diff -r 851a22e8d570 -r c3ad0cf9db50 hws/hw07.tex --- a/hws/hw07.tex Tue Nov 11 12:51:33 2014 +0000 +++ b/hws/hw07.tex Wed Nov 12 21:47:07 2014 +0000 @@ -1,39 +1,14 @@ \documentclass{article} -\usepackage{charter} -\usepackage{hyperref} -\usepackage{amssymb} -\usepackage{proof} +\usepackage{../style} \begin{document} \section*{Homework 7} \begin{enumerate} -\item Suppose a judgement is of the form: -\begin{center} -$Alice\;\textit{says}\;S \wedge Bob\;\textit{says}\;S \vdash Bob\;\textit{says}\;S \wedge Alice\;\textit{says}\;S$ -\end{center} - -Assume you want to use the inference rule - -\begin{center} -\mbox{\infer{\Gamma \vdash F_1 \wedge F_2}{\Gamma \vdash F_1 & \Gamma \vdash F_2}} -\end{center} - -for constructing a proof of the judgement. What do the premises look like? +\item What are good uses of anonymity services like Tor? -\item What are the benefits of using Logic to describe protocols and access control problems? - - -%\item The informal meaning of the formula \mbox{$P\;\mapsto\;Q$} is `$P$ speaks for -%$Q$'. Give a definition for this formula in terms of $\textit{says}$. - -%\item In Unix, what should be the general architecture of a network application that -%processes potentially hostile data from the Internet? (Hint: Focus on the fact that in Unix -%you can give different privileges to processes.) - -%\item Explain what are the differences between dictionary and brute forcing attacks against passwords. - +\item What is meant by the notion \emph{forward privacy}? \end{enumerate} \end{document}