Alice and Bob

Results: 105



#Item
41Course Information  CSE 207 — Modern Cryptography Instructor: Mihir Bellare Website: http://cseweb.ucsd.edu/~mihir/cse207

Course Information CSE 207 — Modern Cryptography Instructor: Mihir Bellare Website: http://cseweb.ucsd.edu/~mihir/cse207

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2014-03-29 12:23:51
42Bringing Inanimate Alice to life in the classroom Carly Zandstra University of Wollongong One of the most intimidating things I learned as a student

Bringing Inanimate Alice to life in the classroom Carly Zandstra University of Wollongong One of the most intimidating things I learned as a student

Add to Reading List

Source URL: www.inanimatealice.edu.au

Language: English - Date: 2013-07-03 05:45:28
43Precise Concurrent Zero Knowledge Omkant Pandey∗ Rafael Pass†  Amit Sahai∗

Precise Concurrent Zero Knowledge Omkant Pandey∗ Rafael Pass† Amit Sahai∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-02-01 05:01:22
44Calling out Cheaters: Covert Security With Public Verifiability∗ Gilad Asharov Claudio Orlandi†

Calling out Cheaters: Covert Security With Public Verifiability∗ Gilad Asharov Claudio Orlandi†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-17 09:16:36
45KEY DISTRIBUTION  1/1 The public key setting

KEY DISTRIBUTION 1/1 The public key setting

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2014-06-02 11:33:43
46Settling Multiple Debts: Lesson Plan Tom Verhoeff Eindhoven University of Technology Netherlands  June 2009

Settling Multiple Debts: Lesson Plan Tom Verhoeff Eindhoven University of Technology Netherlands June 2009

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2010-01-16 10:16:47
47Online chat / Electronic commerce / Diffie–Hellman key exchange / Email / Internet Relay Chat / XTR / RSA / Man-in-the-middle attack / Transmission Control Protocol / Cryptography / Cryptographic protocols / Computing

Apres - A System For Anonymous Presence Ben Laurie Step 2, 17 Perryn Road, London W3 7LR, United Kingdom Abstract. If Alice wants to know when Bob is online, and they don’t want anyone else to know th

Add to Reading List

Source URL: apache-ssl.securehost.com

Language: English - Date: 2009-01-02 13:32:36
48Multi-party Off-the-Record Messaging Ian Goldberg ˘ Berkant Ustaoglu

Multi-party Off-the-Record Messaging Ian Goldberg ˘ Berkant Ustaoglu

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2009-08-01 14:09:59
49How soon can you decide whether Alice is permitted to communicate or share resources with Bob? Bernard Butler and Brendan Jennings TSSG, Waterford Institute of Technology, Ireland {bbutler,bjennings}@ieee.org

How soon can you decide whether Alice is permitted to communicate or share resources with Bob? Bernard Butler and Brendan Jennings TSSG, Waterford Institute of Technology, Ireland {bbutler,bjennings}@ieee.org

Add to Reading List

Source URL: tinytocs.org

Language: English - Date: 2013-04-02 18:41:25
50YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 24 (rev. 1) December 1, 2005

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 24 (rev. 1) December 1, 2005

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2005-12-06 23:10:45