On the controllability of artificial intelligence: An analysis of limitations
The invention of artificial general intelligence is predicted to cause a shift in the trajectory of
human civilization. In order to reap the benefits and avoid the pitfalls of such a powerful …
human civilization. In order to reap the benefits and avoid the pitfalls of such a powerful …
On controllability of AI
Invention of artificial general intelligence is predicted to cause a shift in the trajectory of
human civilization. In order to reap the benefits and avoid pitfalls of such powerful …
human civilization. In order to reap the benefits and avoid pitfalls of such powerful …
[PDF][PDF] On controllability of artificial intelligence
Invention of artificial general intelligence is predicted to cause a shift in the trajectory of
human civilization. In order to reap the benefits and avoid pitfalls of such powerful …
human civilization. In order to reap the benefits and avoid pitfalls of such powerful …
A complete characterization of secure human-server communication
Establishing a secure communication channel between two parties is a nontrivial problem,
especially when one or both are humans. Unlike computers, humans cannot perform strong …
especially when one or both are humans. Unlike computers, humans cannot perform strong …
IsaNet: A framework for verifying secure data plane protocols
Today's Internet is built on decades-old networking protocols that lack scalability, reliability
and security. In response, the networking community has developed path-aware Internet …
and security. In response, the networking community has developed path-aware Internet …
Formal Development of Secure Data Plane Protocols
T Klenze - 2021 - research-collection.ethz.ch
Today's Internet is built on decades-old networking protocols that lack scalability, reliability
and security. In response, the networking community has developed path-aware Internet …
and security. In response, the networking community has developed path-aware Internet …
On the (im) possibility of perennial message recognition protocols without public-key cryptography
A message recognition protocol (MRP) aims to exchange authenticated information in an
insecure channel. During the initialization session of the protocol, the parties exchange …
insecure channel. During the initialization session of the protocol, the parties exchange …
[HTML][HTML] 2 AI Control Problem
RV Yampolskiy - journals.riverpublishers.com
It has been suggested that the AI control problem may be the most important problem facing
humanity [35, 38], but despite its importance it remains poorly understood, ill-defined and …
humanity [35, 38], but despite its importance it remains poorly understood, ill-defined and …
Program Refinement, Perfect Secrecy and Information Flow
Abstract “Classical” proofs of secure systems are based on reducing the hardness of one
problem (defined by the protocol) to that of another (a known difficult computational …
problem (defined by the protocol) to that of another (a known difficult computational …
[معلومات الإصدار][C] ZISC Annual Report 2009 2010
D Basin, M Frank, C Sprenger - 2010 - Technical report, ZISC