slides/slides01.tex
changeset 101 b37223b88ebd
parent 100 62b66cb088f6
child 102 8f2c3329c9b8
equal deleted inserted replaced
100:62b66cb088f6 101:b37223b88ebd
  1173 \frametitle{\begin{tabular}{c}This Course\end{tabular}}
  1173 \frametitle{\begin{tabular}{c}This Course\end{tabular}}
  1174 
  1174 
  1175 \begin{itemize}
  1175 \begin{itemize}
  1176 \item break-ins (buffer overflows)
  1176 \item break-ins (buffer overflows)
  1177 \item access control\\ (role based, data security / data integrity)
  1177 \item access control\\ (role based, data security / data integrity)
  1178 \item protocols\\
  1178 \item electronic voting
  1179 (specification)
  1179 \item protocols (specification)
  1180 \item access control logic
  1180 \item access control logic
  1181 \item privacy
  1181 \item privacy
  1182 \begin{quote}
  1182 \begin{quote}
  1183 Scott McNealy: \\``You have zero privacy anyway. Get over it.''
  1183 Scott McNealy: \\``You have zero privacy anyway. Get over it.''
  1184 \end{quote}
  1184 \end{quote}
       
  1185 \item zero-knowledge proofs
  1185 \end{itemize}
  1186 \end{itemize}
  1186 
  1187 
  1187 \end{frame}}
  1188 \end{frame}}
  1188 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
  1189 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
  1189 
  1190 
  1324 The difference between being criminal is to only \alert{\bf think} about how things can go 
  1325 The difference between being criminal is to only \alert{\bf think} about how things can go 
  1325 wrong, or be very careful with attacks.
  1326 wrong, or be very careful with attacks.
  1326   
  1327   
  1327 \end{frame}}
  1328 \end{frame}}
  1328 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
  1329 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
       
  1330 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
  1331 \mode<presentation>{
       
  1332 \begin{frame}[c]
       
  1333 \frametitle{Satan's Computer}
       
  1334 
       
  1335 Ross Anderson and Roger Needham wrote:\bigskip
       
  1336 
       
  1337 \begin{tikzpicture}
       
  1338 \draw (0,0) node[inner sep=2mm,fill=cream, ultra thick, draw=red, rounded corners=2mm] 
       
  1339 {\normalsize\color{darkgray}
       
  1340 \begin{minipage}{10cm}\raggedright\small
       
  1341 ``In effect, our task is to program a computer which gives 
       
  1342 answers which are subtly and maliciously wrong at the most 
       
  1343 inconvenient possible moment\ldots{} we hope that the lessons 
       
  1344 learned from programming Satan's computer may be helpful 
       
  1345 in tackling the more common problem of programming Murphy's.''
       
  1346 \end{minipage}};
       
  1347 \end{tikzpicture}\\[30mm]
       
  1348 
       
  1349 \only<2>{
       
  1350 \begin{textblock}{11}(2,12)
       
  1351 \begin{tabular}{c}
       
  1352 \includegraphics[scale=0.12]{pics/ariane.jpg}\\[-2mm]
       
  1353 \footnotesize Murphy's computer
       
  1354 \end{tabular}
       
  1355 \begin{tabular}{c}
       
  1356 \includegraphics[scale=0.15]{pics/mobile.jpg}\;
       
  1357 \includegraphics[scale=0.06]{pics/pinsentry.jpg}\\[-2mm]
       
  1358 \footnotesize Satan's computers
       
  1359 \end{tabular}
       
  1360 \end{textblock}}
       
  1361 
       
  1362 \end{frame}}
       
  1363 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
  1329 
  1364 
  1330 
  1365 
  1331 
  1366 
  1332 \end{document}
  1367 \end{document}
  1333 
  1368