--- a/hws/hw07.tex Tue Nov 11 12:51:33 2014 +0000
+++ b/hws/hw07.tex Wed Nov 12 21:47:07 2014 +0000
@@ -1,39 +1,14 @@
\documentclass{article}
-\usepackage{charter}
-\usepackage{hyperref}
-\usepackage{amssymb}
-\usepackage{proof}
+\usepackage{../style}
\begin{document}
\section*{Homework 7}
\begin{enumerate}
-\item Suppose a judgement is of the form:
-\begin{center}
-$Alice\;\textit{says}\;S \wedge Bob\;\textit{says}\;S \vdash Bob\;\textit{says}\;S \wedge Alice\;\textit{says}\;S$
-\end{center}
-
-Assume you want to use the inference rule
-
-\begin{center}
-\mbox{\infer{\Gamma \vdash F_1 \wedge F_2}{\Gamma \vdash F_1 & \Gamma \vdash F_2}}
-\end{center}
-
-for constructing a proof of the judgement. What do the premises look like?
+\item What are good uses of anonymity services like Tor?
-\item What are the benefits of using Logic to describe protocols and access control problems?
-
-
-%\item The informal meaning of the formula \mbox{$P\;\mapsto\;Q$} is `$P$ speaks for
-%$Q$'. Give a definition for this formula in terms of $\textit{says}$.
-
-%\item In Unix, what should be the general architecture of a network application that
-%processes potentially hostile data from the Internet? (Hint: Focus on the fact that in Unix
-%you can give different privileges to processes.)
-
-%\item Explain what are the differences between dictionary and brute forcing attacks against passwords.
-
+\item What is meant by the notion \emph{forward privacy}?
\end{enumerate}
\end{document}