Human-Computability Boundaries (transcript of Discussion).
Security Protocols XXVII Lecture Notes in Computer Science(2020)
摘要
The origin of many protocol vulnerabilities is the human. Humans fail predictably, and they fail often. This paper is mostly dealing with how do we acknowledge these failures. Moreover, how do we start designing protocols in such ways that humans are less likely to fail and cause these vulnerabilities down the road?
更多查看译文
关键词
Computability,Failure Prediction,Fault Tolerance
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要