equal
deleted
inserted
replaced
1 \documentclass{article} |
1 \documentclass{article} |
2 \usepackage{charter} |
2 \usepackage{../style} |
3 \usepackage{hyperref} |
|
4 \usepackage{amssymb} |
|
5 \usepackage{proof} |
|
6 |
3 |
7 \begin{document} |
4 \begin{document} |
8 |
5 |
9 \section*{Homework 7} |
6 \section*{Homework 7} |
10 |
7 |
11 \begin{enumerate} |
8 \begin{enumerate} |
12 \item Suppose a judgement is of the form: |
9 \item What are good uses of anonymity services like Tor? |
13 \begin{center} |
|
14 $Alice\;\textit{says}\;S \wedge Bob\;\textit{says}\;S \vdash Bob\;\textit{says}\;S \wedge Alice\;\textit{says}\;S$ |
|
15 \end{center} |
|
16 |
10 |
17 Assume you want to use the inference rule |
11 \item What is meant by the notion \emph{forward privacy}? |
18 |
|
19 \begin{center} |
|
20 \mbox{\infer{\Gamma \vdash F_1 \wedge F_2}{\Gamma \vdash F_1 & \Gamma \vdash F_2}} |
|
21 \end{center} |
|
22 |
|
23 for constructing a proof of the judgement. What do the premises look like? |
|
24 |
|
25 \item What are the benefits of using Logic to describe protocols and access control problems? |
|
26 |
|
27 |
|
28 %\item The informal meaning of the formula \mbox{$P\;\mapsto\;Q$} is `$P$ speaks for |
|
29 %$Q$'. Give a definition for this formula in terms of $\textit{says}$. |
|
30 |
|
31 %\item In Unix, what should be the general architecture of a network application that |
|
32 %processes potentially hostile data from the Internet? (Hint: Focus on the fact that in Unix |
|
33 %you can give different privileges to processes.) |
|
34 |
|
35 %\item Explain what are the differences between dictionary and brute forcing attacks against passwords. |
|
36 |
|
37 \end{enumerate} |
12 \end{enumerate} |
38 \end{document} |
13 \end{document} |
39 |
14 |
40 %%% Local Variables: |
15 %%% Local Variables: |
41 %%% mode: latex |
16 %%% mode: latex |