Professional Documents
Culture Documents
English Expressions
English Expressions
Since 1998
박 동국 (DongGook Park)
Writing
“우위 , “능가 , 더 낫다
edge on/over sb/sth: a slight advantage over sb/sth
a
decisive/slight/clear/great/decisi
ve military edge over the
enemies
The company needs to improve
its competitive edge.
They have the edge on us.
His cars have the edge over
his rivals’.
Their strategy still has the
edge over more recent
approaches.
For intuitive and qualitative
understanding, the sinusoids
have the edge over
exponentials. Fortunately, this
difficulty can be overcome
readily because of close
connection between exponential
and Fourier spectra.
So far, theories and models that
make the frame-content
distinction have the edge over
any that lack it.
The ILECs have the edge over
the network components
because their networks were
built over the past 120 years.
The first providers to implement
the AIN features will have the
edge over taking the customer
base.
Again, radio solutions appear to
have the edge over those
offered by the fixed network;
unique line-to-meter mapping is
not a relevant issue and the
flexibility provided by the mobile
network’s separation between
telephone number and user
identity is also beneficial.
It is fair to warn that in the
context of Predicate Logic
Hilbert-style proofs have the
edge over Equational-style
proofs. The former are amenable
to the methodology of
removing/inserting quantifiers so
that between the removal and
insertion one can use Boolean
techniques, notably the all-
powerful Post’s Theorem (2.2.1).
imilarly, how do we know that
the electronic mail attachment
actually came from the stated
sender or that it was not
changed in transit? Here
cyberspace has the edge over
noncyberspace. Technologies are
available that help us to verify
the mail sender (authentication)
and the validity of the message
(integrity).
Linksys's system has the edge
over Orinoco's because it's a
little cheaper (under $350 total
for Linksys, versus almost $400
total for Orinoco), but both are a
cinch to install.
Given the differences among the
means of the three groups, you
might think at first glance that
Method B has the edge over
Method A, and that Methods B
and A are both superior to
Method C. As it happens,
however, these differences,
considered in and of themselves,
are well within the range of mere
random variability.
It gives them the edge over
their competitors.
However, it is the constant,
systematic exploration, bit by
bit, never losing what has been
found, that gives RMHC the
edge over our GA.
Ericsson’s experience of
providing longterm support and
of upgrades gives it the edge
over other retailers of telecom
management systems, such as
large computer companies,
management consultants,
systems integrators, and small
companies with niche products.
“도입 , 단계별 도 입, 점진 적 도입
The new series of course in the
curriculum is being phased
into the program beginning in
the fall of 1999. The new
curriculum will be completely
implemented by the fall of 2000.
The new tax will be phased in
over the next two years.
Most of the measures will be
phased in over a year.
“필연 적으로
of necessity; necessarily; inevitably
In the final FA, this state has of
necessity an a, b loop going
back to itself.
Many of the jobs are, of
necessity, temporary.
This is, of necessity, a brief
and incomplete account.
The care of old people
necessarily involves quite a lot
of heavy lifting.
~인 한 , “한
as/so long as
This is nice as long as nothing
goes wrong.
You can go out to play as long
as you stay in the back yard.
As long as we keep playing
well, we’ll keep winning games.
We’ll go as long as the weather
is good.
So long as there is a demand
for these drugs, the financial
incentive for drug dealers will be
there.
“한번 에
The example we gave required
fives states primarily because an
FA can read only one letter from
the input string at a time.
Suppose we designed a more
powerful machine that could
read either one or two string at
a time.
“이동
we go straight to the final
state 3.
All words other than Λ go to
the right state and stay there.
This then transports us to sate
2.
To get back to the final state,
we must proceed to state 4
and then to state 3.
We stay in the start state until
we read our first a. This moves
us to the middle state. If the
very next letter is another a,
we move to the + state, where
we must stay and eventually be
accepted.
Recapitulating what we
know: If an input string begins
with an a and then has some b’s,
it must have 3 b’s to return us
to state 3, or 6 b’s to make the
trip twice, or 9 b’s, or 12 b’s and
so on. 정리, 요약
When in the middle state, an a
sends us to nirvana, where
ultimate acceptance awaits us,
whereas a b sends us back to
start, hoping for the first a of a
double letter.
If we start with an a, we take the
high road and jump back and
forth between the two top
states ending on the right (at +)
only if the last letter read is a b.
If the first letter read is a b, we
go south. Here, we get to the
+ on the bottom only when we
read a as the last letter.
However, when a pair of
unmatched letters is read (either
ab or ba), the machines flips
over to the unbalanced state,
which signifies that it has read
an odd number of a’s and an
odd number of b’s.
그 다음 , “다음 , “then
The machine will accept all
words with b as the third letter
and reject all other words. States
1 and 2 are only waiting states
eating up the first two letters of
input. Then comes the decision
at state 3. A word that has
fewer than three letters cannot
qualify, and its path ends in one
of the first three states, none of
which is designated +. Once we
get to state 3, only the low road
leads to acceptance. 소진
“hope
In this characterization, if we
read a b while in state 2, we go
to state 3, hoping for another
b, whereas if we read an a in
state 3, we go to state 2,
hoping for a baby a.
“그치 다, 끝나 다
wait sth out: if you wait out an event, period, or time, espe-
cially an unpleasant one, you wait for it to finish/end; to wait un-
til an unpleasant event has finished; to wait until the end of
Let’s find a place where we can
wait out the storm.
We have already discovered the
existence of a double letter in
the input string and we are
going to wait out the rest of
the input sequence and then
announce acceptance when it
is all over.
If neither can be arranged, then
the object might need to wait
out a previous request before
proceeding.
“다 써버 리면 , 다 떨어지 면, “out
We’re out of milk.
They’ve run out of ideas.
You’re out of luck ― she left
ten minutes ago.
We start at the minus sign and
proceed along the indicated
edges until we are out of input
letters.
A good programmer would
employ instead what is called a
Boolean flag; let us call it E for
even. If the number of letters
read so far is indeed even, then
E should have the value TRUE.
If the number of letters read is
not even, then E should have
the value FALSE. Initially, we set
E equal to TRUE, and every
time we read a letter, we
reverse the value of E until we
have exhausted the input
string. When the input letters
have run out, we check …
“미지 의, “uncharted
Not uncommonly, studies of
this kind which relate to
relatively uncharted areas
raise more issues than they
solve. 흔히, 드물지 않게
If we had started with the final
picture and tried to interpret its
meaning, we would be sailing
uncharted waters.
The party is sailing in
uncharted waters (= a
situation it has not been in
before).
This new project will take us
into uncharted territory.
This type of work is uncharted
territory for us.
Other career seekers are more
interested in venturing into
uncharted waters.
Some developmental paths are
blocked, while potentially novel
ones lead off into uncharted
terrain.
I was moving into uncharted
territory (= a completely new
experience) with this
relationship.
“이해
“understand
Graph theory is an exciting
subject in its own right, but for
our purposes there is no real
need to understand directed
graphs in any deeper sense
than as a collection of circles
and arrows. 더 깊이 이해할 필요는
없다
“grasp (have/get a ~ grasp of)
To have a proper grasp of
convolution operation, we should
understand the graphical
interpretation of convolution.
Such a comprehension also
helps in evaluating the
convolution integral of more
complicated signals.
It's remarkable that the
Egyptians of 1850 BC (and
probably much earlier) had
already developed this crude
version of the "Sieve of
Eratosthenes", and seemed to
have a grasp of the difference
between prime and composite
numbers.
You should have a healthy
grasp of shell programming
techniques now that you have
gone through the previous
chapters.
It is helpful and almost
necessary to have a good
grasp of the information which
might be required to complete
the specification by embodying
the assumptions and the
resulting decisions which are
appropriate.
It's therefore important to have
a solid grasp of the following
topics covered in C++NPv1
before reading this book:
To estimate the appropriate level
of investment in security, it is
useful to have a sound grasp
of the probability of different
levels of damage.
Of all the types of security
experts that are out there, those
that concentrate on NT networks
seem to have a better grasp
of databases such as Microsoft
SQL.
As far as substance goes, this is
a pretty trivial proof. But it is
important to have a good
grasp of the form of the proof,
and particularly the form of the
inductive step.
One of the more interesting
findings obtained employing the
simultaneous presentation of
items is that monkeys appear to
have a better grasp of an
overall sequence of events than
do pigeons.
He has a good grasp of
German grammar.
let’s first take a look at what
Acrobat is and what PDF is, and
let’s try to get a grasp on
some of the many options you
have for working with PDF files
in Acrobat
These complex formulae are
beyond the grasp of the
average pupil.
At this point, the HTML file has
gotten well beyond the
grasp of your average HTML
author.
VBA can be difficult to grasp at
first, but it becomes easier with
practice [동사로 바로 쓰는 경우]
“지정
Let us also designate state x
as the starting state and state z
as the only final state.
“읽는 방법 , “발음
C(n, r) is pronounced “n-
choose-r”.
The term FA is read by naming
its letters, so we say “an FA”
even though it stands for “a
finite automaton” and we say
“two FAs” even though it stands
for “two finite automata.”
“선택 , “choice
… pick a password or pass
phrase of their own choice. 고
르다
One small difference between
these two situations is that in
the child's game the number of
pieces of input is determined by
whether either player has yet
reached a final state, whereas
with the computer the number
of pieces of input is a matter of
choice made before run time.
Still, the input string is the sole
determinant as to whether the
game child or the computer
child wins his or her victory. 결정
“다른 , “other
, and some other solutions
have been proposed.
The computer is also
deterministic, by which we mean
that, on reading one particular
input instruction, the machine
converts itself from the state it
was in to some particular
other state (or remains in the
same state if given a NO-OP),
where the resultant state is
completely determined by the
prior state and the input
instruction. No choice is
involved. No knowledge is
required of the state the
machine was in six instructions
ago. 뭔가 다른, 어떤 다른 특정한;
선택; 알 필요 없다
“번갈 아, “교차
The language associated with
(ab)* is words with alternating
a’s and b’s, whereas the
language associated with a*b* is
only strings where all the a’s (if
any) precede all the b’s (also if
any).
“여기 다, “간주
…, but it is more correct to
think of this “+” as offering
alternatives in forming words. 더
옳다
“제약 , “제한 적
We shall soon see that this
language-defining tool is of
limited capacity in that there
are many interesting languages
that cannot be defined by
regular expressions, which is
why this volume has more than
100 pages.
Perhaps the most important
property of these channels is
that the return feedback channel
from the clients to the server is
typically of limited capacity,
or is non-existent.
Controlling access to services is
something that is very
desirable in most environments.
The services may be of limited
capacity, or they may contain
information that is not meant
for public access. Thus the
provider of a service wants to
somehow make sure that only
authorized access is allowed. In
some cases it is even necessary
to know the identity of the
person or entity accessing the
service.
It is an abstraction, of course,
since any real computer has
registers with a limited
capacity.
The nodes contain resources of
limited capacity.
“more
It was more of a holiday than a
training exercise. (be more of ~
than ~ = be ~ rather than ~)
A degree is more of a hindrance
than a help in British industry.
We might define a language by
the symbols: L5 = {xn for n = 1
4 9 16 ... } but now the symbols
are becoming more of an IQ
test than a clear definition. ~라
기 보다 ~에 더 가깝다
“주의 , “조심 , “wary, “careful, “caution
As a final note in this section,
we should be wary that we
have sometimes used recursive
definitions to define membership
in a set …
One should be wary that
Euclidean angles in this model
do not accurately depict the true
hyperbolic angles.
Although this may be true, one
must be wary that the
mathematics was not studied
with this application in mind.
In dealing with radio signals,
you must be wary that you no
longer have the “security” or
physicality of a hardwired line.
Even though this individual
presents you with a paper copy
of a warranty, you may be
wary that their vehicle is not
trustworthy.
Therefore, when using this
approach, the verifier must be
wary that this could result in
particular attacks on the
protocols being missed, due to
the limitations of the calculus.
Be wary of strangers who offer
you a ride.
Teachers have to be careful
when criticizing pupils.
You must be careful who you
accept a lift from.
Be careful that the medicine is
kept away from children.
People should be more careful
about the things they say.
She was careful to keep her
records up to date.
Here we should again be very
careful to observe that …
Care should be taken so as
not to confuse this with + as
an exponent. 혼동하지 않도록 주의
This cautions us against
thinking of the * as a normal
algebraic exponent.
Tony cautioned against
misrepresenting the situation…
The statement clearly was
intended to caution Seoul
against attempting to block the
council’s action again…
However, the distributive law
must be used with extreme
caution. Sometimes, it is
difficult to determine whether
the law is applicable.
“괄호
The first contains unbalanced
parentheses; the second
contains the forbidden substring
… The first … The fourth has a
close parenthesis before the
corresponding open
parenthesis. “)”, “(“
“조건 , “condition
on (the) condition that: only if; provided that
They will give us the money on
one condition--that we pay it
back within six months.
He was released on bail on
condition that he did not go
within half a mile of his mother's
address.
They agreed to lend us the car
on condition that (= only if)
we returned it before the
weekend.
Reproduction of all or part of this
work is permitted for educational
or research use on condition
that this copyright notice is
included in any copy.
I’ll come to the party on the
condition that you don’t wear
those ridiculous trousers!
This is not to say that S+ cannot,
in general, contain the word Λ. It
can, but only on the condition
that S contains the word Λ
initially, In this case Λ is in S+.
They agreed under the
condition that the matter be
dealt with promptly.
Under these conditions, the
fire can be rapidly controlled.
Under what conditions do
plants grow best?
“개수
Λ plus all strings of a's and b's in
which the a's occur in even
clumps. 짝수 개
Λ plus all strings of a's and b's
except those that start with b
and those that contain a double
b … By the phrase “double b”,
we mean the substring bb.
“seem
This may seem like belaboring
a trivial point, but the
significance of being careful
about this distinction will
emerge over and over again.
“즉시 , 지체 없이
right away/off: immediately, without delay
I want it sent right away.
I told him right off what I
thought of him.
I could tell right off that
something was wrong.
He wants to see you right
away…
Right off I want to confess that
I was wrong.
“note, “주목 , 관찰
Most notable is the fact
that… 가장 주목할 만한 것은…
Note that …
We note that many variations
of ER diagrams are in use, and
no widely accepted standards
prevail. The presentation in this
chapter is representative of
the family of ER models and
includes a selection of the most
popular features. 전형적, 대표적
We should note that this use
of the plus sign is consistent
with the principle that in these
expressions plus means choice.
We should take particular
note of the fact that although
this proof looks like a proof by
constructive algo, it is not that
at all.
Whilst it may be of
questionable value to
consider the efficiency of
incomplete protocols, it is also
interesting to note that …
It is of interest to note that
…
Before leaving this example,
let us note that although the
second recursive definition is
still harder to use (in proving
that given numbers are even)
than the two nonrecursive
definitions, it does have some
advantages. 마치기 전에
Further, note that each
department has at most one
manager, as before, because of
the key constraint.
Finally, we note that a foreign
key could refer to the same
relation.
Before discussing record
formats, we note that …
To derive these probabilities, we
simply note that …
note that, in contrast to the
earlier example, a second CDB is
needed.
The key to drawing one is to
note that a curve of order n is a
curve of order n-1 followed by an
L followed by a curve of order n-
1 traversed in reverse order and
that the same instructions,
except with the middle L
changed to an R, traverse the
curve in reverse order.
Please note that this is the
book's primary case study
example of a detailed use case;
it shows many common
elements and issues.
Last, but not least, it is
important to note that
Contemporary Cryptography
addresses only the materials
that are published and available
in the open literature.
In either case, it is important
to note that cryptographic
applications may consist of
multiple (sub)protocols, that
these (sub)protocols and their
concurrent executions may
interact in some subtle ways,
and that these interactions and
interdependencies may be
exploited by various chosen-
protocol attacks (see, for
example, [7] for the notion of a
chosen-protocol attack).
It is, however, important to
note that a complexity-based
proof is not absolute and that it
is only relative to the (assumed)
intractability of the underlying
mathematical problem(s).
Again, it is important to note
that most parts of modern
cryptography rely on
intractability assumptions and
that relying on such assumptions
seems to be unavoidable today
(see Chapter 21).
But note that none of these
functions has been shown to be
one way and that it is
theoretically not even known
whether one-way functions
really exist.
Also, note that …
Again, note that …
At this point it is important
to note that …
First of all, it is important to
note that a vector of random
variables (associated with the
same discrete probability space
or random experiment) can
always be viewed as a single
random variable.
It is interesting to note that
knowing the public encryption
key is of almost no help at all in
finding the decryption key.
Note that the product P of
these common factors must be
the gcd of x and y. To see this,
note that P|x and P|y, and
furthermore:
Note that with data hiding,
backward standard compliance
is automatically achieved, since
the hidden data is simply
ignored by a decoder which is
not designed to exploit it.
Note that in many cases a
fast algorithm exists to speed up
the exhaustive search of all the
possible shifted version of w.
There is one thing that we
must notice about this
machine; it will also accept
words in which some bbb can
occur before the first aaa and
then has another bbb later. 한 가
지 주목할 점
“observation, “관찰 , 주목
From these observations we
consider the following concepts.
Before continuing, we make a
few observations about …
When we look back at the partial
orders in parts (b), (c), and (d) of
Example 7.38, the following
observations come to light.
다음 사항들을 발견하게 된다.
The crucial observation here
is that …
This observation provides us
with a procedure for
determining voltage polarities in
coupled circuits.
This observation provides us
with our fundamental notion of
a practical algorithm.
This observation provides
the motivation for the
construction of a grammar GT
that is equivalent to G and
contains only variables that
derive terminal strings.
This observation provides
the motivation for the action
to take when a collision is
detected.
This observation provides
the basis for reasoning about
derivable judgements by rule
induction.
This observation provides a
basis for characterizing the
number of extant or active
sessions in this infinite-server
system.
This observation provides a
scientific basis for a homeland
security strategy: Given that we
cannot afford to protect
everything equally, our
prevention strategy should focus
on the hubs of scale-free
networks, or the clusters in
small-world networks.
This observation provides a
way to compute …
This observation provides a
simple but useful test for
divergence.
This observation provides a
broader perspective on the
phenomenon of Westernization
in Africa.
This observation provides a
method to improve the
approximation of binomial
probabilities.
This observation provides a
partial answer to the second
question as well.
This last observation
provides a constraint for the
linear programming problem
which needs to be solved to find
the linear possibility regression.
This observation provides
the connection with one of the
main examples which motivates
this general development,
namely the ‘stable elements’
formula of Cartan and Eilenberg
[16].
A stronger system would use
more bits, and this
observation provides the
opportunity to discuss how the
strength of a cyptographic
system can be measured in bits
…
“만병 통치약
a one-size-fits-all attitude,
method, plan etc is designed to
please everyone or be suitable
for every situation, often with
the result that it is not
successful;
a one-size-fits-all approach to
education
a one-size-fits-all public
education program
Given the current state of the art
in this area, we are convinced
that no one-size-fits-all
approach will succeed at all
institutions.
“완성 하다
“round something ↔ off/out: to finish an activity or complete
something in a good or suitable way; to make an experience
more through or complete; finish; to do something as a way of
ending an event, performance, etc in a suitable or satisfactory
way
She rounded off the tour with a
concert at Carnegie Hall.
African percussion and Native
American flute rounded out the
show.
You can round off the evening
with a visit to the nightclub.
She rounded off the meal with
some cheese.
It was a perfect way to round
off the season.
Prices are rounded off to the
nearest dollar.
…, and additional advanced
courses to round out the
curriculum.
그 자체 로, 그 자체 가
But, just as importantly, a
formal semantics is seen to be a
valuable reasoning tool in its
own right.
While these distinction are easy
to understand in their own
right, it is important to
recognize that …
In particular, since the n-th
extension Sn of S is a source in
its own right, we may apply
the Noiseless Coding Theorem to
Sn, to get …
~에 따라
The expenses you claim can
vary enormously, depending
on travel distances involved.
… This additional work can and
should vary based on
institutional mission, the areas
of concentration offered by a
given institution, and individual
student choice.
“remain, “남은 과제 , 남은 일, 추후 과제 , 추후 연구 ,
남아 있다 .
Much remains to be done to
realize the promise of RBAC.
Where appropriate, we comment
how the new extensions apply to
these logics; further such
examination remains to be
done.
Several points remain to be
settled.
There remained a few jobs still
to be finished.
A great many things remain to
be done (= have not yet been
done).
Major questions remain to be
answered about his work.
There remained one significant
problem.
The wider problem remains.
it remains to be seen: it will only be known later; it is not yet
certain; 불확실, 두고 봐야 안다
It remains to be seen whether
you are right.
It remains to be seen who will
win.
It remains to be seen
whether the operation was
successful.
It remains to be seen
whether her parliamentary
colleagues will agree.
It remains possible that bad
weather could tear more holes
in the tanker’s hull.
The question remains
whether he was fully aware of
the claims.
“더 좋은 , 더 나은 , “better
better still (also even better): used to say that a particular
choice would be more satisfactory; 더 좋은 것은, 아예
Why don’t you give her a call or,
still better, go and see her?
I started to hunt for a cheap
restaurant or, better still, a
snack shop.
… Better still, eliminate the
subtitle altogether. Less is more.
Come for a weekend or, better
still, come for a whole week.
“가끔 , “occasion
on occasion(s): sometimes but not often; occasionally
On occasion prisoners were
allowed visits from their families.
He has, on occasion, made a
small mistake.
He has been known on
occasion to lose his temper.
He translated not only from the
French but also, on occasion,
from the Polish.
As we have emphasized on
several occasions in this
report, … 몇 번에 걸쳐, 수차 (數
次), several times
“trade-off, tradeoff
Of course, result caching is a
tradeoff of memory (sth bad)
for time (sth good).
For some car buyers, lack of
space is an acceptable trade-
off for a sporty design.
Inflation is often a trade-off for
healthy economic growth.
There is a trade-off between
the benefits of the drug and the
risk of side effects.
There is a trade-off between
doing the job accurately and
doing it quickly.
There has to be a trade-off
between quality and quantity if
we want to keep prices low.
She said that she’d had to make
a trade-off between her job
and her family.
“진실 성, 진위
Doubts were cast on the
veracity of her alibi after three
people claimed to have seen her
at the scene of the robbery. (=
truthfulness)
Has anyone checked the
veracity of these allegations?
Some people questioned the
veracity of her story.
They questioned the veracity
of our claims.
We have total confidence in
the veracity of our research.
He was shocked to find his
veracity questioned.
A report of doubtful veracity
결함
Her hearing was found to be
slightly defective.
There are several ways in which
defective user input could be
handled. One way is to check…
“처음 에는
The deployment of xDSL
technology was not a smooth
one in the beginning due to its
severe limitations on distance.
Assumptions which appear
intuitively necessary at the
outset, but are not found to
be required anywhere in the
formal proofs, should be
carefully reexamined. 아닌 것으
로 밝혀지는
In earlier times, an
organization would use a single
subnet mask through an entire
network. 초창기에는
At first (= in the beginning
before something changes) he
wouldn’t even talk about it.
At first it is hard to see how this
procedure can be used to
calculate anything, but our
discussion of the lambda
calculus should help explain
how this works. 도움이 된다, 유익
At first, he seemed surprised
by my questions.
I had some difficulty at first
recalling why we were there.
“알 수 있다 , 알 수 있듯이 , 보는 것처 럼; “see
So, with this single example, we
see that a is not a
homomorphism. ~의 경우에, ~임
을 알 수 있다, 볼 수 있다.
We see here that the first
permutation is 123 and that we
obtain … ~을 보게 된다. 볼 수 있
다, 알게 된다, 알 수 있다.
The global scope resolution
operator also does its stuff
within the inner block, as you
can see from the output
generated by the statement we
have added there. 제 역할을 한다,
에서 볼 수 있는 것처럼, 볼 수 있듯
이, 알 수 있듯이
As we can see by the result of
Inverses, R is not a field. ~으로부
터 알 수 있듯이, 볼 수 있듯이
As one sees from this
example, “Switch[ ]” returns
the entire Switch expression
unevaluated if the expression
fails to match any of the forms,
so it is a good idea to include a
final pair whose form is _, with
some neutral value, e.g., Null. 이
예로부터 알 수 있듯이, 볼 수 있듯이,
보다시피, 설명
As you may have observed
by now, the characteristic
polynomial …
처음 예상과는 달리
The solution to the problem
proved to be easier than first
anticipated.
Contrary to [far from] our
expectations, we could not
raise the necessary funds.
사태 진행 “속도
New and promising technologies
are introduced at a dizzying
pace.
This field, moreover, continues
to evolve at an astonishing
pace. New technologies are
introduced continually, and
existing ones becomes obsolete
almost as soon as they appear.
by / in leaps and bounds (= very quickly/rapidly; in large
amounts): 매우 빨리, 매우 빠른 속도로
Her Spanish has come on (=
improved) in leaps and
bounds this year.
Julie’s reading is improving in
leaps and bounds.
Lifeboat technology has
advanced by leaps and
bounds.
The total number of species on
the planet appears to be
growing by leaps and bounds.
“전제 , ~를 전제 로 하고서
… It presupposes that the
Supplicant can reliably
determine …
Giving special attention to the
weaker students presupposes
that the others are willing to
work without much support.
Teachers sometimes
presuppose (= to presume; to
take for granted in advance; to
assume beforehand) a fairly high
level of knowledge by the
students. 가정하다
His argument presupposes (=
to require as a condition) that it
does not matter who is in power.
“악화 시키다
The problems were
compounded by severe food
shortages.
Her terror was compounded
by the feeling that she was
being watched.
His financial problems were
compounded when he
unexpectedly lost his job.
To compound matters, …
Severe drought has further
compounded the food
shortages in the region.
Further financial reverses
compounded his despair.
“쭉, “내내
Implementing a customer-
installed VPN solution provides
security all the way from the
M-ES to the F-ES.
Prices vary all the way from $5
to $50.
몇 “배
Modify the AspectRatio of the
above plot by making the height
two times the width. 두 배
For several years Internet traffic
has been increasing by 8
times every year. ~ 배 증가
A multiply is slower than a shift-
left by at least a factor of 3. 최
소한 세 배 이상 느리다
IPv6 addresses are four times
as big (16 bytes versus 4 bytes)
as IPv4 addresses.
order of magnitude:
10 배, 100 배, 10n 배 더 크다.
the difference in size, usually expressed in powers of 10, between
two quantities. If a quantity were 10 times greater than another,
it would be an order of magnitude greater; if 100 times greater, it
would be two orders of magnitude greater.
The mass of the Earth is an
order of magnitude greater
than that of Mars.
The masses of Earth and the sun
differ by five orders of
magnitude.
Capacity of links in ISP networks
are typically a few orders of
magnitudes higher than those in
enterprise networks.
Earth's mass is of the order of
magnitude of 1022 tons; that of
the sun is 1027 tons.
거리 가 멀다 , 모자라 다, 기준 미달 , “short of
If something falls short of expectations or hopes, it fails to reach
a desired amount or standard and is disappointing.
They aspired to be gentlemen,
though they fell far short of
the ideal.
The hotel fell far short of their
expectations.
August car sales fell short of
the industry’s expectations.
This essay falls considerably
short of your usual standard.
So what happens if the Socialists
top the poll but fall short of an
absolute majority?
While this definitional approach
is intuitively appealing the
actual KE security definition of
[2] comes short of the
expectations.
“이슈 , 이슈거 리
Does the OS for a firewall make
a difference? As far as security is
concerned, it’s becoming less
of an issue. 별 이슈가 아니다. 문
젯거리가 아니다.
This becomes more of an
issue as m-commerce and
banking applications use the
GPRS network. 이슈가 되고 있다
“each
Each network card connects to
the computer through a different
port, isolating it from the other.
A computer dating service wants
match each of four women with
one of six men. 여자 하나에 남자
하나 씩
At the end of a correct run of the
protocol, each principal should
be in possession of the secret
key Kab newly generated by the
server S and believe that the
other has the key. That is what
the protocol is intended to
achieve.
“서로 서로 , “another
Both entities need to
authenticate one another.
For public-key cryptosystems,
the public key and the private
key in a key pair are inverses of
one another.
VirusNet members kept in touch
with one another by telephone
and through network gateways
the worm did not shut down.
“따라 서, 고로 ; 그 결과
The use of a format other than a
smart card would mean that a
UIM could not serve as a multi-
functional card and would
thereby lose many market
opportunities.
This has the effect of reducing
the value of individual
payments, thereby reducing
both the likelihood of fraud and
the loss incurred due to fraud.
“귀결 , “귀착 , ~하게 된다 , “결과
“end up –ing, end up with, “result in
After we had finished the
calculation, the variable x
ended up having the value 4.
Intruder ends up knowing the
key.
It is entirely conceivable that if
we eliminated the states in a
different order, we could end
up with a different-looking
regular expression.
Several works attempt to
support low-value payments, by
avoiding the use of public-key
cryptographic operations. The
assumption is that these
operations, which are
computationally intensive,
result in significant cost and
delay.
“come down to (= to be able to be explained by a single import-
ant point)
if a problem, decision, or question comes down to a particular
thing, that thing is the most important factor involved.
Eventually our choice of hotel
will come down to (= be
decided by ) how much we can
afford.
It all comes down to money in
the end.
What it all comes down to is
your incredible insecurity.
What it comes down to is,
either I get more money or I
leave.
What we come down to is a
picture that looks like this: …
“reduce something to
We can reduce the problem to
two main issues. (= to change
sth to a more general or more
simple form; to make sth
simpler especially by extracting
or summarizing essential
elements)
This reduces the problem to
showing that …
• An important consequence of this is that
subsequent changes to x or y will change how z
evaluates. 결론, 결과, 영향
“result
• Note that only cryptographically protected mes-
sages, i.e. steps M 2 and M 3 , will contribute dir-
ectly to the logical beliefs that result.
• As a result, there is less of a chance that the
user will forget the ID, commit mistakes, and re-
quire access to the system administrator. 가능성이/
우려가 줄어든다
• … it is only executed as a result of the “if” con-
dition being “TRUE”.
• What results is an FA with one start state and
some or no blue states.
• … This is the result we seek.
한 단계 더
Taking the analogy one step
further, banknotes have special
features added to them such as
water marks.
Carrying this argument one
step further, suppose that a
group G is generated by g, and
that the relation g4 = e holds.
…인 것으 로 판명될 것, 밝혀 질 것
It may turn out to be useful to
pursue this matter further and
see if our framework can be
adapted to take into account
countermeasures such as these.
This principle may seem to have
nothing in common with what
we have been doing so far, but
it will prove to be helpful
nonetheless. 지금까지, 이제까지
“문제 , “문제 점
Usually, no such problem
comes up when you use…
In the normal course of events
(= the way things normally
happen) such problems do not
arise.
“rub: a particular problem or difficulty that makes a situation dif-
ficult or impossible
You can’t get a job unless you
have experience, but there’s
the rub, you can’t get
experience unless you have a
job.
That’s where the rub comes.
There’s/here’s the rub.
This is the rub.
That’s the rub: too little time.
The rub is …
~와 “함 께
Each character in the alphabet,
along with (= together with) the
number of times it appears in
the message, is placed in a
“pool.”
Dunne was murdered along
with three RUC men near
Armagh.
This header has the following
format:
Content-Type:
type/subtype ; parameters
where the “parameters” (along
with the semi-colon) is optional.
In combination with the
broadcast nature of the system,
this opens the possibility for
unauthorized access and
eavesdropping.
The system is designed to be
used in conjunction with a
word processing program.
We will see how to use it in
conjunction with other tools.
“line
A somewhat complicated line of
reasoning led me to this
conclusion. 일련의
Using the same line of
reasoning as before, we can
readily show that G contains no
more than four elements g, g2,
g3, and e.
My sister works in publishing
and I'm hoping to do
something along the same
lines (= something similar). 종
류, 동일선상, 유사
Japan, the leader in Asia, is
working along the same lines
as Europe, and cooperating with
the European activities.
The whole proposal is very
much along the same lines
as ‘pay and display’ parking…
They are campaigning for the
electoral system to be reformed
along the lines of (= so that it
becomes similar to) the one in
Germany.
Do you think this approach to
the problem is on the right
lines (= a suitable method and
likely to be successful)?
Can you give me a line on the
professor who's visiting us
tomorrow? 실마리
I've been trying to get a line on
this guy they've nominated for
president, I can't find out
anything about him. 실마리
What sort of line (=method of
arguing) do you think we should
take in the pay negotiations? 방
침
His line of argument was
impossible to follow.
명심 , 유념 , 기억 , “염두 에 두고
The reader should bear this in
mind…
… a handset which was not
designed with security in
mind.
Mobile IP was explicitly designed
with extensibility in mind.
For now, keep in mind that
SetDelayed is almost always the
right choice for defining a
function, and that …
The only point to keep in
mind here is that the system
imposes no bound on the
number of digits (though the
hardware does).
Bear in mind that …
우리 자신 /나 자신이 ~함을 발견 하게 된다
When …, then we may find
ourselves examining it further
in the following ways.
Although it is quite
straightforward to create images
using MMA’s built-in functions,
we frequently find ourselves
having to create a graphic
image for which no MMA
function exists.
“필요 , “필요 성
In this particular example, we
will have no need for the
remaining two-dimensional
graphics primitives, Rectangle,
Polygon, Disk, or Raster (see
Table 10.1 at the end of this
section for a complete listing).
Conditions (“/;”) are handy
because they obviate the need
to write a separate test
function, e.g., the function …
Chain rule seems to eliminate
the need for the power rule, so
we might try to UnSet the latter.
Thankfully, the user does not
need to worry about these
details. 다행히; 할 필요가 없다, 불
필요
( does not need to = needs not
)
Documents could cross
international boundaries with
ease, without the need for
onerous password systems.
The need for these facilities in
respect of data communications
is viewed, in the main, as an
Administration-imposed
requirement. 필요성; 주로, 대개
The need for this will become
more apparent when we come to
deal with functions. 필요성, 더욱
더 명확해질 것
There’s a growing need for
cheap housing in the larger
cities.
be in need of sth: to need help, advice, money etc, because
you are in a difficult situation
The project is in urgent need
of funding. 시급히 요구된다.
He is homeless and in
desperate need of help.
The church was in dire need of
repair.
Are you in need of help?
be incumbent on/upon somebody: “necessary for someone;
necessary as part of somebody’s duty or responsibility; “필요 (의무
나 책임의 뉘앙스)
She felt it incumbent upon/on
her to raise the subject at their
meeting.
It is incumbent upon parents
to control what their children
watch on TV.
It was incumbent on them to
attend.
It is incumbent upon all of us
as loyal citizens to make an
extra effort.
It is therefore incumbent on
the task force to provide
guidance as to how to make that
structure work.
한 만큼, “만큼, “한, “as … as …
This performs as many
iterations as are necessary to
find the fixed point of Function[x,
(x+r/x)/2] and returns the last
result. ~하기 위해 필요한 만큼 많이
This feature allows overall
performance to be as high as
the hardware will allow, with as
little memory and CPU
requirements as possible.
You can place as many
primitives as you like within the
scope of each directive. 원하는 만
큼 많이
“point
I see little point in discussing
this further. 소용 없다, 목적, 이유,
의미
What’s the point of
complaining now?
There is no point in going
There is not much point in doing
that.
While there is usually little
point for clients to send
requests that the server does
not list acceptable, sending such
requests is not an error, and the
server should simply reject
requests that it does not
recognize. 별 의미가 없지만, 별 소
용이 없지만…
The point here is that calling
this number simply 98.6 is fine
for most applications. We will
say more about this issue later.
This theorem expresses a
trivial but subtle point. It is
analogous to saying that if
people are made up of
molecules and molecules are
made up of atoms, then people
are made up of atoms.
make a point: to state an item of importance
You made a point that we all
should remember.
He spoke for an hour without
making a point.
I’d like to make one final
point before I stop.
A second point that should
be made in the banner and in
policies is that there is no
expectation of privacy when
using an organization computer
system. The employee should be
made aware of the fact that …
There is one somewhat
subtle point that should be
made about our way of
describing the game.
There is a somewhat subtle
point that should be made
about error detection and
correction. Namely, both cannot
take place at the same time and
at maximum levels. To be more
specific, suppose that …
One point that should be
made is that these tests were
made using version 1.0 of the
HTTP protocol.
One point that should be
made is the following: there
exist several DoD application
whose requirements are not
overly different than that of NSS.
Another point that should be
made here is ease of
programming and vendor
selection. As H.323 is complex
with regard to
encoding/decoding, the number
of competing vendors and
operators for the source and
services which employ the
protocol may be reduced.
Another point that should be
made concerning Equation 3.2
is that if it is used to define the
binomial coefficients, then it is
no longer necessary to require n
to be a positive integer.
“무의 미
… would be completely
nonsensical.
Their methods of assessment
produce nonsensical results.
A 1-bit subnet field would
provide only one subnet , and so
it also does not make sense.
The whole idea's a complete
nonsense. (= stupid, untrue)
Computer programs look like
complete nonsense to me. (=
without meaning)
“end up: 하게 되다 , 귀결
come to be in a particular situation or state, especially when you
did not plan it;
turn out to be;
to become something eventually;
“결국 마지막에는 (…이) 되다.
… then they will end up in
possession of one or more
shared secrets …
You can use both type specifier
within the same program for
declaring different variables that
will end up (as) having the
same type.
He ended up (as) head of the
company.
An unknown key-share (UKS)
attack on an AK or AKC protocol
is an attack whereby an entity A
ends up believing she shares a
key with B, and although this is
in fact the case, B mistakenly
believes the key is instead
shared with an entity E ≠ A. 잘못
알고 있다, 오해한다
We were going to go out, but
ended up watching videos.
If we are in any of the four
states 1, 2, 3, or 4 and we read
two a's, we end up in state 4.
공간 이 부족해 서
because of limitations on space;
due to space restrictions;
due to spaced limitations
Because of limitations on
space, we omit all proofs from
this paper; the interested reader
is referred to [12].
Due to spaced limitations, we
omit the detailed description of
protocols and give a high level
view of the system. For more
details, we refer to [2].
이제 , 이 시점 에서
At this point we shall examine
recurrence relation with a
variable coefficient.
At this point, we will …
~할 만한 , “가치 가 있는
The kernel and image of a
homomorphism are special
subsets worthy of
consideration.
It is worth noting that the
authentication required can be
achieved through …
A couple of general points
worth noting are about the
layout of the program. Firstly, …
and, secondly, …
While it would be expensive, this
attack may be well worth the
effort if the attacker knows that
sensitive information will be
passing across the link.
Although adapting to the new
accreditation process will require
much work, it will be well worth
the effort. 노력할 만한 가치가 있
다
가능 하게 해준 다, 허용 /허락 (“enable)
Good health enabled him to
carry out the plan.
He was enabled to attend.
The software enables you to
access the Internet in seconds.
A new programme to enable
older people to study at college.
Insulin enables the body to use
and store sugar
A new train line to enable easier
access to the stadium
This definition is much broader,
and allows for many functions
that are not as computational as
one is used to from
programming. This turns out
to be valuable in both
mathematics and CS.
“가능
susceptible of sth: if sth is susceptible of an action, that action
can be done to it.
Working conditions are
susceptible of improvement by
legislation.
Every definite mathematical
problem must necessarily be
susceptible of an exact
settlement, either in the form of
an actual answer to the question
asked, or by the proof of the
impossibility of its solution and
therewith the necessary failure
of all attempts.
“설상 가상
Even worse would be to write
the relation f in the form f(x, y),
since this would produce endless
confusion with functions of
two arguments. 더욱 문제는, 더욱
심각한 것은; ~와의 혼동
This is bad enough, but even
worse is the fact that some
bugs can be a security problem.
Worse still, users and security
administrators must now deal
with multiple security models
based on different forms of user
credentials.
To make matters worse, the
bombardment mentioned above
is usually done with IP packets in
which the Source Address is
“spoofed”; i.e., the sender sets
the IP Source Address field to
either a nonexistent address or
to some address that is
legitimately owned by some
other party.
“contrary, “반면
So, from now on, unless the
contrary is stated explicitly,
all rings will be considered to be
commutative. 지금부터; 별도 언
급이 없는 한
We intend to show you that,
contrary to popular belief,
there is really nothing imaginary
about “imaginary numbers” at
all. In a metaphysical sense,
they are just as real as are
“real numbers.” 보이고자 한다, 보
이겠다; 일반적인 상식과는 달리, 다
르게; 마찬가지로
Contrary to first
appearances, this need not
result in an overly complex logic.
첫 인상과는 달리, 보기와는 달리, 얼
핏 보기에는
… Suppose, on the contrary,
that …
용법
In order to give the other side of a question, we use “on the oth-
er hand”. “On the contrary” is used to contradict to say that
something is not true.
“On the other hand” means ‘it
is, however, also true that ...’.
(contrast, 한편, 그 반면)
“On the contrary” means ‘the
opposite is true’. (contradiction,
천만에, 그 반대로, 오히려)
Examples
The job wasn't very interesting,
but on the other hand it was
well-paid.
It’s certainly hard work. But, on
the other hand, a man who
wishes to have a career has to
make a great many sacrifices.
It’s not a very nice flat. On the
other hand, it’s cheap. (or
Still, it’s cheap)
On the other hand, with off-
line servers, a fast revocation of
rights becomes harder to
achieve.
“I suppose the job wasn't very
interesting?” -- “On the
contrary, it was fascinating. I
loved it.”
“You’ll get tired of it.” “On
the contrary. I shall enjoy it.”
There was nothing ugly about
her dress: on the contrary, it
had a certain elegance.
방법 ; “불가 능, 할 수 없다 , 방법이 없 다
This is highly desirable since
there is no way to know in
advance what other variables
with values may be around when
a particular function is used.
If not for the existence of
heads like Hold and HoldForm,
there would be no way for an
expression to return a partially
evaluated result such as a
component of a trace.
There is no way of checking
whether a certificate has been
revoked.
Here is one way of doing it. …
The only purpose for the last
factor is to guarantee that Λ
is not a possibility because it
is not accepted by the machine.
“예, “보기
Let us take an example. Suppose
that we are trying to define the
set of positive even integers for
someone who knows about
arithmetic, but has never heard
of the even numbers.
This very simple syntax is the
starting point of a vast theory
called the lambda calculus. It is
intended to capture the two
most fundamental properties
of functions in a certain sense,
namely, that of applying a
function to an argument by
substituting the argument for a
bound variable in the body of
the function and that of giving
a name to the function
determined by a rule. Here are
some examples of terms in the
lambda calculus. 개념 설명, 도입,
기술, 나열; 예, 보기
Here are two examples.
Let us walk through an
example to get a feel for how
these special status codes and
headers work. 예를 들겠다; 감을
가지기 위해, 살펴보기 위해, 알아보
기 위해
If you asked for more accuracy
than is possible in double
precision variables, what might
happen? For example, say
that you asked for 21 accurate
figures.
Take, for example, an
electrical engineering program.
Its educational objectives shoud
be …
“복잡
If we want to apply a function to
several arguments, things get
more complicated. 일이 더 복잡
해진다
It could get quite complicated.
꽤 복잡할 수도 있다
“lead to/into
The goal of this lab is to develop
the concept of an ideal through
examples, leading to discovery
of some of the properties of
ideals.
Following the sings led us into
a small square with a fountain.
Years of painstaking research
have led to a new vaccine.
Indifference to pollution now will
lead us into serious problems
in the future.
Any digital bank note can be
copied at infinitum. This is
bound to lead to cheating. ~할
것이 틀림 없다, 확실, 필연, certain
Whether this is what was
intended or not is unimportant
in the current discussion.
The important points are, firstly,
that an informal description can
be expected to have ambiguities
which may lead to weaknesses
in certain interpretations;
secondly, that the interpretation
that allows the attack is what
appears to have been used in
the BAN logic analysis.
Failure to understand the
precise meaning of specific
goals has lead to
misunderstandings about the
differences between various
protocols. This motivates us
to explicitly identify six distinct
candidate positions which may
or may not be intended as
formal goals in a specific
authenticated key establishment
protocol. 이런 이유 때문에/동기로
우리는 ~ 했다. ~하게 된 이유
“많은 양의
…, especially if you are sending
large amounts of information
over a single SSL session or over
multiple SSL sessions that use a
shared master secret. On the
other hand, if you expect to be
serving dozens or more SSL
HTTP requests over the course
of a minute, you should
consider getting either an
extremely fast computer or
hardware assistance for the
public key operations. 많은 양의
정보; 잠시 동안에
There is thus a fair amount of
syntactic reduction since
primitives of one language are
often definable in another. On
the logical level there is a
similar amount of axiom
chopping. 상당히 많은 양의, 꽤 많
은, 많이, 많다
A fair amount of research has
centered around anonymity.
Some of the work is highly
theoretical, but some solutions
are practical and have been
implemented. Much of the work
in this area is based on Chaum’s
invention of a digital mix.
Existential quantifications are
also signaled by a host of
English words: …
a multitude of (= an extremely large number of):
a multitude of
problems/possibilities/reasons
These elements can be
combined in a multitude of
different ways.
a multitude of possible
interpretations
Wireless technologies today
come in several forms and offer
a multitude of solutions
applicable to …
a great deal:
What actually goes on is a
great deal more involved.
A great deal more can be
done with finite state machines.
This can save you a great deal
of work. 일거리를 들어준다.
Within the past few months it
has become obvious that there
is a great deal of interest and
financial stake involved in the
deployment of protocols for … 최
근 몇 달 새, 최근 몇 개월 새, 최근 몇
개월 사이에, 지난 몇 달간
On the face of it, it seems like a
great deal.
그 응답 으로서 , 반응 , 회신
A “Cookie” Exchange guards
against simple flooding attacks
sent with bogus IP Sources or
UDP Ports. Each party passes a
“cookie” to the other. In return,
a list of supported Exchange-
Schemes are offered by the
Responder for calculating a
shared-secret. 보호, 방어, 막아준
다, 막는다; 전달, 송신, 보낸다
In response, the server will
also send its own
ChangeCipherSpec message.
The responding system replies
with a packet with both the SYN
and ACK flags set.
I asked her what her name was
but she made no reply.
I am writing in reply to your
letter of 16 March.
The Supplicant PAE sends a
Response packet in reply to
each Request.
“차이 , 변화 , 달라 지다 , 변하다
“Teddy, you have it all wrong.
You were the one who taught me
that I could make a difference.
변하다, 변화, 달라지다
At first sight, the only difference
between …
The order in which we write x
and y makes a difference. 다
르다, 차이가 있다
The only difference is the
way that V’s TTP recovers the
session key K.
There is an important
difference here in that an
attacker with knowledge of a
compromised key could produce
a fraudulent suicide note, which
would prevent the owner from
using its certificate, a denial of
service attack. Another
important difference is that
the suicide note refers to one
certificate only, whereas the …
“표시
The emergency exit is shown in
(= indicated in) green letters.
~로 표시
The sections shown with an
ellipse (…) must be filled in for
the particular application
created.
“어려 움, “difficulty
I had difficulty getting any
details. He wasn’t very
forthcoming(=willing).
This difficulty is at the core
of the debate over key recovery.
In fact, an incomplete logic that
gets us most of what we want
easily is generally preferred
over one that gets us all of what
we want but with greater
difficulty.
As a further difficulty,
generation of keys may face
legal restrictions in some
jurisdictions.
“extreme
In the extreme, providing no
network services at all will result
in a very secure but useless
commercial system. 극단적으로는
At one extreme, RADIUS does
not require … At the other
extreme, the user is not willing
to wait several minutes for
authentication. 한편으로는… 그
반대로…
“여러 가지 , 여러 가지 , “다양한
Solutions to this problem fall
into a variety of categories.
여러 가지 다양한 범주, 종류로 나눌
수 있다, 분류
The Web is already being put
to a variety of uses:
educational, social, political, and
commercial. 다양한 용도
It is an important issue, since,
as we will see, session key
distribution protocols must resist
a variety of novel attacks. 여러
가지/다양한
A future mobile user will be
offered a much larger variety
of services than in today’s
networks.
Any defined EAP method can be
used within IEEE 802.1X,
enabling support for a wide
variety of authentication
credentials.
There is a diversity of both
educational objectives and the
means by which we measure the
attainment of these objectives.
In this way the work retains its
unity but can have a wide
diversity of atmosphere.
But despite the rich diversity
of issues raised, there are some
disappointments.
Such behavioral diversity
serves the same function as
genetic diversity, and indeed
compensates for restrictions on
genetic diversity.
Remote access servers vary
widely in their functionally.
For various reasons, we
consider this to be the most
useful definition of
authentication: it insists that the
two agents agree on all the
essential features of the protocol
run, while avoiding specifying
features that are hard to
achieve and less likely to be
required. 여러 가지 이유로, ~하는
한편, 별로 ~할 것 같지 않다, 가능성
With the vast array of security
options available, users will
choose to use the stock
configuration rather spend the
time to lock down a host or
network.
This will be of manifold
advantage. First, … 여러 가지 장
점이 있다.
Amongst other things, such a
foundation can give us
assurance that the reasoning in
the logic is sound (i.e., false
conclusions cannot be derived
from true premises.) 여러 가지 중
에서도
It also has a range of other
options relating to the way a
workspace is handled. 여러 가지,
방식, 방법
In a wide/vast/impressive
array of contents, it has been
found empirically that the
statistics of noise are well-
described by normal
distributions, and the central
limit theorem provides a
convincing explanation for this
phenomenon.
There was a vast array of
colors to choose from.
come in … varieties/forms/flavours: 여러 가지 다양한 종류/형태
로 나타난다
These devices come in
different forms and are
typically used in branch office
and corporate networks. .
Key establishment protocols
come in various flavours (= a
type or kind of something).
Symmetries can come in
several varieties.
Computer problems come in
different varieties; some are
easy, and some are hard.
Computer network attacks can
take many forms and any one
attack may include many
security events of different
types.
다양한보다는 많은에 더 가까운 어
휘는 “많”을 키워드로 쳐서 찾을 것!
“기인 , 근거 , 이유 , 기원
While the obvious limitations are
rooted in (= having as their
origin or cause) the nature of
wireless devices and data
networks, there are also more
fundamental differences that are
important to understand.
This incompleteness can be
attributed to the limitations
associated with our current
models of cryptographic
protocols.
“과거
Back in the early days, TCP/IP
standards writers adopted the
word gateway for what the
commercial marketplace now
calls a router. 초창기에는
In earlier times, an
organization would use a single
subnet mask through an entire
network. 처음에는, 초창기에는
There have been many
examples in recent times of
individuals in sensitive positions
violating the trust placed in
them. 최근에
The router price/performance
ration has decreased steadily
over the past few years. 지난
몇 년간, 최근 몇 년간
During the past few years,
other networking technologies
like frame relay and ATM have
become available for forming
corporate networks.
Within the past few months
it has become obvious that there
is a great deal of interest and
financial stake involved in the
deployment of protocols for … 최
근 몇 달 새, 최근 몇 개월 새, 최근 몇
개월 사이에, 지난 몇 달간
Just over a year ago, the idea
of a single wireless data
standard was unheard of, yet
today the WAP specification is
available to the public. 불과 1 년
전만 해도… 그러나 지금은 / 들어본
적이 없다
Although the Web only started
gaining popularity around
1993, the underlying concepts
for the Web have been around
for quite sometime.
… which was given to them
some time in the past. 과거 어
느 시점에
In the late eighties BAN
developed BAN logic, which
quickly became the most widely
used and widely discussed
formal method for the analysis
authentication protocols,
particularly authenticated key
distribution protocols. There
have since been a number of
papers noting BAN’s inability or
limited ability to reason about
some features of both protocols
and attacks on protocols. This
has led several authors to
propose alternatives to BaN.
Many of these proposed
alternatives are essentially
extensions. ~년대 후반에; 그 이
후, 그 뒤로
As a director for over a
decade, I established myself as
the leading expert in both … 10
여년간
“미래
There are few chances that the
world will ever agree on a single
electronic purse scheme in the
near future. 가까운 장래에, 미래
And, in the very near future,
Odyssey Server will be able to
forward WLAN authentication
reqests to Steel-Belted RADIUS,
to authente WLAN users against
non-Windows back-end
databases such as token
systems or SQL.
Within the next 2-3 years,
SET will become the
predominant method for doing
credit card payments on the
Internet, initially in software
only, but later supported by
smartcards. 향후 2, 3 년
… the above scenario appears
likely in the not-so-distant
future. 멀지 않은 장래에
A CSMA protocol works as
follows: A station desiring to
transmit senses the medium, if
the medium is busy (i.e. some
other station is transmitting)
then the station will defer its
transmission to a later time, if
the medium is sensed free then
the station is allowed to
transmit.
The comments should be
sufficient for another
programmer, or you at a later
date, to understand the purpose
of any particular piece of code,
and to understand how it works.
In course of time, new and
increasingly abstract
representations of value were
introduced. 시간이 지나면서, 점차
Sometime in the future, PPTP
is going to be supplanted by
L2TP. That future is not here yet,
however. 언젠가는
At a later time, a subset of
participants B ⊆ P will pool their
shares in an attempt to
compute the key K. 나중에
If a transaction can be carried
out using computer technology,
it is certain that at some time
or other a client will decide to
do so. 언젠가는
After a time, the table will be
full and the target system must
start discarding SYN packets or
removing half-open connection,
and it has no way of
distinguishing between valid
connections and connections
from an attacker. 구분/구별/차이
식별
After some time, I will get a
message that confirms my
enrollment. 얼마 안 있어, 얼마 지나
면, 조금 있으면,
At some future time,
governments will probably
legislate regarding archiving of
electronic certificates. In the
meantime, the issuer could
offer … 향후, 미래, 지금, 당분간, 시
간
This is all you need to know
about the evaluation process
for now (= for the present 당분
간, 우선은); any further details
would serve to confuse rather
than to illuminate.
Let’s set this knowledge aside
for the moment (for the sake
of learning how to use some of
the available tools in situations
where we don’t know if we have
an isomorphism).
Everything that you give a name
to in a program (a variable, or a
function, or anything else)
only exists for a finite period
of time, the maximum being
the entire duration of program
execution. 기타 등등, 그 밖에 어떤
것이든, 유한한 기간 동안, 일정 기간
동안
For example, say that all seniors
in one program have difficulty
with a specific thermodynamics
course over a period of
several years.
“때, “시점, 경과 등등
Over time, various formalisms
have been proposed for
investigating and analyzing
protocols to see whether they
contain blunders. 시간이 지나면서
As time goes on and attacks
evolve, the prevalence of
various attacks will no doubt
change. 시간이 지나면서; 틀림 없이
… , which is efficiently retrieved
from the issuer’s server in a
fraction of a second. 몇 분의 일
초 안에, 매우 빨리, 매우 짧은 시간
안에
At any one time, the machine
can be in one of a finite set of
internal configuration or states.
특정 순간, 특정 시점, 시간
It’s just too challenging, or
difficult, or expensive to acquire
and use the technology
necessary to break into the
system (at least as far as we
know, and at this point in
time, what people will come up
with tomorrow is anyone’s
guess). 침입, 공격, 침투; 지금 이
시점
At the time that IPv4 was
designed, no one could have
dreamed that there would be
millions (and someday billions)
of networked computers in the
world. 때, 시점
Section 2.4 Properties of the
mechanism.
We next observe a few
significant properties of the
proposed mechanism.
- First note that a user can
arrange for his send key pair to
be changed at any time. 살펴보
자, 고찰, 도입; 언제라도, 어느 때라
도
Either party may initiate an
exchange at any time. 언제라
도, 어느 때라도
Sometimes this is exactly what
you need, but at other times
you need more flexibility.
Because many kinds of
information must be kept
confidential for long periods
of time, assessment cannot be
limited to the protection
required today. Equally
important, cryptosystems –
especially if they are standards –
often remain in use for years or
even decades. 오랫동안/오랜 시간
동안, 또 한가지 중요한 점은; 사용중
인, 사용하는, 사용하고 있는, 쓰고
있는
… but it will not keep out a
determined cracker for (very)
long. 오랫 동안
Will you be away for long?
I’m sorry I haven’t written to you
for so long. 연락, 편지
~ 할 “때까지, … 시점까지
The Count had resolved to wait
until after Christmas to
propose to Gertrude.
They have to wait till after
school.
In other words, the Authenticator
cannot execute the Pairwise Key
Hierarchy until after it has
received the second message of
the four-way handshake.
때가 되었다, ~할 때다
We believe the time is right to
question this two-course
assumption.
Now is the right time for us to
move to London.
phase out
= stop, discontinue, eliminate or remove something in
stages/phases or gradually;
“또 다른 , 또 하나
yet = even, still
Yet another problem with SLIP
is that each end must know the
IP address of its interlocutor. For
additional discussion of SLIP, see
Tanenbaum (1996) or Stevens
(1994).
The mail brought yet another
reply.
yet another reason
“시작
To start with, you can select …
시작
Starting with the next chapter,
we’ll be using console
applications extensively
throughout the first half of the
book. ~부터 시작해서
In this chapter, we’ll get down
to (= to start concentrating
seriously on something or
getting something done) the
essentials of programming in
C++. By the end of the chapter
you will be able to write a simple
C++ program. 시작
Now we are ready to get down
to the specifics. In the sections
that follow, we discuss the way
that data is packaged for the
various types of network
topology. We start off with
point-to-point links.
Now let’s resume our pursuit
that preceded question 12. ~로
돌아가서, 재개, 다시 시작
“시작, “도래, “가져오다, 야기하다
However, this is just the
beginning. There is more to
come and it may very well
change the way we transact
business. 시작, 앞으로…
Commerce on the Internet is just
getting off the ground. 이제 막
시작하고 있다. 시작되었다.
While the Morris worm did little
real damage, it nevertheless
ushered in a significant new
era of security consciousness by
revealing the Internet’s
vulnerability.
The change of management
ushered in fresh ideas and
policies.
The legislation should usher in
a host of new opportunities for
school leavers.
The 1929 crash of the American
stock market ushered in the
Great Depression.
…a unique opportunity to usher
in a new era of stability in
Europe.
“진입
As we enter the new
millennium, computer science is
an enormously vibrant field.
From its inception just half a
century ago, computing has
become the defining technology
of our age. 접어들면서, 진입하면
서; 시작부터, 처음부터
set sth in motion/progress/train: to make sth start happening
A study by military experts was
immediately set in motion.
The chief executive will set in
train the process of finding a
successor.
During the Spring semester of
2000, the curriculum committee
set into motion an assessment
plan that includes four major
components: …
유례 없는 , 전대 미문 , 미증유
this was an unheard-of piece of
luck. (= very unusual or has
never happened before)
Home computers are now used
on a scale unheard-of a few
years ago.
It is almost unheard-of for a
new band to be offered such a
deal.
… In the same way that the
first airplane hijacking in the
1960s gave rise to previously
unheard of security measures
at airports, this first attempt at
“cyber-terrorism” ushered in a
new era of security awareness
for managers of computer
networks, particularly networks
linked to the Internet.
“use, 도움 , 쓸모
To be of any use, the null
space must contain vectors
other than zero.
Internet PKIX certificates have
recently come into use as an
attempt to provide a workable
and acceptable certificate
structure for Internet
applications. 사용하게 되다, 쓰이게
되다
“Working with Held Expression,”
puts the knowledge gained in
Section 7.2 to practical use.
Thus, in the realistic model of
an active adversary, the DH key
exchange is of no direct use.
“year
The survey reported that the
number of companies suffering
intrusions in the previous twelve
months rose to forty-nine
percent from forty-two percent
the year before. 한 해 전
Industry experts appear divided
between those who believe this
technology is many years
away from widespread
application and those who
believe VoIP to be the wave of
the near future.
“부상 , 등장
Outsourcing LAN administration
is not a new idea, but it is
rapidly gaining ground as
networks grow in importance
and complexity. 부상하고 있다
a theory gaining ground
among academics
모든 가능성 , 모든 경우 의 수
Whilst it is possible to build a
certain amount of error-handling
capability into the script, it is
never possible to anticipate all
eventualities.
We must be prepared for every
eventuality.
“경험
Experience has shown that
secure cryptographic systems
are deceptively hard to design
and build properly.
Experience has shown that
the best way to develop and
maintain a large program is to
construct it from smaller pieces
or modules each of which is
more manageable than the
original program.
It is my experience that
different researchers will give
different answers to the above
questions. 내 경험으로는…
“최소 한, “적어도
The main requirements were to
keep the changes required to a
minimum and at the same time
minimise the computational
overhead at the user’s end.
Evaluate it five times at a
minimum.
At a minimum, they include …
At the least, this restriction is
very annoying. In the extreme,
some sites set their full
allotment of 20 cookies each
time, so the user spends all of
his time answering cookie pop-
up windows – an unacceptable
outcome.
As an absolute minimum, you
should spend two hours in the
evening studying.
“다름 아닌 , “바로
The first speech was given by
none other than Clint
Eastwood.
The mystery guest turned out to
be none other than Cher
herself.
The future looks bright for
Kerberos however, since a major
endorsement of the technology
came from none other than
Microsoft who is basing the NT5
authentication framework on
Kerberos.
~ 이란 것은 없 다
First of all, there is no such
thing as a number devil.
Darling, Mummy's told you
before, there's no such thing
as ghosts (= they do not exist)!
“강화 , “지원
Wireless LAN protocols are also
designed in such a way that
bolstering the access control
also makes it quite easy to
shore up the encryption of
traffic, to the point where
deploying products to improve
authentication will also provide
greater privacy of the
information traveling over the
wireless LAN.
…an aid programme to bolster
up their troubled economy.
The chapter concludes by
providing illustrations of how the
PAM service is used to support
both Primary and Secondary
Sign-on operations in support of
the concept of Single Single-on.
지원
Provide for sth: make it possible for sth to happen in the fu-
ture; plan for; make plans in order to deal with a possible event
in the future; 지원, 대비
The budget provides for a
salary increase after one year
Commanders failed to provide
for an attack by sea.
Generally, the count will be a
single byte, which provides for
strings of up to 255 characters.
Provide for sb: take care of someone by making money in order
to buy the things that they need; give sb the things they need
such as money, food or clothes; 부양
Without work, how can I
provide for my children?
He has a wife and two young
children to provide for.
“case, “경우
By defining a separate set of
communication rules (protocols),
these rules can now be applied
over any OSI-compliant topology.
This was not the case with
legacy systems, which is why
the OSI model was developed. ~
의 경우는/경우에는 그렇지 못했다.
Nevertheless, clever design has
its limitations when delay is
excessive, as is often the case
in the public Internet. ~에서는 흔
히 그렇듯이
The recursive solution is much
easier to code than the iterative
solution would. This is often
the case with good recursive
solutions.
… or might it be the case
that A has completed more runs
than B? ~일 수도 있는가?
It is quite commonly (=
often, usually) the case that
one wishes to prevent this sort
of thing from happening.
Should this be the case, the
firewalls defining the DMZ will
have to be reconfigured. 이럴 경
우, 이 경우는, 만약 그렇다면
That being the case,
however, the astute reader may
be wondering why the simpler
pattern merge[a_, {b1_,
brest___}] wasn't used instead.
The answer will be revealed in
the exercises.
In each of the examples above,
the orbits all had the same size.
This is by no means always
the case. 늘/항상/언제나 그런 것
은 아니다
on a case-by-case basis:
= according to the particular facts relating to each situation
= 임기응변 식으로; 경우에 따라; 사례별로; 개별로
The only thing we can do is to
negotiate on a case-by-case
basis.
어떤 경우든, 어느 경우든
In any case, if the user does
not exist, the authentication
request must not be accepted.
In either case, the key cannot
be directly accessed except by
the cryptographic processor on
the card.
You can get there by train or bus
– either way / in either case
it’ll take an hour.
Whatever the case may be, …
경우 “열거, 경우 “나열
One reason is to distinguish the
use of asymmetric key pairs for
signatures, encryption, and key
agreement, ….. A second
reason is to separate the notion
of binding a public key to a
principal from the notion of the
goodness of that key.
Cayley’s Theorem is important
for two contrasting reasons. One
is that it allows us to represent
an abstract group in a concrete
way. A second is that it shows
that the present-day set of
axioms we have adopted for a
group is the correct abstract of
its much earlier predecessor–a
group of permutations.
This definition for POSITIVE has
two problems. One, it does
not generate all real numbers
(e.g., 1T is not included because
of its infinite length). Two, the
definition is not recursive since
we did not use known elements
of POSITIVE
One standard way of defining
this set is … Another way we
might try is this: … The third
method we present is sneaky, by
recursive definition: …
Whereas the first datagram
sent from the web server to the
requesting client may travel
across an underground fiber-
optic cable, the second
datagram may be sent across a
satellite link, while a third
may travel over a conventional
network.
“색깔
The topological view they use for
their inter-AS routing protocol is
shown at the higher level, with
links shown in light gray. “회색
칠된선
In Figure 4.3-3, the portion of the
path routed using A's intra-AS
protocol is shown in red, the
portion using the inter-AS
routing protocol is shown in
blue, and the portion of the path
routed using B's intra-AS
protocol is shown in green.
동작 설명 , 동작 설명 , 순서설 명, 순서 설명
Let us begin by considering in
detail one particular example.
Suppose that the input alphabet
has only the two letters a and b.
Throughout this chapter, we use
only this alphabet (except for a
couple of problems at the end).
Let us also assume that there
are only three states, x, y, and z.
Let the following be the rules of
transition: Rule I Rule 2 Rule 3
Rule 4 Rule 5 From state x and
input a, go to state y. From state
x and input b, go to state z. From
state y and input a, go to state
x. From state y and input b, go
to state z. From state z and any
input, stay at state z. Let us also
designate state x as the starting
state and state z as the only
final state. We now have a
perfectly defined finite
automaton, because it fulfills all
three requirements demanded
above: states, alphabet,
transitions. Let us examine what
happens to various input strings
when presented to this FA. Let
us start with the string aaa. We
begin, as always, in state x. The
first letter of the string is an a,
and it tells us to go to state y (by
Rule I). The next input
(instruction) is also an a, and
this tells us by Rule 3 to go back
to state x. The third input is
another a, and by Rule I again
we go to state y. There are no
more input letters in the input
string, so our trip has ended. We
did not finish up in the final state
(state z), so we have an
unsuccessful termination of our
run. The string aaa is not in the
language of all strings that leave
this FA in state z. The set of all
strings that do leave us in a final
state is called the language
defined by the finite automaton.
The input string aaa is not in the
language defined by this FA.
Using other terminology, we
may say that the string aaa is
not accepted by this finite
automaton because it does not
lead to a final state. We use this
expression often. We may also
say, "aaa is rejected by this FA."
The set of all strings accepted is
the language associated with
the FA. We say, "this FA accepts
the language L," or "L is the
language accepted by this FA."
When we wish to be
anthropomorphic, we say that L
is the language of the FA. If
language L, is contained in
language L2 and a certain FA
accepts L2 (all the words in L2
are accepted and all the inputs
accepted are words in L2) , then
this FA also must accept all the
words in language L, (because
they are also words in L2) .
However, we do not say, "L; is
accepted by this FA" because
that would mean that all the
words the FA accepts are in L j .
This is solely a matter of
standard usage. At the moment,
the only job an FA does is define
the language it accepts, which is
a fine reason for calling it an
acceptor, or better still a
language-recognizer. This last
term is good because the FA
merely recognizes whether the
input string is in its language
much the same way we might
recognize when we hear
someone speak Russian without
necessarily understanding what
it means. Let us examine a
different input string for this
same FA. Let the input be abba.
As always, we start in state x.
Rule I tells us that the first input
letter, a, takes us to state y.
Once we are in state y, we read
the second input letter, which is
a b. Rule 4 now tells us to move
to state z. The third input letter
is a b, and because we are in
state z, Rule 5 tells us to stay
there. The fourth input letter is
an a, and again Rule 5 says stay
put. Therefore, after we have
followed the instruction of each
input letter, we end up in state
z. State z is designated a final
state, so we have won this
game. The input string abba has
taken us successfully to the final
state. The string abba is
therefore a word in the language
associated with this FA. The
word abba is accepted by this
FA. It is not hard for us to predict
which strings will be accepted by
this FA. If an input string is made
up of only the letter a repeated
some number of times, then the
action of the FA will be to jump
back and forth between state x
and state y. No such word can
ever be accepted. To get into
state z, it is necessary for the
string to have the letter b in it.
As soon as a b is encountered in
the input string, the FA jumps
immediately to state z no matter
what state it was in before. Once
in state z, it is impossible to
leave. When the input string
runs out, the FA will still be in
state z, leading to acceptance of
the string.
///////////////////////////////////////////////////////////////////////////////
///////////////
Etc.
The length of a word w, denoted
by |w|, is the number of letters
in w when each letter is
counted as many times as it
occurs. “count
It was no wonder that Leibniz
felt compelled to consider
anew the meaning of the
concept of space and its infinite
divisibility. 놀라운 일이 아니다; 재
검토
It might be that you do not
wish to wait that long. 아마도
First off, let’s see how much
it’ll cost. 우선, 먼저 (before
anything else; in the first place)
This flexibility does not come
without a cost, however. 비용
이 든다, 대가
In no case can the average
number of questions be less
than H(X). 절대로, 결코 아니다
Rachel seems to be the only fly
in the ointment of Caroline’s
smooth life.
All principals act in their own
best interest (including to
guard jointly derived secrets). 이
익을 위해 최선을 다한다
To do so, we felt it was important
to spend part of our effort
getting a sense of what
aspects of computer science had
changed over the last decade. “
감을 잡다
As a result, we have seen
exponential increases in
available computing power that
have made it possible to solve
problems that would have been
out of reach just a few short
years ago. 불과 몇 년 전까지는
One of the most hotly debated
questions in computer science is
the role of programming in the
introductory curriculum.
An understanding of what a
given standard body does
within the landscape of
mobile networking will be helpful
to the reader for the remainder
of the book. 분야
Likewise, your security (or
lack thereof ) can cause
serious harm to others, even if
intruders do no direct harm to
your organization. Similarly,
machines that are not part of
centralized computing facilities
and that may be managed by
novice or part-time system
administrators or may be
unmanaged, can be used by
intruders to inflict harm on
others, even if those systems
have no strategic value to your
organization. 해를 끼치다, 공격하
다, 손해, 폐해; thereof (= of
that)
An alternative protocol that cuts
the typing in half is for the
calculator to encrypt the current
time and display the result. 절반
으로 줄이다. 감소
require of 요구한다.
- Marathons require incredible
stamina of the runners.
- Analogous assumptions are
required of B.
It is important, however, that
you do not think of a firewall as
a single piece of equipment or
as one “do-it-all” software
program, despite the fact that
some vendors may try to
convince you otherwise. ~에도 불
구하고 (despite = in spite of)
The Internet is not without its
shortcomings, however. 결점이
없지는 않다. 있기는 있다.
The wireless medium is
characterized by high bit error
rate and expensive usage (since
spectrum is a scarce resource).
특징
I take an assortment of clothes
on holiday, as a provision
against the vagaries of the
weather. 대비책, 방비책
The system is supposed to
enter service in 2003-2004;
some of the design details are
still being worked on, so this
section is necessarily somewhat
tentative.
It's such a tiny office. Don't you
ever feel cooped up here?
If the user is not required to use
EAP, then the RADIUS server will
respond with an Access-Accept
or Access-Reject packet as
appropriate. 경우에 따라
Some confusion may arise in
deciding when to use virtual
private networks (VPN) and
when to use 802.1X. These
technologies actually
complement each other and
there are times when both
may be used. ~할 때가 있다.
It is assumed here that each
possible key is as likely as any
other.
To some extent / a certain extent
(Partly), she was responsible for
the accident.
Don't fiddle with my computer
while I'm out.
There's no point in fiddling with
the format because the whole
report will have to be altered.
I spent all morning fiddling
about/around.
… without any maths
whatsoever
… in any way whatever
… continued study will be
necessary to keep up to date
with developments, especially in
relation to …
I try to keep abreast of what's
happening in psychology.
Please find attached some draft
text
Sorry, I can't make it. (I'm not
feeling well….)
OR, Sorry, I can't go.
I am indebted to the ideas of
Bob Waller for much of the
foregoing analysis.
What if the adversary were able
to recover the first 56 bits of K ,
but not all of K?
Thus, in order to get off the
ground, the legitimate parties
need an information…
When two parties A, B,
sharing, respectively, keys
KA and KB with S, want to
engage in a communication
session, a three party protocol
will be executed, involving A, B
and S.
… can be executed in a similar
time to a symmetric
cryptosystem.
Assume each party has access
to authentic copies of the
other’s public key (if not,
certificates can be included in
existing messages 2 and 3.
Apart from detailed information
on the syntax of each command,
you will also find hints and tips
on how to avoid typical
mistakes.
Hence the code is such that
any received string with one
error can be detected.
⇔ Hence we can detect any
received string containing one
error.
Yet another irritating fact is
that there is no help text to
document which commands
support “assume” and which do
not.
The term verification refers to
the process of checking the
appropriated claims …
A key shall be replaced when its
compromise is known or
suspected.
Key may become lost due to
human error, software bugs, or
hardware malfunction.
The identification facility has to
check known information about
the claimed identity against
information acquired during the
identification process.
Certification authorities are to
be trusted with their
registering responsibilities only.
the initiator A shall be able to
generate or otherwise acquire
a key K …
This concept requests
unconditional trust in that
servers will not misuse their
ability to eavesdrop.
Like Kerberos, SPX has
credential initialization and
client-server protocols.
Secrecy specifies that a
message can be read only by its
intended recipients, while
integrity specifies that every
message is received exactly as
it was sent, or a discrepancy is
detected.
But the less obvious success
stories of how the Allies
protected their codes is less
know but no less important.
.. the security of both wire and
wireless communications is
becoming a more prominent
issue in personal and business
communications than ever
before.
… is required, for instance, in
case B initiates some operation
without any authorization from
A.
The basic procedures described
above are vulnerable, especially
as regards attacks by active
eavesdropper.
Last, but perhaps just as
important, remember that
you’re most likely going to be
installing firewalls at more than
one site. 마지막으로
The increasing, and
increasingly diverse, demand
for security by users, operators
and regulatory bodies calls for
more advanced security features
in third generation system, such
as UMTS.
Since the 1980’s, ISO has
been standardising different
aspects of smart cards to ensure
…
ETSI does not seem quite so
clear what this device will be
called or what form it will take.
We obtain at most k rows ( one
row fewer for each 0-bit in the
integer n )
… anyone can open useless
connections to any server while
few people are able to record
and replay messages to a
particular server. ( 대조, 반대, 대
비)
To summarize, …
On the theoretical side, the
security of the stateless
protocols should be examined
from two directions. First, …
. Second, … .
The computation of modular
exponentiations are mainly
considered, because it is the
most time-consuming
computation.
Also take note of the fact
that this loop must execute 2
commands, one to increment
counter, the other to multiply
product.
For large expressions,
compilation can speed up
execution by a factor as large
as 20.
We would like instead to
instruct MMA that all names in a
certain section of code refer to a
particular context.
We move, then, to the second
way to declare names in a
context. 전환
There is, however, then the
question of which symbol you
actually get when you type in
only the short name Mole.
A successful denial-of-service
attack using this vulnerability
would require the initiator to
start the protocol not once but
many times.
Since this is an attack against
the initiator, not the responder,
it is potentially less useful for
tying up resources; the victim
must decide to initiate an
instance of the protocol before
the attack can be mounted. 보
안에서의 각종 표현
In the first message in the STS
protocol, an attacker who is
capable of doing nothing more
than sending messages could
send a bogus message and
cause the responder to waste
resources responding to it.
No protocol is completely
immune against denial of
service attacks.
More to be done 추후 과제
The hotel is in the middle of
nowhere and there lies the
rub. We don’t have a car.
The number will be exact if no
decimal point is encountered,
approximate otherwise.
At the beginning of this
section we asserted that every
expression returns another
expression as its value. There
are cases in which this seems
to be untrue, however. An
example is …
The above example seems to
imply that there is no return
value from SetDelayed.
… if it is part of a larger
expression, however. 관사가 붙지
않는다.
… the intended result of
executing the function is not its
return value, but rather some
change that it makes to the
state of the Mathematica session
(or to the computer in general
for example, writing data to
a file).
There is one last topic that
needs to be made before we
leave this topic.
After 4096 rewritings have
taken place, the kernel wraps
the current result in Hold (which
prevents any further
evaluation) and returns it.
In very special cases, even the
space is unnecessary. The
author knows of only two such
cases. The first is when a
number is followed by a
nonnumeric character.
For reasons that will become
much clearer later, it is good
practice to always Clear a
function before making changes
to its definition.
These errors can be notoriously
hard to track down, since you
don’t get any kind of warning
messages, just a function call
that does nothing.
The correct thing to do in
this case is to use Set, so that
the RHS is evaluated at the point
of function definition.
Better yet, write a second
function that formats the data
returned by the first function.
In place of loops, there are
high-order functions that apply
other functions to collections of
data. 대신에
A trace of the evaluation shows
why.
When in doubt, consult the
table of special input forms in
Appendix A of the Mathematica
Book, or better yet, use
parentheses to settle the matter
unambiguously.
A level specification of the form
n without the braces applies to
levels 1 through n inclusive.
(Exception: A level specification
of 0 doesn’t do anything.)
…the value u is chosen at
random by U prior to the start
of the protocol.
V has to register with its TTP
the private key agreement key
v.
The function Fold is somewhat
like Nest, except that its first
argument is a function of two
arguments.
Although this seems like a
curiosity, it is actually very
useful.
You can use Word as your editing
tool at the very same time
you take advantage of
Publisher’s desktop publishing
capabilities.
Use this option very sparingly,
however, because even when
the text is visible, it is often
difficult to read.
You also can combine head
matching with a test function.
(also 조동사 순서)
… where g is as above.
What is really going on here?
Finally, it must be pointed
out that during the course of
debugging such a function, care
must be taken to always Clear
the cached values and define
the function from scratch
whenever any change is made
to the function.
In fact, you can think of an
UpValue as a kind of virtual
function. This analogy seems
especially appropriate since
the kernel checks an expression
for upvalues before checking it
for downvalues, so that the
former always override the
latter.
Having said all that, we need
to point out a limitation of
upvalues: They can be
associated only with symbols
that are at level 1 or the heads
of expression at level 1 in the
rule definition.
In the given example, we have
a choice of defining a
downvalue for Factor or an
upvalue for Plus. The former
seems like the logical choice
since Factor is much less
common than Plus. Either way,
you have to modify a protected
symbol.
All told, there are six different
kinds of rules that can be
associated with a tag; they are
listed in Table 7-1.
The external rules always take
precedence over the internal
ones, as we shall see shortly.
In cases in which an
expression matches both an
upvalue and a downvalue, the
upvalue always takes
precedence.
Although this looks rather like
a downvalue for N, the tag for
this rule is, in fact, omega.
F[6] evaluates to 2 rather than
3 because of the order of the
rules.
The basic idea is protection of
privacy of information by
distribution.
… one can't figure out anything
about it.
Now if t + 1 players get together
they can figure out f and hence
s.
Shamir's scheme suffers from
two problems.
Thus in place of the notation a
* b, we shall be using either a
+ b to be read “the sum of a and
b,” or ab to be read “the product
of a and b.” 대신에
We are requiring not only that
the set of one group be
contained in the set of the other,
but also that the group
operation on the smaller set
assign the same element to
each ordered pair from this
smaller set as is assigned by
the group operation of the larger
set.
Let us imitate this reasoning in a
general situation.
It is easy to see that our usual
law of exponents, aman = am+n for
m, n ∈ Z holds. For m, n ∈ Z+, it
is clear.
… to build on the work already
undertaken for UMTS by ETSI
SMG 10, …
… to accommodate, as far as is
practicable, any regional
variations in security
objectives and priorities for
3GPP partners …
No guarantee can be given
as to the existence of other IPRs
not referenced in SR 000 314.
Recent research in this field
seems to corroborate the
theory. (= to add proof or
certainty to (an account,
statement, idea, etc.) with new
information)
Data origin authentication: The
corroboration that the source
of data received is as claimed.
Entity authentication: The
provision of assurance of the
claimed identity of an entity.
If the activation of a security
feature provided for the
benefit of a customer is
controlled by another party, e.g.
a network operator, then the
customer should be made
aware of a failure to activate
the feature.
Those features should work
without any reduction in
security when a user roams.
They must not affect the
confidentiality of third parties.
They are such that differences
in security functionality for
terrestrial and satellite
components of UMTS can be
minimised.
They have a minimal impact
on the use of radio resources.
The MS sends its ciphering
capabilities as they are stored
on the UE, and the ciphering
preferences, as they are stored
in the USIM, as a part of the MS
capabilities, to the SN.
One common thread that
weaves through many of the
functions in AbstractAlgebra is
the use of the Mode option. By
default, functions are set to use
the Computational mode.
The first step in the process is a
SYN packet that is sent from Si
to D. The second message, from
D to Si, has both the SYN and
ACK flags set indicating that D
acknowledges the SYN and is
continuing the handshake. The
third message, from Si to D has
its ACK bit set, and is an
indication to D that both hosts
agree that both hosts agree that
a connection has been
established. The third message
may contain user payload data.
프로토콜 설명
To defend against the
exhaustion of resources in the
systems under attack, an
obvious approach is to increase
the number of resources
devoted to half-open TCP
connections, and to reduce the
timeouts. These measures have
been suggested by different
sources [11], and can be
summarized as: …
This can be effective if, apart
from the normal blocking done
by the firewall, some other
specialized mechanism is put in
place to deal with SYN flooding.
With the advent of WWW and
Java, the attacker has many
opportunities to push Trojan
horses down to the user's
desktop system.
In order to simplify our
description, we consider the
mechanism only in relation to
one-way communication. The
adaptation of the scheme for
two-way communication is very
straightforward. More
specifically we present the
mechanism in the context of a
pair of users A and B , where A
wishes to send B a confidential
message and needs to be
provided with a session key to
protect it.
First suppose TTPA is required
to provide access to this
message. … Second suppose
that TTPB is required to provide
access to this message.
The above analysis shows that
given that, before generating a
certificate, a TTP always checks
that a user possesses the
private key corresponding to the
public key which they claim as
their own, then the Burmester
attack does not apply.
By signing up to a licensed
TTP, the user will be able to
communicate securely with
every user of every TTP with
whom his TTP has an
agreement.
This matter is the subject of
further study, but no problems
have yet been identified. 추후과
제 향후과제
The proposed scheme as it
stands does not meet this
requirement, but the provision of
digital signatures as an
additional service by the TTP will
allow it to be met.
The proposed scheme allows a
user to have new send key pairs
generated as often as wished.
This is because MMA
determines the width of the
plot based on the x-coordinates
of the data, without regard for
the space needed to insert the
text annotations.
It is no loss of generality to
assume that …
It is no loss of generality to
let the set be A = {1, 2, …, n},
and we are assuming that n ≥
2 so that transpositions exist.
Members of a list do not all
have to be of the same type.
Thus, as previously, in the
context of the situation
where A wishes to send a
secret message to user B, we
suppose that … 앞에서처럼, 전술
한 것처럼, 이전처럼
Before A can send a secret
message to B, two key pairs will
need to be established, as we
now describe.
It is our hope that our findings
will shed further light on the
debate over key recovery and
provide a long-needed baseline
analysis of the costs of key
recovery.
This rising tide of important
yet unsecured electronic data
leaves our society increasingly
vulnerable to curious
neighbors, industrial spies,
organized crimes and terrorist
organizations.
It is extremely difficult if not
virtually important for
anyone other than
authorized recipients to
recover the original “plaintext.”
Taken together, these
elements encompass a system
of “ubiquitous key recovery”
designed to meet law
enforcement specifications.
While some specific details
may change, the basic
requirements most likely will
not: they are the essential
requirements for any system
that meets the stated objective
of guaranteeing law
enforcement agencies timely
access, without user notice,
to the plaintext of encrypted
communications traffic.
… there is little or no user
demand for this feature. In
particular, there is hardly
ever a reason for an encryption
user to want to recover the key
used to protect a communication
session such as telephone call,
FAX transmission, or Internet
link.
… and other basic operational
procedures will vary widely
from user to user, even within
a single business.
At this early stage in their
deployment, no consensus has
emerged on what government
role is appropriate.
The result is that once the call is
over, the information required to
decrypt it ceases to exist; not
even the parties to the call
store the keys.
The requirements set out by law
enforcement impose new
system costs for designing,
deploying, …
New expenses entailed in the
design of secure product that
conform to the stringent key
recovery requirements.
These costs are born/borne
by all encryption applications,
even those where key recovery
is not beneficial to the user or
even to law enforcement.
It remains unclear whether
the high-risk, high-liability
business of operating a key
recovery center, with limited
consumer demand to date, will
even be economically viable.
Political considerations aside,
the technical properties of
Clipper are interesting.
First we must check to see if φ is
a mapping.
We have limited our discussions
to ANSI C.
… But more importantly, it
provides capabilities to do
object-oriented programming.
Building software quickly,
correctly, and economically
remains an elusive goal.
… in the mid-to-late 1990s …
Many people feel that the best
educational strategy today is to
master C, then study C++.
To achieve this, T must use a
different secret value bA with
each user A. 각각 서로 다른 기밀
데이타
An implicit assumption in the
evaluation process is that the
system is designed so that the
set of all expression is partially
ordered with respect to
evaluation, or equivalently,
that there are no cyclic
dependencies in the evaluation
process. It is all too easy to
construct an example for which
this assumption is violated.
There is, of course, a grey area
with services such as electronic
mail which has both storage
and communications aspects.
두 측면, 양 측면, 두 가지 면
A visiting user has to
authenticate himself to the
foreign service provider with
the help of his home domain
agent. This may involve a
potentially time consuming
authentication protocol over
long distances.
What type of attacker will a
digital money system be willing
to withstand? 단수형(복수형이 아
니고)인데도 관사가 없다. attackers,
an attacker
That was true at the
beginning, but the knowledge
spread quickly and now cell
phone fraud is a huge problem
for the industry.
People can easily exchange
money without linking up with
a central computer system, and
this can reduce the costs
significantly. 연결
Brokers pay vendors by means
outside the PayWord system.
If user authentication fails, the
user request is rejected. If user
authentication succeeds,
proceed to step 4.
Even if the counter is updated
once every second, a 25 bit
counter suffices for the counter
to not overflow in one year,
which is a reasonable period to
obtain new certificates. TO 부정
사 부정형
A common use of IP multicast is
conferencing, especially video-
conferencing.
Yes, but it's a bit like a learning
English from a dictionary.
It is a good idea to master the
programming concepts
introduced in this chapter, even
if they seem a bit bewildering at
first.
Users can make payments to a
large number of different VASPs
without having to establish a
security association with each
one in advance. 미리, 사전에
(= beforehand, previously,
ahead (of time), in
anticipation)
They exchange their certificates
in the course of the protocol.
~ 하는 동안에, 과정에, 하면서
Protocols A and B were already
described in D10. However, they
have since undergone a
modification and are thus also
included in this deliverable. 수정,
변경
… mechanism proposed in this
section need not be modified.
To make life easy, the Internet
provides facilities to use
symbolic names instead of
dotted addresses.
Its domain name would quite
likely be mycompany.com.
This revolution, that some call
Webolution, is spreading at a
phenomenal rate.
… and it should be treated as
work in progress.
There is some evidence that
consumer will take proper
care in creating and protecting
security information if forced to
do so. 강제로 시킬 때만
As a result, awareness of a
threat tends to result in “non-
use” rather than “care in use”.
사용
For us secure e-mail is almost
more important than secure
payment.
… the law is to keep pace with
technological advances. 보조를
맞추어야
Acknowledgements
This work was supported by the
ACTS Project AD026, SEMPER.
However, it represents the view
of the author. SEMPER is part of
the ACTS research program
established by the European
Commission …
This description is based on joint
work of the SEMPER consortium.
It is a pleasure to thank all of
them for their co-operation and
contributions. The SEMPER
homepage is at
<http://www.semper.org>.
SET is a pragmatic approach to
pave the way for easy and
rapid enabling of secure
electronic transactions over the
Internet. 길을 닦다, 원활
To aid visibility, the PointSize
is increased from its default
value.
Suffice it to say that …
However, the basic ideas are
not all that complicated, and
one can get good use out of the
system knowing just a few
fundamental facts.
The interpretation that they
have of BAN’s work is fairly
typical.
The results were the same to
within statistical error, so
directC[] is certainly running
faster than direct and the
speedup cannot be attributed to
an ordering effect.
For larger expressions,
compilation can speed up
execution by a factor as large
as 20.
It is rather curious to
discover that the security of
this protocol is critically
dependent on plaintext
information which can be
considered as incidental to the
protocol.
It may well be that in a non-
robust protocol an attacker is
able to use messages drawn
from different protocols to
successfully deceive a
participant.
In this light, we view our
contribution as follows.
First, we raise the implicit
philosophy behind the use of a
random oracle to …. Second,
we systematically apply the
paradigm to ….
When a KA protocol involves
more than 2 users, we refer to
it as a multi-party key-
agreement (MPKA) protocol.
It is important to have as firm a
handle on these functions as
possible since a key to good,
efficient programming in
Mathematica is to use the built-
in functions whenever possible.
To see this more clearly, we
can step through the
computation. …
The DDN scheme is many
orders of magnitude more
expensive than any practical
scheme, since it involves
multiple signatures and zero-
knowledge proofs, and thus is
likely to be ruled out.
Decryption in the CS scheme is
about five times as costly as
in OAEP. In some applications,
this kind of increase may be
tolerable; in others not.
Big O takes care of upper
bounds, i.e., if the running time
is O[f[n]] this means that, up to
a constant factor, the program
is no slower than f[n].
We can pretty-print the result,
but that's not much of an
improvement.
In a man-in-the-middle attack,
an attacker intercepts all of the
communications between two
parties, making each think that
it is communicating with the
other.
The TMN protocol [12] is
described by the following series
of messages:
These are, on the whole, less
severe but do represent patterns
of behaviour under which A and
B are deceived by the intruder
about some aspect of
connections between them.
… and it also provides certain
defenses against denial-of-
service attacks by adopting the
cookies technique of [17].
Simple as this example
seems, there are complications.
In particular the rule of reductio
ad absurdum is not nearly as
natural as the other ones. 간단해
보이긴 하지만, 쉬워 보이긴 하지만
Suppose that, to start with, we
make no assumptions
whatsoever about security.
From this point on, application
of the pigeonhole principle may
be more subtle.
As it turns out, the timing is
perfect.
It really helped us understand
the issues and what the latest
Earthling debates are all
about.
Is there perhaps a way to
determine whether one
algorithm is “better” than
another? 더 나은 방법은 없을까?
The first coin that we input sets
the machine in motion. 동작시킨
다
…, while a quick revocation of
user rights becomes harder to
achieve. 대신에 ~하기가 더 어려워
진다
Now just how do partitions
come into play with
equivalence relations? 어떤 관계
가 있는가
On the basis of this theorem
and the examples we have
examined, we state the next
result.
In fact, for a uniform distribution
of the numbers 0-9, any
sequence of one thousand digits
is equally as likely to occur as
any other sequence of one
thousand digits. A sequence of
1000 numbers that contains
exactly 100 occurrences of the
digit 0 followed by 100
occurrences of the digit 1,
followed by 100 occurrences of
the digits 2, …, is no more
likely than the sequence that
contains one thousand 7s, for
example.
Sum[i^2, {i, 1, 3}]: This
command adds up the squares
of i as i takes on the values
from 1 to 3.
For now we consider two more
examples.
There will be times when it is
easier to compute with a power
series than with a polynomial.
The important point to note here
is that …
… you don’t need to know much
about what’s in these files.
However, in case you’re curious,
let’s do a quick run-through of
what the more interesting ones
are for. 대충 훑어보기
You will see though, that the
process really is very
straightforward.
This is to advise you of what
AppWizard is about to do and
provides you with an
opportunity to abort the whole
thing if it doesn’t seem to be
what you want.
We won’t worry about what all
these signifywe’ll get to them
eventually. 신경
The comment using // only
covers the portion of the line
following the two successive
slashes, whereas the /*....*/
form defines whatever is
enclosed as a comment and
can span several lines.
Note that the second statement
runs over two lines. The
successive lines are combined
into a single statement until the
compiler finds the semicolon
that defines the end of the
statement.
In a certain sense, Formatter
is the inverse to FullForm. 어떤 의
미에서는
… but we will defer discussion
of this until later in this
chapter when we discuss
something called variable scope.
뒤로 미루다
We will discuss the order of
execution more fully later in
this chapter.
You can, therefore, include as
much white space as you like
to make your program more
readable.
It’s not that it’s difficult quite
the opposite in fact but …
The basic arithmetic operators
we have at our disposal are
addition, subtraction, …
These operate generally as you
would expect, with the
exception of division which has
a slight aberration when working
with integer variables or
constants, as we’ll see.
One thing needs to be clear at
the outset.
A couple of general points worth
noting are about the layout of
the program. Firstly, … and,
secondly, …
The last paragraph reads a bit
like The Auctioneer’s Song. ~처
럼 들린다. 적어 놓았다.
The overall design of your
program may well be at fault.
잘못된 것일 수 있다.
Entity B responds with a
message containing F(x, rA ), a
suitable function of rA and
further data fields x. If A can
attribute this message to B,
then B has been authenticated.
암호학
May A can deduce that B
thought he was running the
protocol with A as opposed to
some third party, C? ~이 아닌
The use of CSP has two
advantages: …
Most of the possible meanings of
authentication refer to the
recent state of an agent B when
another agent A completes a run
of the protocol, apparently with
B.
It turns out that the
recentness is the hardest part of
the specification to formalize in
CSP.
It is sensible to begin by
looking for attacks on these
weaker specifications, since
these tests are faster than in the
cases including recentness.
As explained in the
introduction, we begin by
considering the cases without
recentness, and then extend the
definitions to include recentness.
The following is what we
consider to be the weakest
reasonable definition of
authentication.
Many protocols fail to achieve
even this weak form of
authentication. In several
cases, this is due to an
intruder launching a mirror
attack, simply reflecting an
agent’s messages back at
himself; examples appear in
[2].
Closely related to the notion
of aliveness is the case where,
when A completes a run of the
protocol, apparently with B, then
B has previously been present,
but not necessarily running the
protocol in questionit may be
that B has been running a
completely different protocol.
This raises the question of
interaction between protocols,
where an intruder can learn
information in one protocol that
he can use in an attack on
another protocol.
Several protocols achieve a
guarantee of liveness, but fail
to guarantee weak agreement.
The normal scenario is that
the intruder imitates an agent B
to attack A, by using B as an
oracle in a parallel run in which
the intruder adopts his own
identity; thus A believes he has
been running the protocol with A
B thinks he has been running
the protocol with the intruder.
Examples include my attack
on the Needham-Schroeder
Public Key protocol [16] in [10].
The following definition adds the
condition that the two agents
agree as to which roles each
was taking, and that they agree
upon some of the data items
used in the exchange.
We say that a protocol
guarantees to an initiator A
non-injective agreement with a
responder B on a set of data
items ds.
This protocol gives B a
guarantee of non-injective
agreement on K.
We will use the term full
agreements to refer to
agreement on all the atomic
data items used in the protocol
runs. 용어 정의/도입/소개
We will use the term
“injective agreement”, or
simply “agreement”, when we
want to insist that there is a
one-one relationship between
the two agent’s runs. 용어 정의/도
입/소개
An agent A is tricked into
thinking that B is trying to
establish two sessions with him,
whereas B was only trying to
establish a single run.
The agents do not check that
….
The meanings of “recent” will
depend on the circumstances:
sometimes we will take it to
mean within the duration of A’s
run; sometimes we will take it to
mean at most t time units before
A completed his run.
For example, consider the
following one-step protocol,
where K AB is a key shared
between A and B.
The protocol can be
strengthened to achieve
recent non-injective agreement
by adding a timestamp to the
message.
Also, in a setting where key
compromise is possible, there is
a well known attack on the
Needham-Schroeder Secret Key
Protocol [16], presented in [4]:
once a key has been
compromised, the intruder may
replay messages from an earlier
run so as to imitate the
initiator; thus the protocol
guarantees non-injective
agreement, but not recent non-
injective agreement. 경우, 상황,
케이스
If Y were revealed, there would
be no justification to attribute
message X to principal Q.
We have offered a choice of
possible translations, all based
on interpreting identity as
cryptographic key.
Style |= HREDRAW | VREDRAW.
This statement will set to the
two rightmost bits of the
variable style to 1, leaving the
others at whatever they were
before the execution of this
statement.
Bits that “fall off” either end of
the variable are lost.
All of the variables that we have
declared so far have been
declared within a block, that is,
within the extent of a pair of
curly braces.
Both these variables exist from
this point to the closing brace at
the end of the program. 두 개 모
두
You will get an error message
something like, … 다음과 같은,
다음과 유사한/비슷한
They might raise the
question in your mind, ‘Why
not make all variables global
and avoid all this messing about
with local variables that
disappear?’
We can demonstrate how this
works with a revised version of
the last example: …
A default case isn't essential. In
its absence, if the value of the
test expression doesn’t
correspond to any of the cases,
the switch is exited and the
program continues with the
next statement after the switch.
~이 없을 경우/때는; 계속
From this example we are
directed to the following.
Since we have no technique for
attacking such a relation, let us
list some terms and see whether
there is a recognizable pattern.
Once again, if 1 and 2 are
interchanged in the last
permutation, we obtain the first
permutation in our list. 다시 한번
One way to represent any
relation is by listing the ordered
pairs that are its elements. ~하
는 한 가지 방법은 ~하는 것이다
This pictorial representation is a
lot easier to work with than the
36 ordered pairs of the relation
R. 훨씬 더
This theorem provides some
insight into the number of odd-
degree vertices that can exist in
a graph. ~에 관해 어떤 통찰을 준
다, ~로부터 우리는 ~에 관한 통찰을
할 수 있다. 통찰, 직관
We can keep going right down
to the beginning, but that
doesn’t seem any easier than
drawing K1000 and counting
directly.
A Morphoid is a structure that
has the potential of being a
homomorphism (and therefore
potentially also an
isomorphism). 가능성, 잠재성
We also consider when a direct
product might be cyclic, given
that its factors are cyclic. 가정,
~라고 할 때, ~일 때, ~일 경우
Continuing this process, we
can move all of the g’s to the
right and all of the h’s to the left,
while reducing the powers of the
g’s modulo 2 and the powers of
h’s modulo 3 as we make the
substitutions. 이러한 과정을 반복
하면, 계속하면
In programming, there are in
addition logical control
structures, loops, recursion and
such like. 기타 등등
Our definition of what a function
is will be completely extensional,
the only thing that matters
is the connection between input
and output. How the latter is
calculated is irrelevant. In fact,
as we will see, in most cases
there is no method to compute
the output given the input. 제일
중요한 것은, 문제가 되는 유일한 것
은
On the other hand, it is not
uncommon for students to
wonder all along whether
they are really doing magic
rather than mathematics. 의아,
이상하게 생각, 어리둥절
Its solution had been
communicated to him by Niccolo
Fontana (who, unfortunately,
came to be known as Tartaglia
- the stammerer - because of a
speaking disorder). ~로 알려져 있
다
It turns out that this
development eventually gave a
great impetus toward the
acceptance of imaginary
numbers. ~하게 된다; ~를 위한
강력한 계기/동기를 부여하다
In Cardano's time, negative
numbers were still being
treated with some suspicion, so
all the more was the idea of
taking square roots of them.
Many other mathematicians also
had this view. 견해
A vector can be uniquely
specified by giving its magnitude
(i.e., its length) and direction
(i.e., the angle it makes with
the positive x-axis). X 축과 이루는
각도
Thus, θ can take on an infinite
number of values for a given
complex number and is unique
only up to multiples of 2π. 값을
가지다
The real numbers are deficient
in the sense that not all
algebraic operations on them
produce real numbers. Thus, for
− 1 to make sense, we must
lift our sights to the domain of
complex numbers.
Polya's Pattern Inventory will
determine how many different
necklaces there are all
together of each kind,
allowing for equivalence under
rotations.
For simplicity, we only
consider machines with a finite
set of inputs and a finite set of
states. 간단
Needless to say, fixing things
so that this doesn't happen
would add considerable
complexity to the language. 당연
히, 말할 것도 없이, 필연
If it still evaluates to True, then
expr is evaluated again. 여전히,
아직도
This result also points up the
unfortunate fact that evaluating
this For loop has had the
unintended “side effect” of
giving a value to i, which we
probably didn't want. 보여준다
A directory service is to a
network what white pages and
yellow pages are to the
telephone system. Like the white
pages, a directory service can be
used to look up a person or
object (file service, printer, etc.)
by name. “비유
In the protocols examined in the
present paper, so-called
“random numbers” serve as
nonces. ~로 쓰인다, ~의 역할을 한
다, ~의 구실을 한다
…… That’s what the
PaddedForm[ ] is about. 그게 바
로 ~의 역할/이유
For reference, and to put our
work in perspective, we now
list a subset of BAN inference
rules previously proposed. 참고
로, 제대로 보기 위해서
We will use only a few Greek
letters in this text, but for
(future/easy) reference we list
the entire alphabelt. 나중에 참고
하기 위해서
To denote that A has sent a
formula X in the present epoch
(i.e., has recently said X), we use
the AT construct “A says X”.
Without further information (e.g.
whether K is also known by
some unidentified or
uncorroborated party B), such a
key K which A has is called an
“unqualified” key (from A’s
point of reference). ~의 기준에
서볼때
We assume f results in a joint
key K which can be deduced
only with knowledge of the
appropriate private information,
and that knowledge does not
compromise the secrecy of the
other party’s private
information. ~를 알아야만 구할 수
있다
To be technically precise, we
should use ~ and ~ in place of ~
and ~ in the statement of
Axiom 3, but we write simply
the latter for appearance; the
meaning should be clear by
context. A similar comment
applies to the argument of F( )
in Definition 4.
There is one binary operation,
that of applying a function to a
value, written (f g) (using LISP-
like notation), called application,
and one x . expr, called
construction written
abstraction, whose intended
interpretation is “the function
of x given by the expression
expr”; i.e., it is the same thing
as Function[{x}, expr] in
Mathematica. 그 의미는, 그 해석
은; ~와 동일, 똑같다
This is not of very much
practical value, however,
because Sn has order n!, which is
much larger than the order of G,
in general.
So, we know how to find all
solutions of 4x + 6y = 4. But, 4x
+ 6y = 9 didn't appear to have
any solutions. (Note that it's
already “reduced.”) Why is
that? 왜 그런가?
Do these work as we suppose?
예상한대로 동작할까?
However, rather than simply
tacking together the notation
and rules from all of these we
adopt an integrated approach,
designed to yield a logic that is
sound with respect to a single,
relatively simple model of
computation. 대충 모으다, 합치다
In the first stage, two peers
negotiate a common secure
channel further called a ISAKMP
Security Association or a ISAKMP
SA for short. 혹은 간략히, 간단히
~라고 부른다, 명명, 약칭
These problems were not so
much flaws in the protocol
design itself, but rather
ambiguities and omissions in the
specification that could lead to
insecure or incorrect
implementations if the
specification were not correctly
understood. Indeed, in one
case we found that several
incorrect implementations were
being developed as a result of
an omission in the IKE
specification. ~라기 보다는 ~, 나
열 설명
In ISP environments where many
users share the same Web
server, it is important to use as
specific a path as possible in
the cookie. 되도록이면/가능한 한
구체적
… and we also have p not
dividing a.
Our list was for n from 1 to 10.
How about trying from 69 to 71,
to pick two funny numbers that
come to mind. 얼른 생각나다, 떠
오르다
Oh my! You know, it's enough to
shake your confidence in the
whole idea of experimental
mathematics. 확신을 깨뜨리다, 무
너뜨리다; 개념 전체/일반, 전 개념,
개념 자체
The roots of the factors are
known as the roots of unity,
since they are all numbers that,
when raised to some power,
give 1. ~ 로 알려져 있다, 알고 있
다, 부른다, 불린다, 명칭, 호칭; 멱
승, 승
First let’s remind ourselves
what the factorizations of these
polynomials look like. 기억하자,
상기하자
If you have ever browsed
through The Mathematica Book,
you may have come across the
description of the cyclotomic
polynomials. 보다, 만나다, 부닥치
다
Our goal at this point is to
develop an alternate way of
building the cyclotomic
polynomials without using the
complex numbers. 이제 우리 목표
는, 이제 우리가 할 것은
Therefore, to use the third
element, we either pick it off
the list of elements, as we did
earlier or we create it anew
with the Poly function. In this
case, this polynomial can be
obtained by … 뽑아내다, 집어내다,
추출하다, 골라내다; 먼저, 앞서
Note that this is now identical
to third. 동일, 똑같다
To verify that a (whatever it
turns out to be) is a root of a,
we need to represent a’s
coefficients as elements of a. 그
것이 무엇이든 간에, 뭐든지 간에, 상
관 없이
The use of “Indeterminate → x”
is just for consistency. 그냥 일
관성을 기하기 위해, 일관성을 위해
We illustrate these theorems
with examples to give you a
better feel for what they say
and what their implications are.
~에 대한/관한 감을 주기 위해, 느낌,
감(感)
However, many questions
regarding EC-systems are still
open at this moment, making
it unclear what the future of
these systems will be. 아직 많은
문제가 미결; 지금으로서는; 불확실하
게 한다
We now take up the question
of when a quotient ring of a ring
is a field and when it is an
integral domain. 이제 ~ 문제를 다
루자, 문제 제기, 문제 도입
One reasonable guess might
be that the identity function is
an isomorphism, since the
domains are identical. 한 가지 타
당한 추측은, 짐작, 추정
From the issuer’s point of view, a
CRL is an efficient way of
making known which
certificates are involved. 알리다,
밝히다
The server then checks its
secure session cache for a
match. If a match is found, … 일
치하는 게 있는지 확인한다
This viewpoint is essentially
looking at a LAN as a distributed
system, with emphasis on the
distributed operating system
and the service it provides. 강조,
역점
The hash-value of x’ is computed
and compared to the protected
hash-value; if they are equal,
one accepts that the inputs are
also equal, and thus that the
message has not been altered.
비교, 검사, 동일
Upon receiving (= receipt of
= reception of) instructions
from B, K decrypts the
instructions with Kbk, thus
verifying that they were issued
by B at some time in the past (K
does not care about replays). 수
신하면
After this sequence, E is
authenticated as B towards
A, and knows what A believes to
be the session key, namely the
public information M, A, B. 인증
It also works well against
physical intrusion; an attacker
who tapped in to an Ethernet
cable, for example, would not be
able to inject spurious packets.
잘 듣는다/동작한다/효과가 있다
The principal disadvantages of
the client puzzle protocol by
comparison with the standard
approaches is its requirement for
special client-side software.
It is a sad fact of life that
most software has bugs. 유감이
다/슬픈 현실
However, most important of
all, wireless subscribers have a
different set of essential desires
and needs than desktop or even
laptop Internet users. 무엇보다 중
요한 것은/가장 중요한 것은
Wireless service providers are
able to offer a new dimension
of service that complements the
existing features of their
networks, while extending
subscriber access to the
unbounded creativity of the
Web. ~하면서 동시에 새로운 차원
의
… they are both using the
same master secret, they will
generate identical symmetric
key pairs. 둘 다 (both 의 순서)
… losing a basis for further
discussion in the rest of the
chapter. 나머지
공격자: intermediary
the two words are used
interchangeably.
… let alone security, privacy, or
confidentiality. ~는 별도로 치고,
말할 것도 없고
The solution described above
imposes a number of
limitations, both for the user
and the operator.
ISAKMP by itself does not
dictate a specific key exchange
algorithm. 그 자체는, 그 자체로는
If this data is valuable at all, you
may have no choice but to
accept the cost of encryption. 해
야 한다, 할 수 밖에 없다, 선택의 여
지가 없다.
Hosts in the networks on either
side of the serial line must
retransmit transport layer
messages through all involved
networks just because of
problems on one link. ~의 양쪽에,
양쪽
After the completion of the
PPP link establishment phase,
the authenticator sends a
challenge message to its peer.
Both these public key
substitution attacks are well-
known and are usually
prevented by requiring that
entities prove to the certificate-
issuing authority possession of
the private keys corresponding
to their public keys during the
certification process. The
attacks can also be launched
against STS-ENC; in this case,
an alternate way to prevent the
attacks is to encrypt certificates
using the shared key K. 증명/입
증; 공격
A NAS which supports PAP may
forward the Reply-Message to
the dial-in client and accept a
PAP response which it can use
as though the user had
entered the response. 가정법, 마
치 ~인 것처럼
The secrets should be
distributed with a mechanism
that limits the number of entities
that handle (and thus gain
knowledge of) the secret. 알게
된다, 알아 내다
These categories are not hard
and fast; some corporate end
systems may well use the
access network technology that
we ascribe to residential access
networks, and vice versa. Our
descriptions below are meant to
hold for the common (if not
every) case. 보통 경우, 일반적인
경우에 성립한다
At the other end, the
destination host receives 1-PDUs
and directs them up the protocol
stack. 반대쪽에서는, 반대편에서는
make headway = to make
progress towards achieving
something in spite of difficulties
진전 , 발전, 진척 [+
towards/in/with etc]:
They had made no headway
towards finding a solution.
We’re unable to make much
headway with the project.
But to keep things simple,
let’s suppose for now that there
are only two hosts for each
connection. 문제를 간명하게, 간단
하게, 간단히
Although packet switching and
circuit switching are both very
prevalent in today’s
telecommunication networks,
the trend is certainly in the
direction of packet switching.
경향은 확실히 ~ 쪽이다
Then layer 3, the network layer,
slaps an IP header on the packet
and hands it off to the data link
layer, which passes it to the
hardware layer, which passes it
out onto the network. 전달, 넘긴
다, 패스
… in which case … 이런 경우에…
and here’s the algorithm …
The most complete non-
repudiation protocols with off-
line TTP have been presented
in [16] and in independently
in [12]. 논문이 서로 독립적으로 발
표되었다
There are two strategies which
are gaining acceptance. 쓰이
고 있다, 채택되고 있다
What is more, in a large
network with many users it is
difficult do maintain strict
control of each user and each
machine. 더욱이
When for some reason a link
key is deleted and the initial
pairing must be repeated, any
Bluetooth security code can be
entered by the user again. 어떤
이유로
This latter figure is around half
the number of telephone
connections worldwide. ~ 수의 절
반
Such developments will be
essential if evidence based on
use of digital signatures is to be
strong enough to stand up in a
court of law. 법정
In a new and fast-moving area
like e-Commerce, there is no real
substitute for practical, hands-on
experience to gain a detailed
understanding of the key issues.
급변하는
There will be winners and there
will be losers. Only one thing is
certain life will never be
quite the same again! 똑 같지
않을 것이다
Clogging or flooding is a form of
worm. It entails sending a very
large amount of bogus traffic to
a node, such as a server or a
router. ~와 같은
The best we can do is offer
principles for writing robust
scripts and identifying common
pitfalls, such as filtering out the
“|” symbol before sending data
to a command interpreter, as in
the example above. “최선책
Avoid reinventing the wheel.
When possible, use ANSI C
standard library functions
instead of writing new functions.
This reduces program
development time. “가능하면, “가
능하다면, “할 수 있다면, “그럴 수 있
다면
The truth of the matter is
that when users are forced to
remember many different
passwords, they will typically
adopt working methods that
significantly weaken the overall
security of the system. 사물의 실
상은, “실상
If the comparison fails, the
destination station assumes that
something has happened to the
frame in its travels and
requests that another copy of
the frame be sent by the
transmitting system. 전달 도중에
We don’t have a full-blown (full
blown) PKI in our system.
Instead we employ a very
simplified CA which only signs
and issues certificates for users
and WLGs. CRLs are not used.
No more than 10 simultaneous
users should be associated with
the same AP to achieve a
sufficient level of throughput. 최
대, 최고
Paper
“논문 개요 /시작
As business is moving from face-
to-face trading, mail order, and
telephone order to electronic
commerce over open networks
such as the Internet, crucial
security issues are being
raised. Whereas Electronic
Funds Transfer over financial
networks is reasonably secure,
securing payments over open
networks connecting commercial
servers and consumer
workstations poses challenges
of a new dimension.
This article reviews the state
of the art in payment
technologies, and sketches
emerging developments.
전술 한 바와 같이 , 전술한 대 로, 앞에 서 언급한 바와
같이 , 이미 앞에 서 보았듯 이, “지적
As said before, …
As stated, …
As stated earlier, …
As stated at the very
beginning of this section, the
evaluation process continues
until there is nothing left that
can be rewritten in another form.
As mentioned, replay attacks
can be countered by using
nonces or time stamps.
As we remarked before, for a
general argument we always use
multiplicative notation.
(new section begins here) As
we have already discussed,
in the scheme described
above a user's receive key pair
is apparently fixed, since it is
generated as a deterministic
function of a secret key shared
by two TTPs and the name of the
receiving user. We now
describe one way in which
this problem can be overcome
through the use of date-
stamps.
Because MMA does offer the
traditional looping constructs,
as we have just seen, it is
rather tempting to simply
continue using these familiar
means of flow control instead of
using a more natural, problem-
oriented approach.
However, as we have already
noted, if there is a requirement
for receive keys to be changed
at regular intervals, a date
stamp could be included within
the scope of the key
generating function f.
This would have the advantage
that any private receive key
provided to an intercepting
authority would have only a
limited period of validity,
meaning that the warranted
interception capability could
only last for a certain time
period before needing to be
renewed.
In order to study what has now
been described in a somewhat
general manner, we need to
introduce the following
fundamental ideal. 방금 기술한,
언급한, 설명한
As remarked above, one use
of Modules is just to give a name
to some computation which will
be used several times in a
further expression. 위에서 언급하
였듯이, 보았듯이
While these goals may appear
obvious, as stated they are
quite imprecise, and subtle
differences exist among
protocols regarding the exact
properties established. ~하긴 하
지만, 그러나; 앞에서 언급했듯이
As was pointed out earlier,
the zeros of the ath cyclotomic
polynomial are a subset of the
whole set of ath roots of unity. 이
미 지적했듯이, 언급했듯이
As pointed out in an earlier
report, these activities can be
assigned to a registration
authority. 이미 지적했듯이, 언급했
듯이
It is important to point out
here that absolute security is
an abstract, theoretical concept
¾ it does not exit anywhere. 강
조, 지적
For the reasons mentioned
above, it would be desirable to
realise an on-line access to a
certificate server in the second
demonstrator. 상기 이유로, 위에서
언급한 까닭으로
Suppose we can answer
questions such as those set
forth in item 1. Then … (to state
or present an argument or a set
of figures in speech or writing)
제시
The essential idea of the
construction is set forth in the
preceding discussion; here we
work through several examples.
앞에서 언급한, 기술한, 전술한; 제
시, 나왔다
So, from now on, unless the
contrary is stated explicitly,
all rings will be considered to be
commutative. 지금부터; 별도 언
급이 없는 한
“기술 , “설명
set sth out / forth: to give the details of sth or to explain it, esp.
in writing, in a clear, organized way
The management board has set
out its goals/plans/proposals for
the coming year.
Your contract will set out the
terms and conditions of your
employment.
He has written a letter to The
Times setting out his views.
You will be given a Back To Work
plan which sets out how you
can best help yourself.
He set out the reasons for his
decision in his report.
The essential idea of the
construction is set forth in the
preceding discussion; here we
work through several examples.
“look
In this section we will look at
the building blocks of graphics
programming and at how we
put them together to make
graphics.
Then we take a more rigorous
look at the encoding and
decoding procedures for such
codes.
Let's look at this from the
standpoint of the voters.
Taking a second look at the
functions f and g, we now want
to show that g ∉ O(f).
We can get some insight into
this process by looking at the
internal representation of a plot.
직관을 얻을 수 있다, 통찰
Let’s take a look to see what
the values of the default context
and the context search path are.
Let’s take a close look at a
set of vectors that is linearly
dependent.
If you now take a look at the
TrialWin folder using Explorer, or
whatever else you may have
handy for looking at the files on
your hard disk, you will see that
…
When we look back at the
partial orders in parts (b), (c),
and (d) of Example 7.38, the
following observations come
to light. 다음 사항들을 발견하게
된다.
In appendix B we look at the
language and logic of VO in
comparison to SVO.
What does SSO really mean? A
quick look at some of the
problems of distributed
computing will help reveal a
working definition. 잠깐 살펴보는
것이
Let us look at the issues
involved in some more detail.
좀 더 자세히 살펴 보자, 상세하게, 구
체적으로
Now let’s take a look at the
way in which different network
components fit together in an
Internet VPN.
We will examine these
graphics elements by
constructing a graphic using
only primitive elements. In a
later section, we will look
into how the built-in functions
such as Plot construct graphics
out of the primitive elements. 살
펴 보다
The purpose of this section is to
look deeper into these issues.
화제 /주제 “전환
We turn now to the reason
why Euler developed the idea of
the degree of a vertex: to solve
the problem dealing with the
seven bridges of Konigsberg. 이
제 ~을 살펴보자
We turn next to the details of
this construction. 이제, 다음으로
넘어가서
Before proceeding to more
serious matters, let us note that
recursive definitions are not
completely alien to us in the real
world. “넘어가기 전에
“논문 전개 과정 ; 논문 진행 설 명
In what follows, we will first
insure that we know where our
files reside, then discuss how to
create and alter their contents,
and finally show an example of
good programming practice
checking to see whether a given
file is one with which we wish to
work. 논문 전개 및 진행 설명
In this section we develop
some notation for stating our
new counting principle. Then
we establish the principle by a
combinatorial argument.
Examples will then
demonstrate how this principle
is applied.
In this section we will look at
the building blocks of graphics
programming and at how we
put them together to make
graphics.
We start with some simple
examples and then turn to
some more complicated ones
showing how to translate
programs in Pascal and C into
Mathematica programs. In each
case the direct translation can
be replaced by a much shorter
and clearer Mathematica
program written in a functional
or rewrite rule style. 먼저 ~을 하
고, 그 다음에는 ~를
In the next section of the
paper we present a formal
language and logic, and we
describe the procedure
whereby these are to be
applied in protocol analysis. We
also give a basic description
how to analyze protocols using
the logic. We then analyze the
well known Needham-Schroeder
protocol, henceforth ‘NS’, as an
example. This analysis
demonstrates our analysis
technique. ~에 따라; 지금부터 ~
라고 표기한다; 보여준다
This chapter starts out with an
overview of the architecture of
PPTP and moves on to the
details of how the protocol
works. Then we move on to an
overview of the types of
products you can use to build a
VPN using PPTP.
In this section, we investigate
group codes to protect against
independent errors. Our
development begins with a
simple example, to show the
properties of such does from an
intuitive point of view. Then
we take a more rigorous look
at the encoding and decoding
procedures for such codes.
First let us explore, through
examples, the use of
redundancy to detect and
correct errors. ~로부터 보호
We propose extensions of BAN
and BAN-like logics to facilitate
more precise identification and
examination of the goals and
beliefs arising in authenticated
key agreement protocols. We
then illustrate such protocols
based on Diffie-Hellman key
exchange, including one which is
identity-based. ~를 용이하게 하기
위해, ~를 위해, ~를 돕기 위해
We will defer our discussion
of such time-sensitive
applications until Chapter 6. 미
루겠다, ~에 가서 다루겠다
The remainder of the/this
paper is organized as
follows. Section 2 (with
Appendix A) reviews the
essential features of the logic,
and introduces new extensions
including a refinement of the
fundamental BAN construct
“shares the good crypto key”, …
Section 3 highlights six
fundamental candidate formal
goals for authenticated key
establishment protocols. Section
4 gathers in one place the
various formal assumption
required in our subsequent
analysis. … Section 8 uses these
results to compare the
assumptions and goals of these
protocols, and the
aforementioned X.509
protocol. Section 9 provides
concluding remarks. … Where
appropriate, we comment how
the new extensions apply to
these logics; further such
examination remains to be
done. 필요할 경우, 적절한 경우; 추
후 수행 내용, 남아 있다
The remainder of the/this
paper is organized as
follows. The STS protocol is
described in Section 2. In
section 3 we present the new
on-line UKS attacks on STS-MAC,
and consider ways of
preventing the attacks. In
Section 4, we examine the
plausibility of an assumption
regarding signature schemes
that is required in order for the
attacks to succeed. Section 5
makes concluding remarks. (실
제 conclusion 섹션은 그냥
“Conclusion”이라는 이름으로 나타
나도 된다.)
In practice, however, the
differences between the two
commands go deeper, as
shown by the following
examples, first for “macro”, and
then for “alias”.
The second major step is as
follows.
In what follows, we will make
use of the following facts about
matrices.
In the following, … is
discussed only for … . The
discussion for … is similar to it.
논문 전개 /기술 관점 및 범 위
We now turn our attention to
the investigation of some
elementary mappings. 화제 전환
But enough with airlines. Let’s
now turn our attention to
network protocols. ~는 이제 그만
하고, 그만하면 됐고;
In this paper we mainly restrict
our attention to systems
running a single protocol; we
briefly discuss how to extend
these techniques to cover
systems running several
protocols in Section 4-5.
In the early parts of this
chapter we restrict our
attention to performing
functional operations on lists.
In the last part of the chapter
we show how these operations
generalize to arbitrary
expressions.
A comprehensive treatment of
encryption is beyond the scope
of this paper; interested readers
should consult Voydock and Kent
[44] or Davies and Price [45]. 다
다룰 수는 없다/취급/소개/설명; 찾아
보기 바란다/참고하기 바란다
Our goal here is not to
provide a complete
classification, but simply to
identify a few of the most
important axes along which
application requirements can be
classified. 변명, ~이 아니고 ~다,
단지
The emphasis of this paper is
on concept rather than on
implementation. 논문의 강조점
Although the emphasis of this
paper is on the computational
setting, we first present the
state of knowledge, and sketch
the problems involved, in the
secure channels setting.
“인용 , “출처
She cited a passage from the
President’s speech.
The passage cited above is
from a Robert Frost poem.
She cites both T.S. Eliot and
Virginia Woolf in her article.
All citations are taken from
the 1973 edition of the text. (=
a word or piece of writing taken
from a written work)
We cite the definition from [13]:
“in all cases …”
Parts of this general discussion
are sourced from [Scho99],
and I recommend you read
Mayer-Schonberger’s full paper.
“참고 문헌 , “literature
More discussion of this
interesting topic appears in
the literature.2
We suspect that little appears
in the literature concerning
the practices of such intruders
and that the data used to test or
evaluate IDSs does not reflect
their approaches.
Our notion of a dual-threshold
scheme should not be confused
with a weaker notion that
sometimes appears in the
literature (e.g., [29]).
Notice that the small-hours
attack is different from a so-
called midnight attack which
often appears in the
literature as another name for
lunchtime attack; perhaps as in
lunchtime attack, it is
considered that the security
guards of an organization should
have meals rather punctually
around midnight.
The Kolb model frequently
appears in the literature,
often modified to accommodate
particular types of learning (or
training) experiences and using
alternative or simplified
terminology (eg see Chapter
23).
A tabulation of site-diversity
experiments prior to 1983
appears in the literature
[Ippolito, 1989].
The most worrisome problem
which appears in the
literature is the possibility of
running out of address space for
IP addresses. Various schemes
are being suggested such as
subrouting, introduction of
additional bits, and other
possibilities.
As a final note, it is interesting
that the expression
“mortification of the king”
(mortificatio regis) appears in
the literature of alchemy as
one of the most frequent
symbols of the disintegration of
matter.
Yet another intriguing
connection between primes and
discrepancy appears in the
literature (see [Joe 1999] and
references therein).
The most general model of on-
line problems that appears in
the literature is request-
answer games [15].
The polynomial hierarchy was
formally defined by Stockmeyer
[Sto77], though the concept
appears in the literature
even earlier. For instance, Karp
[Kar72] notes that
This name has been translated
from Russian and appears in
the literature with different
spellings, such as: Chebychev,
Tschebyscheff, Tchebysheff and
Tchebichef.
“control
The authenticator is in control
of the frequency and timing of
the challenges.
There has been some violence
after the match, but the police
are now in control of the
situation.
Were you in control of your
emotions at the time?
If either computer comes under
the control of a network
attacker, then the secret
password is compromised. ~의
수중에 들어가다
Backward reference
As I said … (or Like I said …): 좋
지 않은 표현 (발표자 자기중심적인
표현)
As you recall …
We discussed earlier …
You saw …
Remember …
질문 에 대한 대처
I would like to address your
question later on when I cover...
You and I can discuss that after
the conclusion of the
presentation...
Regretfully, I do not have that
information readily available.
Please meet me after the
meeting, I will get your name...
and get back to you next week.
샘플
영어 사용이 아주 약간이긴 하지만 좀 의심스러운 사람 자료니 주의해서 사
용할 것!
Good afternoon.
Today I will talk about…
First I would like to define… I’m
assuming that… , and also
that…
Before I go into a detailed
discussion of the range of ASP
solutions I would like to
discuss those items that must
be addressed regardless of the
ASP Billing solution chosen.
My message is…
Also, let’s not forget the
general contract issues. These
are especially important since
you will be dependent on the
supplier once you move to the
ASP Billing solution. The issues
range from what type of price
protection you have to the
performance guarantees that
the ASP will provide.
I’ll outline what is offered at
this level and some of the things
to look out for.
There are three ways that…
The problem with this approach
is…
What I believe to be the only
viable solution is…
Now I know you can’t read this
flow chart, but I’ve included it to
deliver the message that…
Up until now I’ve only been
discussing…
화제 전환 , 주제 이동 , 페이 지 이동
But enough with airlines. Let’s
now turn our attention to
network protocols. ~는 이제 그만
하고, 그만하면 됐고;
We now turn our attention to
the investigation of some
elementary mappings.
We turn now to the British
news.
Let’s turn to more important
matters now.
Turn to page 17 for our prices.
Now I would like to turn to my
second point.
(better expression: Now let’s
turn to the second point.)
Now let’s get back to our
main topic of discussion. 돌아가
서, 돌아가자
I’m going to talk about …
Let’s look at …
Let’s …
I’d now like to come onto my
next point. (used to show that
you are starting to talk about a
different subject)
Protocol/Attack Description
Etc
When a system (called the
client) attempts to establish a
TCP connection to a system
providing a service (the server),
the client and server exchange
a set sequence of messages.
This connection technique
applies to all TCP connections--
telnet, Web, email, etc. The
client system begins by
sending a SYN message to the
server. The server then
acknowledges the SYN
message by sending SYN-ACK
message to the client. The client
then finishes establishing the
connection by responding
with an ACK message. The
connection between the client
and the server is then open, and
the service-specific data can be
exchanged between the client
and the server. Here is a view
of this message flow: ….
1. the wireless client indicates
to the access point that it wants
to connect.
2. the access point sends a
random number (the challenge)
to the wireless client.
3. the wireless client performs
a computation using its key and
the random number, and sends
the result (the response) back to
the access point.
4. the access point performs
the same computation, using
the same random number and
its copy of the key.
5. if the keys match, the
result of the computation
will match that sent by the
wireless client the wireless
client is authenticated and may
be accepted.
The basic mode of operation is
as follows:
1. a RADIUS request is made
including a username and
password.
2. the password is encrypted
using a secret known by the
requestor and the server (the
shared secret)
3. the server looks up the
username in its database and
then checks the password for
a match. If the match is
made an “accept” message is
returned. If the match is bad
a “reject” message is returned.
If the WEP ICV check is
successful, the responder shall
then compare the decrypted
contents of the Challenge Text
field to the challenge text that
was sent in Frame 2 of the
sequence. If they are the
same, then the responder shall
respond with a successful status
code in Frame 4 of the
sequence. 동일, 비교
If the WEP ICV check fails, the
responder shall respond with an
unsuccessful status code in
Frame 4 of the sequence as
described below.
This peer must then calculate a
one-way hash function and send
this information to the
authenticator.
The authenticator verifies the
hash value with its
complementary calculation and
responds with an ACK if the
values match.
Otherwise, (a Failure is
returned and) the connection
is terminated.
In IKE phase 1 after Diffie-
Hellman key exchange both MT
and WLG compute a hash
value (over previously
exchanged data), HashMT and
HashWLG respectively. MT signs
(encrypts) HashMT with the
user’s private key, and sends
the signature Sig MT together
with the user identifier IDMT-U
to the WLG over the air
interface. After receiving the
WLG fetches the user’s
certificate CertMT-U from the
DBS by giving IDMT-U. WLG
verifies CertMT-U first to
make sure that the contained
user public key PubMT-U is
authentic. It then calculates
Hash’MT in the same way as
MT did before, decrypts SigMT
with PubMT-U to recover the
original HashMT, and
compares HashMT against
Hash’MT. If they match the
mobile user is proven to be an
authorised user. In a similar
way the WLG authenticates
itself to the MT. The only
difference is that the WLG sends
its own certificate CertWLG to
the MT in addition to IDWLG and
SigWLG.
After an attacker identifies a pair
of computersA and B, for
examplethat are
communicating with each other
as a client-server pair, he
attempts to establish a
connection with computer B in
such a way that B believes
that it has a connection with
A; in reality, the connection is
with the attacker’s computer. 연
결; 사실은, 실상은, 진실은
“평문
For example, in common operating
system environments the user identity
with its associated password is
transmitted in cleartext to the host
who performs the necessary verification
before granting (or denying) the
user access to the system. Nothing
prevents an eavesdropper from
stealing user identities and passwords
which pass by. 암호화되지 않고, 비화되지
않고, 평문으로, 날로 전달
SSL noticeably slows the speed of
transmitting information over the
Internet. The performance
degradation is primarily the result
of the public key encryption and
decryption that is required to initialize
the first SSL connection. Compared
with this, the additional overhead of
encrypting and decryption data using
RC2, RC4, or DES is practically
insignificant. Users have reported
performance degradations of
approximately 50% when using SSL,
compared to sending information in
the clear. 속도 저하, 성능 저하; 비교; 사실
상 무시할 만; 암호화하지 않고, plaintext
Grammar
Notice that the left state is both
a start and a final state.
The symbol "/" has many names.
In computer science, it is usually
called a "slash"; other names are
"oblique stroke," "solidus," and
"virgule." It also has another
theorem.
… we still can conclude that the
pot cannot end up with an alarm
clock in it.
… it truly is the method we use
for recognizing arithmetic
expressions in real life.
This effect is depicted in Fig.
4.20 with two sinusoids, the
frequency of the lower sinusoid
being twice that of the upper.
The substring bb is impossible,
as is starting with a b. 좀 드문
구조인 듯… “…, as it is
starting…”이 더 흔한 모양 같다.
Call these x1 and x2, and as x1
is the displacement x1 = x and
as x2 is the velocity this is the
derivative of the displacement
giving x2=dx1/dt.
Although the encrypted version
of information is obtainable by
unauthorized persons, it is
useless to anyone not
knowing the decryption
technique.
There will still be only one
piece of storage for …
Preparing the documentation
was not as onerous a task as
anticipated. 예상했던 만큼 그리
~하지 않다. 생각보다
In order that the combined
statement be true, we require
that both parts are true.
in the event of is followed by a noun or gerund
email
Hi Keith,
Best wishes,
Colin
Hi Keith,
Best wishes,
Colin
DongGook Park
Conversations
NTC’s Dictionary of Everyday American English
Expressions
Inviting someone to talk
Can we talk?
Can I talk to you?
답장 늦어서 미안 ; 답장 못해서 미안
I am sorry to be slow to
respond. Actually I had
problems on the weekend with
my computer.
Sorry for the delay in
replying. I had a quick read
through of the final paper. It
looks great to me.
I am very sorry that I have
not replied before now.
Actually I had a real problem last
Thursday evening.
It was very remiss of me not
to answer your letter. 답장 못
해서 미안
발표 자 소개
We are privileged to welcome
you as our speaker this evening.
We are privileged tonight to
have as our main speaker the
Foreign Minister of France.
We are privileged in having
with us in tonight’s show one of
the world’s greatest comedians,
Mr. Les Dennis.
be sunk: “낭패
have serious problems; be in a bad situation that will bring prob-
lems or defeat; have no hope of avoiding trouble or failure
If the car breaks down, we’ll be
sunk.
Without him, we’d be well and
truly (= completely;
thoroughly) sunk.
… and you will be sunk if you
are not careful with them.
못 가서 미안
I'm really sorry, but I won't be
able to make it (on Sunday
after all).
We didn't make it to the party
in the end.
I can’t make it to the party
tonight.
“길
He couldn’t find his way to our
house. He didn’t have a map.
“표정
Why are you holding your face
like that? Have you got/Do you
have a toothache?
물건 을 물리다 , 환불
If the shirt doesn’t fit, take it
back.
That sweater is too big for you. I
know. I’m going to take it back.
I won't be long: 오래 걸리 지 않을 거다
Just wait here ― I won't be long.
Can you wait for me? I won't be
very long.
I won't be long. I’ve pretty well
finished. 거의 다 끝났다, 거의 다 했
다
선생 님-학부모 면 담
Does she get along with her
friends? (친구들과 잘 지내나요?)
Is she participating in class
debates and activities? (클래스 토
론과 활동에는 잘 참여하나요?)
I would like to know of her
strengths and weaknesses in
Language Arts. (영어 과목에서 아
이의 강점과 약점을 알고 싶어요.)
How is her attitude? How about
her work habits? (아이의 학업 습
관과 태도는 어떤가요?)
그게 다야 , 이게 다야 , “다야 , “전부
That’s all there is to tell.
///////////////////////////////////////////////////////////////////////////////
///////////////
Etc
The meeting is still going on.
When do you think it will end? 언
제 끝날 것 같아?
Why don’t you try on this jacket?
It will look nice on you. 너한테
잘 어울릴 거다.
Goodbye. I expect we’ll meet
again before long. 작별, 머지 않
아 다시 보게 될 것
I’ve got a question for you – it’s
just a quickie. 질문이 하나 있는데
I’d like to stay if it’s not too
much of an imposition. 지나친 결
례가 아니라면
I have a problem of a rather
delicate nature that I'd like to
discuss with you in private. 개인
적으로 의논할 일이 있다.
I don’t want to be a nuisance
so tell me if you want to be
alone. 혼자 있고 싶으면 얘기해라
Her spirits plummeted at the
thought of meeting him again.
~라고 생각하니, ~를 생각하니
She ranged herself with (=
agreed with the opinions of) my
opponents. ~의 편을 들다, 편들다
Glad to have any comments on
the above.
So that’s the first line of
argument. The second is a
matter to do with presentation
to the outside world but it also
affects our own internal goals.
So that’s the second point.
I spent ages trying to work it
out.
If someone is driving out to
Griffith and back - I'd appreciate
a lift.
Please let me know if there are
any difficulties with the file.
Please find attached the
camera ready paper “Public Key
Protocols for Wireless
Communications” for the
proceedings of ICISC98.
“Teddy, you have it all wrong.
You were the one who taught me
that I could make a difference.
변하다, 변화, 달라지다
This will really help me out,
since I have no time to prepare
the slides right now.
Seems like lots of people are on
holidays at the moment.
If you'd like to come, let me
know so that we can reserve a
big enough table.
Bill is on leave this week
Thanks for letting us know
about this. I was thinking of
buying Mathematica, but if this
is how they do business, I am
no longer interested in them.
Paul Ashley phoned earlier this
morning. He is at home with
the flu and will not be in today.
The international café is the
restaurant for you! They make
delicious Italian food. They’re
open Monday through Sunday.
문을 연다, 영업한다, 영업시간 (가게
하나를 얘기하면서, “they’re open”
으로 표현하는 데 주목할 것!)
Hi DongGook, Here is an edited
version of your paper. There are
a couple of things I would like
to discuss with you about it.
Colin
Colin Boyd is away sick today.
The KT meeting is cancelled for
today.
If you have any queries
regarding the school, please
contact Mark Looi on ext 5114.
In the next section two
prototype constructions are
presented for protocols
providing forward secrecy. The
first is based on the Diffie-
Hellman protocol, while the
second can be used with any
chosen asymmetric encryption
scheme. Section 3 then
discusses the notion of partial
forward secrecy and presents
prototype constructions. In
sections 4 and 5 we examine
a prominent proposed protocol
for third generation mobile
communications, show that it
does not provide forward
secrecy, and show how it may
be modified to do so.
Almost all authors discuss only
Diffie-Hellman based key
establishment protocols as
examples providing forward
secrecy…
… one based on the special
algebraic properties of Diffie-
Hellman key exchange, and the
other which can work with any
asymmetric encryption scheme.
… forward secrecy can be
provided only through use of a
one-way function …
It is possible to subject
electronic hardware, a smart
card in our case, to
environmental stress which will
induce a hardware fault.
Depending on the attack in
question, it may be important
that the number of such faults is
small.
Paul phoned and is home again
trying to get over the flu.
Here is my understanding of
the situation, although I would
need to check these matters.
Pardon me for budding in to
this discussion, but from my own
experiences I've always found
it more beneficial to work
through a problem myself than
to see the solution and then
work to that.
Thanks for the message - I am
glad to hear you will be using
Mathematica. Please feel free
to contact me should you have
any further questions.
Best regards, Christy
This is to let you know that
Ed's home phone number has
changed. His new number is
3901 0946. (Email)
It was just what we were
looking for.
It felt like it was talking directly
to me and to my crew in a
friendly voice.