# HG changeset patch # User Christian Urban # Date 1385447611 0 # Node ID 059527f0615a0450ef552d8c8412a3ed490e3085 # Parent 86d1e2e6c211a3adf0765b0b74aebb9800c0a2b6 added diff -r 86d1e2e6c211 -r 059527f0615a hws/hw07.pdf Binary file hws/hw07.pdf has changed diff -r 86d1e2e6c211 -r 059527f0615a hws/hw07.tex --- a/hws/hw07.tex Tue Nov 26 00:01:50 2013 +0000 +++ b/hws/hw07.tex Tue Nov 26 06:33:31 2013 +0000 @@ -22,6 +22,9 @@ for constructing a proof of the judgement. What do the premises look like? +\item What are the benefits of using Logic to describe protocols and access control problems? + + %\item The informal meaning of the formula \mbox{$P\;\mapsto\;Q$} is `$P$ speaks for %$Q$'. Give a definition for this formula in terms of $\textit{says}$. diff -r 86d1e2e6c211 -r 059527f0615a slides/slides08.pdf Binary file slides/slides08.pdf has changed diff -r 86d1e2e6c211 -r 059527f0615a slides/slides08.tex --- a/slides/slides08.tex Tue Nov 26 00:01:50 2013 +0000 +++ b/slides/slides08.tex Tue Nov 26 06:33:31 2013 +0000 @@ -134,6 +134,8 @@ \frametitle{Man-in-the-Middle} + +\hfill\footnotesize\url{http://www.renesys.com/2013/11/mitm-internet-hijacking/} \end{frame}} %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%