谷歌浏览器插件
订阅小程序
在清言上使用

Human-Computability Boundaries (transcript of Discussion).

Security Protocols XXVII Lecture Notes in Computer Science(2020)

引用 0|浏览9
暂无评分
摘要
The origin of many protocol vulnerabilities is the human. Humans fail predictably, and they fail often. This paper is mostly dealing with how do we acknowledge these failures. Moreover, how do we start designing protocols in such ways that humans are less likely to fail and cause these vulnerabilities down the road?
更多
查看译文
关键词
Computability,Failure Prediction,Fault Tolerance
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要