hws/hw07.tex
changeset 306 c3ad0cf9db50
parent 139 059527f0615a
child 373 bc612039d174
equal deleted inserted replaced
305:851a22e8d570 306:c3ad0cf9db50
     1 \documentclass{article}
     1 \documentclass{article}
     2 \usepackage{charter}
     2 \usepackage{../style}
     3 \usepackage{hyperref}
       
     4 \usepackage{amssymb}
       
     5 \usepackage{proof}
       
     6 
     3 
     7 \begin{document}
     4 \begin{document}
     8 
     5 
     9 \section*{Homework 7}
     6 \section*{Homework 7}
    10 
     7 
    11 \begin{enumerate}
     8 \begin{enumerate}
    12 \item Suppose a judgement is of the form:
     9 \item What are good uses of anonymity services like Tor?
    13 \begin{center}
       
    14 $Alice\;\textit{says}\;S \wedge Bob\;\textit{says}\;S \vdash Bob\;\textit{says}\;S \wedge Alice\;\textit{says}\;S$
       
    15 \end{center}
       
    16 
    10 
    17 Assume you want to use the inference rule
    11 \item What is meant by the notion \emph{forward privacy}?
    18 
       
    19 \begin{center}
       
    20 \mbox{\infer{\Gamma \vdash F_1 \wedge F_2}{\Gamma \vdash F_1 & \Gamma \vdash F_2}}
       
    21 \end{center}
       
    22 
       
    23 for constructing a proof of the judgement. What do the premises look like? 
       
    24 
       
    25 \item What are the benefits of using Logic to describe protocols and access control problems?
       
    26 
       
    27 
       
    28 %\item The informal meaning of the formula \mbox{$P\;\mapsto\;Q$} is `$P$ speaks for
       
    29 %$Q$'. Give a definition for this formula in terms of $\textit{says}$.
       
    30 
       
    31 %\item In Unix, what should be the general architecture of a network application that 
       
    32 %processes potentially hostile data from the Internet? (Hint: Focus on the fact that in Unix
       
    33 %you can give different privileges to processes.)
       
    34 
       
    35 %\item Explain what are the differences between dictionary and brute forcing attacks  against  passwords.
       
    36 
       
    37 \end{enumerate}
    12 \end{enumerate}
    38 \end{document}
    13 \end{document}
    39 
    14 
    40 %%% Local Variables: 
    15 %%% Local Variables: 
    41 %%% mode: latex
    16 %%% mode: latex