Alice and Bob

Results: 105



#Item
31Tor / Anonymity / Alice and Bob / System software / Internet privacy / Computing / Software

Internet Freedom CS161: Computer Security Guest Lecturer: Paul Pearce Instructor: Vern Paxson TAs: Jethro Beekman, Mobin Javed Antonio Lupher, Me,

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2014-02-17 17:32:41
32Cryptography / Challenge-response authentication / IP / Alice and Bob / Baseband / Modulation / Channel / Distance-bounding protocol / Cryptographic protocols / Information / Data

Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System ˇ Aanjhan Ranganathan1 , Nils Ole Tippenhauer1 , Boris Skori´ c2 , Dave Singel´ee3 , 1

Add to Reading List

Source URL: members.home.nl

Language: English - Date: 2013-03-16 15:45:20
33Non-interactive zero-knowledge proof / Zero-knowledge proof / IP / Commitment scheme / Alice and Bob / NP / Public-key cryptography / Formal verification / Digital signature / Cryptography / Cryptographic protocols / Proof of knowledge

Vis-`a-vis Cryptography: Private and Trustworthy In-Person Certifications Ian Miers∗ Matthew Green∗ Christoph U. Lehmann, MD†

Add to Reading List

Source URL: sharps.org

Language: English - Date: 2012-10-09 12:57:09
34Public-key cryptography / Grader / Replay attack / Cryptography / Cryptographic protocols / Alice and Bob

Distributed Proctoring Bruce Schneier ? John Kelsey

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
35Alice series / Betting in poker / Nim / Mathematics / Cryptographic protocols / Alice and Bob

Settling Multiple Debts Efficiently: Problems Tom Verhoeff Faculty of Mathematics and Computing Science Eindhoven University of Technology Email: June 2004

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2011-11-21 07:40:51
36Ubiquitous computing / Smart card / Alice and Bob / Chip and PIN / Debit card / Transaction authentication number / IP / Technology / Computing / Payment systems / Cryptographic protocols / ISO standards

Keep your enemies close Distance bounding against smartcard relay attacks Computer Laboratory Saar Drimer and Steven J. Murdoch

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-24 13:58:54
37Public-key cryptography / Internet privacy / Alice and Bob / Simple Mail Transfer Protocol / Oblivious transfer / Pretty Good Privacy / Needham–Schroeder protocol / Index of cryptography articles / Cryptography / Email / Cryptographic protocols

A Certified E-Mail Protocol Bruce Schneier Counterpane Systems James Riordan

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
38Information / Man-in-the-middle attack / Alice and Bob / Wide Mouth Frog protocol / Replay attack / Blind signature / Burrows–Abadi–Needham logic / Public-key cryptography / Communications protocol / Cryptography / Cryptographic protocols / Data

Protocol Interactions and the Chosen Protocol Attack John Kelsey Bruce Schneier Counterpane Systems 101 E. Minnehaha Parkway

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
39IP / Complexity classes / Commitment scheme / Soundness / Challenge-response authentication / NP / Alice and Bob / Black box / Communications protocol / Cryptography / Cryptographic protocols / Zero-knowledge proof

Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy Vipul Goyal∗ UCLA and MSR India Email:

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-10-23 06:25:21
40Digital signature / Notary / Alice and Bob / Cryptography / Public-key cryptography / Key management

DIGITAL SIGNATURES 1/1 Signing by hand

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2011-11-15 20:06:48
UPDATE