Alice and Bob

Results: 105



#Item
11BRICS DS-04-3 J. Groth: Honest Verifier Zero-knowledge Arguments Applied  BRICS Basic Research in Computer Science

BRICS DS-04-3 J. Groth: Honest Verifier Zero-knowledge Arguments Applied BRICS Basic Research in Computer Science

Add to Reading List

Source URL: www.brics.dk

Language: English - Date: 2005-04-06 04:06:17
12Secure Verification of Location Claims∗ Naveen Sastry Umesh Shankar  David Wagner

Secure Verification of Location Claims∗ Naveen Sastry Umesh Shankar David Wagner

Add to Reading List

Source URL: naveen.ksastry.com

Language: English - Date: 2013-06-08 15:25:49
13CS 70 SPRING 2008 — DISCUSSION #4 LUQMAN HODGKINSON, AARON KLEINMAN, MIN XU 1. Just Division Exercise 1. After Alice, Bob, and Carol died, God decided to punish their gluttony by forcing them to divide and eat cakes fo

CS 70 SPRING 2008 — DISCUSSION #4 LUQMAN HODGKINSON, AARON KLEINMAN, MIN XU 1. Just Division Exercise 1. After Alice, Bob, and Carol died, God decided to punish their gluttony by forcing them to divide and eat cakes fo

Add to Reading List

Source URL: www.cs.berkeley.edu

- Date: 2015-01-21 19:48:43
    14CS 161  Computer Security Fall 2005

    CS 161 Computer Security Fall 2005

    Add to Reading List

    Source URL: www-inst.eecs.berkeley.edu

    Language: English - Date: 2005-12-13 23:10:13
    15U.C. Berkeley CS276: Cryptography Professor David Wagner Lecture 28 April 27, 2006

    U.C. Berkeley CS276: Cryptography Professor David Wagner Lecture 28 April 27, 2006

    Add to Reading List

    Source URL: www.cs.berkeley.edu

    Language: English - Date: 2015-01-21 19:48:43
    16One-Round Secure Computation and Secure Autonomous Mobile Agents (Extended Abstract) Christian Cachin1 , Jan Camenisch1 , Joe Kilian2 , and Joy M¨ uller1 Abstract. This paper investigates one-round secure computation be

    One-Round Secure Computation and Secure Autonomous Mobile Agents (Extended Abstract) Christian Cachin1 , Jan Camenisch1 , Joe Kilian2 , and Joy M¨ uller1 Abstract. This paper investigates one-round secure computation be

    Add to Reading List

    Source URL: www.zurich.ibm.com

    Language: English - Date: 2000-04-12 11:39:28
    17Peer-to-Peer Systems and Security Attacks! Christian Grothoff Technische Universit¨ at M¨ unchen

    Peer-to-Peer Systems and Security Attacks! Christian Grothoff Technische Universit¨ at M¨ unchen

    Add to Reading List

    Source URL: grothoff.org

    Language: English - Date: 2013-06-04 10:22:31
    18Security Analysis of Accountable Anonymity in Dissent EWA SYTA, HENRY CORRIGAN-GIBBS, SHU-CHUN WENG, DAVID WOLINSKY, and BRYAN FORD, Yale University AARON JOHNSON, U.S. Naval Research Laboratory  Users often wish to comm

    Security Analysis of Accountable Anonymity in Dissent EWA SYTA, HENRY CORRIGAN-GIBBS, SHU-CHUN WENG, DAVID WOLINSKY, and BRYAN FORD, Yale University AARON JOHNSON, U.S. Naval Research Laboratory Users often wish to comm

    Add to Reading List

    Source URL: www.ohmygodel.com

    Language: English - Date: 2014-08-17 14:47:48
    19On Message Recognition Protocols: Recoverability and Explicit Confirmation Ian Goldberg David R. Cheriton School of Computer Science, University of Waterloo Waterloo, Ontario Canada N2L 3G1

    On Message Recognition Protocols: Recoverability and Explicit Confirmation Ian Goldberg David R. Cheriton School of Computer Science, University of Waterloo Waterloo, Ontario Canada N2L 3G1

    Add to Reading List

    Source URL: www.cypherpunks.ca

    Language: English - Date: 2009-11-13 20:20:01
    20A Machine-Checked Formalization of Σ-Protocols Santiago Zanella-B´eguelin1 Gilles Barthe1 Daniel Hedin1 Benjamin Gr´egoire2 Sylvain Heraud2 1 IMDEA

    A Machine-Checked Formalization of Σ-Protocols Santiago Zanella-B´eguelin1 Gilles Barthe1 Daniel Hedin1 Benjamin Gr´egoire2 Sylvain Heraud2 1 IMDEA

    Add to Reading List

    Source URL: software.imdea.org

    Language: English - Date: 2013-03-13 12:33:24