Alice and Bob

Results: 105



#Item
31Internet Freedom CS161: Computer Security Guest Lecturer: Paul Pearce Instructor: Vern Paxson TAs: Jethro Beekman, Mobin Javed Antonio Lupher, Me,

Internet Freedom CS161: Computer Security Guest Lecturer: Paul Pearce Instructor: Vern Paxson TAs: Jethro Beekman, Mobin Javed Antonio Lupher, Me,

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2014-02-17 17:32:41
32Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System ˇ Aanjhan Ranganathan1 , Nils Ole Tippenhauer1 , Boris Skori´ c2 , Dave Singel´ee3 , 1

Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System ˇ Aanjhan Ranganathan1 , Nils Ole Tippenhauer1 , Boris Skori´ c2 , Dave Singel´ee3 , 1

Add to Reading List

Source URL: members.home.nl

Language: English - Date: 2013-03-16 15:45:20
33Vis-`a-vis Cryptography: Private and Trustworthy In-Person Certifications Ian Miers∗ Matthew Green∗  Christoph U. Lehmann, MD†

Vis-`a-vis Cryptography: Private and Trustworthy In-Person Certifications Ian Miers∗ Matthew Green∗ Christoph U. Lehmann, MD†

Add to Reading List

Source URL: sharps.org

Language: English - Date: 2012-10-09 12:57:09
34Distributed Proctoring Bruce Schneier ?  John Kelsey

Distributed Proctoring Bruce Schneier ? John Kelsey

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
35Settling Multiple Debts Efficiently: Problems Tom Verhoeff Faculty of Mathematics and Computing Science Eindhoven University of Technology Email:  June 2004

Settling Multiple Debts Efficiently: Problems Tom Verhoeff Faculty of Mathematics and Computing Science Eindhoven University of Technology Email: June 2004

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2011-11-21 07:40:51
36Keep your enemies close Distance bounding against smartcard relay attacks Computer Laboratory Saar Drimer and Steven J. Murdoch

Keep your enemies close Distance bounding against smartcard relay attacks Computer Laboratory Saar Drimer and Steven J. Murdoch

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-24 13:58:54
37A Certified E-Mail Protocol Bruce Schneier Counterpane Systems   James Riordan

A Certified E-Mail Protocol Bruce Schneier Counterpane Systems James Riordan

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
38Protocol Interactions and the Chosen Protocol Attack John Kelsey Bruce Schneier Counterpane Systems 101 E. Minnehaha Parkway

Protocol Interactions and the Chosen Protocol Attack John Kelsey Bruce Schneier Counterpane Systems 101 E. Minnehaha Parkway

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
39Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy Vipul Goyal∗ UCLA and MSR India Email:

Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy Vipul Goyal∗ UCLA and MSR India Email:

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-10-23 06:25:21
40DIGITAL SIGNATURES  1/1 Signing by hand

DIGITAL SIGNATURES 1/1 Signing by hand

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2011-11-15 20:06:48