added
authorChristian Urban <christian dot urban at kcl dot ac dot uk>
Tue, 26 Nov 2013 06:33:31 +0000
changeset 139 059527f0615a
parent 138 86d1e2e6c211
child 140 4affecdbc1a9
added
hws/hw07.pdf
hws/hw07.tex
slides/slides08.pdf
slides/slides08.tex
Binary file hws/hw07.pdf has changed
--- a/hws/hw07.tex	Tue Nov 26 00:01:50 2013 +0000
+++ b/hws/hw07.tex	Tue Nov 26 06:33:31 2013 +0000
@@ -22,6 +22,9 @@
 
 for constructing a proof of the judgement. What do the premises look like? 
 
+\item What are the benefits of using Logic to describe protocols and access control problems?
+
+
 %\item The informal meaning of the formula \mbox{$P\;\mapsto\;Q$} is `$P$ speaks for
 %$Q$'. Give a definition for this formula in terms of $\textit{says}$.
 
Binary file slides/slides08.pdf has changed
--- a/slides/slides08.tex	Tue Nov 26 00:01:50 2013 +0000
+++ b/slides/slides08.tex	Tue Nov 26 06:33:31 2013 +0000
@@ -134,6 +134,8 @@
 \frametitle{Man-in-the-Middle}
 
 
+
+\hfill\footnotesize\url{http://www.renesys.com/2013/11/mitm-internet-hijacking/}
 \end{frame}}
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%