powerful later dialogue,
the Theaetetus.
 Effects due to general relativity
other than those just described
have been studied to a
considerable extent, but it is
hard at present to test
theoretical results
experimentally, and there are
some doubts about the limit of
its applicability.
 The committee discussed this
specific issue to a
considerable extent and found
a middle ground between these
two extremes -- that information
technology is one important
industry among others, and that
the health and well-being of that
industry are important to the
nation.
 The 1988 versions of the X.400
series of recommendations
support a variety of security
services, based to a
considerable extent on the
use of digital signatures and
public key cryptosystems; see,
for example, [Mitchell89b].

futile: “허사 , “헛수고


 All efforts to save the child
proved futile (= ended without
being successful).
 My efforts to go back to sleep
proved futile.
 Until attitudes at work are
changed, attempts to improved
performance are likely to
prove futile.
 Experimenting with other output
format wrappers proves to be
futile; the way out of this
dilemma is to define …
 The goal is not to punish the
rebels, but to convince them
that it is futile to resist.
 It was futile to continue the
negotiations.
 It would be futile to sustain
his life when there is no chance
of any improvement.
 It’s quite futile trying to
reason with him – he just won’t
listen
 He brought his arm up in a
futile attempt to ward off the
blow.

“trade-off, tradeoff
 Of course, result caching is a
tradeoff of memory (sth bad)
for time (sth good).
 For some car buyers, lack of
space is an acceptable trade-
off for a sporty design.
 Inflation is often a trade-off for
healthy economic growth.
 There is a trade-off between
the benefits of the drug and the
risk of side effects.
 There is a trade-off between
doing the job accurately and
doing it quickly.
 There has to be a trade-off
between quality and quantity if
we want to keep prices low.
 She said that she’d had to make
a trade-off between her job
and her family.

to/for all intents and purposes: 사실 상; 실제로


는; 아무 리 봐도 ; 어떻 게 봐도 ; 어느 모로 보나
in all the most important ways; used to say that a situation is not
exactly as you describe it, but the effect is the same as if it were;
in the effects that sth has, if not in reality; almost completely;
 Using the old definition of “fib”,
this computation would, for all
intents and purposes, never
finish.
 The war was, to all intents and
purposes, over.
 For all intents and purposes, the
project is completed.
 The two items are, to all
intents and purposes,
identical.
 To all intents and purposes he
was my father.

a fly in the ointment: the only thing that


spoils something and prevents it from being
successful; “흠, 결함 , 옥에 티
 I’m looking forward to Sunday,
the only fly in the ointment
being the fact that I shall have
to sit next to my mother-in-law.

 The only fly in the ointment was
Jacky.
 Another possible fly in the
ointment arises in the case of
missing options – options are,
after all, optional!

“posit: suggest or assume sth as the basis for


an argument or calculation; postulate; 가정하

 If we posit that wage rises
cause inflation, it follows that we
should try to minimize them.
 He posited that each planet
moved in a perfect circle.
 Most religions posit the
existence of life after death.
 Several writers posited the idea
of a universal consciousness.
 Callahan goes further, positing
that chemical elements radiate
electromagnetic signals.
 Who was the first scientist to
posit that the Earth revolves
around the Sun?

“Contend with: to have to deal with a difficult


or unpleasant situation; “씨름 하다 , 다루다
 Nurses often have to contend
with violent or drunken
patients.
 The rescue team also had bad
weather conditions to contend
with.
 At the age of nine, he had the
death of both parents to
contend with.
 We don’t need a computer
failure to contend with as well
as all our other problems.
 However, even if we can assume
our protocols to be running in
isolation we must still contend
with the applications that make
use of the authenticated keys
that were established using the
protocol in question

“진실 성, 진위
 Doubts were cast on the
veracity of her alibi after three
people claimed to have seen her
at the scene of the robbery. (=
truthfulness)
 Has anyone checked the
veracity of these allegations?
 Some people questioned the
veracity of her story.
 They questioned the veracity
of our claims.
 We have total confidence in
the veracity of our research.
 He was shocked to find his
veracity questioned.
 A report of doubtful veracity

early on: at an early stage/point of a


situation, relationship, period of time, etc.; 일
찍이 , 진작 , 진즉 , 일찌감 치
 I knew quite early on that I
wanted to marry her.
 Early on, he found that being
honest and being funny were
almost the same thing.
 The wheel was discovered very
early on in human history.
 Mr. Wood decided pretty early
on that he was not right for the
job.

결함
 Her hearing was found to be
slightly defective.
 There are several ways in which
defective user input could be
handled. One way is to check…

“곤경 /어려 움에 “처 하다 , “빠지 다


 fall on hard times: if you have
fallen on hard times, you have
lost all your money and are
starting to have a difficult life. 곤
경에 처하다
 In the 1960s, IBM’s competitors,
the so-called “Seven Dwarfs”–
GE, RCA, Univac, Honeywell,
Burroughs, Control Data, and
NCR–fell on hard times.
 The scheme is designed to help
children whose parents have
fallen on hard times.
be/become mired (down) in something: to be involved in a
difficult situation, especially for a long period of time
 The peace talks are mired in
bureaucracy.
 The country was mired in
recession.
 His reasons for leaving are
mired in confusion.
 A government mired in scandal
and controversy
 We have kept the discussion
informal to avoid becoming
mired in the technical details of
formal logic.

at risk (from/of something): in a situation in


which something unpleasant or dangerous
could happen to you (“위험 , “risk)
 As with all diseases, certain
groups will be more at risk than
others.
 Reporters going to war zones do
so at greater risk to
themselves.
 Some plants are more at risk of
frost than others.
 Low-lying farmland may be at
risk from flooding this
weekend.
 The officers said innocent
people’s lives had been put at
risk.
 These measures will put many
small businesses at risk.

“처음 에는
 The deployment of xDSL
technology was not a smooth
one in the beginning due to its
severe limitations on distance.
 Assumptions which appear
intuitively necessary at the
outset, but are not found to
be required anywhere in the
formal proofs, should be
carefully reexamined. 아닌 것으
로 밝혀지는
 In earlier times, an
organization would use a single
subnet mask through an entire
network. 초창기에는
 At first (= in the beginning
before something changes) he
wouldn’t even talk about it.
 At first it is hard to see how this
procedure can be used to
calculate anything, but our
discussion of the lambda
calculus should help explain
how this works. 도움이 된다, 유익
 At first, he seemed surprised
by my questions.
 I had some difficulty at first
recalling why we were there.

“알 수 있다 , 알 수 있듯이 , 보는 것처 럼; “see
 So, with this single example, we
see that a is not a
homomorphism. ~의 경우에, ~임
을 알 수 있다, 볼 수 있다.
 We see here that the first
permutation is 123 and that we
obtain … ~을 보게 된다. 볼 수 있
다, 알게 된다, 알 수 있다.
 The global scope resolution
operator also does its stuff
within the inner block, as you
can see from the output
generated by the statement we
have added there. 제 역할을 한다,
에서 볼 수 있는 것처럼, 볼 수 있듯
이, 알 수 있듯이
 As we can see by the result of
Inverses, R is not a field. ~으로부
터 알 수 있듯이, 볼 수 있듯이
 As one sees from this
example, “Switch[ ]” returns
the entire Switch expression
unevaluated if the expression
fails to match any of the forms,
so it is a good idea to include a
final pair whose form is _, with
some neutral value, e.g., Null. 이
예로부터 알 수 있듯이, 볼 수 있듯이,
보다시피, 설명
 As you may have observed
by now, the characteristic
polynomial …
처음 예상과는 달리
 The solution to the problem
proved to be easier than first
anticipated.
 Contrary to [far from] our
expectations, we could not
raise the necessary funds.

사태 진행 “속도
 New and promising technologies
are introduced at a dizzying
pace.
 This field, moreover, continues
to evolve at an astonishing
pace. New technologies are
introduced continually, and
existing ones becomes obsolete
almost as soon as they appear.
by / in leaps and bounds (= very quickly/rapidly; in large
amounts): 매우 빨리, 매우 빠른 속도로
 Her Spanish has come on (=
improved) in leaps and
bounds this year.
 Julie’s reading is improving in
leaps and bounds.
 Lifeboat technology has
advanced by leaps and
bounds.
 The total number of species on
the planet appears to be
growing by leaps and bounds.

“전제 , ~를 전제 로 하고서
 … It presupposes that the
Supplicant can reliably
determine …
 Giving special attention to the
weaker students presupposes
that the others are willing to
work without much support.
 Teachers sometimes
presuppose (= to presume; to
take for granted in advance; to
assume beforehand) a fairly high
level of knowledge by the
students. 가정하다
 His argument presupposes (=
to require as a condition) that it
does not matter who is in power.

“악화 시키다
 The problems were
compounded by severe food
shortages.
 Her terror was compounded
by the feeling that she was
being watched.
 His financial problems were
compounded when he
unexpectedly lost his job.
 To compound matters, …
 Severe drought has further
compounded the food
shortages in the region.
 Further financial reverses
compounded his despair.

keep/stay/steer clear (of): “피하 다


to try to avoid sb or sth unpleasant or difficult;
to avoid a person or thing because it may cause problems
 Paul’s in a bad mood, so I’d
steer well clear if I were you.
 Make sure you steer clear of
(= control the direction taken so
that you do not hit) the rocks.
 (figurative) They warned their
children to steer clear of (=
keep away from) drugs.
 (figurative) Her speech steered
clear of (= avoided)
controversial issues.
 Steer clear of the centre of
town at this time of the evening.
 We will steer clear of any
discussion of the mathematics
behind cryptography and
instead concentrate on its uses.
 I would steer clear of the fish
stew; it’s not very good!

“in place: working or ready to work


 All the arrangements are now in
place for their visit.
 How long has the import ban
been in place?
 All the arrangements are now in
place for their visit. * How long
has the import ban been in
place?
 Once this service agreement is
in place, the user can connect
to the Internet via her SP.

“쭉, “내내
 Implementing a customer-
installed VPN solution provides
security all the way from the
M-ES to the F-ES.
 Prices vary all the way from $5
to $50.

몇 “배
 Modify the AspectRatio of the
above plot by making the height
two times the width. 두 배
 For several years Internet traffic
has been increasing by 8
times every year. ~ 배 증가
 A multiply is slower than a shift-
left by at least a factor of 3. 최
소한 세 배 이상 느리다
 IPv6 addresses are four times
as big (16 bytes versus 4 bytes)
as IPv4 addresses.
order of magnitude:
10 배, 100 배, 10n 배 더 크다.
the difference in size, usually expressed in powers of 10, between
two quantities. If a quantity were 10 times greater than another,
it would be an order of magnitude greater; if 100 times greater, it
would be two orders of magnitude greater.
 The mass of the Earth is an
order of magnitude greater
than that of Mars.
 The masses of Earth and the sun
differ by five orders of
magnitude.
 Capacity of links in ISP networks
are typically a few orders of
magnitudes higher than those in
enterprise networks.
 Earth's mass is of the order of
magnitude of 1022 tons; that of
the sun is 1027 tons.

“증가 , “증대 , “늘리 다


 The police are stepping up
their efforts to fight crime.
(step up sth or step sth up: to
increase the amount of an
activity or the speed of a
process in order to improve a
situation)
 Following the bomb explosion,
security has been stepped up
at the airport.
 Stepped-up security at airports
 Step up the number of
iterations to 20.
 The health department is
stepping up efforts to reduce
teenage smoking.
 He has stepped up his training
to prepare for the race.
 The teaching unions are
stepping up industrial action in
support of their pay claim.
 Security is stepped up to deal
with the increase in violence.
 There are reports of stepped-
up fighting in El Salvador.
 The president has stepped up
the pressure on the groups to
come to an agreement.
 Incidents of armed robbery
have increased over the last
few years.
 Crime is on the increase.
 … this is a problem that is fast
on the increase.
 Efficiency and productivity are
increasing.
 The population continues to
increase.
 We are experiencing an
increasing number of
problems.
 The cost of the project has
increased
dramatically/greatly/substan
tially since it began.
 Mobile networks carry more
traffic than ever before (이전보
다), with data traffic increasing
at a rapid rate.
 Increased/increasing efforts
are being made to end the
dispute.
 According to Meridien Research,
identity theft is growing at an
alarming rate.
 With the growth of the
Internet and digital data
transmission, many applications
need to securely transmit data
to remote applications and
computers. SSL was designed to
solve this problem in an open
standard. ~가 증가함에 따라, 증가
에 따라, 증가하면서, 늘어남에 따라,
늘어나면서
 With the rapidly growing
number of service providers,
most of which are new on the
market and, thus, unknown to
the users, this assumption is not
justified anymore. 급속히 증가함
에 따라
 While technologies are evolving
to tackle unintentional
disruptions of data networks,
intentional disruptions caused
by attackers are on the rise.
gain (in) sth: to gradually get more of a particular quality (OPP:
lose)
 to gain in confidence
 His books gained in popularity
in recent years.
 This area is gaining in
importance because of several
reasons, one of them being the
advances in …
 With the emerging need for
ubiquitous access to
information, web access from
mobile clients is gaining
increasing importance.

“위해 , “위하 여, “위하는 , “interest


 Therefore, it is in your
(best/own) interest(s) to make
your public key as available as
possible.
 It’s in his interest to keep in
touch with a business contact.
 I’m only acting in your best
interest (= doing what is best
for you).
 The president doesn’t believe
the plan is in the best
interests of the company.
 In the interest(s) of (= in
order to achieve) safety,
smoking is forbidden.
 …a call for all businessmen to
work together in the interests
of national stability.
 in the interests of accuracy 정
확을 기하기 위해
 in the interest of time 시간상,
시간의 형편상
 In the interest of promoting
peace among the warring
factions, the CC2001 task force
has chosen not to recommend
any single approach.

거리 가 멀다 , 모자라 다, 기준 미달 , “short of
If something falls short of expectations or hopes, it fails to reach
a desired amount or standard and is disappointing.
 They aspired to be gentlemen,
though they fell far short of
the ideal.
 The hotel fell far short of their
expectations.
 August car sales fell short of
the industry’s expectations.
 This essay falls considerably
short of your usual standard.
 So what happens if the Socialists
top the poll but fall short of an
absolute majority?
 While this definitional approach
is intuitively appealing the
actual KE security definition of
[2] comes short of the
expectations.

“막다 , “금지 하다 “방 지하다 , “stop, “keep,


“prevent
stop/keep/prevent somebody (from) –ing: 세 동사 모두 from을
생략할 수 있다는 것에 주목!
 You can’t stop me (from) doing
what I want.
 A broken leg won’t stop me
from going.
 How do you stop a tap dripping.
 Did any of them try to stop you
coming?
 They’ve put barriers up to stop
people (from) getting through.
 Some people smoke because
they think it stops them (from)
putting on weight.
 The only thing that stops me
(from) travelling more is
money.
 In order to keep computer A
from responding to any of B’s
transmissions…
 These worries kept her from
sleeping properly.
 The troops fire to keep the
situation from escalating.
 Embarrassment has kept me
from doing all sorts of things.
 He kept her from being lonely.
 What can you do to keep it
from happening again?
 The police have been trying to
prevent them carrying
weapons.
 He is prevented by law from
holing a license.
 Nothing would prevent him
from speaking out against
injustice.
 Nothing would prevent
him/his speaking out against
injustice.
 Nothing in C, however,
prevents any ASCII character,
other than the null delimiter,
from being used in a string. 할
수 있다
 There is nothing to prevent
anyone changing the data stored
on the magnetic stripe.
 Are you trying to prevent me
speaking?

just about, “거의


(informal) 1. almost; very nearly 2. approximately; “약
 This job is just about done.
 I’ve met just about everyone.
 “Did you reach your sales
target?” “Just about.”
 I received a message from Dr
Kim.
He told me to ask you if ISRC
can give Korea Telecom some
cut-down in the Project Budget.
They are having many
difficulties from the IMF
situation. Actually, they have
cut down on (삭감) the research
budgets for the most of the KT
projects being executed in the
universities in Korea. You know,
the budget for Prof. Moon's
project was 60 million Won, but
now, it's just about 20 million
won. (약, 거의; almost, very
nearly)

“앞, “앞에 서, “앞의


the “foregoing (something):
= something that has just been mentioned, read, dealt with, de-
scribed etc.;
= the above;
= to refer to what has just been stated or mentioned;
= preceding;
 the foregoing
analysis/discussion/example
 The foregoing paragraphs
were written in 1985.
 The foregoing account was
written fifty years after the
incident.
 The foregoing examples
illustrate this point.
 the foregoing is a description
of the proposed plan.
 You might think from the
foregoing that the French want
to phase accents out. Not at all.
 In the foregoing we have seen
how people differ in their
approach to problems.
 The foregoing helps to explain
these results.
 I can testify to the foregoing
since I was actually present
when it happened.
 From the foregoing, it may be
seen that things could not be
other than they are, and …
“earlier
 Earlier, we discussed the
intuitive meaning of the region
of convergence (or region of
existence) of the Laplace
transform F(s).
 There are many perspectives
from which to view the SM
function. Earlier, we presented
a threephase action cycle.
 Earlier, we noted that our work
on Isis was adopted by the Navy
for use in its AEGIS architecture.
 Earlier, we detailed a scenario
for looking up the address of
CNN.com while ignoring the
implications of caching.
 Earlier we explained that when
A wanted to send an IP packet, it
would broadcast an ARP request
and wait for an ARP reply. If A
did this every time it needed to
send IP traffic, why not just
broadcast the data packet and
forego the ARP mechanism?
 Earlier, we outlined potential
functionalities for a number of
devices.
 Earlier we talked about how
easy it is to install and set up.
Now we’re talking about its
complexity. Can you clarify what
you mean?

“이슈 , 이슈거 리
 Does the OS for a firewall make
a difference? As far as security is
concerned, it’s becoming less
of an issue. 별 이슈가 아니다. 문
젯거리가 아니다.
 This becomes more of an
issue as m-commerce and
banking applications use the
GPRS network. 이슈가 되고 있다

“each
 Each network card connects to
the computer through a different
port, isolating it from the other.
 A computer dating service wants
match each of four women with
one of six men. 여자 하나에 남자
하나 씩
 At the end of a correct run of the
protocol, each principal should
be in possession of the secret
key Kab newly generated by the
server S and believe that the
other has the key. That is what
the protocol is intended to
achieve.

“서로 서로 , “another
 Both entities need to
authenticate one another.
 For public-key cryptosystems,
the public key and the private
key in a key pair are inverses of
one another.
 VirusNet members kept in touch
with one another by telephone
and through network gateways
the worm did not shut down.

“가져 오다 , “야기 하다 , “일으 키다


“bring, “rise, “cause
 … This brought up the
question of the exact function
of the server which until that
time had not been questioned.
(bring up; brings up)
 This brings up an interesting
idea: users can modify their
client’s cookies, and the server
has no way of detecting this.
One suggestion is for the server
to set …
 The arrival of commercial Web-
based datasets has brought
new problems.
 Thus, it is not surprising that
analysis of one should
occasionally help bring to light
some features of the other. 알리
다, 조명하다, 부각시키다
 A would-be attacker may
attempt to infiltrate a well
known site with the hope that a
successful attack will bring with
it some level of notoriety. 침입,
잠입
 Services that can give rise to
re-authentication include Web,
Mail (IMAP/POP etc), and PC-to-
Unix telnet and X connections.
cause a change of: “변화, “바꾸다
 Only b’s cause a change of
state.
 Obviously, in this case, it is not
worth the expense of obtaining
satellite reports, because it is so
unlikely that they will cause a
change of plan.
 In summary, we can say that
information has value to the
extent that it is likely to cause a
change of plan, and to the
extent that the new plan will be
significantly better than the old
plan.
 In cases such as the conversions
between integral and real
numeric types casts will cause a
change of representation to
occur.
 Note that this may also cause a
change of the returned list,
which may now have
polynomials over
 Intuitively, a PDA scans the input
tape symbol by symbol from left
to right, making moves that
cause a change of state, an
update to the stack (but only at
the top), and either advancing
the reading head to the next
symbol, or not moving the
reading head during an -move.
 The events that cause a
change of state are called
transactions in database terms.
 Any modification to it will cause
a change of the hash value.
 Event is an action targeted
toward an object or system with
the intention to cause a
change of state (status) of the
target. Evidence is made up of
the available facts which support
a belief or proposition.
 Note that an internal transition
does not cause a change of
state and so never invokes entry
or exit actions.
 In marginal situations this might
cause a change of the
optimum subset. However, by
iterating the process as required,
the ADP security planner will
finally reach the point where he
can recommend a given group of
remedial measures with
considerable confidence.

~ (방침 , 정책 , 결정 , 원칙 )에 따라 서/준해서 /부합 하여


 Following the variable
definitions, the value of count1
is output to produce the first of
the lines shown above. ~에 따라

 In the remainder of this section
we assume that our codes are
binary n-tuples for some fixed n,
and that n can be chosen to be
consistent with the constraints
of a computer design. ~의 제약/
조건 등에 따라서, ~와 일치하도록,
~에 부합하도록
 Pursuant to (= in accordance
with / following) the ETSI IPR
Policy, no investigation,
including IPR searches, has been
carried out by ETSI. ~ (방침, 정책,
결정, 원칙)에 따라서
 The keys can be changed as
frequently as desired in line
with key-management policies.
에 따라서
in accordance with a rule/law/wish/etc: “일치
= according to a rule, system or the way that somebody says that
something should be done;
= following or obeying
 Three different levels of difficulty
of problems were used, and the
results were in accordance
with the Yerkes-Dodson law. 들
어 맞는다
 Article 47 may only be used in
accordance with international
law.
 Use this product only in
accordance with the
manufacturer’s instructions.
 in accordance with legal
requirements
 In accordance with her wishes,
she was buried in France.
 We acted in accordance with
my parent’s wishes.

“따라 서, 고로 ; 그 결과
 The use of a format other than a
smart card would mean that a
UIM could not serve as a multi-
functional card and would
thereby lose many market
opportunities.
 This has the effect of reducing
the value of individual
payments, thereby reducing
both the likelihood of fraud and
the loss incurred due to fraud.
“귀결 , “귀착 , ~하게 된다 , “결과
“end up –ing, end up with, “result in
 After we had finished the
calculation, the variable x
ended up having the value 4.
 Intruder ends up knowing the
key.
 It is entirely conceivable that if
we eliminated the states in a
different order, we could end
up with a different-looking
regular expression.
 Several works attempt to
support low-value payments, by
avoiding the use of public-key
cryptographic operations. The
assumption is that these
operations, which are
computationally intensive,
result in significant cost and
delay.
“come down to (= to be able to be explained by a single import-
ant point)
if a problem, decision, or question comes down to a particular
thing, that thing is the most important factor involved.
 Eventually our choice of hotel
will come down to (= be
decided by ) how much we can
afford.
 It all comes down to money in
the end.
 What it all comes down to is
your incredible insecurity.
 What it comes down to is,
either I get more money or I
leave.
 What we come down to is a
picture that looks like this: …
“reduce something to
We can reduce the problem to

two main issues. (= to change
sth to a more general or more
simple form; to make sth
simpler especially by extracting
or summarizing essential
elements)
 This reduces the problem to
showing that …
• An important consequence of this is that
subsequent changes to x or y will change how z
evaluates. 결론, 결과, 영향
“result
• Note that only cryptographically protected mes-
sages, i.e. steps M 2 and M 3 , will contribute dir-
ectly to the logical beliefs that result.
• As a result, there is less of a chance that the
user will forget the ID, commit mistakes, and re-
quire access to the system administrator. 가능성이/
우려가 줄어든다
• … it is only executed as a result of the “if” con-
dition being “TRUE”.
• What results is an FA with one start state and
some or no blue states.
• … This is the result we seek.

한 단계 더
 Taking the analogy one step
further, banknotes have special
features added to them such as
water marks.
 Carrying this argument one
step further, suppose that a
group G is generated by g, and
that the relation g4 = e holds.

…인 것으 로 판명될 것, 밝혀 질 것
 It may turn out to be useful to
pursue this matter further and
see if our framework can be
adapted to take into account
countermeasures such as these.
 This principle may seem to have
nothing in common with what
we have been doing so far, but
it will prove to be helpful
nonetheless. 지금까지, 이제까지

“문제 , “문제 점
 Usually, no such problem
comes up when you use…
 In the normal course of events
(= the way things normally
happen) such problems do not
arise.
“rub: a particular problem or difficulty that makes a situation dif-
ficult or impossible
 You can’t get a job unless you
have experience, but there’s
the rub, you can’t get
experience unless you have a
job.
 That’s where the rub comes.
 There’s/here’s the rub.
 This is the rub.
 That’s the rub: too little time.
 The rub is …

“different, 다르게 , 다르다 , 다른


 However, you should try to get
in the habit of using
arguments whose names are
different than the names of
the parameters, for the reason
explained above. 습관
 … most ISPs will not treat these
datagrams any different than
unmarked datagrams … 다르게
취급
 Note that the group Z is
different in one important
respect: …. 한 가지 중요한 점
에서
 Vectors of different sizes are
never equal. … Vectors of the
same size can be added
componentwise. 서로 같다/다르다
 An attack in [3] shows how an
intruder can get A to accept a
key different from the one
used by B. ~하게 하다/만들다
 The requirements imposed
by such government-driven key
recovery systems are different
from the features sought by
encryption users, and ultimately
impose substantial new risks
and costs.

“놀랄 /놀라 운 일이 아니 다, “당연하 다


 It should come as no
surprise that these arguments
are exactly the same as the
ones for using #define
declarations in C or const
declarations in C++.
 But, considering that so many of
PPTP’s features are tied to
Windows NT and that Microsoft
has tremendous influence in the
PC world, it shouldn’t come as
a surprise that many of the
initial products for PPTP have
followed Microsoft’s feature set.
 It will come as a surprise to
programmers who are used to
other programming languages
that you cannot modify a
parameter of a function inside
the body of the function.
 These results were derived
earlier for the Fourier spectrum
of a periodic signal [Eq. (3.77)]
and should come as no
surprise.
 What is not obvious, however,
and indeed often comes as a
shock to the protocol designer
or user, is that a protocol can be
completely subverted without
impeaching, or even eroding,
the security of the underlying
cryptoalgorithm.

~와 “함 께
 Each character in the alphabet,
along with (= together with) the
number of times it appears in
the message, is placed in a
“pool.”
 Dunne was murdered along
with three RUC men near
Armagh.
 This header has the following
format:
Content-Type:
type/subtype ; parameters
where the “parameters” (along
with the semi-colon) is optional.
 In combination with the
broadcast nature of the system,
this opens the possibility for
unauthorized access and
eavesdropping.
 The system is designed to be
used in conjunction with a
word processing program.
 We will see how to use it in
conjunction with other tools.

처리 되어야 할 일 등이 “남아 있다 , “남았 다, ~만 남


았다
 All that remains to do is to
apply PowerExpand to this
result. 해야 할 일이 남아 있다.
 It merely remains to iron out
(= remove problems or find
solutions) the details of the plan.
 The conflict remains unsettled.
 Major questions remain to be
answered about his work.

“방법 , “방식 , “way, 식으 로


 I find it easier to work (in) this
way (= like this). 이런 식으로, 이
렇게
 Sorry, I didn’t know you felt that
way (= had that feeling or
opinion)
 The drug didn’t seem to affect
Anna in the same way.
 Many industries have been
forced to cut jobs and it looks
like the electronics industry is
going the same way
 The changes will benefit the
company in more ways than
one (= in a number of ways).
 Key recovery encryption systems
work in a variety of ways.
 The model of computation and
semantics herein is motivated
by Abadi and Tuttle’s but differs
from it in fundamental ways.
이 논문에서의; 근본적인 점에서 다르
다, 근본적으로
 One of the ways to do this is
called a public verifiable board,
which means there is …
 The proxy client, however, can
be implemented in several ways,
as described later.
 We now discuss various ways
to realize …
 The proposed scheme can
almost certainly be modified
in many ways.
 When …, then we may find
ourselves examining it further in
the following ways.
 Looking at it another way, if
the data are not variable in
length, then we don’t need the
string data structure to store
them. 다른 방식으로 보면, 다른 각
도에서 보면
 Continuing (on) (in) this way,
… 이런 식으로 계속하면
“둘 중 하나 (either = one of the other of two)
 You can therefore call ListPlot in
either of the following ways:
다음 방법 중에 하나
ListPlot[{y1, y2, y3, …}];
ListPlot[{{x1, y1}, {x2, y2},
{x3, y3}, … }]
 It can do this in either of two
ways. The direct sequence
method … Frequency hopping,
true to its name, … Either
way, an interceptor must
constantly change frequencies
to keep up with the
transmission, almost impossible
unless you know the frequency
changing code.
 The compliment of any simple
closed curve C can be
partitioned into two mutually
exclusive domains I and E in
such a way that I is bounded,
E is unbounded, and C is the
boundary for both I and E.
 The goal is to configure the
router in such a way as to
forward all of the packets
generated by Good Guys but
reject all packets generated by
Bad Guys.

“다음 , “follow, 다음과 같 이, 다음 과 같은 , 아래와 같



 I have prepared a new plan, as
follows. (NOT … as it follows)
 The only means of attack on
Diffie-Hellman of relevance
here would appear to be the
Burmester attack, which we
now discuss. The basic idea
of the Burmester attack (in the
context of the scheme
presented here) is as follows.
 In the chapters to follow, we
shall assume that you have
copied a complete set of book
files to your hard disk in the
directory c:\Maple\Book\, using
exactly the same directory
structure.
 You can therefore call ListPlot in
either of the following ways:
다음 방법 중에 하나
ListPlot[{y1, y2, y3, …}];
ListPlot[{{x1, y1}, {x2, y2},
{x3, y3}, … }]
 For example, we can reduce …
in the following fashion: … 다
음과 같은 방법으로
 The computer and user
authentication behavior for a
Windows XP wireless client is
the following:
 The central notion of this section
is the following: a group can
be specified completely by
specifying relations on a set of
generators of this group.
 The final list of attributes to be
assessed in the questionnaire
includes these three skills as
well as the eight distinct course
objectives identified by the
team. It reads as follows:
1. …
2. …
 We might design a machine like
the one below:

as opposed to: ~과 “반 대로 , “대조 적으로


[“opposed]
 Keys are 80 bits in length, as
opposed to DES’s 56 bits.
 Be careful to note the spelling of
“gray” as opposed to “grey.”
 Key freshness: A key is fresh if it
can be guaranteed to be new,
as opposed to an old key being
reused through actions of either
an adversary or authorized
party.
 As opposed to the methods
using hardware or software
tamperproofing to achieve this,
here the constraint is that the
third party T will be unable to
help in the decryption without it.

“관점 , “견해 , “입장 , “견지 , “태도


 From this starting point,
Business takes the view that it
is necessary to develop key
management solutions that
accommodate both its own and
Administrations’ key recovery
requirements.
 There is a
prevailing/widespread view
that the convicted man are
innocent.
 Some people hold/take the
view that children should not
be smacked.
 She holds strong views about
how children should be taught.
 These measures have been
taken with a view to (=with
the aim of) increasing the
company’s profits.
 Many authors on Web security
have espoused (= supported)
the point of view that Web
servers should be started on
nonstandard ports to reduce the
risk of damage in case of a
server compromise.
 From a protocol point of view,
pay-now and pay-later systems
belong to the same class. 같은 종
류에 속한다
 Let’s turn the whole idea around
and look at it from another
angle.
 Looking at it another way, if
the data are not variable in
length, then we don’t need the
string data structure to store
them.
 From a performance
standpoint, we identified the
causes of packet delay and
packet loss in the Internet.
 Let's look at this from the
standpoint of the voters.
 This chapter adopts the
stance that the server can and
must be protected against
malicious attacks.
 Third, by serving as a common
semantics, it allows us to view
the extensions from a single
perspective. 한 관점에서
 If we view wireless technology
in this context, the approach
shifts from trying to encrypt the
radio transmissions to creating
secure end-to-end connections
between stations. 이런 점에서 보

“무관 , 관계 없이 , 상관 없이 , 무조건 , “matter


 No matter how we restore the
brackets, the resulting formula is
determined uniquely up to
equivalence. 어떻게 하든지, 어떻게
하더라도
 I make a conjecture that my
pattern is genuine, that is, that it
will continue no matter how far
the table is extended.
 They don’t last long no matter
how careful you are.
 Call me when you get there, no
matter what the time is
 He visited her every day no
matter the weather.
 No matter what your age,
you can lose weight by following
this program.
 Regardless of whether an EAP
packet is encapsulated or not, it
is the Accept or Reject indication
that signals to the Authenticator
whether the Controlled Port is
authorized or unauthorized.
 To put it simply, my attitude was
that if the Ian Botham story was
going to go anywhere, my
cricket had to come first no
matter what the cost.
 And since they've both
succeeded in fields where there
are millions of hopefuls, any
success, no matter how huge,
is handled quite nervously, as if
it could turn out to be a flash in
the pan.
 Environmental issues are not
simply scientific but involve a
whole gamut of disciplines,
perspectives and passions that
will not go away no matter
how conclusive the science.
 And since they've both
succeeded in fields where there
are millions of hopefuls, any
success, no matter how huge,
is handled quite nervously, as if
it could turn out to be a flash in
the pan.
 That way, no matter how
simple the cooking, you know
it's always going to taste nice.

“관련 , “연관 , “관하 여, “관한 , “관계 , “무관


 As to efficiency, local variables
serve to hold values of
computations that may be
required at several points in
some procedure, so that they
only have to be calculated once.
~에 관해서는, 측면에서는
 Rumors abound as to the
reasons for his resignation.
 Though wireless LANs use many
of the same fundamental
principles that wired LANs do,
wireless LANs need a lot more
attention when it comes to
their deployment. ~에 있어서는,
~할 때는
 This is not to say that everyone
in business feels equally at
home when it comes to
interpreting numbers ~함에 있어
서, ~에 관해
“connections with: 연관성, 관련성
 The subject has obvious
connections with engineering
practice, and, as in many
sciences, it also has purely
philosophical aspects.
 Although the theory of
symmetric functions and its
connections with
combinatorics is in my opinion
one of the most beautiful topics
in all of mathematics, it is a
difficult subject for beginners to
learn.
 Some good references for
noncommutative series in
general and their connections
with languages and automata
are [16] [43] [55] [61] [62] [63]
[68].
 Much of the importance of Schur
functions arises from their
connections with such
branches of mathematics as
representation theory and
algebraic geometry.
 This field has various
applications (timetabling and
scheduling problems, planning of
experiments, multi-user source
coding .... ) and offers rich
connections with other
combinatorial areas:
probabilistic methods, Extremal
Set Theory, Ramsey Theory,
Discrepancy Theory, etc.
 For details and connections
with the Erdos-Stone density
theorem and Turfin's Problem,
the reader is referred to
chapters 23 and 24.
 The subject has been revitalized
by connections with coding
theory, to be discussed in
section 5.
 New concepts of completion
appeared, and some
surprising connections with
categoricity were established
(SARACINO [1973]).
 Since the days of Post, degree
theory has turned out to have a
number of connections with
other parts of mathematical
logic.
 A fair number of papers dealing
with a-recursion theory only
peripherally or with its
connections with other
subjects have also been listed
but not summarized.
 For the more intimate
connections with admissible
ordinals see CENZER [1974].
 Before we proceed to develop
further the theory of functional
induction, we will consider in this
and the next section some
interesting examples and we will
establish connections with
some classical aspects of
recursion theory.
 The matrix-vector product is a
very natural computation. We
have motivated it by its
connections with systems of
equations, but here is a another
example.
 However, the definition
(Definition MM [210]) is
frequently the most useful for
its connections with deeper
ideas like the null space and the
upcoming column space.
 It will have some natural
connections with the null
space of a matrix, so we will
keep the same notation, and if
you think about your objects,
then there should be little
confusion.
 The proof of this very substantial
theorem exploits some
beautiful connections with
admissible set theory (Sacks
[1971]).
 This theory is called E-recursion
theory; it has close
connections with Godel’s
notion of constructibility.
 For expository convenience we
will break slightly with
chronological order, describing
first the work of Scott, Ershov
and others on purely
mathematical characterizations
of these type structures, and
then returning in Section 4.2.4 to
consider the connections
with languages such as PCF,
starting again with 54 JOHN R.
LONGLEY the work of Scott in
1969.
 There are many works in the
area of relevance logic (see [1,
11] and the collection of papers
in [17]) which seem, at first
glance, to have connections with
our work.
 Here it may be worth mentioning
the potential connections with H.
Kamp's Discourse
Representation Theory 83] and
with K. Fine's [40] account of
Reasoning with Arbitrary
Objects.
 This problem has intimate
connections with fields such
as integral geometry.
 Applications in experimental and
theoretical computer science
have emerged, along with
connections with the theory of
cryptographic communication.
 Mullen [150] discusses a
number of remarkable
connections with various
combinatorial objects see also
[2]
In respect of / With respect to / As respects = in connection
with / as regards / with regard to / in regard to / as regards /
concerning / with reference to / in reference to
(used esp. to introduce a new subject or one that has been earli-
er)
 I am writing to you with
respect/regard to your letter
of 15 June.
 I have nothing more to say in
respect of this.
 In respect of roads and
buildings, the town was much
improved.
 with respect to your problem
~와 관련하여.
 With respect to these letters, I
think the best thing is to burn
them.
 With respect to your other
proposals, I am not yet able to
tell you our decision.
 An implicit assumption in the
evaluation process is that the
system is designed so that the
set of all expression is partially
ordered with respect to
evaluation, or equivalently,
that there are no cyclic
dependencies in the evaluation
process. It is all too easy to
construct an example for which
this assumption is violated
matters that respects our trade
우리 나라의 무역과 유관한/관련된/관
련 있는 사항들
 He will be paid $100 in respect
of (= in payment for) the work
he has done.
 The main points to emerge from
work package 1 in these
respects are as follows. …
 regarding / as regards / with
respect to / in regard to = on
the subject of/in connection
with/concerning/about/relating
to
 Regarding your recent inquiry
….
 The company is being
questioned regarding its
employment policy.
 As regards money, I have
enough.
 He was in a thoroughly sound
condition as regards intellect.
 With regard to your recent
application, I am afraid we are
unable to offer you the job.
 He wants to speak to you in
regard to your financial
situation.
 Single Sign-On is one of the
most talked about topics
relating to access controls in
the distributed environment.
 It also has a range of other
options relating to the way a
workspace is handled.
regard = connection or relation
 The company is owned by its
staff, and in that/this regard it
is rather unusual.
 The union is the largest in the
country and in this/that
regard is best placed to serve
its members.
 … The important players in this
regard are the exponential and
polar forms of a complex
number.
pertain: if one thing pertains to another, it relates, belongs, or
applies to it
 the laws pertaining to (= to be
connected with) adoption
 Those laws no longer pertain.
 The restrictions he imposed
pertained to the type and
height of buildings and the
activities for which they could be
used.
 matters pertaining to naval
district defense
 the destruction and havoc
pertaining to war (= to belong
as an attribute, feature, or
function)
 responsibilities that pertain to
fatherhood (=to belong as a
duty or right)
 the criteria… will be different
from those that pertain
elsewhere (= to be appropriate
to something)
 books pertaining to birds (= to
have reference)
 Any inquiries pertaining to the
granting of planning permission
should be addressed to the
country planning department. (=
to have a connection with;
concern)
involved in
 Faced with a choice of protocols
claiming to be provably secure,
we discussed above some issues
involved in comparing them.
 has a bearing on: if
something has a bearing on a
situation or event, it is relevant
to it.
 Experts generally agree that diet
has an important bearing on
your general health.
 My father’s achievements really
don’t have any bearing on
what I do. 무관
 The frequency of CRL has a
direct bearing on the level of
confidence the user of a
certificate can place in it.
 Recent events had no bearing
on our decision.
 Her comments didn’t have much
bearing on the subject.
surround/surrounding (to be closely connected with a situation
or an event)
둘러싸고 있는
 Uncertainty surrounds the
future of the industry.
 The book was surrounded by
controversy
 publicity surrounding the
divorce
 some of the basic issues
surrounding network security
“associated
 This denotes the key value
associated with key symbol K.
This allows, for example, to
use … to denote the value of the
implied private key, in the
absence of an explicit name
(e.g. “K”) for the associated
public key. ~에 관련/관계/해당/연
관; ~이 없을 때
 There are a lot of complex
details associated with this,
and it’s not a perfect solution,
but it’s enough to enable a site
to keep receiving valid
connections, even when under
attack.
attendant: “관련, “수반
existing along with sth or happening as a result of it ; resulting
(from) ; closely connected with sth that has just been mentioned
 Each of these technologies has
its niche, as well as its
attendant strengths and
weaknesses.
 Behaviour problems and their
frequently attendant learning
difficulties cannot be resolved in
the ordinary classroom.
 There are too many risks
attendant on (= resulting from)
such a large investment of
money.
 attendant problems / risks /
circumstances
 We had all the usual problems
attendant upon starting a new
business.
 She wanted to avoid the awards
ceremony and all its attendant
publicity.
 Mr Branson’s victory, and all
the attendant publicity, were
well deserved.
 …the risks attendant on the
exploration of the unknown.
“수반하는 수반되는
 Cost can be measured by the
communication bandwidth
required and by the
computational overheads
incurred.
 … to choose the correct
technology and the tool that
comes with it…
extraneous: “무관한, 관계없는, 본질에서 벗어난, 본질적이 아닌, “지
엽적인, not essential
 a matter extraneous to the
subject
 We shall ignore factors
extraneous to the problem.
 Such details are extraneous to
the matter in hand.
 When this happens, you discard
extraneous information as
you concentrate on the
particular property of interest.
 an issue extraneous to the
debate
 extraneous question 중심에서
벗어난 질문

“line
 A somewhat complicated line of
reasoning led me to this
conclusion. 일련의
 Using the same line of
reasoning as before, we can
readily show that G contains no
more than four elements g, g2,
g3, and e.
 My sister works in publishing
and I'm hoping to do
something along the same
lines (= something similar). 종
류, 동일선상, 유사
 Japan, the leader in Asia, is
working along the same lines
as Europe, and cooperating with
the European activities.
 The whole proposal is very
much along the same lines
as ‘pay and display’ parking…
 They are campaigning for the
electoral system to be reformed
along the lines of (= so that it
becomes similar to) the one in
Germany.
 Do you think this approach to
the problem is on the right
lines (= a suitable method and
likely to be successful)?
 Can you give me a line on the
professor who's visiting us
tomorrow? 실마리
 I've been trying to get a line on
this guy they've nominated for
president, I can't find out
anything about him. 실마리
 What sort of line (=method of
arguing) do you think we should
take in the pay negotiations? 방

 His line of argument was
impossible to follow.

명심 , 유념 , 기억 , “염두 에 두고
 The reader should bear this in
mind…
 … a handset which was not
designed with security in
mind.
 Mobile IP was explicitly designed
with extensibility in mind.
 For now, keep in mind that
SetDelayed is almost always the
right choice for defining a
function, and that …
 The only point to keep in
mind here is that the system
imposes no bound on the
number of digits (though the
hardware does).
 Bear in mind that …

“aside from (US), “apart from (UK):


i) except for; not considering; ~ 를 빼고는, ~ 이외에, ~ 외에, ~을
제하고는
 Aside from its use as a
separator between elements in a
statement that might otherwise
be confused, white space is
ignored by the complier (except,
of course, in a string of
characters between quotes).
 Aside from his salary, he
receives his pension every
month.
 We didn’t see anyone all day,
except from a couple of kids on
the beach.
 No one aside from A and B
knows or could deduce K. ~를 빼
고는, 제외하고, 말고는, 예외
 Money continues to be a
problem but aside from that
we’re all well.
 I hardly watch any television,
aside from news and current
affairs.
 Apart from the salary (= Salary
apart), it’s not a bad job.
 Apart from you and me (= You
and me apart), I don’t think
there was anyone there under
thirty.
 I’ve finished apart from the last
question.
 Apart from its ending, it’s a
really good film.
 No other parties know or can
deduce K. 다른 ~는 ~할 수 없다
 The key must not be allowed to
become known to any users
apart from those participating
in the protocol or trusted
servers.
 It is simple to see that the
use of a secret key means that
no one apart from A is able to
compute the correct response to
B’s challenge.
ii) in addition to; as well as; ~ 말고도, ~은 별도로 하고, ~는 물론
 Aside from privacy concerns
that already exist in credit card
transactions, the primary
disadvantage of stored-account
transactions is that online
verification is necessary.
 Apart from his earnings as a
football coach, he also owns and
runs a chain of sport shops.
 Quite apart from the cost, we
need to think about how much
time the job will take.
 Apart from their house in
London, they also have a villa in
Spain.
 It was a difficult time. Apart
from everything else, we had
financial problems. 무엇보다도
 Apart from anything else,
you’re my brother.

“끝, “종결 , “완료 , “만료


 Everyone wishes the war would
come to an end (=finish) soon.
 The vacation came to a close.
 The vacation is over (= has
ended).
 The examinations will soon be
over.
 When will you be through with
your work.
 On completion of the guest
authentication process the
server provides VLAN
information to the AP.

우리 자신 /나 자신이 ~함을 발견 하게 된다
 When …, then we may find
ourselves examining it further
in the following ways.
 Although it is quite
straightforward to create images
using MMA’s built-in functions,
we frequently find ourselves
having to create a graphic
image for which no MMA
function exists.

“필요 , “필요 성
 In this particular example, we
will have no need for the
remaining two-dimensional
graphics primitives, Rectangle,
Polygon, Disk, or Raster (see
Table 10.1 at the end of this
section for a complete listing).
 Conditions (“/;”) are handy
because they obviate the need
to write a separate test
function, e.g., the function …
 Chain rule seems to eliminate
the need for the power rule, so
we might try to UnSet the latter.
 Thankfully, the user does not
need to worry about these
details. 다행히; 할 필요가 없다, 불
필요
( does not need to = needs not
)
 Documents could cross
international boundaries with
ease, without the need for
onerous password systems.
 The need for these facilities in
respect of data communications
is viewed, in the main, as an
Administration-imposed
requirement. 필요성; 주로, 대개
 The need for this will become
more apparent when we come to
deal with functions. 필요성, 더욱
더 명확해질 것
 There’s a growing need for
cheap housing in the larger
cities.
be in need of sth: to need help, advice, money etc, because
you are in a difficult situation
 The project is in urgent need
of funding. 시급히 요구된다.
 He is homeless and in
desperate need of help.
 The church was in dire need of
repair.
 Are you in need of help?
be incumbent on/upon somebody: “necessary for someone;
necessary as part of somebody’s duty or responsibility; “필요 (의무
나 책임의 뉘앙스)
 She felt it incumbent upon/on
her to raise the subject at their
meeting.
 It is incumbent upon parents
to control what their children
watch on TV.
 It was incumbent on them to
attend.
 It is incumbent upon all of us
as loyal citizens to make an
extra effort.
 It is therefore incumbent on
the task force to provide
guidance as to how to make that
structure work.
한 만큼, “만큼, “한, “as … as …
 This performs as many
iterations as are necessary to
find the fixed point of Function[x,
(x+r/x)/2] and returns the last
result. ~하기 위해 필요한 만큼 많이
 This feature allows overall
performance to be as high as
the hardware will allow, with as
little memory and CPU
requirements as possible.
 You can place as many
primitives as you like within the
scope of each directive. 원하는 만
큼 많이

“관심 , “신경 , “흥미 , “재미 , “interest


 The coefficients are really what
are of interest. 정말로 관심 있는
것은…
 It is of interest to note that
… 재미있는 점
 An interesting point to note
is that, unlike a conventional
analog modem, a subscriber can
still use the phone while the
xDSL modem is in use. This is
because …
 Several … has been proposed for
this applications, the one of
interest having been proposed
in 1989 by …
 Within the past few months it
has become obvious that there
is a great deal of interest and
financial stake involved in the
deployment of protocols for
 There’s a growing interest in
using the IEEE 802.11
networking protocol as an
enterprise-deployable
technology. 관심 고조
 Interesting enough, this
notion of relying on lower layer
services is prevalent in many
other forms of communication.
 If all we care about is whether
orders match up, we are done
and we might call these two
groups the same. There might
be other issues to consider,
however. 신경, 관심, 흥미, 주의; 일
치, 같다, 다르다, 동일
 If all we cared about was the
computation, then it would be
unfortunate to give a value to x
which might interfere with later
computations. 신경 쓰는 것, 관심
있는 것, 중요한 것
“concern
 When we use a road map, we
are often concerned with
seeing how to get from one town
to another by means of the
roads indicated on the map. 관심
을 가지게 된다, 이용해서
 Also, our major concern in
dealing with any algorithm is
how the algorithm performs for
large values of n. ~하는 데 있어
서 우리의 주요 관심사는
 In a large organization, security
operations are a significant task.
One of the concerns is the
possible compromise of the
organization’s resources due to
the dispersal of security
measures through the system,
resulting in a fragmented
approach.
 Do not concern yourself with
the Mathematica details. ~에 신
경 쓰지 말라, 신경 쓰다, 관심
 The specifics of these standards
do not concern us here.
 You only need concern
yourself with a couple of these
at this time, but it would be
useful to explore the range of
option available to you. 관심, 신
경, 지금은
 However, when it concerns
any VASP, users may not have
confidence that long term keys
are sufficiently secure.
 However, when security is a
concern, the NIU must be
trusted.
 We should be quite concerned
about the vulnerability of the
center to such hazards as
equipment breakdown or enemy
attack. 염려하지 않을 수 없다, 신
경, 걱정
 This is what we mean by saying
that Eval commutes with List.
Actually, another concern is
raised here because …
 Should we be concerned about
denial-of-service attack? …
These days, many programmers
seem to feel the same way. …
Instead of trying, most
programmers simply don’t
bother.
As far as something is concerned: ~에 관한 한
 Does the OS for a firewall make
a difference? As far as security
is concerned, it’s becoming
less of an issue.
 Provide new features that
address security weakness in
GSM which are known to cause
concern.
 A natural question to ask
concerns the generators of this
cyclic group.
 Aside from privacy concerns
that already exist in credit card
transactions, the primary
disadvantage of stored-account
transactions is that online
verification is necessary.
 Management issues concern
the admission of entities into the
domain administered by an
authentication server, and their
expulsion, as well as the
auditing of security-relevant
events.
 When we use a road map, we
are often concerned with
seeing how to get from one town
to another by means of the
roads indicated on the map. 관심
을 가지게 된다, 이용해서
 If your thoughts, activities etc
centre around something or
are centred around it, it is the
main thing that you are
concerned with or interested
in:
 Some privacy concerns arise
from the client’s point of view:
the client has no simple
mechanism to disable cookies.
 Concerning authentication
servers, there is the question
whether this trusted machine
has to participate actively in an
authentication or whether its
contribution to the service is
decoupled from the actual
response to an authentication
request. ~에 관해서는 ~해야 할지,
아니면 ~해야 할 것인가라는 문제가
있다.

“이유 , “맥락 , “때문


 It is because of this analogy to
algebra that we have denoted
our disjunction by the plus sign
instead of the union sign ∪ or
the symbolic logic sign ∨.
Sometimes, we like it to look
algebraic; sometimes, we do
not.
 It is for this reason that
recursive definitions are
important to us. 이러한 이유로;
이 때문에
 The symbol Xi is simply a device
for locating the coefficient a i ,
and for this reason, the formal
∑n =0 a r X r is

power series A( X ) =
called an ordinary generating
function for the sequence
A = {a r } r∞=0 .
 Being able to positively identify
business partners is of
paramount importance in E-
commerce. For this reason,
establishing CAs is critical.
 For the reasons mentioned
above, it would be desirable to
realise an on-line access to a
certificate server in the second
demonstrator. 상기 이유로, 위에서
언급한 까닭으로
 For reasons of trust as well as
for reasons of reliability and
availability, efforts are made to
design services that decreases
dependence on a single
authentication server. ~등의 이유

 For various reasons, we
consider this to be the most
useful definition of
authentication: it insists that the
two agents agree on all the
essential features of the protocol
run, while avoiding specifying
features that are hard to
achieve and less likely to be
required. 여러 가지 이유로, ~하는
한편, 별로 ~할 것 같지 않다, 가능성
 One reason is to distinguish
the use of asymmetric key pairs
for signatures, encryption, and
key agreement, ….. A second
reason is to separate the
notion of binding a public key to
a principal from the notion of
the goodness of that key. “열거,
나열, 이유; 구별/구분, 분리
 The state object is called a
cookie, for no compelling
reason. 특별한 이유 없이, 뚜렷한
이유 없이
 For some unfathomable (=
impossible to explain or
understand) reason they built
the toilet next to the kitchen. 이
해할 수 없는 이유로
 We have no reason to
suppose that the girl is dead.
 There are many reasons to
suppose that Shakespeare was
familiar with the stories of
medieval Italy.
In this/that connection: 이런 맥락에서, 이런 맥락으로, 이런 연유로
(formal) for reasons connected with sth recently mentioned;
to indicate that what you are talking about is related to what you
have just mentioned
 It is the 100th anniversary of his
death. We here are having very
great celebrations in this
connection.
 I am writing to you in
connection with your recent
job application. (= for reasons
connected with)
 A man has been arrested in
connection with the murder of
the teenager

“point
 I see little point in discussing
this further. 소용 없다, 목적, 이유,
의미
 What’s the point of
complaining now?
 There is no point in going
 There is not much point in doing
that.
 While there is usually little
point for clients to send
requests that the server does
not list acceptable, sending such
requests is not an error, and the
server should simply reject
requests that it does not
recognize. 별 의미가 없지만, 별 소
용이 없지만…
 The point here is that calling
this number simply 98.6 is fine
for most applications. We will
say more about this issue later.
 This theorem expresses a
trivial but subtle point. It is
analogous to saying that if
people are made up of
molecules and molecules are
made up of atoms, then people
are made up of atoms.
make a point: to state an item of importance
 You made a point that we all
should remember.
 He spoke for an hour without
making a point.
 I’d like to make one final
point before I stop.
 A second point that should
be made in the banner and in
policies is that there is no
expectation of privacy when
using an organization computer
system. The employee should be
made aware of the fact that …
 There is one somewhat
subtle point that should be
made about our way of
describing the game.
 There is a somewhat subtle
point that should be made
about error detection and
correction. Namely, both cannot
take place at the same time and
at maximum levels. To be more
specific, suppose that …
 One point that should be
made is that these tests were
made using version 1.0 of the
HTTP protocol.
 One point that should be
made is the following: there
exist several DoD application
whose requirements are not
overly different than that of NSS.
 Another point that should be
made here is ease of
programming and vendor
selection. As H.323 is complex
with regard to
encoding/decoding, the number
of competing vendors and
operators for the source and
services which employ the
protocol may be reduced.
 Another point that should be
made concerning Equation 3.2
is that if it is used to define the
binomial coefficients, then it is
no longer necessary to require n
to be a positive integer.

“무의 미
 … would be completely
nonsensical.
 Their methods of assessment
produce nonsensical results.
 A 1-bit subnet field would
provide only one subnet , and so
it also does not make sense.
 The whole idea's a complete
nonsense. (= stupid, untrue)
 Computer programs look like
complete nonsense to me. (=
without meaning)

“end up: 하게 되다 , 귀결
come to be in a particular situation or state, especially when you
did not plan it;
turn out to be;
to become something eventually;
“결국 마지막에는 (…이) 되다.
 … then they will end up in
possession of one or more
shared secrets …
 You can use both type specifier
within the same program for
declaring different variables that
will end up (as) having the
same type.
 He ended up (as) head of the
company.
 An unknown key-share (UKS)
attack on an AK or AKC protocol
is an attack whereby an entity A
ends up believing she shares a
key with B, and although this is
in fact the case, B mistakenly
believes the key is instead
shared with an entity E ≠ A. 잘못
알고 있다, 오해한다
 We were going to go out, but
ended up watching videos.
 If we are in any of the four
states 1, 2, 3, or 4 and we read
two a's, we end up in state 4.

공간 이 부족해 서
because of limitations on space;
due to space restrictions;
due to spaced limitations
 Because of limitations on
space, we omit all proofs from
this paper; the interested reader
is referred to [12].
 Due to spaced limitations, we
omit the detailed description of
protocols and give a high level
view of the system. For more
details, we refer to [2].

“달려 있다 , “의존 , “달렸다


 The solution rested upon our
ability to recognize that … If we
fail to see this, perhaps we can
examine the given sequence
and determine whether there is
some other pattern that will
help us. ~에 달려 있다, 의존, 실패,
못 하다.
 Preshared secret key
authentication relies on
information–the preshared
secret key–that is known only to
the parties to the negotiation.
 Each method hinges on the
peer’s knowledge and use of
some form of specialized
information.
 The order of elimination is left
up to our own discretion. The
algorithm implies that it really
does not matter.

“확인 , “확실 , “확신 , 명확 , “안심 , “보장 , “sure,


“ensure, “certain
sure
 Reference these manuals to be
sure you are aware of the rich
collection of C features and that
you are using these features
correctly.
 If you are not sure how a
feature of C works, write a
sample program with that
feature, compile and run the
program, and see what happens.
 By keeping variables local to a
function or a block, you can be
sure they have almost complete
protection from external effect,

 It is difficult to be sure that
the web server you are visiting
truly belongs to the specified
company. 확신
 However, in general it will be
very difficult to prove results
about a system running several
protocols: we need to be sure
that no protocol acts as an
oracle for any other.
 One method is to keep two
binary flags, the a flag and the b
flag. Every time an a is read, the
a flag is reversed (0 to 1, or 1 to
0); every time a b is read, the b
flag is reversed. We start both
flags at 0 and check to be sure
they are both 0 at the end. 뒤집

 The only way to know for sure
is to test the number as follows
… (= certainly)
 I know for sure that I won’t be
able to go to the party.
 One thing’s for sure – once the
baby’s born, your lives will never
be the same again.
 No one knows for sure what
really happened.
 I think he’ll be back on Monday,
but I can’t say for sure.
 It is not known for sure
whether heads or tails will
occur.
 Sometimes, the cause of an
error may not be quite so
obvious, in which case some
additional information can be
very helpful. 그다지 명확하지 않을
수 있다.
 We can use this operator to
make sure that unwanted bits
are zero in a variable.
 Many parents unwittingly place
their children in danger by not
making sure they wear seat
belts. 위험에 빠뜨리다; 확인하지 않
아서
ensure; insure; assure
 All the necessary steps had been
taken to ensure their safety.
 Please ensure (that) all lights
are switched off.
 A nonce is a randomly chosen
bitstring, used in protocols to
ensure freshness and avoid
replay attacks.
 In what follows, we will first
insure (= ensure) that we
know where our files reside,
then discuss how to create and
alter their contents, and finally
show an example of good
programming practice 
checking to see whether a given
file is one with which we wish to
work. 논문 전개 및 진행 설명
 Both A and B are assured of
key freshness, since the session
key depends on both random
exponents aU and aV.
 Security administrators can rest
assured that when a user
account is revoked, resumed or
deleted on one platform, that
action will be carried out on all
other platforms on which that
user has an account. 안심하고 쉴
수 있다.
 If these keys are destroyed when
the call is over, the participants
can be assured that no one
can later decrypt that
conversation  even if the keys
to some subsequent
conversation are compromised.
 My own view is that an
authentication protocol is
designed to assure an agent A
as to the identity of the other
agent B with whom A is running
the protocol; therefore, in most
cases A should at least be
assured that B thought he was
running the protocol with A.
However, some researchers
take the view that it is enough
for B to be present, and that A
need not receive any further
assurance as to B’s current
state. We should recognize that
the different authentication
specifications may all be valid
goals: there are
circumstances in which the
weaker specifications are all
that is needed; in other
circumstances, a stronger
specification may be required.
However, the designer of any
protocol should make it clear
that which form of
authentication is supposed to be
achieved.
certain
 Firstly, they must make certain
that their pension needs are
adequately catered for.
 You should call the office to
make absolutely certain that
everything is in order.
 You’ll have to leave soon to
make certain of getting there
on time.
for certain (= without doubt): 확실히, 확실하게, 명확히, 분명히
 I can’t say for certain when
we’ll arrive.
 I can’t say for certain how
long I’ll be there.
 I don’t know for certain if
she’s coming.
 We don’t have enough
information to be able to tell for
certain whether the loop
terminates.
 It’s not yet certain who the
driver of the car was.
 Interest rates seem certain to
rise next month.
 … uses the scope resolution
operator to make it clear to the
compiler that we want to
reference the global variable
count1.
 The apparently obvious goal of
an authentication protocol is the
provision of some degree of
assurance of the identity of
another party. 제공
 I feel pretty confident that my
conjecture is right. 자신한다
 The difficulty of course is
convincing another party that
the certificate creator can be
trusted and that the no harm
will come from using the
information in the certificate. 위
험, 해, 손해
convinced
 We are convinced of his guilt.
 At the conclusion of the
dialog, each side is convinced
of the identity of the other.

~할 걸로 /~일 걸로 “생각한 다, “믿는다


“expect: to think that something will happen because it seems
likely or has been planned
 I expect (that) you’ll find it
somewhere in your bedroom.
 I expect that he’d have left
anyway.
 There’s the doorbell – I expect
it’ll be my mother.
 While the order of presentation
and level of emphasis will vary
among individual computer
science programs, we expect
that all introductory programs
will seek to meet these goals.
 He will be hard to beat. I fully
expect (= am completely sure
about) that and I’m ready. 확신
 It is expected that the report
will suggest some major
reforms.
 ‘who are you?’ he murmured,
only half expecting (= thinking
it was possible, but not likely)
her to answer. 반신반의
 I looked back, half expecting to
see someone following me.
 I expect to be back within a
week.
 I didn’t expect him to stay so
long
 The company expects to
complete the work in April.

“기대 , “희망 , “hope


in the hope of sth / in the hope that …
= because you want sth to happen
= ~를 기대해서/바라고서
 I called early in the hope of
catching her before she went to
work.
 He asked her again in the vain
hope that he could persuade
her to come (= it was
impossible).
 It is misguided to deal upgrading
encryption technology in the
hope of making financial
savings.
 We will be analysing all the
things she has told us in the
hope that we can locate the
person responsible.
 Spammers deliver these
unsolicited ads in hopes that
sheer volume will generate
some interest in the product or
service advertised.

이제 , 이 시점 에서
 At this point we shall examine
recurrence relation with a
variable coefficient.
 At this point, we will …

~할 만한 , “가치 가 있는
 The kernel and image of a
homomorphism are special
subsets worthy of
consideration.
 It is worth noting that the
authentication required can be
achieved through …
 A couple of general points
worth noting are about the
layout of the program. Firstly, …
and, secondly, …
 While it would be expensive, this
attack may be well worth the
effort if the attacker knows that
sensitive information will be
passing across the link.
 Although adapting to the new
accreditation process will require
much work, it will be well worth
the effort. 노력할 만한 가치가 있

가능 하게 해준 다, 허용 /허락 (“enable)
 Good health enabled him to
carry out the plan.
 He was enabled to attend.
 The software enables you to
access the Internet in seconds.
 A new programme to enable
older people to study at college.
 Insulin enables the body to use
and store sugar
 A new train line to enable easier
access to the stadium
 This definition is much broader,
and allows for many functions
that are not as computational as
one is used to from
programming. This turns out
to be valuable in both
mathematics and CS.

“가능
susceptible of sth: if sth is susceptible of an action, that action
can be done to it.
 Working conditions are
susceptible of improvement by
legislation.
 Every definite mathematical
problem must necessarily be
susceptible of an exact
settlement, either in the form of
an actual answer to the question
asked, or by the proof of the
impossibility of its solution and
therewith the necessary failure
of all attempts.

“설상 가상
 Even worse would be to write
the relation f in the form f(x, y),
since this would produce endless
confusion with functions of
two arguments. 더욱 문제는, 더욱
심각한 것은; ~와의 혼동
 This is bad enough, but even
worse is the fact that some
bugs can be a security problem.
 Worse still, users and security
administrators must now deal
with multiple security models
based on different forms of user
credentials.
 To make matters worse, the
bombardment mentioned above
is usually done with IP packets in
which the Source Address is
“spoofed”; i.e., the sender sets
the IP Source Address field to
either a nonexistent address or
to some address that is
legitimately owned by some
other party.

“비교 , “대조 (1)


 You must compare various
products’ specifications for
operating speed, price, and
security features. ~ 등의 항목에
대하여 서로 비교
 These costs are likely to be
very high, especially
compared with the ordinary
operational expenses that might
be expected in commercial key
recovery systems.
 A second advantage is the
reduced computational cost as
compared with systems that
require modular arithmetic.
 This road is quite busy
compared to/with ours.
 Children seem to learn more
interesting things compared
to/with when we were at
school.
 It also allows us to compare our
approach to that in [BAN89], in
particular to discuss a new
attack on one of the results
derived for NS in [BAN89].
 In appendix B we look at the
language and logic of VO in
comparison to SVO.
 Comparisons between AT and
SVO syntax require a semantic
context as well, and, in the
interest of brevity, we will not
give a presentation of the full
Abadi-Tuttle semantics. 간결을 기
하기 위해, 간략, 간단
 We therefore make comparative
comments at appropriate points
throughout Section 1 and 3. 적
절한, 적당한
 How did the control group
students do relative to (=
compared to) the whole class?
~와 비교할 때, ~에 비해
(“relative to = concerning or in
relation to” 일 경우도 있다.
예문: Questions have been
raised relative to your
testimony.)
 When you go with a y(0) that is
small relative to b, …
 Women’s earnings are still low
in relation to men’s.
stack up (against): to compare with another thing of a similar
type
 The new model of this car just
doesn’t stack up against
previous models.
 Let’s try him in the team and
see how he stacks up.
 This year’s figures didn’t stack
up to those of 1999 (= they
were not as good).
 Parents want to know how their
kid’s schools stack up against
others.
 How do we stack up against
the competition?

“비교 , “유사 , “반대 , “대조 , “똑같 다, “같다 ,


“compare, “liken, “like, “same, “opposite
 This is essentially the same
as a list of conditional rewrite
rules, except for the behavior
on terms that fail to satisfy any
of the conditions. ~만 빼고는 본질
적으로 동일, 제외, 예외
 Except for the funny things, Do
is very much like the For loop
operation in Pascal. ~만 빼고는 매
우 비슷/유사/흡사
 While[test, expr] is just like the
command “while test do expr” in
the language of while-programs.
똑같다, 꼭 같다
 For[start, test, step, expr] is
almost exactly the same as a
for loop in the language C,
except that in C the clauses
are separated by semicolons
instead of commas. (Note that C
uses commas for compound
statements, so the roles of
commas and semicolons in C are
exactly the opposites of their
roles in Mathematica.) ~만 빼고
는, 제외하곤 거의 동일/같다; ~와 정
반대
 Quite alarmingly, in many
cases security discussions
proceed in exactly the
opposite direction. 놀랍게도; 정
반대
 The situation with an FA is
just the opposite. 정반대 상
황, 정반대 경우, “situation
 The situation with bb is
analogous.
 The use of While loops is the
same as that of Do loops; e.g.,
… 꼭 같다, 똑같다
 “Switch[ ]” makes explicit use of
Mathematica pattern matching.
It is not really like anything
else in other languages. 다른 ~
의 무엇과도 다르다, 같지 않다
 The next family of graphs is in a
sense “opposite” to the null
graphs. 어떤 의미에서, 반대
 In many respects directories
are like contexts; directories
can contain subdirectories just
as contexts can contain
subcontexts; directories hold
files while contexts hold
variables and functions; there is
a default directory just like
there is a default context; and
there is a directory search path
used in the same manner as a
context search path. 많은 점에서;
유사, 비교, 방법, 방식, 스타일
liken A to B: to compare A to B and say they are similar; syn:
compare; 비슷, 동등, 견주다, 비교되다, 비유된다, 필적
 Life is often likened to a
journey.
 She admired her father so much
that she likened him to a saint.
 Critics have likened the new
theater to a supermarket.
A compares with B: to be similar to sb/sth else, either better or
worse
 This school compares with the
best in the country (= It is as
good as them).
 This house doesn’t compare
with our previous one (= It’s not
as good).
 I’ve had some difficulties, but
they were nothing compared
to yours (= they were not nearly
as bad as yours).
 Their prices compare
favourably with those of their
competitors.
 His cooking is good, but it can’t
compare with yours.
 Instant coffee just doesn’t
compare with freshly ground
coffee.
compare A to B: to show or state that A is similarto B; syn:
liken ;
to judge/suggest/consider that A is similar or of equal quality to B
 The critics compared his work
to that of Martin Amis.
 The poet compares his lover’s
tongue to a razor blade. “은유
 Still only twenty-five, she has
been compared to the
greatest dancer of all time.
 You can’t compare the two
cities − they’re totally different.

비교, 마찬가지로, 비슷하게, “방법, “방식, “식으로


 Proceeding in this manner,
we can write the Fourier series
for f (t) as …
 Continuing (on) (in) this way, …
이런 식으로 계속하면
 I find it easier to work in this
way (= like this).
 Sorry, I didn’t know you felt that
way (= had that feeling or
opinion)
 The drugs didn’t seem to affect
Anna in the same way.
 The only difference is the way
that V’s TTP recovers the
session key K.
 The compliment of any simple
closed curve C can be
partitioned into two mutually
exclusive domains I and E in
such a way that I is bounded,
E is unbounded, and C is the
boundary for both I and E. 다음
처럼, 다음과 같이
 An intruder-in-the-middle attack
on the Diffie-Hellman Key
Exchange protocol works in the
same way.
 A nested function call is read in
much the same way that it is
created, starting with the
innermost functions and working
the outermost functions.
 We could then apply our own
user-defined functions in the
same way as we call a built-in
function  by entering the
function name and specific
argument definition.
 … So it is with a presentation.
(발표도) 마찬가지다
just as … so too …: 똑같이, 마찬가지로, ~처럼
 Just as an engineering
researcher carefully plans an
experiment, so too an
educational researcher must
carefully plan implementation
strategies to meet specific goals
and objectives.
 Just as Claire is taller than Max
means something different from
Max is taller than Claire, so too
Taller(claire, max) means
something completely different
than Taller(max, claire).
“manner
 In a manner (very) similar to
how integers are treated,
Mathematica uses different
internal algorithms to do
arithmetic on real numbers
depending upon whether you
are using very high precision
reals or not.
 … allowing the user to cause the
program to behave in a
manner to their advantage.
자기들한테 유리한 방법으로/유리한
쪽으로/유리한 식으로
 … in order to meet the
government’s requirements in a
secure manner. ~한 방법으로
 In many respects directories
are like contexts; directories
can contain subdirectories just
as contexts can contain
subcontexts; directories hold
files while contexts hold
variables and functions; there is
a default directory just like
there is a default context; and
there is a directory search path
used in the same manner as a
context search path.
“fashion
 Other proofs, including the fact
that addition is associative, can
be done in a similar fashion.
 As the proxy receives traffic, it
processes the traffic in a
fashion similar to our example
in Figure 5-10.
 The package
AbstractAlgebra`FiniteFields.m
generates finite fields in a
fashion similar to the way
QuotientRing does but with
restrictions on the allowable
inputs so that only fields are
generated.
 In a fashion analogous to …
 Much like real cookies, browser
cookies don’t last forever.
 In a similar way 비슷한 방법으로,
마찬가지로, 유사한 방법으로,
 With similar reasoning, we
can show that the defining
relation gr = e generates a group
graph with r vertices. 유사한 식으
로, 비슷한 식으로, 마찬가지로
 For similar reasons, …
 A similar argument shows that …
 The right-hand side function
looks very much like a
mathematical equation: a left-
hand side and a right-hand side
separated by a colon-equal sign.
 This looks much like standard
mathematical notation.
 Although a precise comparison
of informal ideas is difficult, we
also find an affinity with Boyd
and Mao’s proposal that the
protocols should be robust in
the sense that … depends
only on information contained in
the message itself or already in
the possession of the recipient.
 This argument is similar in
spirit to the argument for
programming in an object-
oriented style.
 Using the same line of
reasoning as before, we can
readily show that G contains no
more than four elements g, g2,
g3, and e.
 My sister works in publishing
and I'm hoping to do something
along the same lines (=
something similar). 종류, 동일선
상, 유사
 The next family of graphs is in a
sense “opposite” to the null
graphs. 어떤 의미에서, 반대
 It has much in common with
GNY rule 2, although the GNY
definition of “B possesses K”
result in rule 2 not
distinguishing between B
knowing/having K and being
capable of computing K, nor
does it imply B has
demonstrated knowledge of K.
매우 유사/비슷하다, 공통점이 많다;
구분/구별/차이 식별
 Whilst these have much in
common with any IT
implementation there are some
uniquely SSO releated
aspects. ~의 고유한 측면
 What they have in common is
that they can leave information
unavailable when a key decision
must be made. 공통점
기타 표현: “similarly, “likewise
 Similarly, introductory courses
may include elective units
alongside the coverage of core
material.
 The first letter she wrote me was
less than a page long, and her
second letter was similarly
brief.
 The cost of food and clothing
has come down in recent years.
Similarly, fuel prices have fallen
quite considerably.
 The children were similarly
dressed.
 Cars must stop at red traffic
lights; similarly (= in a similar
way), bicycles should stop too.
 Husband and wife were
similarly successful in their
chosen careers.
 The US won most of the track
and field events. Similarly, in
swimming, the top three places
went to Americans.
 The clams were delcious.
Likewise, the eggplant was
excellent.
 Just water these plants twice a
week, and likewise (= in the
same way) the ones in the
bedroom.
 He voted for the change and he
expected his colleagues to do
likewise.
 Her second marriage was
likewise unhappy.
“대조, “비교, “달리, 그 반대로
 In contrast, non-recoverable
systems can usually be designed
securely without any alternative
paths.
 Increasing the security of a
system always comes at some
cost and in a real world
situation this cost can only be
justified when contrasted to
the exposed risk. 비용
 However, in contrast to these
operations, Do[ ] has no output.
~와는 달리, 대조적으로
 The words “generating function”
are used because, in some
sense, A(X ) generates its
coefficients. The word “ordinary”
is used to denote the fact that
powers of X are used; other
kinds of generating functions
could use, by contrast, other
functions like
X r /r ! , sin(rX ), or cos(rX ) in
place of X r . 대신에
 Authentication is ….
Authorization is by contrast an
application-dependent process
because different applications
may need to control access
within their individual domains
quite differently.
 Stored-value systems, in
contrast, attempt to replace
cash with its electronic
equivalent, e-cash, by
transferring a unit of money
between two parties.
 She is quiet and studious, in
marked contrast to her sister.
뚜렷한 대조, 극명한 대비
 This year’s results, in marked
contrast to last rear’s were
very encouraging.
 Denial of service, unlike
authentication, is a matter of
degree. 정도의 문제, … 와는 달리
 Unlike with most programming
languages, the rationales are a
basic data type in Mathematica.
(구어체인 듯)
as distinct from
= used when emphasizing that you are talking about a particular
kind of thing and not something else
= 다른, 별개의
 childhood as distinct from
adolescence
 Insofar as is possible, we
have considered the impact of
these policies without regard to
individual schemes or particular
government proposals. Rather,
we have attempted to look
broadly at the essential
elements of key recovery
needed to fulfill the expressed
requirements of governments
(as distinct from the features
that encryption users might
desire).
 Snail mail: postal mail, mail
sent through the postal service,
as distinct from the faster
electronic mail (informal)
 Note that in MMA the semicolons
bind more tightly than the
comma, in distinction to most
ordinary natural languages. ~와
는 달리, 다르게, 반대로
 In distinction to the Moore
machine, here we do not have to
print the same character each
time we start up, even before
getting a look at the input.

“contrary, “반면
 So, from now on, unless the
contrary is stated explicitly,
all rings will be considered to be
commutative. 지금부터; 별도 언
급이 없는 한
 We intend to show you that,
contrary to popular belief,
there is really nothing imaginary
about “imaginary numbers” at
all. In a metaphysical sense,
they are just as real as are
“real numbers.” 보이고자 한다, 보
이겠다; 일반적인 상식과는 달리, 다
르게; 마찬가지로
 Contrary to first
appearances, this need not
result in an overly complex logic.
첫 인상과는 달리, 보기와는 달리, 얼
핏 보기에는
 … Suppose, on the contrary,
that …

용법
In order to give the other side of a question, we use “on the oth-
er hand”. “On the contrary” is used to contradict  to say that
something is not true.
 “On the other hand” means ‘it
is, however, also true that ...’.
(contrast, 한편, 그 반면)
 “On the contrary” means ‘the
opposite is true’. (contradiction,
천만에, 그 반대로, 오히려)
Examples
 The job wasn't very interesting,
but on the other hand it was
well-paid.
It’s certainly hard work. But, on
the other hand, a man who
wishes to have a career has to
make a great many sacrifices.
It’s not a very nice flat. On the
other hand, it’s cheap. (or
Still, it’s cheap)
On the other hand, with off-
line servers, a fast revocation of
rights becomes harder to
achieve.
 “I suppose the job wasn't very
interesting?” -- “On the
contrary, it was fascinating. I
loved it.”
“You’ll get tired of it.”  “On
the contrary. I shall enjoy it.”
There was nothing ugly about
her dress: on the contrary, it
had a certain elegance.

“구분 /”구별 /”차이 식별 , “다르다


 Unlike a circuit-level gateway, an
application gateway can
differentiate the applications
that need to be blocked from
those that can be allowed to
pass through the gateway.
 They differ according to
whether they route packets
according to host destination
addresses or according to virtual
circuit numbers. 구분된다, 나누어
진다, 구별된다, 달라진다, 차이점, 차
별점
 In an actual network, one
application may differ from
another in requirements on the
efficiency of a key agreement
protocol. (차이점)
 The basic outlines of the proofs
are the same in all cases, but
the details of the basis and
inductive steps differ from one
to another. 모두 마찬가지; 각각
다르다
 Because introductory programs
differ so dramatically in their
goals, structure, resources, and
intended audience, we need a
range of strategies that have
been validated by practice.
 This principle may seem to have
nothing in common with what
we have been doing so far, but
it will prove to be helpful
nonetheless. 지금까지, 이제까지
 Names, by their very nature,
vary in length. It makes no
difference if we are looking at
the name of a person, a
textbook, or an automobile. 차이
가 없다, 다르지 않다, 상관 없다
 In practice, it may not make
any difference as to whether
they developed a taxonomic
order or only a classification
scheme. The Taxonomy fulfills a
function.
“tell: distinguish
 We assume that honest
principals have no way of telling
corrupt principals from other
honest principals, and thus may
be willing to initiate
communication with these
dishonest principals. (tell from:
구분하다, 구별하다)
 Can you tell the difference
between sparkling wine and
champagne?
 This coffee is about half the
price of that one and yet you
really can’t tell the difference.
 Can you tell Tom from his twin
brother?
 It’s difficult to tell them apart.
 The kittens looked exactly alike
—how could you tell which was
which?
 After a time, the table will be full
and the target system must start
discarding SYN packets or
removing half-open connection,
and it has no way of
distinguishing between valid
connections and connections
from an attacker.
 It has much in common with
GNY rule 2, although the GNY
definition of “B possesses K”
result in rule 2 not
distinguishing between B
knowing/having K and being
capable of computing K, nor
does it imply B has
demonstrated knowledge of K.
 One reason is to distinguish
the use of asymmetric key pairs
for signatures, encryption, and
key agreement, ….. A second
reason is to separate the notion
of binding a public key to a
principal from the notion of the
goodness of that key.
 How can you tell a fake Vuitton
handbag from the real thing?
 We may have trouble in
distinguishing when we write
an a whether we mean a, the
letter in ∑; a, the word in Σ*; {
a }, the one-word language; or
a, the regular expression for that
language. Context and
typography will guide us.

“방법 , “방식 , “스타 일, “similar


비교, “마찬가지로, 비슷하게, 유사하게
 The only difference is the way
that V’s TTP recovers the
session key K.
 The compliment of any simple
closed curve C can be
partitioned into two mutually
exclusive domains I and E in
such a way that I is bounded,
E is unbounded, and C is the
boundary for both I and E. 다음
처럼, 다음과 같이
 An intruder-in-the-middle attack
on the Diffie-Hellman Key
Exchange protocol works in the
same way.
 A nested function call is read in
much the same way that it is
created, starting with the
innermost functions and working
the outermost functions.
 We could then apply our own
user-defined functions in the
same way as we call a built-in
function  by entering the
function name and specific
argument definition.
 In this manner, the site can
identify the user for every
request. 이런 식으로 해서, 이렇게
함으로써
 In a manner similar to how
integers are treated,
Mathematica uses different
internal algorithms to do
arithmetic on real numbers
depending upon whether you
are using very high precision
reals or not.
 … in order to meet the
government’s requirements in a
secure manner. ~한 방법으로
 In many respects directories
are like contexts; directories
can contain subdirectories just
as contexts can contain
subcontexts; directories hold
files while contexts hold
variables and functions; there is
a default directory just like
there is a default context; and
there is a directory search path
used in the same manner as a
context search path.
 The right-hand side function
looks very much like a
mathematical equation: a left-
hand side and a right-hand side
separated by a colon-equal sign.
 This looks much like standard
mathematical notation.
 Although a precise comparison
of informal ideas is difficult, we
also find an affinity with Boyd
and Mao’s proposal that the
protocols should be robust in
the sense that … depends
only on information contained in
the message itself or already in
the possession of the recipient.
 In a similar way 비슷한 방법으로,
마찬가지로, 유사한 방법으로,
 … A … , and analogously for B.
마찬가지로
 If a machine is designed as a
snowblower, then tilling the
garden with it isn't such a good
idea. The same goes for IS
technology. “마찬가지다
 It was observed at the
conclusion of question 2 that the
kernel of a ring homomorphism
is an ideal of the domain. This
closely parallels the situation
with groups. 유사, 비슷, 마찬가지;
~임을 보았다, 알게 되었다;
“situation
 Just as RSA and Diffie-Hellman
encryption may be penetrable in
the future, so too may IDEA
become penetrable. 꼭 마찬가지

 Similar remarks apply to g(t)
and g(u).
 This argument is similar in
spirit to the argument for
programming in an object-
oriented style.
 Other proofs, including the fact
that addition is associative, can
be done in a similar fashion.
 With similar reasoning, we
can show that the defining
relation gr = e generates a group
graph with r vertices. 유사한 식으
로, 비슷한 식으로, 마찬가지로
 A similar procedure is
followed in computing the
value of c(t) at t = t2, where t2 is
negative (Fig. 2.7g). In this
case, the function g(-r) is
shifted by a negative amount
(that is, left-shifted) to obtain
g(t2 - r).
 Using the same line of
reasoning as before, we can
readily show that G contains no
more than four elements g, g2,
g3, and e.
 My sister works in publishing
and I'm hoping to do
something along the same
lines (= something similar). 종
류, 동일선상, 유사
 The veification that it is a
“basis” is just as in the prior
example. 꼭 같다, 똑같다

“amount to something: 결국 ~와 “같 다, “동일 ;


~와 “마 찬가지 다
to be equal/equivalent to or the same as something;
to have the same effect as something
 … so the pattern I’ve found
amounts to this: each e is the
sum of the two numbers in the
row above it.
 Before we can address this,
however, there is a prior
question of what the distinction
between knowledge and belief
really amounts to for us. (= to
add up to, be in total, be equal
to or be the same as)
 Her answer amounted to a
complete refusal.
 Their actions amounts to a
breach of contract.
 We’re jailed for a week – well,
confined to quarters, but it
amounts to the same thing.
 Ultimately, their ideas amount
to the same thing.
 His behaviour amounted to
serious professional misconduct.
 He gave what amounted to an
apology on behalf of his
company.
 All his fine words amount to
nothing.
 Their statement amounts to
nothing more than a slick
evasion.

처럼 보인다 , 의 경우처 럼, 와 같이 , 유사하 게


 As with Do and While loops, the
output of a For loop is Null, so in
the example we use a Print
statement in order to see
something.
 This sounds very attractive at
first, but as with the Sirens of
mythology, there are serious
side effects which completely
outweigh any advantages you
may gain. “처럼 들린다,

방법 ; “불가 능, 할 수 없다 , 방법이 없 다
 This is highly desirable since
there is no way to know in
advance what other variables
with values may be around when
a particular function is used.
 If not for the existence of
heads like Hold and HoldForm,
there would be no way for an
expression to return a partially
evaluated result such as a
component of a trace.
 There is no way of checking
whether a certificate has been
revoked.
 Here is one way of doing it. …
 The only purpose for the last
factor is to guarantee that Λ
is not a possibility because it
is not accepted by the machine.

“나누 다, 나눈 다, 나누 어 진다 , 구분된 다, “구성된 다,


이루 어 진다 , “break, “broken
 Time is broken into two
periods: the present (the current
epoch, beginning with the start
of the current protocol run) and
the past. Formulas generated
specifically for the purpose
of being fresh are called nonces.
부분으로 나뉜다, 나누어 진다, 구분
된다, 구성된다; 특별히 ~를 위해, ~
의 용도로
 This 6-byte, 12-digit
hexadecimal number is broken
up into two parts. The first
half of the address is the
manufacturer’s identifier. … The
second half of the MAC
address is the serial number the
manufacturer has assigned to
the device. 구분, 나누다, 나누어진
다; 전반부, 후반부
 The principal advantage of
having a program broken up
into functions is that … There is
a further advantage in that …
 A set of rules was required to
break down the communication
process into a simple set of
building blocks.
 By breaking down this
complicated process into small,
manageable sections, building a
house becomes easier. This
breakdown also makes it easier
to define who is responsible for
which section.
 We asked for a breakdown of
the accident figures into day
time and night time. (breakdown
= a division of something into
smaller parts)
 An analogy to the OSI model
would be the process of building
a house. 좋은 비유
While the final product may
seem a complex piece of work, it
is much simpler when it is
broken down into manageable
sections.

“예, “보기
 Let us take an example. Suppose
that we are trying to define the
set of positive even integers for
someone who knows about
arithmetic, but has never heard
of the even numbers.
 This very simple syntax is the
starting point of a vast theory
called the lambda calculus. It is
intended to capture the two
most fundamental properties
of functions in a certain sense,
namely, that of applying a
function to an argument by
substituting the argument for a
bound variable in the body of
the function and that of giving
a name to the function
determined by a rule. Here are
some examples of terms in the
lambda calculus. 개념 설명, 도입,
기술, 나열; 예, 보기
 Here are two examples.
 Let us walk through an
example to get a feel for how
these special status codes and
headers work. 예를 들겠다; 감을
가지기 위해, 살펴보기 위해, 알아보
기 위해
 If you asked for more accuracy
than is possible in double
precision variables, what might
happen? For example, say
that you asked for 21 accurate
figures.
 Take, for example, an
electrical engineering program.
Its educational objectives shoud
be …

“복잡
 If we want to apply a function to
several arguments, things get
more complicated. 일이 더 복잡
해진다
 It could get quite complicated.
꽤 복잡할 수도 있다

“노출 , “공격 /문제 점에 노출 /”대처 /”방어 /견디 다


 Unfortunately, this leaves the
user open to attack, 공격에 노출,
방치
 In the Internet threat
environment, this opens the
protocol to numerous failures
associated with normal
datagram delivery, such as
reordered and duplicated
datagrams. 노출
 Another flaw in its firewall
product leaves it open to a
DoS attack. 공격에 노출시킨다
 However, SSO can, if badly
implemented, introduce further
security risks because if the
master key is not properly
managed and protected, many
systems will be exposed to
unauthorised access.
 Key management issues and
how our security solution
stands against possible threats
are also described in this white
paper.
 Corporate security mechanisms
guard against unauthorised
manipulation of computer
hardware and network
equipment, e.g. stealing,
sabotage, cable rearrangement,
etc.
 A “Cookie” Exchange guards
against simple flooding attacks
sent with bogus IP Sources or
UDP Ports.
 An effective way to counter
the above attacks is to use
public-key certificates  a data
structure containing among
other things a public key, the
identifier of the owner (be it
user, host, network or
application), and a digital
signature created by a trusted
authority called Certification
Authority (CA).
 This is a passive attack and is
best countered by encryption.

“lead to/into
 The goal of this lab is to develop
the concept of an ideal through
examples, leading to discovery
of some of the properties of
ideals.
 Following the sings led us into
a small square with a fountain.
 Years of painstaking research
have led to a new vaccine.
 Indifference to pollution now will
lead us into serious problems
in the future.
 Any digital bank note can be
copied at infinitum. This is
bound to lead to cheating. ~할
것이 틀림 없다, 확실, 필연, certain
 Whether this is what was
intended or not is unimportant
in the current discussion.
The important points are, firstly,
that an informal description can
be expected to have ambiguities
which may lead to weaknesses
in certain interpretations;
secondly, that the interpretation
that allows the attack is what
appears to have been used in
the BAN logic analysis.
 Failure to understand the
precise meaning of specific
goals has lead to
misunderstandings about the
differences between various
protocols. This motivates us
to explicitly identify six distinct
candidate positions which may
or may not be intended as
formal goals in a specific
authenticated key establishment
protocol. 이런 이유 때문에/동기로
우리는 ~ 했다. ~하게 된 이유

“중요 , 매우 중요 , “important, “crucial


 Printing the 7 is what is
important; what is left in
memory does not matter.
 What is important is that the
string is stored in an array of
characters that ends with a null
delimiter. 중요한 점은
 Chewing properly is crucially
important.
 These ideas are of such
importance that we formalize
them in a definition.
Definition … 매우 중요하므로 ~한
다,
 With hackers making the
national headlines weekly,
protecting wireless data streams
is of the utmost importance.
 The conservation of tropical
forests is of crucial
importance.
 It is crucial that we get this
right.
 A crucial factor/issue/decision
 The aid money is crucial money
is crucial to the government’s
economic policies.
 The work of monks was crucial
in/to spreading Christianity.
 Thus, the crucial point in
defining a function is to write
the underscore.
 The city of Mycenae played a
crucial role/part in the history
of Greece.
 Crucially, though, it failed to
secure the backing of the banks.
overarching: most important, because including or affecting all
other areas
 The overarching theme of the
election campaign was tax cuts.
 an overarching
aim/concept/issue
 the overarching themes of
race, violence and disorder
 an overarching focus on object-
oriented design
 The overarching question
seems to be what happens when
the US pulls out?

“많은 양의
 …, especially if you are sending
large amounts of information
over a single SSL session or over
multiple SSL sessions that use a
shared master secret. On the
other hand, if you expect to be
serving dozens or more SSL
HTTP requests over the course
of a minute, you should
consider getting either an
extremely fast computer or
hardware assistance for the
public key operations. 많은 양의
정보; 잠시 동안에
 There is thus a fair amount of
syntactic reduction since
primitives of one language are
often definable in another. On
the logical level there is a
similar amount of axiom
chopping. 상당히 많은 양의, 꽤 많
은, 많이, 많다
 A fair amount of research has
centered around anonymity.
Some of the work is highly
theoretical, but some solutions
are practical and have been
implemented. Much of the work
in this area is based on Chaum’s
invention of a digital mix.
 Existential quantifications are
also signaled by a host of
English words: …
a multitude of (= an extremely large number of):
 a multitude of
problems/possibilities/reasons
 These elements can be
combined in a multitude of
different ways.
 a multitude of possible
interpretations
 Wireless technologies today
come in several forms and offer
a multitude of solutions
applicable to …
a great deal:
 What actually goes on is a
great deal more involved.
 A great deal more can be
done with finite state machines.
 This can save you a great deal
of work. 일거리를 들어준다.
 Within the past few months it
has become obvious that there
is a great deal of interest and
financial stake involved in the
deployment of protocols for … 최
근 몇 달 새, 최근 몇 개월 새, 최근 몇
개월 사이에, 지난 몇 달간
 On the face of it, it seems like a
great deal.

“문제 해결 , “해결 , “도움


 The problem with the
Needham and Schroeder Public-
key protocol is that the
certificates for the public keys of
A and B are not linked to the
requests. A simple modification
takes care of this. ~의 문제는;
해결할 수 있다
 The concept of “Single Sign-On”
or SSO provides an opportunity
to help address these
problems by providing users
with a single “master key” to all
the systems he is allowed to
access. 문제해결에 도움이 된다.
 Group theory has been a
significant help in the solution
of this problem. ~를 푸는 데, 해
결하는 데 큰 도움이 된다.
 Scripting can help in the
introduction of standard rules
for the composition of
passwords. ~를 도입하는 데 도움
이 된다.
 To plot the graph of a complex -
valued function of a complex
variable, four dimensions are
required as follows: two for the
complex variable and two for the
complex function value. One
method, to circumvent the
need for four dimensional
graphics, is to show how the
function transforms sets of lines
that lie in the complex plane. 해
결할 한 가지 방법은, 피할 수 있는 방
법은
 To get around/round (=
overcome) this problem, let
us have the AS provide both the
client and the TGS with a secret
piece of information in a secure
manner.
 To get around this difficulty,
we define a Mealy machine to be
equivalent to a Moore machine
whenever they always result in
the same output if the automatic
start symbol for the Moore
machine is deleted from the
front of the output.
“해결책, “해결방법
 $RecursionLimit: Can you
program your way around this
problem?
 A way around this problem is
to perform a network logon to
the network operating system
such as a Windows NT domain
logon or a Netware logon.
 One way around this
difficulty is to choose the
length of a time period to be
very small, so that the
probability of two or more
accidents becomes negligible.
 One way around this is simply
to assume that the input
probability distribution is
uniform.

be conducive to something: 이롭다, 이로운, 도움이


된다; 이어진다, 연결된다
= making it easy, possible or likely for something to happen
= providing the right conditions for something good to happen or
exit
= if a situation is conducive to something such as work, rest etc, it
provides conditions that make it easy for you to work etc.
 an environment conducive to
learning
 Chairs in rows are not as
conducive to discussion as
chairs arranged in a circle.
 The soft lights and music were
conducive to a relaxed
atmosphere.
 Such a noisy environment was
not conducive to a good night’s
sleep.
 This is a more conducive
atmosphere for studying.
 Make your bedroom as
conducive to sleep as possible.
 Sometimes the home
environment just isn’t
conducive to reading.
 Of the two, motivation by
anxiety is probably the more
conducive to rote-learning
because, as we have already
seen, it has an inhibitory effect
on the reflective activity of
intelligence.

그 응답 으로서 , 반응 , 회신
 A “Cookie” Exchange guards
against simple flooding attacks
sent with bogus IP Sources or
UDP Ports. Each party passes a
“cookie” to the other. In return,
a list of supported Exchange-
Schemes are offered by the
Responder for calculating a
shared-secret. 보호, 방어, 막아준
다, 막는다; 전달, 송신, 보낸다
 In response, the server will
also send its own
ChangeCipherSpec message.
 The responding system replies
with a packet with both the SYN
and ACK flags set.
 I asked her what her name was
but she made no reply.
 I am writing in reply to your
letter of 16 March.
 The Supplicant PAE sends a
Response packet in reply to
each Request.

in doing so: 그렇 게 하면서 , 그렇게 할 때 , 이 때


 In doing so, it is important to
ensure that the curriculum that
results includes at least the
minimum coverage specified in
the core of the body of
knowledge.
 In so doing we also give
definitions of useful expressions
from the languages of those
logics.

“얼핏 보기에는 , “표면 상으로 는


 Contrary to first
appearances, this need not
result in an overly complex logic.
첫 인상과는 달리, 보기와는 달리
 On appearances, the password
is not intelligible, but with
standard Unix utilities, the
passwords can be decoded
without too much difficulty.
 On the face of it, it seems like
a great deal.
 What may, on the face of it,
seem obvious often turns out to
be far more complicated.
 On the face of it, that seems
to make sense. But the figures
don’t add up.
 At first glance, it seems
natural to ask that the beliefs
formed by the verifier and by
the responder are in agreement.
On second thoughts, this
definition does not capture
authentication very well.
 At first glance, it may seem
unlikely that there would be a
one-to-one correspondence
between …
 At first glance, the problem
seemed easy.

“표면적 으로는 , 표면상 으로는 , “겉보 기에는 , 겉으로 는


[“surface]
 On the surface, this seems like
a difficult problem, but in fact
there’s an easy solution to it.
 On the surface, they appear to
behave identically. But “pf” will
evaluate no matter what gets
passed to it.
 On the surface, it seems a
simple story.
 Half an hour later he had calmed
down, at least on the surface.
 It seems like a good idea on the
surface but there are sure to be
problems.
 On the surface, he appeared
unchanged.
 Back in Britain, things appear,
on the surface, simpler.

“늘/”흔히 /”자주 /”대개 /”대부분 의 시간 /”time


 As usual, the “iterator” has
abbreviated forms. 보통처럼, 늘
그렇듯이, 의례히 그렇듯이
 Alternatively, and as is more
usual in the literature, the
revocation could be done by the
issuer of the certificate rather
than by the owner of the
certificate. 일반적, 흔히 그렇듯이
 As always, the latest
information is available at the
URLs listed at the end of this
advisory. 늘 그렇듯이
 As always, one has to
understand what one is trying to
do.
 Note that when used, as is
common, without client-side
certificates, the SSL protocol is
subject to a similar form of
connection depletion attack. 흔히
그렇듯이
 A receiver of a certificate may
accept it at face value or, as is
more probable for critically
important transactions, wishes
to verify that it is still valid, for
example in case there is …
 Nevertheless, clever design has
its limitations when delay is
excessive, as is often the case
in the public Internet. ~에서는 흔
히 그렇듯이
 It is quite commonly (=
often, usually) the case that
one wishes to prevent this sort
of thing from happening.
 In most cases, …
 Many times it will get you out
of a bind (= nuisance). 자주, 종
종; 곤란, 해결
 Of course, each of these security
breaches has happened,
probably lots of times. 자주
 Most often, this information is
comprised of a user ID and
password. 대개, 보통, 흔히
 Most of the time, these
ingenious workarounds will
weaken the overall security level
of the enterprise.
 … this decision procedure will be
right a vast majority of the
time.
all too often (also only too often): used to say that sth sad,
disappointing, or annoying happens too much; 너무 자주
 All too often, the graphics are
sheer data dumps, loaded with
needless information, poorly
organized, and visually
cluttered.
 All too often doctors are too
busy to explain the treatment to
their patients.
 This type of accident happens
only too often.
 All too often the animals die
through neglect.
 Like the problem of selecting an
implementation language,
recommending a strategy for the
introductory year of a computer
science curriculum all too often
takes on the character of a
religious war that generates far
more heat than light.

in the main: “주로 , “대개 , “대부분 (= generally,


mostly, in general, on the whole)
if you say that something is true in the main, you mean that it is
generally true, although there may be exceptions.
 The need for these facilities in
respect of data communications
is viewed, in the main, as an
Administration-imposed
requirement.
 In the main, we proceed from
the particular to the general.
 Their job in the main consisted
of cleaning and maintaining the
building.
 Her friends are teachers in the
main.
 Tourists are, in the main,
sympathetic people.
 In the main, children are taboo
in the workplace.
in much of
 In much of the following, we
therefore assume that the
channel is physically degraded.
 In much of what follows, the
reader may wish to assume that
n is even; when n is odd, almost
everything that we prove may
be deduced immediately from
the decomposition
 In much of the technical
discussion which will follow,
there will be no a priori
assumptions about the identity
of the guilty party.
 In much of the following
discussion, it will be necessary
when resolving to consider the
relationship between rule
elements such as conditions or
individual action terms.
 In much of our discussion, the
input is assumed to start at t =
0, unless otherwise mentioned.
 However, in much of coding
theory the source
messages/words are irrelevant
and will be ignored.
 I shall therefore ignore the
formal need for minus signs in
much of the mathematics in
this (and the following) chapter.
 Snow and ice storms, for
instance, are anything but
uncommon in certain areas of
the United States and in much
of Canada.
 For more than 20 years,
copyright has been the primary
mode of intellectual property
protection for software in the
U.S. and in much of the rest of
the world.
 This is a well-known account of
life in early America, and a
familiar account of life in much
of America, and the world,
today.
 It will become increasingly
evident in the next few years
that GSM will be the only
telecommunications service
available in much of Africa.
 One predominant feature in
much of the work of the 3GS3
project has been a continuing
commitment to standards
contributions, both in ETSI and in
ITU-R.
 In the typical undergraduate
linear algebra course, only the
field properties of the real or
complex numbers are used in
much of the work.
 We shall study the question of
which polynomials are
irreducible in much of this part
of the book.
 Despite these distinctions, we
need not be concerned with the
details of cryptosystems; we
treat them rather abstractly (as
black boxes) as in much of the
literature.
 As in much of computer
science, the early work on data
security dates back to the
beginning of the seventies.
 As in much of the terminology
of mathematics, the actual
English words used in a term
should not be assumed apriori to
carry any particular meaning.

“차이 , 변화 , 달라 지다 , 변하다
 “Teddy, you have it all wrong.
You were the one who taught me
that I could make a difference.
변하다, 변화, 달라지다
 At first sight, the only difference
between …
 The order in which we write x
and y makes a difference. 다
르다, 차이가 있다
 The only difference is the
way that V’s TTP recovers the
session key K.
 There is an important
difference here in that an
attacker with knowledge of a
compromised key could produce
a fraudulent suicide note, which
would prevent the owner from
using its certificate, a denial of
service attack. Another
important difference is that
the suicide note refers to one
certificate only, whereas the …

“표기 , “명칭 , “부르 겠다 , “notation


 In order to reason more precisely
about cryptographic keys
(hereafter called keys), the
concept “shares the good key”,
denoted by the symbol …
requires refinement. 지금부터 ~
라고 부르겠다, 지칭
 The following notation is used
throughout the paper. ….
 The following notation is
used to describe security
protocols and cryptographic
operations:
- A, B are principals, such as
communicating nodes;
- NA is a nonce generated by A;
- M 1 | M 2 denotes the
concatenation of messages M 1
and M 2 .
 We use the following notation
to describe the protocol.
 From now on we shall often
simply write gh instead of g⋅
h. 간단히, 간단하게
 We then analyze the well known
Needham-Schroeder protocol,
henceforth ‘NS’, as an
example. When the specific
value of the key is not of central
focus or is evident by context,
we write simply PKd(A). 간략한
표기를 소개
 We use “ ” here to mean the
left hand side rewrites to the
right-hand side in a single step.
표기 설명
 We now introduce another use
for the plus sign. By the
expression x + y where x and y
are strings of characters from an
alphabet, we mean “either x or
y.”
 Throughout this paper, we
use the term administrative
domain to denote an IP service
providereither an operator or
Internet service provider.
 The standard way to denote
these cycles is by the notation
(1,3,2), (4,5), and (6)
respectively.
 As a notational convention,
we use E (and variants) to
denote events, while M is a
message and C is a spell. 관례,
관습
 Instead of writing out the
whole phrase “finite
automaton,” it is customary to
refer to one by its initials, FA.
Computer theory is rife with
acronyms, so we have many in
this book. 관습, 관례, 대개, 보통
 We use the notation e(X,Y) to
mean the encryption of word Y
with key X, and d(X,Y) to mean
the decryption of word Y with
key X. Multiple encryption is
represented by the use of
nested functions; e.g., if we
encrypt word Z with key Y, and
then decrypt that using the
decryption of word X with word
W, that is denoted by
d(d(W,X),e(Y,Z)).
 We give some abbreviations
that will be used in the
exercises. First, let WS and SS
stand for the Weakest
induction Step and Strong
induction Step:
WS: …
SS: …
Next, let A mean that all P.n
are true:
A: …
Finally, let WI and SI denote
Weak Induction and Strong
Induction:
WI: …
SI: …
 Define occurs(‘v’, ‘e’) to mean
that at least one variable in the
list v of variables occurs free in
at least one expression in
expression list e.
 The IETF working group’s
solution was the Point-to-Point
Protocol, more frequently
called PPP.
 In the protocol description that
follows, the letter “I” is used to
refer to the initiator and the
letter “R” is used to refer to the
responder.
 You signify this number by
writing …
 To embrace the idea of a
signed message and an
encrypted message, we use
the following notation and
semantics (notation for the first
differs from BAN): …..
 The symbol used signifies that
the frequency is measured in
kHz.
 SU[●] indicates the signature
on the specified argument using
the private signature key of
party U. {●}K indicates the
symmetric encryption of the
specified argument under key K.
 Here, and throughout, the
notation {X}K indicates the
string X encrypted using the key
K.
 The simple expression x* will be
used to indicate some
sequence of x’s (maybe none at
all). This x is intentionally
written in boldface type to
distinguish it from an alphabet
character. 굵은 글꼴
 … That is, x* stands for a string
of x’s, but we do not specify how
many.
 A matrix A is said to be row
equivalent to a matrix B,
written A ~ B, if B can be
obtained from A by a finite
sequence of the following
elementary row operations: …
 The union of S and T is denoted
S ∪ T.
 An atomic event in a key
establishment protocol is a
single transmission of a
message from one principal to
another. This is also called a
pass of a protocol. To indicate
that a principal A sends a
message m to a principal B, we
write (A → B : m). Note that m
may consist of plaintext or
ciphertext or both. For example,
if A wants to use encryption to
ensure the confidentiality of a
plaintext ptxt, the transmission
would be written as (A → B : f
ptxt g K AB ), where f ptxt g K AB
denotes the message obtained
by encrypting ptxt using a
(secret) cryptographic key K AB
shared by A and B.
 Each circle represents a state
of the machine … The unlabeled
arrow pointing to “0 deposited”
indicates that this is the initial
state of the machine. The double
circle around “$1 or more
deposited” indicates that a
bottle of juice is released when
the machine has reached this
state.
 The left-hand side expresses
the input f(t) as made up of the
impulse components in a
manner depicted in Fig. 2.3a.
 We name it pList, for pointer to
list. … This last pointer is often
called either pLast, for pointer
to last, or pRear, for pointer to
rear. ~라는 뜻으로 ~로 이름 짓다
“shorthand
 Mathematical symbols are
shorthand for phrases and
sentences in the English
language.
 That is short-hand for “Is part
(b) of the above technical
definition satisfied?”
 … where na is shorthand for
the sum of n-many copies of a.
 Now the definition given on p.43
simply says that the authors will
use the phrase "complement of
gamma" as shorthand for
"complement of the image of
gamma".
 Of course, … is really
shorthand for a set of m linear
equations in n variables …
 We use B as shorthand for P(S
? O ? A).
 Often, we write G as a
shorthand for Gn.
 Note that we frequently write
i 2 A as a shorthand for Pi 2 A.
 Here, we use ‘ballot’ as a
shorthand for ‘voted ballot’,
which literally means ‘a sheet of
paper filled out to cast a secret
vote’.
 The name diff is shorthand
for difference, derived from
getting a list of the differences
between two files.
 msgs = shorthand for “all
previous messages”
 We’ll use “virus” as shorthand
for a virus, worm, or other such
malware, since the term virus
seems to be in common usage.
 which is shorthand for the
following expression:
 TCP/IP is the usual shorthand
for a collection of
communications protocols that
were originally developed under
the auspices of the U.S. Defense
Advanced Research Projects
Agency
 SA(X) is used as a convenient
shorthand for S(X, s A), as
defined in Chapter 8.
 LBT Shorthand for “listen
before talking.”
 Most processors support a NOP
instruction that literally does
nothing. It is shorthand for no-
operation and has many uses.
symbolically; in symbols
 This can be restated
symbolically as follows:
 Therefore in symbols the
economists argument is: …
 If x is an object of type P, we
write, in symbols, x : P.
 … may be expressed in
symbols as C(x), where x
represents a variable of type
student.
 The identity relation on A, in
symbols 1A : A → A, is given by
1A = { (x, x) |x ∈ A }
 The length of a word P, in
symbols Ig(P), means the
number of letters in P when each
letter is counted as many times
as it occurs.
 The unique x is called the first
projection and the unique y is
called the second projection of c
- in symbols (we are using
notation due to Moschovakis),
zr(c) and 3(c) respectively.
 In symbols this statement has
the form: …
 In symbols, we denote B as
B[x], or …
 Two states are (behaviorally)
equivalent if they have the same
behavior. In symbols: …
 As is traditional, we write 2S to
denote the powerset of S. In
symbols, 2S = { x | x ⊆ S }.

“confusion, “ambiguity, “혼동 , “표기


 The M is omitted when there
is no possible ambiguity.
 If there is no confusion
about the actual choice of the
prime number a, one often
writes ~ instead of ~. “혼동이
없을 경우, ~대신 ~로 간략히 쓴다
 Usually multiplication is
denoted by juxtaposition
without a dot, if no confusion
results.
 When no confusion can arise
(= when no confusion arises),
we also use f(x) to denote the
probabilistic result of applying
algorithm f to input x. (“arise)
 When no confusion can arise,
the complement of E is written
Ec.
 We may sometimes simply refer
to P as a program, when no
confusion can arise from
this. We call σ the type of the
program decI in P (and
sometimes just say σ is the type
of P)
 We will write it simply x when
no confusion can arise.
 Nevertheless (when no
confusion can arise) a field F
endowed with a specific global
field structure will be called a
“global field” and we will
denote it (along with its global
field structure) simply F.
 In general, we identify
elements x and singleton sets
{x} whenever there is no
danger of confusion.
 Where there is no danger of
confusion, we may simply
denote the semigroup by A.
 When there is no danger of
confusion we also write …
instead of …
 We shall often/frequently
omit indices when there is no
danger of confusion; e.g. we
shall write … instead of … We
also abbreviate …=….
 Therefore, the danger of
confusing the two
augmentations g, y is not grave.
−In the literature, the name
“index” is also used for g.
 Its value on M is denoted by …,
or simply … when there is no
danger of confusion.
 We write … = … if there is no
danger of confusion.
 To reduce the danger of
confusing the explanations
with the examples, certain
formatting conventions have
been used.
 The identity element for the
addition law in V is denoted by
0, or by 0V if there is danger
of confusing the zero vector
with the number zero.
 A name for the association is
placed near the path but far
enough from an end so that
there is no danger of
confusion.
 Within a collaboration there is
little danger of confusion, as
all the participants are roles.
 In practice one often uses the
same symbol for a restriction
where there is no danger of
confusion.
 When there is any danger of
confusion, graphs are called
simple graphs.
 However, in this section there
is no danger of confusion if
we use … to denote …; in the
next section we shall be more
pedantic.
 … and therefore there is no
danger of confusion if we
drop the parentheses and
simply write … for …
 When there is no danger of
confusion, the symbol ⋅ can be
deleted, just as in writing
algebraic products.
 Care should be taken so as
not to confuse this with + as
an exponent. 혼동하지 않도록 주의
 It is denoted by ordm a, or simply
ord a if omitting the modulus
does not lead to confusion.
 When the context allows, we
leave out … and write … as …
. 생략하고
 When the context allows, we
drop … and write … . 생략하고

“표시
 The emergency exit is shown in
(= indicated in) green letters.
~로 표시
 The sections shown with an
ellipse (…) must be filled in for
the particular application
created.

“어려 움, “difficulty
 I had difficulty getting any
details. He wasn’t very
forthcoming(=willing).
 This difficulty is at the core
of the debate over key recovery.
 In fact, an incomplete logic that
gets us most of what we want
easily is generally preferred
over one that gets us all of what
we want but with greater
difficulty.
 As a further difficulty,
generation of keys may face
legal restrictions in some
jurisdictions.

“extreme
 In the extreme, providing no
network services at all will result
in a very secure but useless
commercial system. 극단적으로는
 At one extreme, RADIUS does
not require … At the other
extreme, the user is not willing
to wait several minutes for
authentication. 한편으로는… 그
반대로…

“분류 , “구분 , “종류 , 타입 , “범주 , “fall into


 ATM card based systems fall
into this category. 이 범주에 속
한다.
 Solutions to this problem fall
into a variety of categories.
 Probability calculations often fall
into one of two categories:
forward probability and inverse
probability.
 Leaders fall into two
categories.
 Many illnesses fall into the
categories of stress-related
illnesses.
 Wiretapping is subdivided into
passive and active categories.
 We further divide pipes into
two broad classes: general pipes
and service-specific pipes.
 What services might a network
application need from a
transport protocol? We can
broadly classify an
application’s service
requirements along three
dimensions: data loss,
bandwidth, and timing.

“여러 가지 , 여러 가지 , “다양한
 Solutions to this problem fall
into a variety of categories.
여러 가지 다양한 범주, 종류로 나눌
수 있다, 분류
 The Web is already being put
to a variety of uses:
educational, social, political, and
commercial. 다양한 용도
 It is an important issue, since,
as we will see, session key
distribution protocols must resist
a variety of novel attacks. 여러
가지/다양한
 A future mobile user will be
offered a much larger variety
of services than in today’s
networks.
 Any defined EAP method can be
used within IEEE 802.1X,
enabling support for a wide
variety of authentication
credentials.
 There is a diversity of both
educational objectives and the
means by which we measure the
attainment of these objectives.
 In this way the work retains its
unity but can have a wide
diversity of atmosphere.
 But despite the rich diversity
of issues raised, there are some
disappointments.
 Such behavioral diversity
serves the same function as
genetic diversity, and indeed
compensates for restrictions on
genetic diversity.
 Remote access servers vary
widely in their functionally.
 For various reasons, we
consider this to be the most
useful definition of
authentication: it insists that the
two agents agree on all the
essential features of the protocol
run, while avoiding specifying
features that are hard to
achieve and less likely to be
required. 여러 가지 이유로, ~하는
한편, 별로 ~할 것 같지 않다, 가능성
 With the vast array of security
options available, users will
choose to use the stock
configuration rather spend the
time to lock down a host or
network.
 This will be of manifold
advantage. First, … 여러 가지 장
점이 있다.
 Amongst other things, such a
foundation can give us
assurance that the reasoning in
the logic is sound (i.e., false
conclusions cannot be derived
from true premises.) 여러 가지 중
에서도
 It also has a range of other
options relating to the way a
workspace is handled. 여러 가지,
방식, 방법
 In a wide/vast/impressive
array of contents, it has been
found empirically that the
statistics of noise are well-
described by normal
distributions, and the central
limit theorem provides a
convincing explanation for this
phenomenon.
 There was a vast array of
colors to choose from.
come in … varieties/forms/flavours: 여러 가지 다양한 종류/형태
로 나타난다
 These devices come in
different forms and are
typically used in branch office
and corporate networks. .
 Key establishment protocols
come in various flavours (= a
type or kind of something).
 Symmetries can come in
several varieties.
 Computer problems come in
different varieties; some are
easy, and some are hard.
 Computer network attacks can
take many forms and any one
attack may include many
security events of different
types.
 다양한보다는 많은에 더 가까운 어
휘는 “많”을 키워드로 쳐서 찾을 것!

“기인 , 근거 , 이유 , 기원
 While the obvious limitations are
rooted in (= having as their
origin or cause) the nature of
wireless devices and data
networks, there are also more
fundamental differences that are
important to understand.
 This incompleteness can be
attributed to the limitations
associated with our current
models of cryptographic
protocols.

“지금 까지 , “이제 까지 , “최근 까지 , “현재 , “지금 , “시



until now, etc.
 Up until now, remote
connectivity to a corporate
Intranet has been made by
means of circuit-switched
technologies, e.g. PSTN and
ISDN.
 Up until the early 1990s this
was the standard way of doing
things. 90 년대 초까지
 Until recent years 최근까지
 But, until recently, these
networks were essentially
hardwired, offering little
flexibility.
thus far
 Thus far we have discussed the
rather negative properties of
protocols: establishing that they
do not allow certain undesirable
behaviours.
 We haven’t had any problem
thus far.
 Her political career thus far had
remained unblemished.
 They’re delighted with the
replies they’ve received from the
public thus far.
 We have thus far required that
the arguments p1 and p2 be
strictly positive.
so far
 In the examples given so far we
have used SetDelayed (:=) to
define functions. 지금까지, 이제까

 So far we have not had to
borrow any money.
by far
 However, Ethernet technology is
currently by far the most
prevalent access technology in
enterprise networks. 현재로선 지
금까지
 By far the most controversial
aspect of the EES system,
however, is key escrow.
 By far the most popular LAN
topology is Ethernet.
 Since Ethernet is by far the
most popular topology, we will
cover it in detail here.
Etc.
 The techniques presented up to
this point for protecting
sensitive documents on Web
servers from unauthorized eyes
can be considered basic forms of
access control.
 Research to date has
encompassed public key
techniques for authentication
and key transport, but not for
key generation. More
specifically, public-key based
key establishment protocols in
which both parties contribute to
the established key  referred
to as key agreement protocols
 have not previously been
analyzed by these methods. 지
금까지의, 최근까지의 연구; 더 구체
적으로 말해서; 소위
 Thus upon successful
completion, A believes that B
conveyed TB in the current
epoch, as an intended response
to the specific challenge RA. ~했
을 때; 현재, 지금
“아직은, 아직까지는, 지금까지는, 현재로선
as yet (or as of yet): until now or until a particular time in the
past; up to this moment; up to the present time; up to now;
used for talking about something that has not happened or been
done up to now
 While it seems that this should
be the case, as of yet it has not
been formally proved.
 We cannot as of yet explain the
direct application of these
entities to the normal
experience of a programmig
student. That does not mean
that their importance must be
accepted on blind faith –
merely patience. They will be of
utmost special value for us in
the all-important next chapter.
 There are as yet no accepted
standards for wireless
transmission.
 Despite the success of his last
album, there are as yet no
plans for any follow-ups.
 an as yet unpublished report
 As yet little was known of the
causes of the diseases.
 A deal is still being worked out,
but as yet nothing is finalized.
 Police stated that there have
been no arrests made as yet.
 The report remains unfinished
as of yet.
 As yet it is not known whether
the crash was the result of an
accident.
 We have not as yet received a
response.
modern-day (= present-day, contemporary, “현대, “현대판)
 In modern-day public-key
cryptosystems, the encoding
user and the decoding user
access different keys to decrypt
a message.
 The fast-moving demands of a
modern-day sport
 …the by-products of modern-
day living
 Boxers are modern-day
gladiators. 현대판
 Even in modern-day Britain it
seems some people still believe
in sorcery and black magic.
at present: at this time; now.
 “Are you busy?” “Not at
present.”
 At present she's working
abroad.
 Very few of the systems in
common use at present
support easy and scalable
interworking between
authentication domains.
 Ms. Hellman is busy at present,
can she ring you later?
 In the machine we have at
present, this is no problem
because the state x1 on FA1 can
never be reentered (no edges go
into x1).
 At the present time the
development of regulatory policy
for cryptography in many
countries appears to be in a
state of flux. And much the
same can be said for the
technical solutions for key
escrow/recovery. Therefore
Business is in the position
where it needs to try and
influence the outcome. One
way of doing this is by stating
what it considers to be suitable
goals and criteria to which
acceptable key escrow/recovery
regulations and solutions should
aspire.
The main points to emerge
from work package 1 in these
respects are as follows. 한 가지
방법/방편은

“시간 ”, “경과” , “시점 , “미래

“과거
 Back in the early days, TCP/IP
standards writers adopted the
word gateway for what the
commercial marketplace now
calls a router. 초창기에는
 In earlier times, an
organization would use a single
subnet mask through an entire
network. 처음에는, 초창기에는
 There have been many
examples in recent times of
individuals in sensitive positions
violating the trust placed in
them. 최근에
 The router price/performance
ration has decreased steadily
over the past few years. 지난
몇 년간, 최근 몇 년간
 During the past few years,
other networking technologies
like frame relay and ATM have
become available for forming
corporate networks.
 Within the past few months
it has become obvious that there
is a great deal of interest and
financial stake involved in the
deployment of protocols for … 최
근 몇 달 새, 최근 몇 개월 새, 최근 몇
개월 사이에, 지난 몇 달간
 Just over a year ago, the idea
of a single wireless data
standard was unheard of, yet
today the WAP specification is
available to the public. 불과 1 년
전만 해도… 그러나 지금은 / 들어본
적이 없다
 Although the Web only started
gaining popularity around
1993, the underlying concepts
for the Web have been around
for quite sometime.
 … which was given to them
some time in the past. 과거 어
느 시점에
 In the late eighties BAN
developed BAN logic, which
quickly became the most widely
used and widely discussed
formal method for the analysis
authentication protocols,
particularly authenticated key
distribution protocols. There
have since been a number of
papers noting BAN’s inability or
limited ability to reason about
some features of both protocols
and attacks on protocols. This
has led several authors to
propose alternatives to BaN.
Many of these proposed
alternatives are essentially
extensions. ~년대 후반에; 그 이
후, 그 뒤로
 As a director for over a
decade, I established myself as
the leading expert in both … 10
여년간

“미래
 There are few chances that the
world will ever agree on a single
electronic purse scheme in the
near future. 가까운 장래에, 미래
 And, in the very near future,
Odyssey Server will be able to
forward WLAN authentication
reqests to Steel-Belted RADIUS,
to authente WLAN users against
non-Windows back-end
databases such as token
systems or SQL.
 Within the next 2-3 years,
SET will become the
predominant method for doing
credit card payments on the
Internet, initially in software
only, but later supported by
smartcards. 향후 2, 3 년
 … the above scenario appears
likely in the not-so-distant
future. 멀지 않은 장래에
 A CSMA protocol works as
follows: A station desiring to
transmit senses the medium, if
the medium is busy (i.e. some
other station is transmitting)
then the station will defer its
transmission to a later time, if
the medium is sensed free then
the station is allowed to
transmit.
 The comments should be
sufficient for another
programmer, or you at a later
date, to understand the purpose
of any particular piece of code,
and to understand how it works.
 In course of time, new and
increasingly abstract
representations of value were
introduced. 시간이 지나면서, 점차
 Sometime in the future, PPTP
is going to be supplanted by
L2TP. That future is not here yet,
however. 언젠가는
 At a later time, a subset of
participants B ⊆ P will pool their
shares in an attempt to
compute the key K. 나중에
 If a transaction can be carried
out using computer technology,
it is certain that at some time
or other a client will decide to
do so. 언젠가는
 After a time, the table will be
full and the target system must
start discarding SYN packets or
removing half-open connection,
and it has no way of
distinguishing between valid
connections and connections
from an attacker. 구분/구별/차이
식별
 After some time, I will get a
message that confirms my
enrollment. 얼마 안 있어, 얼마 지나
면, 조금 있으면,
 At some future time,
governments will probably
legislate regarding archiving of
electronic certificates. In the
meantime, the issuer could
offer … 향후, 미래, 지금, 당분간, 시

 This is all you need to know
about the evaluation process
for now (= for the present 당분
간, 우선은); any further details
would serve to confuse rather
than to illuminate.
 Let’s set this knowledge aside
for the moment (for the sake
of learning how to use some of
the available tools in situations
where we don’t know if we have
an isomorphism).
 Everything that you give a name
to in a program (a variable, or a
function, or anything else)
only exists for a finite period
of time, the maximum being
the entire duration of program
execution. 기타 등등, 그 밖에 어떤
것이든, 유한한 기간 동안, 일정 기간
동안
 For example, say that all seniors
in one program have difficulty
with a specific thermodynamics
course over a period of
several years.

“때, “시점, 경과 등등
 Over time, various formalisms
have been proposed for
investigating and analyzing
protocols to see whether they
contain blunders. 시간이 지나면서
 As time goes on and attacks
evolve, the prevalence of
various attacks will no doubt
change. 시간이 지나면서; 틀림 없이
 … , which is efficiently retrieved
from the issuer’s server in a
fraction of a second. 몇 분의 일
초 안에, 매우 빨리, 매우 짧은 시간
안에
 At any one time, the machine
can be in one of a finite set of
internal configuration or states.
특정 순간, 특정 시점, 시간
 It’s just too challenging, or
difficult, or expensive to acquire
and use the technology
necessary to break into the
system (at least as far as we
know, and at this point in
time, what people will come up
with tomorrow is anyone’s
guess). 침입, 공격, 침투; 지금 이
시점
 At the time that IPv4 was
designed, no one could have
dreamed that there would be
millions (and someday billions)
of networked computers in the
world. 때, 시점
 Section 2.4 Properties of the
mechanism.
We next observe a few
significant properties of the
proposed mechanism.
- First note that a user can
arrange for his send key pair to
be changed at any time. 살펴보
자, 고찰, 도입; 언제라도, 어느 때라

 Either party may initiate an
exchange at any time. 언제라
도, 어느 때라도
 Sometimes this is exactly what
you need, but at other times
you need more flexibility.
 Because many kinds of
information must be kept
confidential for long periods
of time, assessment cannot be
limited to the protection
required today. Equally
important, cryptosystems –
especially if they are standards –
often remain in use for years or
even decades. 오랫동안/오랜 시간
동안, 또 한가지 중요한 점은; 사용중
인, 사용하는, 사용하고 있는, 쓰고
있는
 … but it will not keep out a
determined cracker for (very)
long. 오랫 동안
 Will you be away for long?
 I’m sorry I haven’t written to you
for so long. 연락, 편지
 ~ 할 “때까지, … 시점까지
 The Count had resolved to wait
until after Christmas to
propose to Gertrude.
 They have to wait till after
school.
 In other words, the Authenticator
cannot execute the Pairwise Key
Hierarchy until after it has
received the second message of
the four-way handshake.
때가 되었다, ~할 때다
 We believe the time is right to
question this two-course
assumption.
 Now is the right time for us to
move to London.

“범위 안/밖, “해당


 facts that fall outside the
purview of this inquiry
 Rather than presenting rigorous
software analysis techniques
that fall under/within the
purview of commercial
software developers, this section
presents vulnerabilities that are
most commonly exploited and
can be tested, detected, and
corrected at the Web site.
 The job falls under the heading
of “sales and marketing”.
 Meat and poultry production fall
under the control of the
Agriculture Department.
 The judge said that this matter
did not fall within the scope of
the auditor’s duties. 소관
 Communication links between
these entities (and the protocols
used in communications across
those links) do not fall within
the scope of this project.
… It is beyond/outside the
scope of this project to provide
Certificate Authority (CA)
mechanisms, certificate chaining
capabilities, or mechanisms for
certificate revocation. 범위에 속
하지 않는다, 해당되지 않는다, 범위
밖이다.
 The method through which the
information is exchanged is
unspecified but lies outside
the realm of the IKE
negotiation itself. 범위 밖
 These systems have been
largely designed to support high
value payments (or
macropayments) in the range
of tens of dollars or above. 범위
안에 드는
“범위 기술 (수학적)
 Continuity of f at a point c is
defined as follows. Choose any
distance ε > 0 . Suppose for any
such distance ε that another
distance δ > 0 can be found
such that for all points x within
distance δ from c, f.x is within
distance ε from f.c.

“적절 , 어울리 지 않는다 , “적당


 However, they are generally
not suited to low value
payments (or micropayments) as
the use of computationally
expensive cryptographic
mechanisms and – above all –
the on-line authorisation for
each payment may not be
economical.
 The above mode of operation
doesn’t quite suit the
requirements of the access
point.
 The question remains whether
this is a felicitous arrangement.
We also examine whether or not
this breakdown is felicitous (=
appropriate, suitable) for
protocol analysis.

phase out
= stop, discontinue, eliminate or remove something in
stages/phases or gradually;

= bring something gradually to an end over a period of time

= “사라져 간다, “없어지고 있다, …을 단계적으로 정지/폐지/제거하다


 The bus service to country areas
is being phased out.
 An earlier link layer protocol for
point-to-point communications
called Serial Line IP (SLIP) (RFC
1055) has become widely
deployed, although it is being
phased out.
 Many airlines have begun to
phase out (= stop using)
airplanes 20 years old or older.

“as, “듯이 , ~이듯이 , ~하듯 이, “처럼 , “같이


 They lost money, as was
expected.
 I am sending you the bill, as
was agreed.
 As is well known, smoking is
dangerous.
 Some expressions beginning
with as are used to introduce
facts which are 'common
ground' - known to both
speaker/writer and
listener/reader. Examples are as
you know, as we agreed, as you
suggested. As you know, next
Tuesday's meeting has been
cancelled. I am sending you the
bill for the repairs, as we agreed.

There are some passive


expressions of this kind - for
example as is well known; as
was agreed. Note that there is
no subject it after as in these
expressions (see 581). As is
well known, more people get
colds in wet weather. I am
sending you the bill, as was
agreed.
 Even both transcendental and
algebraic equations can lead to
the same differential equation,
as is seen in the equations
 Those functions that consist only
of logarithms can also be
differentiated, as is clear from
the following examples.
 If, as is commonly the case, we
take the sum of a series to be
the aggregate of all of its terms,
actually taken together, then
there is no doubt that only
infinite series that converge
continually closer to some fixed
value, the more terms we
actually add, can have sums.
 Even with this agreement, the
difficulty is not eliminated, as is
suggested by the following
series:
 in which the fourth term is equal
to 0, as is the third.
 It follows that a series of powers
of the natural numbers will have
constant differences, as is clear
from the following scheme:
 It follows that if X is a first-
degree polynomial, as is ax+b,
then its difference ΔX is the
constant a.
 Nor can we here offer a
definition at the beginning of
this dissertation as is
sometimes done in other
disciplines.
 The artful funeral of Constantine
constituted a model for a
subsequent elaboration of the
Byzantine ceremonies for dead
emperors, as is depicted in the
Liber de caeremoniis and in
panegyric poetry.
 As is characteristic of
apocalyptic literature, the book
is pseudepigraphically ascribed
to a biblical figure, in this case to
Zerubbabel, the last ruler of
Judaea
 By the middle of the Tang
dynasty (eighth century),
Amidism had become a powerful
movement, as is attested by the
popularity of Amidist literature
and the innumerable icons and
votive inscriptions devoted to
the Buddha of the western
paradise.
 As is the case with many other
new churches of its kind, the
Universal Church gives priority in
its practice to the rite of
exorcism of evil spirits, which
are said to block progress to the
kingdom of God.
 It is difficult to answer the
question whether Adonis was
initially a god of vegetation in
general, a vine god, a tree spirit,
as is suggested by his birth
from a tree, or a grain spirit.
 Although, as is always true in
humanistic disciplines, no
general theory on the “primitive
mind” has been universally
accepted, one methodological
presupposition seems to be
shared by the majority of
today’s scholars: namely, the
“normality” and, consequently,
the creativity of the primal
religions.
 As far as is known, the king
spent the remainder of his
seventeen-year rule within
Amarna.

“또 다른 , 또 하나
yet = even, still
 Yet another problem with SLIP
is that each end must know the
IP address of its interlocutor. For
additional discussion of SLIP, see
Tanenbaum (1996) or Stevens
(1994).
 The mail brought yet another
reply.
 yet another reason

“시작
 To start with, you can select …
시작
 Starting with the next chapter,
we’ll be using console
applications extensively
throughout the first half of the
book. ~부터 시작해서
 In this chapter, we’ll get down
to (= to start concentrating
seriously on something or
getting something done) the
essentials of programming in
C++. By the end of the chapter
you will be able to write a simple
C++ program. 시작
 Now we are ready to get down
to the specifics. In the sections
that follow, we discuss the way
that data is packaged for the
various types of network
topology. We start off with
point-to-point links.
 Now let’s resume our pursuit
that preceded question 12. ~로
돌아가서, 재개, 다시 시작
“시작, “도래, “가져오다, 야기하다
 However, this is just the
beginning. There is more to
come and it may very well
change the way we transact
business. 시작, 앞으로…
 Commerce on the Internet is just
getting off the ground. 이제 막
시작하고 있다. 시작되었다.
 While the Morris worm did little
real damage, it nevertheless
ushered in a significant new
era of security consciousness by
revealing the Internet’s
vulnerability.
 The change of management
ushered in fresh ideas and
policies.
 The legislation should usher in
a host of new opportunities for
school leavers.
 The 1929 crash of the American
stock market ushered in the
Great Depression.
 …a unique opportunity to usher
in a new era of stability in
Europe.
“진입
 As we enter the new
millennium, computer science is
an enormously vibrant field.
From its inception just half a
century ago, computing has
become the defining technology
of our age. 접어들면서, 진입하면
서; 시작부터, 처음부터
set sth in motion/progress/train: to make sth start happening
 A study by military experts was
immediately set in motion.
 The chief executive will set in
train the process of finding a
successor.
 During the Spring semester of
2000, the curriculum committee
set into motion an assessment
plan that includes four major
components: …

“도래 , “오는 , “coming


 With the coming of modern
technology, many jobs were lost.
 This obviously depends on the
weather in the coming
months.
 This coming Sunday is her
birthday.
 I will be back this coming
Friday.
 We look forward to greater
success in the coming year (=
the year that follows from
today).
 They talk of the coming battle.

유례 없는 , 전대 미문 , 미증유
 this was an unheard-of piece of
luck. (= very unusual or has
never happened before)
 Home computers are now used
on a scale unheard-of a few
years ago.
 It is almost unheard-of for a
new band to be offered such a
deal.
 … In the same way that the
first airplane hijacking in the
1960s gave rise to previously
unheard of security measures
at airports, this first attempt at
“cyber-terrorism” ushered in a
new era of security awareness
for managers of computer
networks, particularly networks
linked to the Internet.

“용도 , “목적 , “시도 , “목표 , “이용 , “동기 , 노력 , 의도


 While the intent is to provide
fast Internet access to the
subscribers, many service
providers have begun testing
new technologies such as VoD
and VPN services. 의도
 A shares the good key K with B.
The key is suitable for use as
a cryptographic key in that only
A and B know it, it will not be
disclosed to others, and it can
not be deduced by others. 사용/
이용/용도에 적당하다, 알맞다; ~하
기 때문에, because, ~이므로, 하므
로, 이유
 Photuris is a session-key
management protocol intended
for use with the IP Security
Protocols. 용도, 용, 이용, ~에 쓰기
위한
 It is believed that a few client
programs makes use of this,
which might allow us to remove
the need for users to give their
passwords again just to read
mail.
 “Switch[ ]” makes explicit use
of Mathematica pattern
matching. It is not really like
anything else in other
languages.
 We now introduce another
use for the plus sign. By the
expression x + y where x and y
are strings of characters from an
alphabet, we mean “either x or
y.”
 The Web is already being put to
a variety of uses: educational,
social, political, and commercial.
다양한 용도
 Spread spectrum technology
was first introduced about 50
years ago by the military with
the objective of improving
both message integrity and
security. Spread spectrum
systems are designed to be
resistant to noise, interference,
jamming, and unauthorized
detection. ~하기 위한 목적으로, ~
하기 위한 용도로
 This example is aimed at
illustrating the effect of comma
operator, and is not an example
of how to write good code. 하기
위한 것, 이유, 목적, 하려고, 목표
 PPTP and L2TP are aimed more
at remote VPNs, while IPSec
currently works best for
connecting LANs.
 Over the past few years, BT has
run a range of trials aimed at
exploring different aspects of e-
Commerce. These have
included: …
 At a later time, a subset of
participants B ⊆ P will pool their
shares in an attempt to
compute the key K. 시도하려고
 An active attack is where the
threat makes an overt change or
modification to the system in an
attempt to take advantage of a
vulnerability. 시도하려고
 When we use a road map, we
are often concerned with
seeing how to get from one town
to another by means of the
roads indicated on the map. 관심
을 가지게 된다, 이용해서
 The main motivation behind
the development of SSL was
Web security, but, as figure 1-5
shows, SSL is also used to add
security to other Internet
applications, including those of
the NNTP and the FTP. 주된 동기
는, 주된 이유는
 In an effort to improve
interoperability and security
while decreasing the
proliferation of redundant, or
near-redundant, prots, the IETF
is shepherding work on L2TP as
layer 2 solutions. 노력
 The goal was to create a
problem that would take
BlackHat a long time to solve
even with the aid of a
computer. Here’s what Merkle
devised.
in the interest(s) of: in order to help/achieve sth
 Comparisons between AT and
SVO syntax require a semantic
context as well, and, in the
interest of brevity, we will not
give a presentation of the full
Abadi-Tuttle semantics.
 In the interests of safety,
smoking is forbidden.
 … a call for all businessmen to
work together in the interests
of national stability.
“purpose : “목적/이유(reason)이 아니라 “용도(use)의 뜻이 더 강할 때
가 많다.
 Time is broken into two
periods: the present (the current
epoch, beginning with the start
of the current protocol run) and
the past. Formulas generated
specifically for the purpose
of being fresh are called nonces.
부분으로 나뉜다, 나누어 진다, 구분
된다, 구성된다; 특별히 ~를 위해, ~
의 용도로
 It’s important to note here that
the parentheses, ( ), are not
letters in the alphabet, but are
used for the sole purpose of
demarcating the ends of factors.
So, we can write xxxxx =
(xx)(xxx).
 For the purposes of this
paper, we consider two classes
of “rogue” EES applications:
those that can communicate
only with other rogue systems
and those that can successfully
interoperate with EES “legal”
systems as well.
 For our purposes, more
precision is required.
 Other similar axioms could be
specified, but these suffice for
our present purposes.
 It seems that the money has not
been used for the purposes for
which it was intended.
 I can see no useful purpose
in continuing this conversation.
~할 이유/의미가 없다.
 These comics will serve the
purpose of (= achieve the
result of) keeping the children
occupied during the journey.
 Most of them are destroyed
because they’ve served their
purpose.
 He was asked about casualties,
but said it would serve no
purpose to count bodies.
 All the doctors’ efforts to save
his life turned out to be to no
purpose (= were not
successful).
 These gifts count as income for
tax purposes.
 …the use of nuclear energy for
military purposes/ends…
 The four states in machine can
be characterized by the
purposes they serve: …
“end
 They are prepared to use
violence in pursuit of their
ends.
 She is exploiting the current
situation for her own ends.
 He joined the society for
political ends.
 With this end in view (= in
order to achieve this) they
employed 50 new staff.
 They are working towards
common ends.
to this/that end
= in order to achieve this
= 이런 목적으로, 그런 목적으로, 이런 이유로, 그런 이유로
 To this end, the description of
these systems has been
simplified and does not claim to
reflect the latest version of
systems that are still in
evolution.
 He wants to buy a house, and is
saving money to that end.
 He wanted science students to
take an interest in the arts, and
to this end he ran literature
classes at his home on Sunday
afternoons.
 He wants to cut costs, and to
that end is looking at ways of
cutting the company’s
operations.
 One possibility is to define a
function to this end: f[x_] :=
….
 Mathematica has many
commands to this end.
 We’re willing to make any
concessions necessary to this
end.
Lend itself to
= be suitable for being used in a particular way,
be suitable for a particular purpose or occasion,
~에도 이용할 수 있다, 응용할 수 있다, 도움이 되다, …에 알맞다
= can be considered in that way
 The RADIUS protocol is so
flexible that it lends itself to
other applications as well.
 None of her books really lends
itself to being made into a film.
 The story lends itself to
different interpretations.
 Unlike circuit-switched networks
… packet-switched networks do
not lend themselves to such
abstraction.
 The computer lends itself to
many different uses. 많은 용도로,
다양한 용도로
find one’s way into: 등장하다, 나타나다
 Sensitive information of all
kinds is increasingly finding its
way into electronic form.
Examples include: …
 Its ability to support … has
caused it to find its way into
more corporate (as well as
home) networks than any other
topology.

“use, 도움 , 쓸모
 To be of any use, the null
space must contain vectors
other than zero.
 Internet PKIX certificates have
recently come into use as an
attempt to provide a workable
and acceptable certificate
structure for Internet
applications. 사용하게 되다, 쓰이게
되다
 “Working with Held Expression,”
puts the knowledge gained in
Section 7.2 to practical use.
 Thus, in the realistic model of
an active adversary, the DH key
exchange is of no direct use.

“year
 The survey reported that the
number of companies suffering
intrusions in the previous twelve
months rose to forty-nine
percent from forty-two percent
the year before. 한 해 전
 Industry experts appear divided
between those who believe this
technology is many years
away from widespread
application and those who
believe VoIP to be the wave of
the near future.

“부상 , 등장
 Outsourcing LAN administration
is not a new idea, but it is
rapidly gaining ground as
networks grow in importance
and complexity. 부상하고 있다
 a theory gaining ground
among academics

~ “말해서 , “간단 히, 간단 히 말해서 , “간략 히, “요점 ,


간결 을 기하기 위해 , 간단 한 기술 , 요컨대 , 요는 , 말하
자면 , 결국 , “한마디 로 말해서 , “다시 말해서 , “달리
표현 하자면
 Comparisons between AT and
SVO syntax require a semantic
context as well, and, in the
interest of brevity, we will not
give a presentation of the full
Abadi-Tuttle semantics. 간략, 간단
 These different approaches have
their advantages, but also have
pitfalls as described earlier. In
brief the problem is: 장단점
 We should, in brief, invest
heavily in digital systems.
 For (the sake of) simplicity,
only the information flow in the
error-free case is shown below.
 In short, …
 Simply put, a firewall is a
system or group of systems that
enforces an access control
policy. 간단히 말해서, 한마디로 말
해서
 Network Access Control (NAC) is,
simply put, the ability to set
rules and parameters on a
machine-by-machine basis about
what network traffic is allowed
to enter or leave an operating
system.
 In working with packages, we
are also working with contexts.
To put it simply, contexts are
like directories.
 To put it in a nutshell, we’re
bankrupt. (= to say or express
sth in a very clear way, using
few words)
 Okay, that’s our proposal in a
nutshell. Any questions?
 Well, to put it in a nutshell,
we’re lost.
 This, in a nutshell, is how
closed organizational systems
become self-defeating.
 In a nutshell, this is how it
appears to me.
 The meeting was, in sum (=
considered as a whole), a
disaster.
 In sum, cookies present a
powerful tool for Web servers to
use to enhance their
capabilities.
 The food was good and we loved
the atmosphere and the people.
Altogether (= in total) it was a
great evening. 한마디로 말해서
(“altogether” is used to
introduce a summary when you
have mentioned a number of
different things)
 Stated another way, a
superset of an authorized set is
again an authorized set. What
this says is that the access
structure should satisfy the
monotone property. 달리 말하면,
다시 말해서, 무슨 말이냐 하면
 Each object has its own memory
made up of other objects. Put
another way, you create a new
kind of object by making a
package containing existing
objects. 다시 말해서
 Stated in general terms, a
nested function call is an
application of a function to the
result of applying another
function to some argument
value. 일반적으로 말해서
 Or, put differently, these
properties are exactly what is
needed to prove correctness of
the following algorithm. (달리 말
해서)
 Taken as a whole, the
operations that are to be
performed on the user traffic are
defined by the security protocol,
the cryptographic operations,
and the encapsulation mode. 한
마디로 말해서, 종합하자면
 Couched in generalities, the
report named no one responsible
for the incident. 일반적으로 말해서
 Equivalently stated, Minimal
Encapsulation cannot be used
when an original packet is
already fragmented. 즉,
that is (to say): = in other words; used to give more exact info
about sth or to correct a statement
 Three days from now, that is to
say on Friday
 One solution would be to change
the shape of the screen, that is,
to make it wider.
 Languages are taught by the
direct method, that is to say,
without using the student’s own
language.
 I loved him – that is, I thought I
did.
 They, that’s to say Matt and
John, were arguing about what
to do.
 You’ll find her very helpful – if
she’s not too busy, that is.
 That is to say, there will be no
such thing for Leibniz as ‘mere’
difference of place, and motion
will not be conceived as
transition from one place to
another.

in terms of (= in relation to)


in general/practical/financial etc terms: “적으로 보면/말하자면, ~
적 “관점에서, ~적 “관점으로, ~적 “시각에서, ~적 “시각으로, ~적 “견
지에서 [“terms]
 In operational terms, we are
interested in finding ways of
using the channel such that all
the bits that are communicated
are recovered with negligible
probability of error. In
mathematical terms,
assuming a particular input
ensemble X, we can measure
how much information the
output conveys about the input
by the mutual information.
 In financial terms, the project
was not a success.
 I’ll try to explain in simple
terms.
 We explain in simple terms
what the treatment involves.
 It would be wrong to describe
society purely in economic
terms.
 The war, although successful in
military terms, left the
economy in ruins.
 What do these statistics mean in
human terms?
 In our terms, the scheme has
not been a success.
 Students have less money in
relative terms, but spend more
money on books. “상대적으로
 We wish to protest in the
strongest possible terms (=
to say we are very angry).
 In terms of money, I was
better off in my last job.
 … see life in terms of money
 Feminity is still defined in terms
of beauty.
 It’s a mistake to think of Florida
only in terms of its tourist
attractions.
 It’s too early to start talking in
terms of casualties.
 Did the experiment find any
differences in terms of what
children learned?

to the best of my/our knowledge


내/우리가 알기로는, 내/우리가 아는 한
 To the best of our
knowledge, the only
comparable work is the multi-
party certified mail protocol
proposed by Asokan et al. in [2].
 To the best of my knowledge
there is no IP owned by other
parties.

“나름 대로 장단 점, “나름대 로 강점과 약 점, “장점 , “단


점, “장단 점
 Adopting this pragmatic
approach has its own
advantages and pitfalls.
 There are a variety of
authentication options, each
with its own strengths and
weaknesses.
 The truth is that no ideal
strategy has yet been found,
and that every approach has
strengths and weaknesses.
 End-to-end security comes with
its own disadvantages;
namely, it increases complexity
for the end-user, and it can be
more challenging to manage.
 … There also are
disadvantages. For example, …
단점/문제점도 있다.
 These different approaches
have their advantages, but
also have piftalls as described
earlier. In brief the problem is:
 The principal advantage of
having a program broken up into
functions is that … There is a
further advantage in that …
장점, 이점, 주요 장점, 또 다른 장점
 This will be of manifold
advantage. First, … 여러 가지 장
점이 있다.
 The analysis technique offers
several advantages over
existing ones, even for
monotonic protocols. 비교 장점,
이점

모든 가능성 , 모든 경우 의 수
 Whilst it is possible to build a
certain amount of error-handling
capability into the script, it is
never possible to anticipate all
eventualities.
 We must be prepared for every
eventuality.

“고려 , “감안 , “이유 , “까닭


 Should all the roads under
consideration be two-way, we
have a symmetric relation. 고려
하는, 고려 중인, 해당되는
 But the following lifetime is
recommended in
consideration of (= because
of) performance and security.
 We consider specifically here
the error dependencies due to
failures in adders. 특별히 고려하겠
다, 살펴 보겠다, 다루겠다
 Some points to be considered
as to which device is the most
appropriate one to implement
are: … 고려할 점은, 고려할 사항은
 Given the present lack of means
for secure transactions, one can
only speculate about the
potential for on-line commerce
once these secure transaction
schemes are in place. 고려/감안
할 때, 고려/감안하면; 도입
 This condition is accounted for
by the first summand, 1, that
appears in each factor of f(x). 고
려하다, 고려되다
 I’ve given the matter careful
thought (= the act of thinking
seriously and carefully about
something).
 You may have to give a wireless
network serious thought. Here
are why: …
 He had given some thought
to what she had told him.
 After much thought, I decided
to end my marriage.
in view of: (formal) used to introduce the reason for a decision
or action; You use “in view of” when you are taking into consid-
eration facts that have just been mentioned or are just about to
be mentioned.
= considering; in consideration of
= taking into account; on account of
= bearing something in mind
= because of
= with regard to
 In view of (= considering) the
weather, the event will now be
held indoors.
 In view of (= because;
considering) what you’ve said, I
think we should reconsider our
proposed course of action.
 In view of the fact that Hobson
was not a trained economist his
achievements were remarkable.
 In view of his conduct, the club
has decided to suspend him. 정
직시키다
 In view of the shortage of time,
each person may only speak for
five minutes.
 In view of our difficulties with
money, let’s not go on vacation.
 In view of the circumstances, it
seems best to wait until
tomorrow.
 I saw him struggling but felt
helpless in view of his pain.
take into account
 Later we take theεarrows into
account.
 Thus, every command must be
checked individually to establish
whether and to what extent
it takes “assume” properties
into account.
 … tests that took into account
suggestions solicited from
Professor …
 We are now ready for the
definition of fail-stop modified
slightly to take into account
our slightly different definition of
an event.
 It may turn out to be useful to
pursue this matter further and
see if our framework can be
adapted to take into account
countermeasures such as these.
In the light of (or, in USA, in light of) particular information,
knowledge, etc
= considering or using this information, knowledge, etc in order
to make a decision or understand something;
= after considering something;
= 고려할 때; 고려해서; 비추어
 This development is significant
in the light of what happened
later…
 This should be discussed more
fully, particularly in the light of
the developments in the
University.
 The semantics of confirm(K) are
best understood in light of the
following new Confirmation
Axioms: …
 He wrote the book in the light
of further research.
 In light of this tragic event, we
have cancelled the 4th of July
celebrations.
 In the light of this information
it is now possible to identify a
number of key issues.
(여기서의 의미는 조금 다르다: if
something is possible in the
light of particular information, it
is only possible because you
have this information)

“ease: “편의 , “용이 함, “쉬움


 A simulation study on the use of
digital signatures carried out by
the GMD also identified ease of
use as a key factor for user
acceptance. 사용의 편의성, 사용
자의 수용
 The ease with which “digital”
products can be copied and
distributed presents enormous
challenges for E-commerce. 손
쉽게, 편의성, 큰 문제거리
 In order to ease the burden on
the third party, it is convenient
to make bA a function of the
identity A. 짐을 줄이다, 덜어주다
 Documents could cross
international boundaries with
ease, without the need for
onerous password systems. 쉽게

“경험
 Experience has shown that
secure cryptographic systems
are deceptively hard to design
and build properly.
 Experience has shown that
the best way to develop and
maintain a large program is to
construct it from smaller pieces
or modules each of which is
more manageable than the
original program.
 It is my experience that
different researchers will give
different answers to the above
questions. 내 경험으로는…

“위장 , “가장 , “처럼 보인다


“appear: to give the impression of being or doing something
 Man in the middle appears to
be web server to user, and web
user to server.
 Man in the middle appears to
be web server to user, and web
user to server. 처럼 보인다, 가장
 At the present time the
development of regulatory policy
for cryptography in many
countries appears to be in a
state of flux.
 the interpretation that allows the
attack is what appears to have
been used in the BAN logic
analysis.
 “Man in the middle” appears to
be Web server to user, and Web
user to server.
 The total number of species on
the planet appears to be
growing by leaps and bounds.
 It appears (that) there has
been a mistake. (= it seems
that)
 There appears to be some
mistake.
 It appears to me that (= I
think that) we need to make
some changes. (“expect that”
를 참고)
 It appears unlikely that
interest rates will fall further.
 It would appear that (= it
seems that) nobody on board
the aircraft actually had a
license to fly it.
 It would appear that this was
a major problem.
 It appears as if/as though I was
wrong.
 He tried to make it appear
that she had committed suicide.
가장하려고
 Police have found what appear
to be human remains. ~으로 보
이는
“보기보다, 생각보다
 Determining whether an
approach has been successful,
however, is more difficult than
it might appear.
 It may be less useful than it
appears at first.
Etc.
 If an attacker manages to
replace a user’s public key with
his own, the user is completely
impersonated by the attacker:
all the secret information
intended for the user will be
grabbed by the attacker, and the
attacker can do anything in the
name of that valid user.
 I claim this land in the name of
the King! ~의 이름으로
 An attacker who knows the
password can use it to pose as
a trusted OSPF router and
transmit bogus routing table
information.
 He posed as a health-worker in
order to get into the old lady's
house, and then stole her
money.
 He doesn't really know a thing
about the theatre - he's just
posing!

“nature: “특성 , “성격 , “본질


 Motor-racing is by nature a
dangerous sport. 그 성격상
 Companies are, by their very
nature, conservative.
 Authentication is by its nature
an application-independent
process because an individual’s
identity is unique to the
individual, regardless of what
role the individual is fulfilling or
what operation the individual is
attempting to perform. 본질적으
로, 원래가
 While the obvious limitations are
rooted in (= having as their
origin or cause) the nature of
wireless Any key recovery
infrastructure, by its very
nature, introduces a new and
vulnerable path to the
unauthorized recovery of data
where one did not otherwise
exist.
 … the true nature of their
difficulties
 In order to acquire a deep
understanding of packet
switching and computer
networks, we must understand
the nature and importance of
these delays.
 In combination with the
broadcast nature of the
system, this opens the
possibility for unauthorized
access and eavesdropping.
 Optical cards provide security by
the nature of the fact that
the data cannot be erased.
 It's the nature of linen to
crumple easily.

center around/round/on/upon something : “중


심, “핵심 , “요지
If you center around/round/on/upon something, you make it
the main subject of discussion or interest.

If your thoughts, activities etc center around something or are


centered around it, it is the main thing that you are concerned
with or interested in.
 In the 16th century, village life
centred around religion.
 However, this increase in
productivity must not come at
the expense of security, and
hence some widely voiced
criticisms about SSO systems
center around the notion
that they become a single point
of failure. …을 희생시켜, 지불하고;
 The discussion centred around
reducing waste.
 She spoke about her travels,
centring on the time she had
spent in India.

“그림 언급 , “그림 설명 , “순차 적 설명 , “단계 적 설명


 In that case the IKE negotiation
procedure is as the following
picture shows. 다음 그림과 같다
 This operation of the machine is
represented by the diagram
of Figure 12.2.1.
 These are the steps shown in
Figure 2: 1) …. 2) ….
 Figure 4-1 depicts this concept
in more detail. The steps in this
scheme can be outlined as
follows.
 The process is outlined in the
following steps.
 As shown in the following
illustration, native PPP runs
over the dial-uplink between the
user and the CO. 다음 그림에서 보
듯이
 Here is a picture showing the
objects in the program just
before it stops running.
 As illustrated in Figure 1.5-2, …
 … This is pictured in Figure C-
14.

“최소 한, “적어도
 The main requirements were to
keep the changes required to a
minimum and at the same time
minimise the computational
overhead at the user’s end.
 Evaluate it five times at a
minimum.
 At a minimum, they include …
 At the least, this restriction is
very annoying. In the extreme,
some sites set their full
allotment of 20 cookies each
time, so the user spends all of
his time answering cookie pop-
up windows – an unacceptable
outcome.
 As an absolute minimum, you
should spend two hours in the
evening studying.

“다름 아닌 , “바로
 The first speech was given by
none other than Clint
Eastwood.
 The mystery guest turned out to
be none other than Cher
herself.
 The future looks bright for
Kerberos however, since a major
endorsement of the technology
came from none other than
Microsoft who is basing the NT5
authentication framework on
Kerberos.

be in (a state of) flux


= to be changing a lot so that you cannot be sure what will hap-
pen;
= continuous change; instability;
= “유동적 “변동적, “가변적
 The education system is in a
state of flux, with new
requirements constantly being
added.
 Our plans are in a state of flux
at the moment.
 Nature is dynamic, always in
flux, always changing.
 The flux followed the death of
the king.
 New words and meanings keep
the English language in a state
of flux.

one after another; one after the other


= “연속적으로, “계속해서, “차례차례로
= one at a time in a series
= first one person or thing, and then another, and then another,
up to any number or amount
 One way of protecting against
cracking is to revoke a user’s
access if the wrong secret is
entered a number of times in
succession (= happening one
after the other without
anything different happening in
between).
 The bills kept coming in, one
after another.
 One politician after another
has promised to support our
campaign, but none of them has
done anything yet.
 A whole series of problems have
arisen one after another.
 There was one day when I had
three different exams one after
the other.
“게다 가, “더구나 , “add
 The game was excellent, and
besides, there was no
admission charged.
 The house looked good;
moreover, the price was right.
 She won't mind your being late -
besides, it's hardly your fault
adding to something:
 If we can demonstrate A on the
basis of X then adding to this an
assumption of A → B will lead us
to B.

~ 이란 것은 없 다
 First of all, there is no such
thing as a number devil.
 Darling, Mummy's told you
before, there's no such thing
as ghosts (= they do not exist)!

“강화 , “지원
 Wireless LAN protocols are also
designed in such a way that
bolstering the access control
also makes it quite easy to
shore up the encryption of
traffic, to the point where
deploying products to improve
authentication will also provide
greater privacy of the
information traveling over the
wireless LAN.
 …an aid programme to bolster
up their troubled economy.
 The chapter concludes by
providing illustrations of how the
PAM service is used to support
both Primary and Secondary
Sign-on operations in support of
the concept of Single Single-on.
지원
Provide for sth: make it possible for sth to happen in the fu-
ture; plan for; make plans in order to deal with a possible event
in the future; 지원, 대비
 The budget provides for a
salary increase after one year
 Commanders failed to provide
for an attack by sea.
 Generally, the count will be a
single byte, which provides for
strings of up to 255 characters.
Provide for sb: take care of someone by making money in order
to buy the things that they need; give sb the things they need
such as money, food or clothes; 부양
 Without work, how can I
provide for my children?
 He has a wife and two young
children to provide for.

“case, “경우
 By defining a separate set of
communication rules (protocols),
these rules can now be applied
over any OSI-compliant topology.
This was not the case with
legacy systems, which is why
the OSI model was developed. ~
의 경우는/경우에는 그렇지 못했다.
 Nevertheless, clever design has
its limitations when delay is
excessive, as is often the case
in the public Internet. ~에서는 흔
히 그렇듯이
 The recursive solution is much
easier to code than the iterative
solution would. This is often
the case with good recursive
solutions.
 … or might it be the case
that A has completed more runs
than B? ~일 수도 있는가?
 It is quite commonly (=
often, usually) the case that
one wishes to prevent this sort
of thing from happening.
 Should this be the case, the
firewalls defining the DMZ will
have to be reconfigured. 이럴 경
우, 이 경우는, 만약 그렇다면
 That being the case,
however, the astute reader may
be wondering why the simpler
pattern merge[a_, {b1_,
brest___}] wasn't used instead.
The answer will be revealed in
the exercises.
 In each of the examples above,
the orbits all had the same size.
This is by no means always
the case. 늘/항상/언제나 그런 것
은 아니다
on a case-by-case basis:
= according to the particular facts relating to each situation
= 임기응변 식으로; 경우에 따라; 사례별로; 개별로
 The only thing we can do is to
negotiate on a case-by-case
basis.
어떤 경우든, 어느 경우든
 In any case, if the user does
not exist, the authentication
request must not be accepted.
 In either case, the key cannot
be directly accessed except by
the cryptographic processor on
the card.
 You can get there by train or bus
– either way / in either case
it’ll take an hour.
 Whatever the case may be, …
경우 “열거, 경우 “나열
 One reason is to distinguish the
use of asymmetric key pairs for
signatures, encryption, and key
agreement, ….. A second
reason is to separate the notion
of binding a public key to a
principal from the notion of the
goodness of that key.
 Cayley’s Theorem is important
for two contrasting reasons. One
is that it allows us to represent
an abstract group in a concrete
way. A second is that it shows
that the present-day set of
axioms we have adopted for a
group is the correct abstract of
its much earlier predecessor–a
group of permutations.
 This definition for POSITIVE has
two problems. One, it does
not generate all real numbers
(e.g., 1T is not included because
of its infinite length). Two, the
definition is not recursive since
we did not use known elements
of POSITIVE
 One standard way of defining
this set is … Another way we
might try is this: … The third
method we present is sneaky, by
recursive definition: …
 Whereas the first datagram
sent from the web server to the
requesting client may travel
across an underground fiber-
optic cable, the second
datagram may be sent across a
satellite link, while a third
may travel over a conventional
network.

“색깔
 The topological view they use for
their inter-AS routing protocol is
shown at the higher level, with
links shown in light gray. “회색
칠된선
 In Figure 4.3-3, the portion of the
path routed using A's intra-AS
protocol is shown in red, the
portion using the inter-AS
routing protocol is shown in
blue, and the portion of the path
routed using B's intra-AS
protocol is shown in green.

동작 설명 , 동작 설명 , 순서설 명, 순서 설명
 Let us begin by considering in
detail one particular example.
Suppose that the input alphabet
has only the two letters a and b.
Throughout this chapter, we use
only this alphabet (except for a
couple of problems at the end).
Let us also assume that there
are only three states, x, y, and z.
Let the following be the rules of
transition: Rule I Rule 2 Rule 3
Rule 4 Rule 5 From state x and
input a, go to state y. From state
x and input b, go to state z. From
state y and input a, go to state
x. From state y and input b, go
to state z. From state z and any
input, stay at state z. Let us also
designate state x as the starting
state and state z as the only
final state. We now have a
perfectly defined finite
automaton, because it fulfills all
three requirements demanded
above: states, alphabet,
transitions. Let us examine what
happens to various input strings
when presented to this FA. Let
us start with the string aaa. We
begin, as always, in state x. The
first letter of the string is an a,
and it tells us to go to state y (by
Rule I). The next input
(instruction) is also an a, and
this tells us by Rule 3 to go back
to state x. The third input is
another a, and by Rule I again
we go to state y. There are no
more input letters in the input
string, so our trip has ended. We
did not finish up in the final state
(state z), so we have an
unsuccessful termination of our
run. The string aaa is not in the
language of all strings that leave
this FA in state z. The set of all
strings that do leave us in a final
state is called the language
defined by the finite automaton.
The input string aaa is not in the
language defined by this FA.
Using other terminology, we
may say that the string aaa is
not accepted by this finite
automaton because it does not
lead to a final state. We use this
expression often. We may also
say, "aaa is rejected by this FA."
The set of all strings accepted is
the language associated with
the FA. We say, "this FA accepts
the language L," or "L is the
language accepted by this FA."
When we wish to be
anthropomorphic, we say that L
is the language of the FA. If
language L, is contained in
language L2 and a certain FA
accepts L2 (all the words in L2
are accepted and all the inputs
accepted are words in L2) , then
this FA also must accept all the
words in language L, (because
they are also words in L2) .
However, we do not say, "L; is
accepted by this FA" because
that would mean that all the
words the FA accepts are in L j .
This is solely a matter of
standard usage. At the moment,
the only job an FA does is define
the language it accepts, which is
a fine reason for calling it an
acceptor, or better still a
language-recognizer. This last
term is good because the FA
merely recognizes whether the
input string is in its language
much the same way we might
recognize when we hear
someone speak Russian without
necessarily understanding what
it means. Let us examine a
different input string for this
same FA. Let the input be abba.
As always, we start in state x.
Rule I tells us that the first input
letter, a, takes us to state y.
Once we are in state y, we read
the second input letter, which is
a b. Rule 4 now tells us to move
to state z. The third input letter
is a b, and because we are in
state z, Rule 5 tells us to stay
there. The fourth input letter is
an a, and again Rule 5 says stay
put. Therefore, after we have
followed the instruction of each
input letter, we end up in state
z. State z is designated a final
state, so we have won this
game. The input string abba has
taken us successfully to the final
state. The string abba is
therefore a word in the language
associated with this FA. The
word abba is accepted by this
FA. It is not hard for us to predict
which strings will be accepted by
this FA. If an input string is made
up of only the letter a repeated
some number of times, then the
action of the FA will be to jump
back and forth between state x
and state y. No such word can
ever be accepted. To get into
state z, it is necessary for the
string to have the letter b in it.
As soon as a b is encountered in
the input string, the FA jumps
immediately to state z no matter
what state it was in before. Once
in state z, it is impossible to
leave. When the input string
runs out, the FA will still be in
state z, leading to acceptance of
the string.

///////////////////////////////////////////////////////////////////////////////
///////////////

Etc.
 The length of a word w, denoted
by |w|, is the number of letters
in w when each letter is
counted as many times as it
occurs. “count
 It was no wonder that Leibniz
felt compelled to consider
anew the meaning of the
concept of space and its infinite
divisibility. 놀라운 일이 아니다; 재
검토
 It might be that you do not
wish to wait that long. 아마도
 First off, let’s see how much
it’ll cost. 우선, 먼저 (before
anything else; in the first place)
 This flexibility does not come
without a cost, however. 비용
이 든다, 대가
 In no case can the average
number of questions be less
than H(X). 절대로, 결코 아니다
 Rachel seems to be the only fly
in the ointment of Caroline’s
smooth life.
 All principals act in their own
best interest (including to
guard jointly derived secrets). 이
익을 위해 최선을 다한다
 To do so, we felt it was important
to spend part of our effort
getting a sense of what
aspects of computer science had
changed over the last decade. “
감을 잡다
 As a result, we have seen
exponential increases in
available computing power that
have made it possible to solve
problems that would have been
out of reach just a few short
years ago. 불과 몇 년 전까지는
 One of the most hotly debated
questions in computer science is
the role of programming in the
introductory curriculum.
 An understanding of what a
given standard body does
within the landscape of
mobile networking will be helpful
to the reader for the remainder
of the book. 분야
 Likewise, your security (or
lack thereof ) can cause
serious harm to others, even if
intruders do no direct harm to
your organization. Similarly,
machines that are not part of
centralized computing facilities
and that may be managed by
novice or part-time system
administrators or may be
unmanaged, can be used by
intruders to inflict harm on
others, even if those systems
have no strategic value to your
organization. 해를 끼치다, 공격하
다, 손해, 폐해; thereof (= of
that)
 An alternative protocol that cuts
the typing in half is for the
calculator to encrypt the current
time and display the result. 절반
으로 줄이다. 감소
 require of 요구한다.
- Marathons require incredible
stamina of the runners.
- Analogous assumptions are
required of B.
 It is important, however, that
you do not think of a firewall as
a single piece of equipment or
as one “do-it-all” software
program, despite the fact that
some vendors may try to
convince you otherwise. ~에도 불
구하고 (despite = in spite of)
 The Internet is not without its
shortcomings, however. 결점이
없지는 않다. 있기는 있다.
 The wireless medium is
characterized by high bit error
rate and expensive usage (since
spectrum is a scarce resource).
특징
 I take an assortment of clothes
on holiday, as a provision
against the vagaries of the
weather. 대비책, 방비책
 The system is supposed to
enter service in 2003-2004;
some of the design details are
still being worked on, so this
section is necessarily somewhat
tentative.
 It's such a tiny office. Don't you
ever feel cooped up here?
 If the user is not required to use
EAP, then the RADIUS server will
respond with an Access-Accept
or Access-Reject packet as
appropriate. 경우에 따라
 Some confusion may arise in
deciding when to use virtual
private networks (VPN) and
when to use 802.1X. These
technologies actually
complement each other and
there are times when both
may be used. ~할 때가 있다.
 It is assumed here that each
possible key is as likely as any
other.
 To some extent / a certain extent
(Partly), she was responsible for
the accident.
 Don't fiddle with my computer
while I'm out.
 There's no point in fiddling with
the format because the whole
report will have to be altered.
 I spent all morning fiddling
about/around.
 … without any maths
whatsoever
 … in any way whatever
 … continued study will be
necessary to keep up to date
with developments, especially in
relation to …
 I try to keep abreast of what's
happening in psychology.
 Please find attached some draft
text
 Sorry, I can't make it. (I'm not
feeling well….)
OR, Sorry, I can't go.
 I am indebted to the ideas of
Bob Waller for much of the
foregoing analysis.
 What if the adversary were able
to recover the first 56 bits of K ,
but not all of K?
 Thus, in order to get off the
ground, the legitimate parties
need an information…
 When two parties A, B,
sharing, respectively, keys
KA and KB with S, want to
engage in a communication
session, a three party protocol
will be executed, involving A, B
and S.
 … can be executed in a similar
time to a symmetric
cryptosystem.
 Assume each party has access
to authentic copies of the
other’s public key (if not,
certificates can be included in
existing messages 2 and 3.
 Apart from detailed information
on the syntax of each command,
you will also find hints and tips
on how to avoid typical
mistakes.
 Hence the code is such that
any received string with one
error can be detected.
⇔ Hence we can detect any
received string containing one
error.
 Yet another irritating fact is
that there is no help text to
document which commands
support “assume” and which do
not.
 The term verification refers to
the process of checking the
appropriated claims …
 A key shall be replaced when its
compromise is known or
suspected.
 Key may become lost due to
human error, software bugs, or
hardware malfunction.
 The identification facility has to
check known information about
the claimed identity against
information acquired during the
identification process.
 Certification authorities are to
be trusted with their
registering responsibilities only.
 the initiator A shall be able to
generate or otherwise acquire
a key K …
 This concept requests
unconditional trust in that
servers will not misuse their
ability to eavesdrop.
 Like Kerberos, SPX has
credential initialization and
client-server protocols.
 Secrecy specifies that a
message can be read only by its
intended recipients, while
integrity specifies that every
message is received exactly as
it was sent, or a discrepancy is
detected.
 But the less obvious success
stories of how the Allies
protected their codes is less
know  but no less important.
 .. the security of both wire and
wireless communications is
becoming a more prominent
issue in personal and business
communications than ever
before.
 … is required, for instance, in
case B initiates some operation
without any authorization from
A.
 The basic procedures described
above are vulnerable, especially
as regards attacks by active
eavesdropper.
 Last, but perhaps just as
important, remember that
you’re most likely going to be
installing firewalls at more than
one site. 마지막으로
 The increasing, and
increasingly diverse, demand
for security by users, operators
and regulatory bodies calls for
more advanced security features
in third generation system, such
as UMTS.
 Since the 1980’s, ISO has
been standardising different
aspects of smart cards to ensure

 ETSI does not seem quite so
clear what this device will be
called or what form it will take.
 We obtain at most k rows ( one
row fewer for each 0-bit in the
integer n )
 … anyone can open useless
connections to any server while
few people are able to record
and replay messages to a
particular server. ( 대조, 반대, 대
비)
 To summarize, …
 On the theoretical side, the
security of the stateless
protocols should be examined
from two directions. First, …
. Second, … .
 The computation of modular
exponentiations are mainly
considered, because it is the
most time-consuming
computation.
 Also take note of the fact
that this loop must execute 2
commands, one to increment
counter, the other to multiply
product.
 For large expressions,
compilation can speed up
execution by a factor as large
as 20.
 We would like instead to
instruct MMA that all names in a
certain section of code refer to a
particular context.
We move, then, to the second
way to declare names in a
context. 전환
 There is, however, then the
question of which symbol you
actually get when you type in
only the short name Mole.
 A successful denial-of-service
attack using this vulnerability
would require the initiator to
start the protocol not once but
many times.
 Since this is an attack against
the initiator, not the responder,
it is potentially less useful for
tying up resources; the victim
must decide to initiate an
instance of the protocol before
the attack can be mounted. 보
안에서의 각종 표현
 In the first message in the STS
protocol, an attacker who is
capable of doing nothing more
than sending messages could
send a bogus message and
cause the responder to waste
resources responding to it.
 No protocol is completely
immune against denial of
service attacks.
 More to be done 추후 과제
 The hotel is in the middle of
nowhere and there lies the
rub. We don’t have a car.
 The number will be exact if no
decimal point is encountered,
approximate otherwise.
 At the beginning of this
section we asserted that every
expression returns another
expression as its value. There
are cases in which this seems
to be untrue, however. An
example is …
 The above example seems to
imply that there is no return
value from SetDelayed.
 … if it is part of a larger
expression, however. 관사가 붙지
않는다.
 … the intended result of
executing the function is not its
return value, but rather some
change that it makes to the
state of the Mathematica session
(or to the computer in general
 for example, writing data to
a file).
 There is one last topic that
needs to be made before we
leave this topic.
 After 4096 rewritings have
taken place, the kernel wraps
the current result in Hold (which
prevents any further
evaluation) and returns it.
 In very special cases, even the
space is unnecessary. The
author knows of only two such
cases. The first is when a
number is followed by a
nonnumeric character.
 For reasons that will become
much clearer later, it is good
practice to always Clear a
function before making changes
to its definition.
 These errors can be notoriously
hard to track down, since you
don’t get any kind of warning
messages, just a function call
that does nothing.
 The correct thing to do in
this case is to use Set, so that
the RHS is evaluated at the point
of function definition.
 Better yet, write a second
function that formats the data
returned by the first function.
 In place of loops, there are
high-order functions that apply
other functions to collections of
data. 대신에
 A trace of the evaluation shows
why.
 When in doubt, consult the
table of special input forms in
Appendix A of the Mathematica
Book, or better yet, use
parentheses to settle the matter
unambiguously.
 A level specification of the form
n without the braces applies to
levels 1 through n inclusive.
(Exception: A level specification
of 0 doesn’t do anything.)
 …the value u is chosen at
random by U prior to the start
of the protocol.
 V has to register with its TTP
the private key agreement key
v.
 The function Fold is somewhat
like Nest, except that its first
argument is a function of two
arguments.
 Although this seems like a
curiosity, it is actually very
useful.
 You can use Word as your editing
tool at the very same time
you take advantage of
Publisher’s desktop publishing
capabilities.
 Use this option very sparingly,
however, because even when
the text is visible, it is often
difficult to read.
 You also can combine head
matching with a test function.
(also 조동사 순서)
 … where g is as above.
 What is really going on here?
 Finally, it must be pointed
out that during the course of
debugging such a function, care
must be taken to always Clear
the cached values and define
the function from scratch
whenever any change is made
to the function.
 In fact, you can think of an
UpValue as a kind of virtual
function. This analogy seems
especially appropriate since
the kernel checks an expression
for upvalues before checking it
for downvalues, so that the
former always override the
latter.
 Having said all that, we need
to point out a limitation of
upvalues: They can be
associated only with symbols
that are at level 1 or the heads
of expression at level 1 in the
rule definition.
 In the given example, we have
a choice of defining a
downvalue for Factor or an
upvalue for Plus. The former
seems like the logical choice
since Factor is much less
common than Plus. Either way,
you have to modify a protected
symbol.
 All told, there are six different
kinds of rules that can be
associated with a tag; they are
listed in Table 7-1.
 The external rules always take
precedence over the internal
ones, as we shall see shortly.
 In cases in which an
expression matches both an
upvalue and a downvalue, the
upvalue always takes
precedence.
 Although this looks rather like
a downvalue for N, the tag for
this rule is, in fact, omega.
 F[6] evaluates to 2 rather than
3 because of the order of the
rules.
 The basic idea is protection of
privacy of information by
distribution.
 … one can't figure out anything
about it.
 Now if t + 1 players get together
they can figure out f and hence
s.
 Shamir's scheme suffers from
two problems.
 Thus in place of the notation a
* b, we shall be using either a
+ b to be read “the sum of a and
b,” or ab to be read “the product
of a and b.” 대신에
 We are requiring not only that
the set of one group be
contained in the set of the other,
but also that the group
operation on the smaller set
assign the same element to
each ordered pair from this
smaller set as is assigned by
the group operation of the larger
set.
 Let us imitate this reasoning in a
general situation.
 It is easy to see that our usual
law of exponents, aman = am+n for
m, n ∈ Z holds. For m, n ∈ Z+, it
is clear.
 … to build on the work already
undertaken for UMTS by ETSI
SMG 10, …
 … to accommodate, as far as is
practicable, any regional
variations in security
objectives and priorities for
3GPP partners …
 No guarantee can be given
as to the existence of other IPRs
not referenced in SR 000 314.
 Recent research in this field
seems to corroborate the
theory. (= to add proof or
certainty to (an account,
statement, idea, etc.) with new
information)
 Data origin authentication: The
corroboration that the source
of data received is as claimed.
 Entity authentication: The
provision of assurance of the
claimed identity of an entity.
 If the activation of a security
feature provided for the
benefit of a customer is
controlled by another party, e.g.
a network operator, then the
customer should be made
aware of a failure to activate
the feature.
 Those features should work
without any reduction in
security when a user roams.
 They must not affect the
confidentiality of third parties.
 They are such that differences
in security functionality for
terrestrial and satellite
components of UMTS can be
minimised.
 They have a minimal impact
on the use of radio resources.
 The MS sends its ciphering
capabilities as they are stored
on the UE, and the ciphering
preferences, as they are stored
in the USIM, as a part of the MS
capabilities, to the SN.
 One common thread that
weaves through many of the
functions in AbstractAlgebra is
the use of the Mode option. By
default, functions are set to use
the Computational mode.
 The first step in the process is a
SYN packet that is sent from Si
to D. The second message, from
D to Si, has both the SYN and
ACK flags set indicating that D
acknowledges the SYN and is
continuing the handshake. The
third message, from Si to D has
its ACK bit set, and is an
indication to D that both hosts
agree that both hosts agree that
a connection has been
established. The third message
may contain user payload data.
프로토콜 설명
 To defend against the
exhaustion of resources in the
systems under attack, an
obvious approach is to increase
the number of resources
devoted to half-open TCP
connections, and to reduce the
timeouts. These measures have
been suggested by different
sources [11], and can be
summarized as: …
 This can be effective if, apart
from the normal blocking done
by the firewall, some other
specialized mechanism is put in
place to deal with SYN flooding.
 With the advent of WWW and
Java, the attacker has many
opportunities to push Trojan
horses down to the user's
desktop system.
 In order to simplify our
description, we consider the
mechanism only in relation to
one-way communication. The
adaptation of the scheme for
two-way communication is very
straightforward. More
specifically we present the
mechanism in the context of a
pair of users A and B , where A
wishes to send B a confidential
message and needs to be
provided with a session key to
protect it.
 First suppose TTPA is required
to provide access to this
message. … Second suppose
that TTPB is required to provide
access to this message.
 The above analysis shows that
given that, before generating a
certificate, a TTP always checks
that a user possesses the
private key corresponding to the
public key which they claim as
their own, then the Burmester
attack does not apply.
 By signing up to a licensed
TTP, the user will be able to
communicate securely with
every user of every TTP with
whom his TTP has an
agreement.
 This matter is the subject of
further study, but no problems
have yet been identified. 추후과
제 향후과제
 The proposed scheme as it
stands does not meet this
requirement, but the provision of
digital signatures as an
additional service by the TTP will
allow it to be met.
 The proposed scheme allows a
user to have new send key pairs
generated as often as wished.
 This is because MMA
determines the width of the
plot based on the x-coordinates
of the data, without regard for
the space needed to insert the
text annotations.
 It is no loss of generality to
assume that …
It is no loss of generality to
let the set be A = {1, 2, …, n},
and we are assuming that n ≥
2 so that transpositions exist.
 Members of a list do not all
have to be of the same type.
 Thus, as previously, in the
context of the situation
where A wishes to send a
secret message to user B, we
suppose that … 앞에서처럼, 전술
한 것처럼, 이전처럼
 Before A can send a secret
message to B, two key pairs will
need to be established, as we
now describe.
 It is our hope that our findings
will shed further light on the
debate over key recovery and
provide a long-needed baseline
analysis of the costs of key
recovery.
 This rising tide of important
yet unsecured electronic data
leaves our society increasingly
vulnerable to curious
neighbors, industrial spies,
organized crimes and terrorist
organizations.
 It is extremely difficult  if not
virtually important  for
anyone other than
authorized recipients to
recover the original “plaintext.”
 Taken together, these
elements encompass a system
of “ubiquitous key recovery”
designed to meet law
enforcement specifications.
 While some specific details
may change, the basic
requirements most likely will
not: they are the essential
requirements for any system
that meets the stated objective
of guaranteeing law
enforcement agencies timely
access, without user notice,
to the plaintext of encrypted
communications traffic.
 … there is little or no user
demand for this feature. In
particular, there is hardly
ever a reason for an encryption
user to want to recover the key
used to protect a communication
session such as telephone call,
FAX transmission, or Internet
link.
 … and other basic operational
procedures will vary widely
from user to user, even within
a single business.
 At this early stage in their
deployment, no consensus has
emerged on what government
role is appropriate.
 The result is that once the call is
over, the information required to
decrypt it ceases to exist; not
even the parties to the call
store the keys.
 The requirements set out by law
enforcement impose new
system costs for designing,
deploying, …
 New expenses entailed in the
design of secure product that
conform to the stringent key
recovery requirements.
 These costs are born/borne
by all encryption applications,
even those where key recovery
is not beneficial to the user or
even to law enforcement.
 It remains unclear whether
the high-risk, high-liability
business of operating a key
recovery center, with limited
consumer demand to date, will
even be economically viable.
 Political considerations aside,
the technical properties of
Clipper are interesting.
 First we must check to see if φ is
a mapping.
 We have limited our discussions
to ANSI C.
 … But more importantly, it
provides capabilities to do
object-oriented programming.
 Building software quickly,
correctly, and economically
remains an elusive goal.
 … in the mid-to-late 1990s …
 Many people feel that the best
educational strategy today is to
master C, then study C++.
 To achieve this, T must use a
different secret value bA with
each user A. 각각 서로 다른 기밀
데이타
 An implicit assumption in the
evaluation process is that the
system is designed so that the
set of all expression is partially
ordered with respect to
evaluation, or equivalently,
that there are no cyclic
dependencies in the evaluation
process. It is all too easy to
construct an example for which
this assumption is violated.
 There is, of course, a grey area
with services such as electronic
mail which has both storage
and communications aspects.
두 측면, 양 측면, 두 가지 면
 A visiting user has to
authenticate himself to the
foreign service provider with
the help of his home domain
agent. This may involve a
potentially time consuming
authentication protocol over
long distances.
 What type of attacker will a
digital money system be willing
to withstand? 단수형(복수형이 아
니고)인데도 관사가 없다. attackers,
an attacker
 That was true at the
beginning, but the knowledge
spread quickly and now cell
phone fraud is a huge problem
for the industry.
 People can easily exchange
money without linking up with
a central computer system, and
this can reduce the costs
significantly. 연결
 Brokers pay vendors by means
outside the PayWord system.
 If user authentication fails, the
user request is rejected. If user
authentication succeeds,
proceed to step 4.
 Even if the counter is updated
once every second, a 25 bit
counter suffices for the counter
to not overflow in one year,
which is a reasonable period to
obtain new certificates. TO 부정
사 부정형
 A common use of IP multicast is
conferencing, especially video-
conferencing.
 Yes, but it's a bit like a learning
English from a dictionary.
 It is a good idea to master the
programming concepts
introduced in this chapter, even
if they seem a bit bewildering at
first.
 Users can make payments to a
large number of different VASPs
without having to establish a
security association with each
one in advance. 미리, 사전에
(= beforehand, previously,
ahead (of time), in
anticipation)
 They exchange their certificates
in the course of the protocol.
~ 하는 동안에, 과정에, 하면서
 Protocols A and B were already
described in D10. However, they
have since undergone a
modification and are thus also
included in this deliverable. 수정,
변경
 … mechanism proposed in this
section need not be modified.
 To make life easy, the Internet
provides facilities to use
symbolic names instead of
dotted addresses.
 Its domain name would quite
likely be mycompany.com.
 This revolution, that some call
Webolution, is spreading at a
phenomenal rate.
 … and it should be treated as
work in progress.
 There is some evidence that
consumer will take proper
care in creating and protecting
security information if forced to
do so. 강제로 시킬 때만
 As a result, awareness of a
threat tends to result in “non-
use” rather than “care in use”.
사용
 For us secure e-mail is almost
more important than secure
payment.
 … the law is to keep pace with
technological advances. 보조를
맞추어야
 Acknowledgements
This work was supported by the
ACTS Project AD026, SEMPER.
However, it represents the view
of the author. SEMPER is part of
the ACTS research program
established by the European
Commission …
This description is based on joint
work of the SEMPER consortium.
It is a pleasure to thank all of
them for their co-operation and
contributions. The SEMPER
homepage is at
<http://www.semper.org>.
 SET is a pragmatic approach to
pave the way for easy and
rapid enabling of secure
electronic transactions over the
Internet. 길을 닦다, 원활
 To aid visibility, the PointSize
is increased from its default
value.
 Suffice it to say that …
 However, the basic ideas are
not all that complicated, and
one can get good use out of the
system knowing just a few
fundamental facts.
 The interpretation that they
have of BAN’s work is fairly
typical.
 The results were the same to
within statistical error, so
directC[] is certainly running
faster than direct and the
speedup cannot be attributed to
an ordering effect.
 For larger expressions,
compilation can speed up
execution by a factor as large
as 20.
 It is rather curious to
discover that the security of
this protocol is critically
dependent on plaintext
information which can be
considered as incidental to the
protocol.
 It may well be that in a non-
robust protocol an attacker is
able to use messages drawn
from different protocols to
successfully deceive a
participant.
 In this light, we view our
contribution as follows.
First, we raise the implicit
philosophy behind the use of a
random oracle to …. Second,
we systematically apply the
paradigm to ….
 When a KA protocol involves
more than 2 users, we refer to
it as a multi-party key-
agreement (MPKA) protocol.
 It is important to have as firm a
handle on these functions as
possible since a key to good,
efficient programming in
Mathematica is to use the built-
in functions whenever possible.
 To see this more clearly, we
can step through the
computation. …
 The DDN scheme is many
orders of magnitude more
expensive than any practical
scheme, since it involves
multiple signatures and zero-
knowledge proofs, and thus is
likely to be ruled out.
 Decryption in the CS scheme is
about five times as costly as
in OAEP. In some applications,
this kind of increase may be
tolerable; in others not.
 Big O takes care of upper
bounds, i.e., if the running time
is O[f[n]] this means that, up to
a constant factor, the program
is no slower than f[n].
 We can pretty-print the result,
but that's not much of an
improvement.
 In a man-in-the-middle attack,
an attacker intercepts all of the
communications between two
parties, making each think that
it is communicating with the
other.
 The TMN protocol [12] is
described by the following series
of messages:
 These are, on the whole, less
severe but do represent patterns
of behaviour under which A and
B are deceived by the intruder
about some aspect of
connections between them.
 … and it also provides certain
defenses against denial-of-
service attacks by adopting the
cookies technique of [17].
 Simple as this example
seems, there are complications.
In particular the rule of reductio
ad absurdum is not nearly as
natural as the other ones. 간단해
보이긴 하지만, 쉬워 보이긴 하지만
 Suppose that, to start with, we
make no assumptions
whatsoever about security.
 From this point on, application
of the pigeonhole principle may
be more subtle.
 As it turns out, the timing is
perfect.
 It really helped us understand
the issues and what the latest
Earthling debates are all
about.
 Is there perhaps a way to
determine whether one
algorithm is “better” than
another? 더 나은 방법은 없을까?
 The first coin that we input sets
the machine in motion. 동작시킨

 …, while a quick revocation of
user rights becomes harder to
achieve. 대신에 ~하기가 더 어려워
진다
 Now just how do partitions
come into play with
equivalence relations? 어떤 관계
가 있는가
 On the basis of this theorem
and the examples we have
examined, we state the next
result.
 In fact, for a uniform distribution
of the numbers 0-9, any
sequence of one thousand digits
is equally as likely to occur as
any other sequence of one
thousand digits. A sequence of
1000 numbers that contains
exactly 100 occurrences of the
digit 0 followed by 100
occurrences of the digit 1,
followed by 100 occurrences of
the digits 2, …, is no more
likely than the sequence that
contains one thousand 7s, for
example.
 Sum[i^2, {i, 1, 3}]: This
command adds up the squares
of i as i takes on the values
from 1 to 3.
 For now we consider two more
examples.
 There will be times when it is
easier to compute with a power
series than with a polynomial.
 The important point to note here
is that …
 … you don’t need to know much
about what’s in these files.
However, in case you’re curious,
let’s do a quick run-through of
what the more interesting ones
are for. 대충 훑어보기
 You will see though, that the
process really is very
straightforward.
 This is to advise you of what
AppWizard is about to do and
provides you with an
opportunity to abort the whole
thing if it doesn’t seem to be
what you want.
 We won’t worry about what all
these signifywe’ll get to them
eventually. 신경
 The comment using // only
covers the portion of the line
following the two successive
slashes, whereas the /*....*/
form defines whatever is
enclosed as a comment and
can span several lines.
 Note that the second statement
runs over two lines. The
successive lines are combined
into a single statement until the
compiler finds the semicolon
that defines the end of the
statement.
 In a certain sense, Formatter
is the inverse to FullForm. 어떤 의
미에서는
 … but we will defer discussion
of this until later in this
chapter when we discuss
something called variable scope.
뒤로 미루다
 We will discuss the order of
execution more fully later in
this chapter.
 You can, therefore, include as
much white space as you like
to make your program more
readable.
 It’s not that it’s difficult  quite
the opposite in fact  but …
 The basic arithmetic operators
we have at our disposal are
addition, subtraction, …
 These operate generally as you
would expect, with the
exception of division which has
a slight aberration when working
with integer variables or
constants, as we’ll see.
 One thing needs to be clear at
the outset.
 A couple of general points worth
noting are about the layout of
the program. Firstly, … and,
secondly, …
 The last paragraph reads a bit
like The Auctioneer’s Song. ~처
럼 들린다. 적어 놓았다.
 The overall design of your
program may well be at fault.
잘못된 것일 수 있다.
 Entity B responds with a
message containing F(x, rA ), a
suitable function of rA and
further data fields x. If A can
attribute this message to B,
then B has been authenticated.
암호학
 May A can deduce that B
thought he was running the
protocol with A as opposed to
some third party, C? ~이 아닌
 The use of CSP has two
advantages: …
 Most of the possible meanings of
authentication refer to the
recent state of an agent B when
another agent A completes a run
of the protocol, apparently with
B.
 It turns out that the
recentness is the hardest part of
the specification to formalize in
CSP.
 It is sensible to begin by
looking for attacks on these
weaker specifications, since
these tests are faster than in the
cases including recentness.
 As explained in the
introduction, we begin by
considering the cases without
recentness, and then extend the
definitions to include recentness.
 The following is what we
consider to be the weakest
reasonable definition of
authentication.
 Many protocols fail to achieve
even this weak form of
authentication. In several
cases, this is due to an
intruder launching a mirror
attack, simply reflecting an
agent’s messages back at
himself; examples appear in
[2].
 Closely related to the notion
of aliveness is the case where,
when A completes a run of the
protocol, apparently with B, then
B has previously been present,
but not necessarily running the
protocol in questionit may be
that B has been running a
completely different protocol.
This raises the question of
interaction between protocols,
where an intruder can learn
information in one protocol that
he can use in an attack on
another protocol.
 Several protocols achieve a
guarantee of liveness, but fail
to guarantee weak agreement.
The normal scenario is that
the intruder imitates an agent B
to attack A, by using B as an
oracle in a parallel run in which
the intruder adopts his own
identity; thus A believes he has
been running the protocol with A
 B thinks he has been running
the protocol with the intruder.
Examples include my attack
on the Needham-Schroeder
Public Key protocol [16] in [10].
 The following definition adds the
condition that the two agents
agree as to which roles each
was taking, and that they agree
upon some of the data items
used in the exchange.
 We say that a protocol
guarantees to an initiator A
non-injective agreement with a
responder B on a set of data
items ds.
 This protocol gives B a
guarantee of non-injective
agreement on K.
 We will use the term full
agreements to refer to
agreement on all the atomic
data items used in the protocol
runs. 용어 정의/도입/소개
 We will use the term
“injective agreement”, or
simply “agreement”, when we
want to insist that there is a
one-one relationship between
the two agent’s runs. 용어 정의/도
입/소개
 An agent A is tricked into
thinking that B is trying to
establish two sessions with him,
whereas B was only trying to
establish a single run.
 The agents do not check that
….
 The meanings of “recent” will
depend on the circumstances:
sometimes we will take it to
mean within the duration of A’s
run; sometimes we will take it to
mean at most t time units before
A completed his run.
 For example, consider the
following one-step protocol,
where K AB is a key shared
between A and B.
 The protocol can be
strengthened to achieve
recent non-injective agreement
by adding a timestamp to the
message.
 Also, in a setting where key
compromise is possible, there is
a well known attack on the
Needham-Schroeder Secret Key
Protocol [16], presented in [4]:
once a key has been
compromised, the intruder may
replay messages from an earlier
run so as to imitate the
initiator; thus the protocol
guarantees non-injective
agreement, but not recent non-
injective agreement. 경우, 상황,
케이스
 If Y were revealed, there would
be no justification to attribute
message X to principal Q.
 We have offered a choice of
possible translations, all based
on interpreting identity as
cryptographic key.
 Style |= HREDRAW | VREDRAW.
This statement will set to the
two rightmost bits of the
variable style to 1, leaving the
others at whatever they were
before the execution of this
statement.
 Bits that “fall off” either end of
the variable are lost.
 All of the variables that we have
declared so far have been
declared within a block, that is,
within the extent of a pair of
curly braces.
 Both these variables exist from
this point to the closing brace at
the end of the program. 두 개 모

 You will get an error message
something like, … 다음과 같은,
다음과 유사한/비슷한
 They might raise the
question in your mind, ‘Why
not make all variables global
and avoid all this messing about
with local variables that
disappear?’
 We can demonstrate how this
works with a revised version of
the last example: …
 A default case isn't essential. In
its absence, if the value of the
test expression doesn’t
correspond to any of the cases,
the switch is exited and the
program continues with the
next statement after the switch.
~이 없을 경우/때는; 계속
 From this example we are
directed to the following.
 Since we have no technique for
attacking such a relation, let us
list some terms and see whether
there is a recognizable pattern.
 Once again, if 1 and 2 are
interchanged in the last
permutation, we obtain the first
permutation in our list. 다시 한번
 One way to represent any
relation is by listing the ordered
pairs that are its elements. ~하
는 한 가지 방법은 ~하는 것이다
 This pictorial representation is a
lot easier to work with than the
36 ordered pairs of the relation
R. 훨씬 더
 This theorem provides some
insight into the number of odd-
degree vertices that can exist in
a graph. ~에 관해 어떤 통찰을 준
다, ~로부터 우리는 ~에 관한 통찰을
할 수 있다. 통찰, 직관
 We can keep going right down
to the beginning, but that
doesn’t seem any easier than
drawing K1000 and counting
directly.
 A Morphoid is a structure that
has the potential of being a
homomorphism (and therefore
potentially also an
isomorphism). 가능성, 잠재성
 We also consider when a direct
product might be cyclic, given
that its factors are cyclic. 가정,
~라고 할 때, ~일 때, ~일 경우
 Continuing this process, we
can move all of the g’s to the
right and all of the h’s to the left,
while reducing the powers of the
g’s modulo 2 and the powers of
h’s modulo 3 as we make the
substitutions. 이러한 과정을 반복
하면, 계속하면
 In programming, there are in
addition logical control
structures, loops, recursion and
such like. 기타 등등
 Our definition of what a function
is will be completely extensional,
the only thing that matters
is the connection between input
and output. How the latter is
calculated is irrelevant. In fact,
as we will see, in most cases
there is no method to compute
the output given the input. 제일
중요한 것은, 문제가 되는 유일한 것

 On the other hand, it is not
uncommon for students to
wonder all along whether
they are really doing magic
rather than mathematics. 의아,
이상하게 생각, 어리둥절
 Its solution had been
communicated to him by Niccolo
Fontana (who, unfortunately,
came to be known as Tartaglia
- the stammerer - because of a
speaking disorder). ~로 알려져 있

 It turns out that this
development eventually gave a
great impetus toward the
acceptance of imaginary
numbers. ~하게 된다; ~를 위한
강력한 계기/동기를 부여하다
 In Cardano's time, negative
numbers were still being
treated with some suspicion, so
all the more was the idea of
taking square roots of them.
 Many other mathematicians also
had this view. 견해
 A vector can be uniquely
specified by giving its magnitude
(i.e., its length) and direction
(i.e., the angle it makes with
the positive x-axis). X 축과 이루는
각도
 Thus, θ can take on an infinite
number of values for a given
complex number and is unique
only up to multiples of 2π. 값을
가지다
 The real numbers are deficient
in the sense that not all
algebraic operations on them
produce real numbers. Thus, for
− 1 to make sense, we must
lift our sights to the domain of
complex numbers.
 Polya's Pattern Inventory will
determine how many different
necklaces there are all
together of each kind,
allowing for equivalence under
rotations.
 For simplicity, we only
consider machines with a finite
set of inputs and a finite set of
states. 간단
 Needless to say, fixing things
so that this doesn't happen
would add considerable
complexity to the language. 당연
히, 말할 것도 없이, 필연
 If it still evaluates to True, then
expr is evaluated again. 여전히,
아직도
 This result also points up the
unfortunate fact that evaluating
this For loop has had the
unintended “side effect” of
giving a value to i, which we
probably didn't want. 보여준다
 A directory service is to a
network what white pages and
yellow pages are to the
telephone system. Like the white
pages, a directory service can be
used to look up a person or
object (file service, printer, etc.)
by name. “비유
 In the protocols examined in the
present paper, so-called
“random numbers” serve as
nonces. ~로 쓰인다, ~의 역할을 한
다, ~의 구실을 한다
 …… That’s what the
PaddedForm[ ] is about. 그게 바
로 ~의 역할/이유
 For reference, and to put our
work in perspective, we now
list a subset of BAN inference
rules previously proposed. 참고
로, 제대로 보기 위해서
 We will use only a few Greek
letters in this text, but for
(future/easy) reference we list
the entire alphabelt. 나중에 참고
하기 위해서
 To denote that A has sent a
formula X in the present epoch
(i.e., has recently said X), we use
the AT construct “A says X”.
 Without further information (e.g.
whether K is also known by
some unidentified or
uncorroborated party B), such a
key K which A has is called an
“unqualified” key (from A’s
point of reference). ~의 기준에
서볼때
 We assume f results in a joint
key K which can be deduced
only with knowledge of the
appropriate private information,
and that knowledge does not
compromise the secrecy of the
other party’s private
information. ~를 알아야만 구할 수
있다
 To be technically precise, we
should use ~ and ~ in place of ~
and ~ in the statement of
Axiom 3, but we write simply
the latter for appearance; the
meaning should be clear by
context. A similar comment
applies to the argument of F( )
in Definition 4.
 There is one binary operation,
that of applying a function to a
value, written (f g) (using LISP-
like notation), called application,
and one x . expr, called
construction written
abstraction, whose intended
interpretation is “the function
of x given by the expression
expr”; i.e., it is the same thing
as Function[{x}, expr] in
Mathematica. 그 의미는, 그 해석
은; ~와 동일, 똑같다
 This is not of very much
practical value, however,
because Sn has order n!, which is
much larger than the order of G,
in general.
 So, we know how to find all
solutions of 4x + 6y = 4. But, 4x
+ 6y = 9 didn't appear to have
any solutions. (Note that it's
already “reduced.”) Why is
that? 왜 그런가?
 Do these work as we suppose?
예상한대로 동작할까?
 However, rather than simply
tacking together the notation
and rules from all of these we
adopt an integrated approach,
designed to yield a logic that is
sound with respect to a single,
relatively simple model of
computation. 대충 모으다, 합치다
 In the first stage, two peers
negotiate a common secure
channel further called a ISAKMP
Security Association or a ISAKMP
SA for short. 혹은 간략히, 간단히
~라고 부른다, 명명, 약칭
 These problems were not so
much flaws in the protocol
design itself, but rather
ambiguities and omissions in the
specification that could lead to
insecure or incorrect
implementations if the
specification were not correctly
understood. Indeed, in one
case we found that several
incorrect implementations were
being developed as a result of
an omission in the IKE
specification. ~라기 보다는 ~, 나
열 설명
 In ISP environments where many
users share the same Web
server, it is important to use as
specific a path as possible in
the cookie. 되도록이면/가능한 한
구체적
 … and we also have p not
dividing a.
 Our list was for n from 1 to 10.
How about trying from 69 to 71,
to pick two funny numbers that
come to mind. 얼른 생각나다, 떠
오르다
 Oh my! You know, it's enough to
shake your confidence in the
whole idea of experimental
mathematics. 확신을 깨뜨리다, 무
너뜨리다; 개념 전체/일반, 전 개념,
개념 자체
 The roots of the factors are
known as the roots of unity,
since they are all numbers that,
when raised to some power,
give 1. ~ 로 알려져 있다, 알고 있
다, 부른다, 불린다, 명칭, 호칭; 멱
승, 승
 First let’s remind ourselves
what the factorizations of these
polynomials look like. 기억하자,
상기하자
 If you have ever browsed
through The Mathematica Book,
you may have come across the
description of the cyclotomic
polynomials. 보다, 만나다, 부닥치

 Our goal at this point is to
develop an alternate way of
building the cyclotomic
polynomials without using the
complex numbers. 이제 우리 목표
는, 이제 우리가 할 것은
 Therefore, to use the third
element, we either pick it off
the list of elements, as we did
earlier or we create it anew
with the Poly function. In this
case, this polynomial can be
obtained by … 뽑아내다, 집어내다,
추출하다, 골라내다; 먼저, 앞서
 Note that this is now identical
to third. 동일, 똑같다
 To verify that a (whatever it
turns out to be) is a root of a,
we need to represent a’s
coefficients as elements of a. 그
것이 무엇이든 간에, 뭐든지 간에, 상
관 없이
 The use of “Indeterminate → x”
is just for consistency. 그냥 일
관성을 기하기 위해, 일관성을 위해
 We illustrate these theorems
with examples to give you a
better feel for what they say
and what their implications are.
~에 대한/관한 감을 주기 위해, 느낌,
감(感)
 However, many questions
regarding EC-systems are still
open at this moment, making
it unclear what the future of
these systems will be. 아직 많은
문제가 미결; 지금으로서는; 불확실하
게 한다
 We now take up the question
of when a quotient ring of a ring
is a field and when it is an
integral domain. 이제 ~ 문제를 다
루자, 문제 제기, 문제 도입
 One reasonable guess might
be that the identity function is
an isomorphism, since the
domains are identical. 한 가지 타
당한 추측은, 짐작, 추정
 From the issuer’s point of view, a
CRL is an efficient way of
making known which
certificates are involved. 알리다,
밝히다
 The server then checks its
secure session cache for a
match. If a match is found, … 일
치하는 게 있는지 확인한다
 This viewpoint is essentially
looking at a LAN as a distributed
system, with emphasis on the
distributed operating system
and the service it provides. 강조,
역점
 The hash-value of x’ is computed
and compared to the protected
hash-value; if they are equal,
one accepts that the inputs are
also equal, and thus that the
message has not been altered.
비교, 검사, 동일
 Upon receiving (= receipt of
= reception of) instructions
from B, K decrypts the
instructions with Kbk, thus
verifying that they were issued
by B at some time in the past (K
does not care about replays). 수
신하면
 After this sequence, E is
authenticated as B towards
A, and knows what A believes to
be the session key, namely the
public information M, A, B. 인증
 It also works well against
physical intrusion; an attacker
who tapped in to an Ethernet
cable, for example, would not be
able to inject spurious packets.
잘 듣는다/동작한다/효과가 있다
 The principal disadvantages of
the client puzzle protocol by
comparison with the standard
approaches is its requirement for
special client-side software.
 It is a sad fact of life that
most software has bugs. 유감이
다/슬픈 현실
 However, most important of
all, wireless subscribers have a
different set of essential desires
and needs than desktop or even
laptop Internet users. 무엇보다 중
요한 것은/가장 중요한 것은
 Wireless service providers are
able to offer a new dimension
of service that complements the
existing features of their
networks, while extending
subscriber access to the
unbounded creativity of the
Web. ~하면서 동시에 새로운 차원

 … they are both using the
same master secret, they will
generate identical symmetric
key pairs. 둘 다 (both 의 순서)
 … losing a basis for further
discussion in the rest of the
chapter. 나머지
 공격자: intermediary
 the two words are used
interchangeably.
 … let alone security, privacy, or
confidentiality. ~는 별도로 치고,
말할 것도 없고
 The solution described above
imposes a number of
limitations, both for the user
and the operator.
 ISAKMP by itself does not
dictate a specific key exchange
algorithm. 그 자체는, 그 자체로는
 If this data is valuable at all, you
may have no choice but to
accept the cost of encryption. 해
야 한다, 할 수 밖에 없다, 선택의 여
지가 없다.
 Hosts in the networks on either
side of the serial line must
retransmit transport layer
messages through all involved
networks just because of
problems on one link. ~의 양쪽에,
양쪽
 After the completion of the
PPP link establishment phase,
the authenticator sends a
challenge message to its peer.
 Both these public key
substitution attacks are well-
known and are usually
prevented by requiring that
entities prove to the certificate-
issuing authority possession of
the private keys corresponding
to their public keys during the
certification process. The
attacks can also be launched
against STS-ENC; in this case,
an alternate way to prevent the
attacks is to encrypt certificates
using the shared key K. 증명/입
증; 공격
 A NAS which supports PAP may
forward the Reply-Message to
the dial-in client and accept a
PAP response which it can use
as though the user had
entered the response. 가정법, 마
치 ~인 것처럼
 The secrets should be
distributed with a mechanism
that limits the number of entities
that handle (and thus gain
knowledge of) the secret. 알게
된다, 알아 내다
 These categories are not hard
and fast; some corporate end
systems may well use the
access network technology that
we ascribe to residential access
networks, and vice versa. Our
descriptions below are meant to
hold for the common (if not
every) case. 보통 경우, 일반적인
경우에 성립한다
 At the other end, the
destination host receives 1-PDUs
and directs them up the protocol
stack. 반대쪽에서는, 반대편에서는
 make headway = to make
progress towards achieving
something in spite of difficulties
진전 , 발전, 진척 [+
towards/in/with etc]:
They had made no headway
towards finding a solution.
We’re unable to make much
headway with the project.
 But to keep things simple,
let’s suppose for now that there
are only two hosts for each
connection. 문제를 간명하게, 간단
하게, 간단히
 Although packet switching and
circuit switching are both very
prevalent in today’s
telecommunication networks,
the trend is certainly in the
direction of packet switching.
경향은 확실히 ~ 쪽이다
 Then layer 3, the network layer,
slaps an IP header on the packet
and hands it off to the data link
layer, which passes it to the
hardware layer, which passes it
out onto the network. 전달, 넘긴
다, 패스
 … in which case … 이런 경우에…
 and here’s the algorithm …
 The most complete non-
repudiation protocols with off-
line TTP have been presented
in [16] and in independently
in [12]. 논문이 서로 독립적으로 발
표되었다
 There are two strategies which
are gaining acceptance. 쓰이
고 있다, 채택되고 있다
 What is more, in a large
network with many users it is
difficult do maintain strict
control of each user and each
machine. 더욱이
 When for some reason a link
key is deleted and the initial
pairing must be repeated, any
Bluetooth security code can be
entered by the user again. 어떤
이유로
 This latter figure is around half
the number of telephone
connections worldwide. ~ 수의 절

 Such developments will be
essential if evidence based on
use of digital signatures is to be
strong enough to stand up in a
court of law. 법정
 In a new and fast-moving area
like e-Commerce, there is no real
substitute for practical, hands-on
experience to gain a detailed
understanding of the key issues.
급변하는
 There will be winners and there
will be losers. Only one thing is
certain  life will never be
quite the same again! 똑 같지
않을 것이다
 Clogging or flooding is a form of
worm. It entails sending a very
large amount of bogus traffic to
a node, such as a server or a
router. ~와 같은
 The best we can do is offer
principles for writing robust
scripts and identifying common
pitfalls, such as filtering out the
“|” symbol before sending data
to a command interpreter, as in
the example above. “최선책
 Avoid reinventing the wheel.
When possible, use ANSI C
standard library functions
instead of writing new functions.
This reduces program
development time. “가능하면, “가
능하다면, “할 수 있다면, “그럴 수 있
다면
 The truth of the matter is
that when users are forced to
remember many different
passwords, they will typically
adopt working methods that
significantly weaken the overall
security of the system. 사물의 실
상은, “실상
 If the comparison fails, the
destination station assumes that
something has happened to the
frame in its travels and
requests that another copy of
the frame be sent by the
transmitting system. 전달 도중에
 We don’t have a full-blown (full
blown) PKI in our system.
Instead we employ a very
simplified CA which only signs
and issues certificates for users
and WLGs. CRLs are not used.
 No more than 10 simultaneous
users should be associated with
the same AP to achieve a
sufficient level of throughput. 최
대, 최고

Paper
“논문 개요 /시작
 As business is moving from face-
to-face trading, mail order, and
telephone order to electronic
commerce over open networks
such as the Internet, crucial
security issues are being
raised. Whereas Electronic
Funds Transfer over financial
networks is reasonably secure,
securing payments over open
networks connecting commercial
servers and consumer
workstations poses challenges
of a new dimension.
This article reviews the state
of the art in payment
technologies, and sketches
emerging developments.

전술 한 바와 같이 , 전술한 대 로, 앞에 서 언급한 바와
같이 , 이미 앞에 서 보았듯 이, “지적
 As said before, …
 As stated, …
 As stated earlier, …
 As stated at the very
beginning of this section, the
evaluation process continues
until there is nothing left that
can be rewritten in another form.
 As mentioned, replay attacks
can be countered by using
nonces or time stamps.
 As we remarked before, for a
general argument we always use
multiplicative notation.
 (new section begins here) As
we have already discussed,
in the scheme described
above a user's receive key pair
is apparently fixed, since it is
generated as a deterministic
function of a secret key shared
by two TTPs and the name of the
receiving user. We now
describe one way in which
this problem can be overcome
through the use of date-
stamps.
 Because MMA does offer the
traditional looping constructs,
as we have just seen, it is
rather tempting to simply
continue using these familiar
means of flow control instead of
using a more natural, problem-
oriented approach.
 However, as we have already
noted, if there is a requirement
for receive keys to be changed
at regular intervals, a date
stamp could be included within
the scope of the key
generating function f.
This would have the advantage
that any private receive key
provided to an intercepting
authority would have only a
limited period of validity,
meaning that the warranted
interception capability could
only last for a certain time
period before needing to be
renewed.
 In order to study what has now
been described in a somewhat
general manner, we need to
introduce the following
fundamental ideal. 방금 기술한,
언급한, 설명한
 As remarked above, one use
of Modules is just to give a name
to some computation which will
be used several times in a
further expression. 위에서 언급하
였듯이, 보았듯이
 While these goals may appear
obvious, as stated they are
quite imprecise, and subtle
differences exist among
protocols regarding the exact
properties established. ~하긴 하
지만, 그러나; 앞에서 언급했듯이
 As was pointed out earlier,
the zeros of the ath cyclotomic
polynomial are a subset of the
whole set of ath roots of unity. 이
미 지적했듯이, 언급했듯이
 As pointed out in an earlier
report, these activities can be
assigned to a registration
authority. 이미 지적했듯이, 언급했
듯이
 It is important to point out
here that absolute security is
an abstract, theoretical concept
¾ it does not exit anywhere. 강
조, 지적
 For the reasons mentioned
above, it would be desirable to
realise an on-line access to a
certificate server in the second
demonstrator. 상기 이유로, 위에서
언급한 까닭으로
 Suppose we can answer
questions such as those set
forth in item 1. Then … (to state
or present an argument or a set
of figures in speech or writing)
제시
 The essential idea of the
construction is set forth in the
preceding discussion; here we
work through several examples.
앞에서 언급한, 기술한, 전술한; 제
시, 나왔다
 So, from now on, unless the
contrary is stated explicitly,
all rings will be considered to be
commutative. 지금부터; 별도 언
급이 없는 한

“다음 에 기술하 는”… , “나중 에 보게 되듯 이” , 나중에


보게 될, 뒤에 가서 , “시간 ”, “later
 The proxy client, however, can
be implemented in several ways,
as described later.
 A procedure for using the proxy
server is described next.
 … , which are discussed a
little later. 잠시 후에/잠시 뒤에 기
술하겠다
 More will be said about this
issue later in the text.
 We will examine these
graphics elements by
constructing a graphic using
only primitive elements. In a
later section, we will look
into how the built-in functions
such as Plot construct graphics
out of the primitive elements. 살
펴 보다
 We can try to describe precisely
what the evaluator does for
certain classes of expressions,
but as will be seen, the
situation is rather complicated.
나중에 보게 되겠지만, 뒤에
 We shall be seeing more of
them as we progress through
the language facilities. 보게 될 것
 We will see later that while
bridges do not recognize IP
addresses, they are capable of
recognizing layer 2 addresses,
such as Ethernet addresses.
 In a traditional cable system, a
cable head end station
broadcasts through a
distribution of coaxial cable and
amplifiers to residences. (We
discuss coaxial cable later in
this chapter.) As illustrated
in Figure 1.5-2, fiber optics
(also to be discussed soon)
connect the cable head end to
neighborhood-level junctions,
from which traditional coaxial
cable is then used to reach
individual houses and
apartments. 나중에 가서 다루겠다;
그림에서 보듯이
 There are also other kinds of
variables which we shall see
later in this chapter, when
we come to discuss static and
dynamic. 나중에 보게 될, ~할 때
 As we will see in Chapter 5,
there are many different types of
LAN technology. ~에서 보게 되듯

 As we shall discuss later in
this book, there are two types
of packet switches: routers and
bridges.
 It is too early to think about
what types of variables are
going to be used for the above
data. That will come later.
 At a later time, a subset of
participants B ⊆ P will pool their
shares in an attempt to
compute the key K. 나중에
 If the requested service is not
available, the server may
disconnect immediately or any
time later. 나중에 언제라도
 Afterwards, we define the
multi-party non-repudiation
problem, showing some
differences with multi-party fair
exchange. (afterwards: after an
event or time that has already
been mentioned:) 그 다음에…
“later on: (informal) in the future; at a time in the future; after
the time already mentioned; after the time you are talking about
 Later on, we examine the new
classless method of assigning
network addresses. 나중에 가서
 I’ll come and see you later on.
 I’m going out later on.
 Much later on, she realized
what he had meant.
 Later on I’ll be speaking to
Patty Davis.
 This is only going to cause me
more problems later on.

“detail, “자세히 , “상세 히, “세부사 항, “세부내 용


 We turn next to the details of
this construction. 이제, 다음으로
넘어가서, 화제전환
 We won’t be going into any
further detail on Unicode in
this book, not because it’s
difficult – it isn’t – but simply
because we have to stop
somewhere!
 Before we dig into the
authentication details a short
description of public key
certificate might be helpful for
further understanding.
 Before delving into a
detailed description of the
fields of Registration Requests
and Replies, let us first
examine how the messages are
used and under what
circumstances.
 Before going further, let me
introduce … 더 깊이 들어가기에 앞

 Before we enter into the
discussion of specific
authentication systems, we
would like to stress that
Kerberos, SPX and SELANE have
been chosen to serve as
examples that illustrate the
consequences of various design
decisions. ~을 다루기 전에 ~을 강
조하고 싶다
 I can't go into details now; it
would take too long.
 For specifics on S/MIME, you
can turn to RFC 2311 which
you can view at
www.ietf.org/rfc/rfc2311.txt.
 The president’s speech was
lacking in specifics.
 The specifics of the plan still
have to be worked out.
 Can you give me some
specifics on/about what we’ll
be discussing in the meeting.
 Okay, that’s the broad plan–let’s
get down to the specifics.
 We agreed on the general terms
and let the lawyers deal with
the specifics.
 Now that we’ve agreed on the
general principles, let’s get
down to specifics and
formulate a plan.
 Due to space limitations, we
omit the detailed description of
protocols and give a high level
view of the system. For more
details, we refer to [2].
 … (see [2] for details).
 Thankfully, the user does not
need to worry about these
details. 다행히; 할 필요가 없다, 불
필요
( does not need to = needs not
)
 I had difficulty getting any
details. He wasn’t very
forthcoming (=willing). 어려움, 곤

 This is all you need to know
about the evaluation process
for now (= for the present 당분
간, 우선은); any further details
would serve to confuse rather
than to illuminate.
 There are many things to
understand about evaluation,
but perhaps the most
important thing is the order in
which parts of an expression are
evaluated. Very detailed
information about this can be
found in [Withoff] and The
Mathematica Book.
 It is undoubtedly obvious
that many of the operational
advantages of LANs are also
potential security liabilities.
These liabilities will be discussed
in some detail below. 명백, 확
실, 자명
 It should be clear from the
discussion above that
wireless LANs can take
advantage of all of the security
measures available on wired
LANs, and then add additional
security features not available in
the wired world. 명백, 확실, 자명
 Function definition is discussed
in much greater detail in Part
2.
 We will cover these flaws in
great detail in Chapter 4.
 Let us look at the issues
involved in some more detail.
좀 더 자세히 살펴 보자, 상세하게, 구
체적으로
 In the following chapters we will
revisit all of these ideas,
covering them in much more
detail.
 As it will be outlined in more
details, the certified mail
protocol only continues if the
whole set of receivers is willing
to do so. 나중에 좀 더 상세히/자세
히 설명하겠지만
 Since Ethernet is by far the most
popular topology, we will cover
it in detail here.
 Next, the security issues of the
two browsers, Netscape
Navigator and Internet Explorer,
are presented in great depth.
깊이 있게
“close = careful and through, 면밀히, 꼼꼼히, 철저히, 주의 깊게
 Let’s take a close look at a
set of vectors that is linearly
dependent. 살펴보자
 Take a close look at this
photograph.
 On closer examination the
painting proved to be a fake.
 Pay close attention to what I
am telling to you.
Concrete
 To put this in more concrete
terms suppose, for example,
that the entropy of a given
source is 5 bits per source
symbol. 좀 더 구체적으로
 What does that mean in
concrete terms?
 It is easier to think in concrete
terms rather than in the
abstract.
 …by way of making their
point more concretely.

“기술 , “설명
set sth out / forth: to give the details of sth or to explain it, esp.
in writing, in a clear, organized way
 The management board has set
out its goals/plans/proposals for
the coming year.
 Your contract will set out the
terms and conditions of your
employment.
 He has written a letter to The
Times setting out his views.
 You will be given a Back To Work
plan which sets out how you
can best help yourself.
 He set out the reasons for his
decision in his report.
 The essential idea of the
construction is set forth in the
preceding discussion; here we
work through several examples.

“look
 In this section we will look at
the building blocks of graphics
programming and at how we
put them together to make
graphics.
 Then we take a more rigorous
look at the encoding and
decoding procedures for such
codes.
 Let's look at this from the
standpoint of the voters.
 Taking a second look at the
functions f and g, we now want
to show that g ∉ O(f).
 We can get some insight into
this process by looking at the
internal representation of a plot.
직관을 얻을 수 있다, 통찰
 Let’s take a look to see what
the values of the default context
and the context search path are.
 Let’s take a close look at a
set of vectors that is linearly
dependent.
 If you now take a look at the
TrialWin folder using Explorer, or
whatever else you may have
handy for looking at the files on
your hard disk, you will see that

 When we look back at the
partial orders in parts (b), (c),
and (d) of Example 7.38, the
following observations come
to light. 다음 사항들을 발견하게
된다.
 In appendix B we look at the
language and logic of VO in
comparison to SVO.
 What does SSO really mean? A
quick look at some of the
problems of distributed
computing will help reveal a
working definition. 잠깐 살펴보는
것이
 Let us look at the issues
involved in some more detail.
좀 더 자세히 살펴 보자, 상세하게, 구
체적으로
 Now let’s take a look at the
way in which different network
components fit together in an
Internet VPN.
 We will examine these
graphics elements by
constructing a graphic using
only primitive elements. In a
later section, we will look
into how the built-in functions
such as Plot construct graphics
out of the primitive elements. 살
펴 보다
 The purpose of this section is to
look deeper into these issues.

화제 /주제 “전환
 We turn now to the reason
why Euler developed the idea of
the degree of a vertex: to solve
the problem dealing with the
seven bridges of Konigsberg. 이
제 ~을 살펴보자
 We turn next to the details of
this construction. 이제, 다음으로
넘어가서
 Before proceeding to more
serious matters, let us note that
recursive definitions are not
completely alien to us in the real
world. “넘어가기 전에

“논문 전개 과정 ; 논문 진행 설 명
 In what follows, we will first
insure that we know where our
files reside, then discuss how to
create and alter their contents,
and finally show an example of
good programming practice 
checking to see whether a given
file is one with which we wish to
work. 논문 전개 및 진행 설명
 In this section we develop
some notation for stating our
new counting principle. Then
we establish the principle by a
combinatorial argument.
Examples will then
demonstrate how this principle
is applied.
 In this section we will look at
the building blocks of graphics
programming and at how we
put them together to make
graphics.
 We start with some simple
examples and then turn to
some more complicated ones
showing how to translate
programs in Pascal and C into
Mathematica programs. In each
case the direct translation can
be replaced by a much shorter
and clearer Mathematica
program written in a functional
or rewrite rule style. 먼저 ~을 하
고, 그 다음에는 ~를
 In the next section of the
paper we present a formal
language and logic, and we
describe the procedure
whereby these are to be
applied in protocol analysis. We
also give a basic description
how to analyze protocols using
the logic. We then analyze the
well known Needham-Schroeder
protocol, henceforth ‘NS’, as an
example. This analysis
demonstrates our analysis
technique. ~에 따라; 지금부터 ~
라고 표기한다; 보여준다
 This chapter starts out with an
overview of the architecture of
PPTP and moves on to the
details of how the protocol
works. Then we move on to an
overview of the types of
products you can use to build a
VPN using PPTP.
 In this section, we investigate
group codes to protect against
independent errors. Our
development begins with a
simple example, to show the
properties of such does from an
intuitive point of view. Then
we take a more rigorous look
at the encoding and decoding
procedures for such codes.
First let us explore, through
examples, the use of
redundancy to detect and
correct errors. ~로부터 보호
 We propose extensions of BAN
and BAN-like logics to facilitate
more precise identification and
examination of the goals and
beliefs arising in authenticated
key agreement protocols. We
then illustrate such protocols
based on Diffie-Hellman key
exchange, including one which is
identity-based. ~를 용이하게 하기
위해, ~를 위해, ~를 돕기 위해
 We will defer our discussion
of such time-sensitive
applications until Chapter 6. 미
루겠다, ~에 가서 다루겠다
 The remainder of the/this
paper is organized as
follows. Section 2 (with
Appendix A) reviews the
essential features of the logic,
and introduces new extensions
including a refinement of the
fundamental BAN construct
“shares the good crypto key”, …
Section 3 highlights six
fundamental candidate formal
goals for authenticated key
establishment protocols. Section
4 gathers in one place the
various formal assumption
required in our subsequent
analysis. … Section 8 uses these
results to compare the
assumptions and goals of these
protocols, and the
aforementioned X.509
protocol. Section 9 provides
concluding remarks. … Where
appropriate, we comment how
the new extensions apply to
these logics; further such
examination remains to be
done. 필요할 경우, 적절한 경우; 추
후 수행 내용, 남아 있다
 The remainder of the/this
paper is organized as
follows. The STS protocol is
described in Section 2. In
section 3 we present the new
on-line UKS attacks on STS-MAC,
and consider ways of
preventing the attacks. In
Section 4, we examine the
plausibility of an assumption
regarding signature schemes
that is required in order for the
attacks to succeed. Section 5
makes concluding remarks. (실
제 conclusion 섹션은 그냥
“Conclusion”이라는 이름으로 나타
나도 된다.)
 In practice, however, the
differences between the two
commands go deeper, as
shown by the following
examples, first for “macro”, and
then for “alias”.
 The second major step is as
follows.
 In what follows, we will make
use of the following facts about
matrices.
 In the following, … is
discussed only for … . The
discussion for … is similar to it.

First, let us consider the


storage-exhaustion attack. …
Next, let us consider the CPU-
exhaustion attack. … (도입부분)
 In the following, we describe
some of the significant breaches
that have taken place in the
last few years.
 In what follows, we will first
insure (= ensure) that we
know where our files reside,
then discuss how to create and
alter their contents, and finally
show an example of good
programming practice 
checking to see whether a given
file is one with which we wish to
work. 논문 전개 및 진행 설명, 확인,
확실
 The structure of this technical
specification is as follows: …
 Chapter 1 talks about …,
describes …, and discusses …
We briefly discuss …
Chapter 2 explains …. We
explore … We go over what a
basic wireless network consists
of, then we study wireless LAN
architecture in detail and the
technologies that make up a
wireless LAN.
In Chapter 3, we examine …
Our focus will be … We will
understand … 다루다 (go over)
 We start with the discussion
of pervasive mobility and its
consequences, moving on to
MVPN history and business case.
The section ends with an
overview of MVPN market
segments and stakeholders. The
second half of the chapter
examines the current wireless
data standardization status and
trends and provides the
reader with a reference to the
standard documents usage and
retrieval from various standard
body repositories.
 We discuss these services
further in Chapter 9. For now, we
start our discussion of MVPN by
taking a brief tour of VPN
history, then outlining Mobile
VPN business case.
 We return to this point in Part
II, but for now this definition
adequately defines the language
of all valid strings of symbols for
arithmetic expressions.

논문 전개 /기술 관점 및 범 위
 We now turn our attention to
the investigation of some
elementary mappings. 화제 전환
 But enough with airlines. Let’s
now turn our attention to
network protocols. ~는 이제 그만
하고, 그만하면 됐고;
 In this paper we mainly restrict
our attention to systems
running a single protocol; we
briefly discuss how to extend
these techniques to cover
systems running several
protocols in Section 4-5.
 In the early parts of this
chapter we restrict our
attention to performing
functional operations on lists.
In the last part of the chapter
we show how these operations
generalize to arbitrary
expressions.
 A comprehensive treatment of
encryption is beyond the scope
of this paper; interested readers
should consult Voydock and Kent
[44] or Davies and Price [45]. 다
다룰 수는 없다/취급/소개/설명; 찾아
보기 바란다/참고하기 바란다
 Our goal here is not to
provide a complete
classification, but simply to
identify a few of the most
important axes along which
application requirements can be
classified. 변명, ~이 아니고 ~다,
단지
 The emphasis of this paper is
on concept rather than on
implementation. 논문의 강조점
 Although the emphasis of this
paper is on the computational
setting, we first present the
state of knowledge, and sketch
the problems involved, in the
secure channels setting.

“인용 , “출처
 She cited a passage from the
President’s speech.
 The passage cited above is
from a Robert Frost poem.
 She cites both T.S. Eliot and
Virginia Woolf in her article.
 All citations are taken from
the 1973 edition of the text. (=
a word or piece of writing taken
from a written work)
 We cite the definition from [13]:
“in all cases …”
 Parts of this general discussion
are sourced from [Scho99],
and I recommend you read
Mayer-Schonberger’s full paper.

“참고 문헌 , “literature
 More discussion of this
interesting topic appears in
the literature.2
 We suspect that little appears
in the literature concerning
the practices of such intruders
and that the data used to test or
evaluate IDSs does not reflect
their approaches.
 Our notion of a dual-threshold
scheme should not be confused
with a weaker notion that
sometimes appears in the
literature (e.g., [29]).
 Notice that the small-hours
attack is different from a so-
called midnight attack which
often appears in the
literature as another name for
lunchtime attack; perhaps as in
lunchtime attack, it is
considered that the security
guards of an organization should
have meals rather punctually
around midnight.
 The Kolb model frequently
appears in the literature,
often modified to accommodate
particular types of learning (or
training) experiences and using
alternative or simplified
terminology (eg see Chapter
23).
 A tabulation of site-diversity
experiments prior to 1983
appears in the literature
[Ippolito, 1989].
 The most worrisome problem
which appears in the
literature is the possibility of
running out of address space for
IP addresses. Various schemes
are being suggested such as
subrouting, introduction of
additional bits, and other
possibilities.
 As a final note, it is interesting
that the expression
“mortification of the king”
(mortificatio regis) appears in
the literature of alchemy as
one of the most frequent
symbols of the disintegration of
matter.
 Yet another intriguing
connection between primes and
discrepancy appears in the
literature (see [Joe 1999] and
references therein).
 The most general model of on-
line problems that appears in
the literature is request-
answer games [15].
 The polynomial hierarchy was
formally defined by Stockmeyer
[Sto77], though the concept
appears in the literature
even earlier. For instance, Karp
[Kar72] notes that
 This name has been translated
from Russian and appears in
the literature with different
spellings, such as: Chebychev,
Tschebyscheff, Tchebysheff and
Tchebichef.

“control
 The authenticator is in control
of the frequency and timing of
the challenges.
 There has been some violence
after the match, but the police
are now in control of the
situation.
 Were you in control of your
emotions at the time?
 If either computer comes under
the control of a network
attacker, then the secret
password is compromised. ~의
수중에 들어가다

Presentation & Discussion


Etc
 “detail; “later;
 Should I add an explanation, or
would that be overkill? 설명을 할
까, 말까?
 My second recommendation is …
 To start/begin with, …
 In the first place, the main
objective of the network is to
give easy and open access to
the Internet. 제일 먼저,
 Now, regarding those sales
figures, …
 … Now as regards marketing
 As far as marketing is
concerned, …
 For one thing, … for another
thing, …
 Another thing is …
 as well as that
 on top of that
 besides ( introducing a stronger
argument than the one before )
 He claims to be a socialist, and
yet he has two houses and a
Rolls Royce.
 I mean / that is to say / in other
words
 After all, …
 I would like to refer back to my
issue of closing the gap.
 As many of us know, a taxi
can be stuck in a traffic jam for a
very long time (while the meter
continues to run!). 여러분도 알다
시피
 As you’d expect with any
networking project, we can’t
possibly get through this book
without referring to the OSI
model. 예상하시겠지만, 짐작하시겠
지만
 In my view it was a waste of
time. 내가 보기에는
 I am certain you will agree. 동의
 I recommend you to consider.
 Let’s review what we’ve covered
so far … 정리, 요약

WIIFY (what's in it for you) Triggers


 “This is important to you
because … “ (The presenter fills
in the blank.)
 “What does this mean to you?”
(The presenter explains.)
 “Why am I telling you this?” (The
presenter explains.)
 “Who cares?” (“You should care,
because … “)
 “So what?” (“Here's what … “)
 “And … ?” (“Here's the WIIFY …
“)

Backward reference
 As I said … (or Like I said …): 좋
지 않은 표현 (발표자 자기중심적인
표현)
 As you recall …
 We discussed earlier …
 You saw …
 Remember …

질문 에 대한 대처
 I would like to address your
question later on when I cover...
 You and I can discuss that after
the conclusion of the
presentation...
 Regretfully, I do not have that
information readily available.
Please meet me after the
meeting, I will get your name...
and get back to you next week.

샘플
영어 사용이 아주 약간이긴 하지만 좀 의심스러운 사람 자료니 주의해서 사
용할 것!
 Good afternoon.
 Today I will talk about…
 First I would like to define… I’m
assuming that… , and also
that…
 Before I go into a detailed
discussion of the range of ASP
solutions I would like to
discuss those items that must
be addressed regardless of the
ASP Billing solution chosen.
 My message is…
 Also, let’s not forget the
general contract issues. These
are especially important since
you will be dependent on the
supplier once you move to the
ASP Billing solution. The issues
range from what type of price
protection you have to the
performance guarantees that
the ASP will provide.
 I’ll outline what is offered at
this level and some of the things
to look out for.
 There are three ways that…
 The problem with this approach
is…
 What I believe to be the only
viable solution is…
 Now I know you can’t read this
flow chart, but I’ve included it to
deliver the message that…
 Up until now I’ve only been
discussing…

하이 브레인 영어논문 공부방 에서 퍼온 내용


(jeong2140@hanmail.net)
Giving an overview (starting)
 This morning we’re going to look
at…
 Today’s lecture will focus on..
 In this lab I plan to cover…
 Today, I’d like to talk about…
Emphasizing a main point
 The main thing is..
 Let me say again that..
 This is important because
 First, second, third
 The key point is…
Giving an example
 Take, for example,..
 Let me give you an example to
show
 An example of this is
 For instance
Making a transition between ideas
 All right, Let’s go on to another
aspect of
 Now, let’s take a look at
 O.K. Let’s move on to the next
part of…
 Next…
Closing
 In conclusion,
 To summarize, Let me say that
 Let me end by saying..
 O.K. just as a general conclusion,
then
 Finally

화제 전환 , 주제 이동 , 페이 지 이동
 But enough with airlines. Let’s
now turn our attention to
network protocols. ~는 이제 그만
하고, 그만하면 됐고;
 We now turn our attention to
the investigation of some
elementary mappings.
 We turn now to the British
news.
 Let’s turn to more important
matters now.
 Turn to page 17 for our prices.
 Now I would like to turn to my
second point.
(better expression: Now let’s
turn to the second point.)
 Now let’s get back to our
main topic of discussion. 돌아가
서, 돌아가자
 I’m going to talk about …
 Let’s look at …
 Let’s …
 I’d now like to come onto my
next point. (used to show that
you are starting to talk about a
different subject)

Opening an academic discussion


 Right, I suppose we should
begin by considering the tricky
question of the Norman invasion.

Protocol/Attack Description
Etc
 When a system (called the
client) attempts to establish a
TCP connection to a system
providing a service (the server),
the client and server exchange
a set sequence of messages.
This connection technique
applies to all TCP connections--
telnet, Web, email, etc. The
client system begins by
sending a SYN message to the
server. The server then
acknowledges the SYN
message by sending SYN-ACK
message to the client. The client
then finishes establishing the
connection by responding
with an ACK message. The
connection between the client
and the server is then open, and
the service-specific data can be
exchanged between the client
and the server. Here is a view
of this message flow: ….
 1. the wireless client indicates
to the access point that it wants
to connect.
2. the access point sends a
random number (the challenge)
to the wireless client.
3. the wireless client performs
a computation using its key and
the random number, and sends
the result (the response) back to
the access point.
4. the access point performs
the same computation, using
the same random number and
its copy of the key.
5. if the keys match, the
result of the computation
will match that sent by the
wireless client  the wireless
client is authenticated and may
be accepted.
 The basic mode of operation is
as follows:
1. a RADIUS request is made
including a username and
password.
2. the password is encrypted
using a secret known by the
requestor and the server (the
shared secret)
3. the server looks up the
username in its database and
then checks the password for
a match. If the match is
made an “accept” message is
returned. If the match is bad
a “reject” message is returned.
 If the WEP ICV check is
successful, the responder shall
then compare the decrypted
contents of the Challenge Text
field to the challenge text that
was sent in Frame 2 of the
sequence. If they are the
same, then the responder shall
respond with a successful status
code in Frame 4 of the
sequence. 동일, 비교
If the WEP ICV check fails, the
responder shall respond with an
unsuccessful status code in
Frame 4 of the sequence as
described below.
 This peer must then calculate a
one-way hash function and send
this information to the
authenticator.
The authenticator verifies the
hash value with its
complementary calculation and
responds with an ACK if the
values match.
Otherwise, (a Failure is
returned and) the connection
is terminated.
 In IKE phase 1 after Diffie-
Hellman key exchange both MT
and WLG compute a hash
value (over previously
exchanged data), HashMT and
HashWLG respectively. MT signs
(encrypts) HashMT with the
user’s private key, and sends
the signature Sig MT together
with the user identifier IDMT-U
to the WLG over the air
interface. After receiving the
WLG fetches the user’s
certificate CertMT-U from the
DBS by giving IDMT-U. WLG
verifies CertMT-U first to
make sure that the contained
user public key PubMT-U is
authentic. It then calculates
Hash’MT in the same way as
MT did before, decrypts SigMT
with PubMT-U to recover the
original HashMT, and
compares HashMT against
Hash’MT. If they match the
mobile user is proven to be an
authorised user. In a similar
way the WLG authenticates
itself to the MT. The only
difference is that the WLG sends
its own certificate CertWLG to
the MT in addition to IDWLG and
SigWLG.
 After an attacker identifies a pair
of computersA and B, for
examplethat are
communicating with each other
as a client-server pair, he
attempts to establish a
connection with computer B in
such a way that B believes
that it has a connection with
A; in reality, the connection is
with the attacker’s computer. 연
결; 사실은, 실상은, 진실은

The attacker accomplishes this


by creating a fake message (i.e.,
a message from the attacker)
but with A’s address as the
source address, requesting a
connection to B.
When it receives this message, B
will respond with an
acknowledgment, which includes
sequence numbers for
transmission with A.
These sequence numbers from
server B are unique to the
connection between the two
machines.

To complete the setup of this


session between A and B, B
would expect A to acknowledge
B’s sequence number before
proceeding with any further
exchange of information. But, in
order for the attacker to
impersonate A, he has to guess
the sequence numbers B will
use, and he has to prevent A
from replying. It turns out
that, in certain circumstances,
it’s not too difficult to guess
what the sequence numbers are.

In order to keep computer A


from responding to any of B’s
transmissions (and thus denying
that it has requested a
connection in the first place), the
attacker usually transmits a
large number of packets A,
overflowing A’s capacity to
process them and preventing A
from responding to B’s message.
제지하다, 막다, 저지하다, “keep
from
 The actual process is as follows:
1. The authenticator sends a challenge
message to the peer.
2. The peer calculates a value using a
one-way hash functions and sends it
back to the authenticator.
3. The authenticator can acknowledge
authentication if the response matches
the expected value.

“평문
 For example, in common operating
system environments the user identity
with its associated password is
transmitted in cleartext to the host
who performs the necessary verification
before granting (or denying) the
user access to the system. Nothing
prevents an eavesdropper from
stealing user identities and passwords
which pass by. 암호화되지 않고, 비화되지
않고, 평문으로, 날로 전달
 SSL noticeably slows the speed of
transmitting information over the
Internet. The performance
degradation is primarily the result
of the public key encryption and
decryption that is required to initialize
the first SSL connection. Compared
with this, the additional overhead of
encrypting and decryption data using
RC2, RC4, or DES is practically
insignificant. Users have reported
performance degradations of
approximately 50% when using SSL,
compared to sending information in
the clear. 속도 저하, 성능 저하; 비교; 사실
상 무시할 만; 암호화하지 않고, plaintext

Recordings from “Security


Protocols” Workshop
 Sure! That could bring us
closer to the privacy I
mentioned in which there is no
investigator but each one of the
participants is involved in a very,
very complex protocol. Sure!
You can do that but things
become very quickly unrealistic
when you talk about more
than a very few number of
voters. So the answer to the
question: yes, you can do that
with some things, how realistic
they are is a different
question.
 One of the ways to do this is
called a public verifiable board,
which means there is …
 Plus you’re putting another
burden on the voter.
 I have a comment not a
question, so it’s outside the
rules. What about this?
 Let me answer to something
that is closer to home. … I still
remember …
 No, but I’m giving you the
example of a very close
election which can turn on a few
votes.
 Presumably this has something
to do with cryptographic
protocols and money.
 Not necessarily. It’s a rather
different background to the
story. Back in February I was
forced to propose something I
would speak about at this
workshop and really the only
thing I dare to talk about
would be some observation I had
made ??????????????( 뭐가 빠졌
다?) about how people present
analyses of cryptographic
protocols, how people speak
about cryptographic protocols. It
seemed to me that we
should be turning the
attention towards the fact
we also want to protect
ourselves against insiders within
the protocol. From looking at
what I have heard in talks, it
seems the point is worth
repeating. … So that was the
starting point and along came
Gavin and he presented an
attack which I like to phrase in
this form: A initiates a protocol
run with a party called I. This
party I now behaves strangely,
re-encrypts the same message
and passes it on to B. B treats it
as a message coming from A
and sends it back to A. A sees
nothing wrong, everything
according to the protocol rules,
replies to I and that’s how it
finished. You can discuss
whether it’s an attack or not
but certainly with respect to the
one property I mentioned before
that these nonces are shared
between A and B, this is
clearly not the case, they are
now shared between all three
parties. So with respect to this
proven property this interleaved
protocol run creates a violation.
The problem people have
with describing this attack is to
find a good reason why A should
talk to the intruder in the first
place. I’ve heard it before,
I’ve heard it from Gavin, I’ve
heard it from other people and
they say “Well, A is tricked
into talking to the intruder”. My
point is there is no intruder.
Why are we desperately
looking for an intruder? I is an
insider who behaves exactly
according to protocol rules.
You don’t have to invent
reasons why A wants to talk to
an intruder or has to be tricked
into talking to an intruder.
Insiders can behave in strange
ways. Perfectly normal, we
know it. … the breakdown
quoted in my paper was 70-
90, so if we put on our hats
as security experts we know
insiders are the main problem.
We switch back to protocols
and we’re desperately looking
for intruders because we
cannot talk about security
violations without seeing an
intruder. Again in paper I have
briefly surveyed notations in
various formal tools to analyse
security protocols and
predominantly they want to talk
about an intruder because it is
the right way to talk about
cryptographic protocols. One of
the reason for this is a shift in
paradigms which we are not
prepared to acknowledge
intellectually. We start off from
this old communications security
paradigm. A and B trust each
other. The intruder sits on the
communication link and can do
all sorts of nasty things,
intercepting messages, changing
messages, deleting messages,
and inserting messages. What
these protocols for
communications security do is
protect A and B from the
intruder. … You find many
papers now on security
protocols … They are definitely
not partners who necessarily
trust each other completely in
the same way as complete trust
exists in these communications.
It would be wrong to say they
are mistrusting parties, but as
in Rafi’s talk before, you
know sometimes things go
wrong, maybe because
someone really tries to beat the
system, maybe simply
because something accidentally
happens in communications or
in the implementation. Things
go wrong, you have to recover
from this state, you need some
process of dispute resolution and
… So paradigms shift, the role of
the parties shifts, the underlying
environmental model shifts, but I
still would claim most of us, all
of us here, if we asked to explain
security protocols to someone
who said “This is something
new to me, please explain”,
we’d latch onto/on to the
communications security
paradigm and explain what
we’re doing in these terms.
Language and fundamental
patterns of thinking lead us
astray. To make the point
again about what I would
prefer to call an insider attack,
I’ve embellished the
protocol. …… Insider attack, no
intruder. That’s what I want to
call it. Another footnote here:
I’ve seen this type of an attack
being categorised as the man
in the middle and I don’t like
it. You are again using the same
term for very different types of
events. …, So my plea is: call
these insider attacks too.
Sounds more attractive.
 Because A believes they’re
talking to B they don’t believe
they’re talking to C. if A believed
they were talking to C it might
be more like the traditional
man in the middle attack.
 Exactly, if A wanted to talk to C
and B somehow inserts itself and
gets the reward intended for C,
then yes I would call it a man
in the middle attack. If A wants
to talk to B in this case and
gives the reward to B then A has
been fooled, C has been fooled,
B makes a run with the brownie
points.
 A man at the far end attack?
 So, to conclude this part of my
talk, what I have seen … I think
this is an extremely strange way
of thinking.
 What’s bad is when they can’t
answer, when you say to the
implementers, “So, why are you
encrypting this, what are you
trying to protect?”, and they
have no answer. If they have
an answer then it’s not so
alarming. It’s (alarming) when
they don’t know that you have a
problem.
 [Stewart Lee]
OK, I’ve learned a lot here. I’ve
learned that delegation means
many things to many people,
like all of these words we use, I
would hope that somebody will
launch a piece of research that
will try and encompass all of the
meanings, or a closed set of the
meanings that delegation has.
We have been using delegation
as a sort of portmanteau, we
could well have used some of
the meanings of reliance for
instances where we said
delegation, and so on. And very
often we were talking about
delegation without worrying
about the side effects: who is
liable once delegate, what
happens to the liability when we
do the delegation.
 And very often we were
delegating to what amounts to
automata, very simple things,
something like a printer server,
and I’m not at all sure we’ll ever
get much beyond that. I
delegate things to people but
then I have a mutual trust
relationship with the person I’m
delegating. I don’t have that
kind of mutual trust relationship
with things inside the computer
so I pick only very simple things
to delegate to. … I don’t know if
there are any protocols that
were inspired originally to do
delegation and if there are, what
should they do.
 Finally I come back to something
I said previously, that we have a
system with a lot of stuff inside
it and, … These are all deep
interconnected arrangements
which we have to begin to look
at.
 [Roger Needham]
It’s interesting for me to recall
that when Abadi and Lampson
and Wobber and such people
were putting together all this
stuff on the subject of
delegation, they were in fact
always talking about things like
print servers. They were talking
about rather down-to-earth
questions like if I have got
permission to access
somebody’s file (because it’s
Tuesday) how do I print it, what
causes the print server to be
able to have access to it. They
were not thinking whatsoever
about delegation in any human
context at all, and I think they’ve
been interpreted as saying
something much beyond what
they did say, in just the same
way as Burrows, Abadi and I
were interpreted as having said
something about belief when all
we actually did was to give a
name to a symbol so that we
could pronounce it when what
the symbol was used for was
defined by a set of rules. I have
been accused of engaging in
doxastic logic. I’m using very
posh words, they sent me for the
dictionary and I don’t get sent
for the dictionary very often and
it actually turned out to mean a
logic concerned with opinions.
And we might think that the
CERT crew on delegation and so
forth have had their words used
in an inappropriate context in
the same way.
 [Joan Feigenbaum]
We’ve heard a lot of
interesting stuff about
credentials and policies and
trust and delegation and all
these words that we haven’t
nailed down completely which
actually is fine with me. I
don’t think we need to have
some mathematically precise
definitions for all these things,
but I think it’s really time to
get started.

Excerpts from Literature


종합적 분석, 결론, 고찰 등등
 The discussion so far shows
that a periodic signal has a dual
personality ― the time domain
and frequency domain. It can
be described by its waveform
or by its Fourier spectra. The
time- and frequency-domain
descriptions provide
complementary insights into
a signal. For in-depth
perspective, we need to
understand both of these
identities. It is important for the
reader to learn to think of a
signal from both of these
perspectives. In the next
chapter, we shall see that
aperiodic signals also have this
dual personality. Moreover, we
shall show that even LTI
systems have this dual
personality, which offers
complementary insights into
the system behavior. [Lathi]

Grammar
 Notice that the left state is both
a start and a final state.
 The symbol "/" has many names.
In computer science, it is usually
called a "slash"; other names are
"oblique stroke," "solidus," and
"virgule." It also has another
theorem.
 … we still can conclude that the
pot cannot end up with an alarm
clock in it.
 … it truly is the method we use
for recognizing arithmetic
expressions in real life.
 This effect is depicted in Fig.
4.20 with two sinusoids, the
frequency of the lower sinusoid
being twice that of the upper.
 The substring bb is impossible,
as is starting with a b. 좀 드문
구조인 듯… “…, as it is
starting…”이 더 흔한 모양 같다.
 Call these x1 and x2, and as x1
is the displacement x1 = x and
as x2 is the velocity this is the
derivative of the displacement
giving x2=dx1/dt.
 Although the encrypted version
of information is obtainable by
unauthorized persons, it is
useless to anyone not
knowing the decryption
technique.
 There will still be only one
piece of storage for …
 Preparing the documentation
was not as onerous a task as
anticipated. 예상했던 만큼 그리
~하지 않다. 생각보다
 In order that the combined
statement be true, we require
that both parts are true.
in the event of is followed by a noun or gerund

 In the event of the decoder


detecting errors, any erasures
in the word being decoded will
be the bits that are most likely
to be in error. ~하는 경우
 For example, in the event of a
DS3 failing, the DS3 link failure
is reported as the root alarm,
whereas the T1 links, and
subsequent services being
carried, are reported as side
effect alarms.

email
Hi Keith,

Hope you are doing well.

You will remember that a couple of months back


DongGook Park sent you a draft paper on forward
secrecy in mobile protocols. We submitted to
ICICS'99 and just had a rejection notification. One
referee seemed to misunderstand the notation - we
can clarify that. The second was in favour. The third,
however, gave scathing comments including a state-
ment that because UMTS is designed for key escrow
then forward secrecy is a waste of time. We disagree
with this referee's comments but I was wondering
whether you might be able to give any opinion your-
self, in particular whether that last point has any
validity. (I realise that there may be some delicacy
required here since Chris Mitchell was on the
ICICS'99 panel and we assume you may have
passed the paper on to him.)

We are inclined to resubmit elsewhere, but if we


have made a misjudgement on the value of the pa-
per we would rather not spend more time on it -- so
your candid opinion would be valued!

Many thanks if you can help.

Best wishes,

Colin

Hi Keith,

Many thanks for your prompt and fulsome reply. I am


writing this from home so this will be a quick reply
which I will follow up tomorrow. I wanted to make a
few quick points.

1) I never intended to imply that Chris was the refer-


ee in question. In fact I think I know who it was, and
that person is well known for making his strong
opinions very forcefully.

2) The statement about UMTS and escrow was my


paraphrasing. I may have been inaccurate - I will
check this tomorrow since I do not have it here now.
However, the remarks fit in with my conjecture
about who the referee was.

3) I think that we would agree with all your com-


ments, including that it is a lightweight paper. If this
was the reasons for rejection we would have no ar-
gument.

4) It would be great if you could visit us for a day or


two in September/ October. I am fairly sure we
could pay for your local travel. I will check with Ed
and get back to you tomorrow. 확인, 확실

Best wishes,

Colin

Dear Manager of Ray White Toowong,


My name is DongGook Park, the tenant of the unit
with the address “Unit 68 24 Dunmore Terrace
Auchenflower”. The rental contract expires on 26th
July, 2000. Could you please help us by having the
house inspected by the 24th (Monday) July before
my family and I permanently leave Brisbane for
Korea on 25th (Tuesday) July, 2000? By inspecting
prior to our Australian departure, we will still have
an opportunity to rectify any minor problems, should
they be identified.
There is an area of carpet that has been damaged
by water leaking through the roof. This damage oc-
curred after we moved in. We provided verbal advice
of this damage to the owner and to Ray White Too-
wong. We would like to ensure that the cost of fixing
this problem is not deducted from our bond as we
were not responsible for this damage. Also, when
the air conditioner was installed, some cracks in the
wall developed. We do not believe we are liable for
the cost of fixing these cracks as we did not cause
them. The owner was advised of this problem in per-
son.
We have a friend who has agreed to take care of any
matters that arise after our departure. Her name is
_____. If the bond refund cannot be processed be-
fore we leave the money should be given to _____,
who will forward it to us in Korea. Is there a formal
procedure to allow this to happen?
We would greatly appreciate your timely reply to
these enquiries.
Best Regards,

DongGook Park

Dear Professor Won,


Please find attached a paper for consideration for
ICISC 2000.
Authors: DongGook Park, Colin Boyd and Ed Dawson
Title: Micropayments for Wireless Communications
I attach an electronic copy of the paper in MS Word
format
and a separate cover sheet.
I look forward to hearing from you in due course.
Sincerely,
Colin Boyd

Conversations
NTC’s Dictionary of Everyday American English
Expressions
Inviting someone to talk
 Can we talk?
 Can I talk to you?

“trouble: inconvenience or effort, “수고 , “폐


 I didn’t mean to cause you any
trouble.
 “I’d love some more tea, it isn’t
too much trouble.” “Oh, it’s
no trouble at all.”
 I don’t want to put you to any
trouble (= create any work for
you).
 If you took the trouble to
listen to what I was saying,
you’d know what I was talking
about.
 They went to a lot of trouble
(= made a lot of effort) for their
dinner party, but half the guests
didn’t bother to turn up.
 It’s annoying, but I don’t think I’ll
go to the trouble of making
an official complaint.
 Although this seems like
unnecessary work, there are at
least five good reason for going
to the trouble.

“aware of something; aware that …: knowing


or realizing something; “알고 있다 , 인지하 고 있

 I am well aware that we all
conform to one stereotype or
another. 잘 알고 있다
 As far as I am aware, nobody
has done anything about it.
 Were you aware that
something was wrong?
 He was well aware of the
problem.
 I don’t think people are really
aware of just how much it
costs.

답장 늦어서 미안 ; 답장 못해서 미안
 I am sorry to be slow to
respond. Actually I had
problems on the weekend with
my computer.
 Sorry for the delay in
replying. I had a quick read
through of the final paper. It
looks great to me.
 I am very sorry that I have
not replied before now.
Actually I had a real problem last
Thursday evening.
 It was very remiss of me not
to answer your letter. 답장 못
해서 미안

발표 자 소개
 We are privileged to welcome
you as our speaker this evening.
 We are privileged tonight to
have as our main speaker the
Foreign Minister of France.
 We are privileged in having
with us in tonight’s show one of
the world’s greatest comedians,
Mr. Les Dennis.

“sound: “들린다 , ~로 들린 다, ~ㄴ것처 럼 들린다 ; “


듯하 다, ~ㄴ 듯하다
 It sounds to me from the
rumours that we might have
some problems.
 Judging by what they said, it
sounds like they had a good
holiday. (= sounds as if, =
sounds as though)
 Some parts of the desert sound
like (= seem to be) dangerous
places.
 You sound as though you have
a sore throat.
 You sound as if you’re getting a
cold.
 I know it sounds silly, but I’ll
miss him when he’s gone.
 He sounded very depressed
when we spoke on the telephone
yesterday.
 He always sounds too busy to
talk.
 I don’t want to sound like I’m
complaining, but this plan is
unfair.
“감사 , “고맙 다
 I’m very/really grateful to you
for your help.
 I feel very grateful about it.

be sunk: “낭패
have serious problems; be in a bad situation that will bring prob-
lems or defeat; have no hope of avoiding trouble or failure
 If the car breaks down, we’ll be
sunk.
 Without him, we’d be well and
truly (= completely;
thoroughly) sunk.
 … and you will be sunk if you
are not careful with them.

못 가서 미안
 I'm really sorry, but I won't be
able to make it (on Sunday
after all).
 We didn't make it to the party
in the end.
 I can’t make it to the party
tonight.

“길
 He couldn’t find his way to our
house. He didn’t have a map.

“표정
 Why are you holding your face
like that? Have you got/Do you
have a toothache?

물건 을 물리다 , 환불
 If the shirt doesn’t fit, take it
back.
 That sweater is too big for you. I
know. I’m going to take it back.

I won't be long: 오래 걸리 지 않을 거다
 Just wait here ― I won't be long.
 Can you wait for me? I won't be
very long.
 I won't be long. I’ve pretty well
finished. 거의 다 끝났다, 거의 다 했

선생 님-학부모 면 담
 Does she get along with her
friends? (친구들과 잘 지내나요?)
 Is she participating in class
debates and activities? (클래스 토
론과 활동에는 잘 참여하나요?)
 I would like to know of her
strengths and weaknesses in
Language Arts. (영어 과목에서 아
이의 강점과 약점을 알고 싶어요.)
 How is her attitude? How about
her work habits? (아이의 학업 습
관과 태도는 어떤가요?)

그게 다야 , 이게 다야 , “다야 , “전부
That’s all there is to tell.

That’s the way things are.

That’s about the size of it.


 Well, that’s about the size of it.
See you tomorrow.
 That’s about the size of it.
You’ve understood it perfectly.

///////////////////////////////////////////////////////////////////////////////
///////////////

Etc
 The meeting is still going on.
When do you think it will end? 언
제 끝날 것 같아?
 Why don’t you try on this jacket?
It will look nice on you. 너한테
잘 어울릴 거다.
 Goodbye. I expect we’ll meet
again before long. 작별, 머지 않
아 다시 보게 될 것
 I’ve got a question for you – it’s
just a quickie. 질문이 하나 있는데
 I’d like to stay if it’s not too
much of an imposition. 지나친 결
례가 아니라면
 I have a problem of a rather
delicate nature that I'd like to
discuss with you in private. 개인
적으로 의논할 일이 있다.
 I don’t want to be a nuisance
so tell me if you want to be
alone. 혼자 있고 싶으면 얘기해라
 Her spirits plummeted at the
thought of meeting him again.
~라고 생각하니, ~를 생각하니
 She ranged herself with (=
agreed with the opinions of) my
opponents. ~의 편을 들다, 편들다
 Glad to have any comments on
the above.
 So that’s the first line of
argument. The second is a
matter to do with presentation
to the outside world but it also
affects our own internal goals.
 So that’s the second point.
 I spent ages trying to work it
out.
 If someone is driving out to
Griffith and back - I'd appreciate
a lift.
 Please let me know if there are
any difficulties with the file.
 Please find attached the
camera ready paper “Public Key
Protocols for Wireless
Communications” for the
proceedings of ICISC98.
 “Teddy, you have it all wrong.
You were the one who taught me
that I could make a difference.
변하다, 변화, 달라지다
 This will really help me out,
since I have no time to prepare
the slides right now.
 Seems like lots of people are on
holidays at the moment.
 If you'd like to come, let me
know so that we can reserve a
big enough table.
 Bill is on leave this week
 Thanks for letting us know
about this. I was thinking of
buying Mathematica, but if this
is how they do business, I am
no longer interested in them.
 Paul Ashley phoned earlier this
morning. He is at home with
the flu and will not be in today.
 The international café is the
restaurant for you! They make
delicious Italian food. They’re
open Monday through Sunday.
문을 연다, 영업한다, 영업시간 (가게
하나를 얘기하면서, “they’re open”
으로 표현하는 데 주목할 것!)
 Hi DongGook, Here is an edited
version of your paper. There are
a couple of things I would like
to discuss with you about it.
Colin
 Colin Boyd is away sick today.
The KT meeting is cancelled for
today.
 If you have any queries
regarding the school, please
contact Mark Looi on ext 5114.
 In the next section two
prototype constructions are
presented for protocols
providing forward secrecy. The
first is based on the Diffie-
Hellman protocol, while the
second can be used with any
chosen asymmetric encryption
scheme. Section 3 then
discusses the notion of partial
forward secrecy and presents
prototype constructions. In
sections 4 and 5 we examine
a prominent proposed protocol
for third generation mobile
communications, show that it
does not provide forward
secrecy, and show how it may
be modified to do so.
 Almost all authors discuss only
Diffie-Hellman based key
establishment protocols as
examples providing forward
secrecy…
 … one based on the special
algebraic properties of Diffie-
Hellman key exchange, and the
other which can work with any
asymmetric encryption scheme.
 … forward secrecy can be
provided only through use of a
one-way function …
 It is possible to subject
electronic hardware, a smart
card in our case, to
environmental stress which will
induce a hardware fault.
 Depending on the attack in
question, it may be important
that the number of such faults is
small.
 Paul phoned and is home again
trying to get over the flu.
 Here is my understanding of
the situation, although I would
need to check these matters.
 Pardon me for budding in to
this discussion, but from my own
experiences I've always found
it more beneficial to work
through a problem myself than
to see the solution and then
work to that.
 Thanks for the message - I am
glad to hear you will be using
Mathematica. Please feel free
to contact me should you have
any further questions.
Best regards, Christy
 This is to let you know that
Ed's home phone number has
changed. His new number is
3901 0946. (Email)
 It was just what we were
looking for.
 It felt like it was talking directly
to me and to my crew in a
friendly voice.

You might also like