¿µ¾îÇнÀ»çÀü Home ¿µ¾îÇнÀ»çÀü Ä¿¹Â´ÏƼ
   

validation

´Ù¸¥ °÷¿¡¼­ Ã£±â  ³×À̹ö»çÀü ´ÙÀ½»çÀü Cambridge M-W M-W Thesaurus OneLook Wordnet Google


validation Àΰ¡, Çã°¡; È®ÀÎ

validation È®ÀÎ,ºñÁØ

´Ü¼ø ÀÎÁõ¼­ °ËÁõ ÇÁ·ÎÅäÄÝ Simple Certificate Validation Protocol

µ¥ÀÌÅÍ °ËÁõ ¹× ÀÎÁõ ¼­¹ö Data Validation and Certification Server

½Äº° Á¤º¸ È®ÀÎ identity validation

À§ÀÓ ÀÎÁõ °æ·Î °ËÁõ Delegated Path Validation

ÀÔ·Â À¯È¿¼º °ø°Ý input validation attack

ÀÚ·á °ËÁõ data validation

cross-validation : ±³Â÷ È®ÀÎ

validation : Á¤´çÈ­

Á¤½Åº´ÁúÀû ¼º°Ý Áú¹®Áö °³Á¤ÆÇ (PPI-R)ÀÇ Å¸´çµµ ¿¬±¸
A Validation Study of the Psychopathic Personality Inventory-Revised(PPI-R)

°úÇÐÀû âÀǼº°ú ¿¹¼úÀû âÀǼº : Áö½ÄÀÇ ¼ºÀåÀ¸·Î¼­ÀÇ Ã¢ÀǼº¿¡ ´ëÇÑ »ç·Ê¿¬±¸ ¹× °úÇÐÀû âÀǼºÀÇ Å¸´çÈ­
Scientific creativity and artistic creativity: case studies on creativity as growth of knowledge and validation of scientific creativity

À¯¾Æ ¿¡´Ï¾î±×·¥ ¼Í°ÝÀ¯Çü °üÂûôµµÀÇ °³¹ß°ú Ÿ´çÈ­
A Study on the Development and Validation of the Observation Inventory of the Preschool Children Enneagram Personality

K-CBCL 1.5-5ÀÇ º¯º°Å¸´çµµ : K-BASC¸¦ ±âÁØÀ¸·Î
A Discriminant Validation Study of K-CBCL 1.5-5

¾ç±Ø¼º Àå¾Ö ȯÀÚ¿¡¼­ Çѱ¹¾îÆÇ Bipolar Spectrum Diagnostic ScaleÀÇ Å¸´ç¼º ¿¬±¸
A Validation Study of the Korean Version of the Bipolar Spectrum Diagnostic Scale for Detecting Bipolar Disorder

¹®Á¦¹ß°ß´É·Â °Ë»ç µµ±¸ÀÇ ±¸¾È ¹× Ÿ´çÈ­
Construction and validation of problem finding ability test

128ºñÆ® ¾ÏÈ£ (128bits encryption)
°³ÀÎ ÀÎÁõ (personal authentification)
°³Ã¼ ÀÎÁõ (entity authentication)
°ÅºÎÀû ¾Ïȣȭ (deniable encryption)
°ø°³ Ű ¾ÏÈ£ Ç¥ÁØ (Public-Key Cryptography Standards)
°ø°³Å° ±â¹Ý ±¸Á¶ (public key infrastructure : PKI)
°ø°³Å° »óÈ£ ÀÎÁõ (public key cross certification)
°ø°³Å° ¾ÏÈ£ ½Ã½ºÅÛ (public key cryptosystem, public key encryption system, asymmetric cryptosystem)
°ø°³Å° ÀÎÁõ¼­ (public key certificate)
°ø°³Å° ÀÎÁõ¼­ (public key certificate)
°ø°Ý (attack)
°ü¿ë ¾ÏÈ£ ¹æ½Ä (conventional encryption system)
±â¹Ð¼º(Confidentiality)
³»¿ëÀº´Ð ¼­¸í (Blind Signature)
³×Æ®¿öÅ© ¾Ïȣȭ (network encryption)
´ÙÁß ´ëü ¾ÏÈ£ (multiple substitution cipher)
´Ü ´ë ´Ü ¾Ïȣȭ (end-to-end encryption)
´Ü¹æÇâ ¾ÏÈ£ (one-way cipher)
´Ü¼ø ´ëü ¾ÏÈ£ (simple substitution cipher)
´ëĪ ¾Ïȣȭ ¾Ë°í¸®Áò (symmetric encipherment algorithm)
´ëĪÇü ¾ÏÈ£ ±â¹ý (symmetric cryptographic technique)
µ¥ÀÌÅÍ ¾Ïȣȭ (data enciphering)
µ¥ÀÌÅÍ ¾Ïȣȭ ¾Ë°í¸®Áò (data encryption algorithm : DEA)
µ¥ÀÌÅÍ ¾Ïȣȭ ¾Ë°í¸®Áò Ç¥ÁØ (data encryption algorithm standard)
µ¥ÀÌÅÍ ¾Ïȣȭ ÀåÄ¡ (data encipherment equipment : DEE)
µ¥ÀÌÅÍ ¾Ïȣȭ Ç¥ÁØ (data encryption standard : DES)
µ¥ÀÌÅÍ ÀÎÁõ (data authentication)
µð·ºÅ丮 (directory)
µðÁöÅÐ ¼­¸í (Digital Signature)
¶óºó ¾ÏÈ£ ¹æ½Ä (Rabin scheme)
¸µÅ© ¾Ïȣȭ (link encryption)
¸¶½ºÅÍ Å° (master key)
¸Þ½ÃÁö ÀÎÁõ (message authentication)
¸Þ½ÃÁö ÀÎÁõ ÄÚµå (message authentication code)
¸ðµ© ¾ÏÈ£ ÀåÄ¡ (modem encryption device)
¹«°á¼º(Integrity)
ºÎÀÎ ¹æÁö ÀÎÁõ¼­ (non-repudiation certificate)
ºÐ»ê½Ä ŰºÐ¹è
ºí·Ï ¾ÏÈ£ (block cipher) ¹æ½Ä
ºñ´ëĪÇü ¾ÏÈ£ ½Ã½ºÅÛ (asymmetric cryptographic system)
ºñ¹Ð ¹øÈ£ ÀÎÁõ ±Ô¾à (password authentication protocol : PAP)
»ç¿ëÀÚ ÀÎÁõ ½Ã½ºÅÛ (user authentication system)
»óÈ£ ÀÎÁõ (mutual authentication)
¼­¸í (Signature):
¼±ÅÃµÈ ¾ÏÈ£¹® °ø°Ý(chosen plaintext attack)
¼±ÅÃµÈ Æò¹® °ø°Ý(chosen plaintext attack)
¼±Çü ¾ÏÈ£ ºÐ¼® (linear cryptoanalysis)
¼¼¼Ç Ű (session key)
¼ÒÀ¯±ÇÀÚ ¾ÏÈ£ (owner password)
½ºÆ®¸² ¾Ïȣȭ (stream encryption)
½Ãµµ-ÀÀ´ä (challenge-response) °³Àνĺ° ÇÁ·ÎÅäÄÝ
½ÃÀú ¾ÏÈ£(Caesar cipher, shift decipher)
¾Ë·ÁÁø Æò¹® °ø°Ý(known plaintext attack)
¾ÏÈ£ (cipher)
¾ÏÈ£ °æ·Î (cryptographic path)
¾ÏÈ£ ±â¹ý (cryptography)
¾ÏÈ£ ó¸® (cipher processing, encryption processing)
¾ÏÈ£ ü°è (cryptographic system, cryptosystem, encryption system)
¾ÏÈ£ Ű (encryption key)
¾ÏÈ£ Åë½Å (cryptographic communication)
¾ÏÈ£ Åë½Å º¤ÅÍ Ç¥ (cryptographic communications vector table)
¾ÏÈ£ ÇØµ¶ ¶Ç´Â ¾ÏÈ£ ºÐ¼® (cryptoanalysis)
¾ÏÈ£¹® (ciphertext)
¾ÏÈ£¹® °ø°Ý(ciphertext only attack)
¾ÏÈ£ÇÐ (cryptology)
¾Ïȣȭ (encryption, encipherment)
¾Ïȣȭ ¾Ë°í¸®Áò (cryptographic algorithm)
¿¤°¡¸» ¾ÏÈ£ ¹æ½Ä (ElGamal Scheme)
¿µÁö½Ä (zero-knowledge) °³Àνĺ° ÇÁ·ÎÅäÄÝ
ÀÎÁõ (authentication)
ÀÎÁõ (Certification)
ÀÎÁõ ±âÈ£ (authenticator)
ÀÎÁõ ºÎÈ£ ½Äº° ±â´É (Authorization Code Facility : ACF)
ÀÎÁõ ½Ã½ºÅÛ (authentication system)
ÀÎÁõ±â°ü (certificate authority)
ÀÎÁõ¼­ (certificate)
ÀÎÁõ¼­ Á¤Ã¥ (Certificate Policy)
ÀÎÁõ¼­ ÇÁ·ÎÆÄÀÏ (certificate profile)
ÀüÀÚ¼­¸í (electronic signature)
ÀüÀÚ¼­¸í ¾Ë°í¸®Áò (digital signature algorithm : DSA)
Â÷µ¿ ¾ÏÈ£ ºÐ¼® (differential cryptoanalysis)
ÄÄÇ»ÅÍ ¾ÏÈ£ ±â¹ý (computer cryptography)
Ű º¹±¸ (key recovery)
Ű ºÐ¹è (key distribution)
Ű ¾ÏÈ£ Ű (key encryption key : KEK)
Ű ¾Ïȣȭ Ű (key encryption key)
Ű À§Å¹ (key escrow)
Ÿ¿ø °î¼± ¾ÏÈ£ ¹æ½Ä (Elliptic Curve Cryptosystem)
ÆÐ½º¿öµå (password)
ÇÁ·ÎÅäÄÝ
ÇØ½¬ ÇÔ¼ö (Hash function)
È®ÀÎ (Validation)
ȯġ ¾ÏÈ£(transposition cipher)
ȸ¼± ¾ÏÈ£ ÀåÄ¡ (communication line encryption device)
Rotor ¾ÏÈ£±â
RSA °ø°³ Ű ¾ÏÈ£ ¹æ½Ä (RSA public key cryptosystem)
TTP (Trusted Third Party, Á¦»ï½Å·Ú±â°ü)
Vigenere ¾ÏÈ£


°Ë»ö°á°ú´Â 17 °ÇÀ̰í ÃÑ 120 ¶óÀÎÀÇ ÀÚ·á°¡ Ãâ·ÂµÇ¾ú½À´Ï´Ù.    ¸ÇÀ§·Î
(È­¸é ¾îµð¼­³ª Alt+Z : ´Ü¾î ÀçÀÔ·Â.)
(³»¿ë Áß °Ë»öÇÏ°í ½ÍÀº ´Ü¾î°¡ ÀÖÀ¸¸é ±× ´Ü¾î¸¦ ´õºíŬ¸¯Çϼ¼¿ä.)
    

hit counter