Alice and Bob

Results: 105



#Item
71Email / Chaffing and winnowing / Alice and Bob / Steganography / Adversary / Communication / RSA / Cryptography / Cryptographic protocols / Espionage

Technical Report MS-CIS[removed]The Eavesdropper’s Dilemma Eric Cronin, Micah Sherr, and Matt Blaze Distributed Systems Lab Department of Computer and Information Science

Add to Reading List

Source URL: www.crypto.com

Language: English - Date: 2006-02-03 16:13:56
72Cryptographic protocols / Alice and Bob / Cryptography

Make noise and whisper: a solution to relay attacks Omar Choudary and Frank Stajano Computer Laboratory University of Cambridge

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-05-13 10:59:01
73Cipher / Key size / One-time pad / Cryptanalysis / Vigenère cipher / Substitution cipher / Alice and Bob / Key / Index of cryptography articles / Cryptography / Public-key cryptography / RSA

This article was published in 2003 and has not been updated or revised. ® BEYOND DISCOVERY T H E PAT H F R O M R E S E A R C H T O H U M A N B E N E F I T

Add to Reading List

Source URL: www.nasonline.org

Language: English - Date: 2014-08-04 15:09:41
74Quantum cryptography / Quantum field theory / Quantum mechanics / Superselection / Commitment scheme / Quantum key distribution / Qubit / Alice and Bob / Man-in-the-middle attack / Physics / Cryptography / Quantum information science

Quantum information and quantum mechanics: fundamental issues John Preskill, Caltech 23 February 2004

Add to Reading List

Source URL: www.theory.caltech.edu

Language: English - Date: 2004-11-03 21:17:40
75Information / Broadband / Videotelephony / Voice over IP / Speex / Speech coding / N-gram / Speech recognition / Internet Low Bit Rate Codec / Audio codecs / Computational linguistics / Science

Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob? Charles V. Wright Lucas Ballard

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:51
76Notary / Blind signature / Electronic voting / Digital signature / Trusted third party / RSA / Diffie–Hellman key exchange / Non-repudiation / Alice and Bob / Cryptography / Public-key cryptography / Cryptographic protocols

An Abuse-Free Fair Contract Signing Protocol Based on the RSA Signature Guilin Wang Infocomm Security Department Institute for Infocomm Research (I2 R) 21 Heng Mui Keng Terrace, Singapore[removed]

Add to Reading List

Source URL: www2005.org

Language: English - Date: 2005-03-31 05:24:15
77Waterbury /  Connecticut / Alice and Bob / Geography of the United States

Revised[removed]Act 264 Advisory Board 95 South Main Street, Waterbury April 10, [removed]:00 – 1:00

Add to Reading List

Source URL: mentalhealth.vermont.gov

Language: English - Date: 2011-05-08 22:57:40
78Online chat / Electronic commerce / Diffie–Hellman key exchange / Email / Internet Relay Chat / XTR / RSA / Man-in-the-middle attack / Transmission Control Protocol / Cryptography / Cryptographic protocols / Computing

Apres - A System For Anonymous Presence Ben Laurie Step 2, 17 Perryn Road, London W3 7LR, United Kingdom [removed] Abstract. If Alice wants to know when Bob is online, and they don’t want anyone else to know th

Add to Reading List

Source URL: www.apache-ssl.org

Language: English - Date: 2009-01-02 13:32:36
79Alice and Bob / Behavior / Ethology / Behavioral addiction / Addiction / Video game addiction

PDF Document

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2009-10-07 06:24:40
80Quantum cryptography / Cryptographic protocols / Post-quantum cryptography / Quantum computer / Digital signature / Public key infrastructure / Alice and Bob / Key size / NTRU / Cryptography / Public-key cryptography / Key management

NIST Workshop on Cybersecurity in a Post-Quantum World

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2014-03-26 13:34:11
UPDATE