Alice and Bob

Results: 105



#Item
71Technical Report MS-CIS[removed]The Eavesdropper’s Dilemma Eric Cronin, Micah Sherr, and Matt Blaze Distributed Systems Lab Department of Computer and Information Science

Technical Report MS-CIS[removed]The Eavesdropper’s Dilemma Eric Cronin, Micah Sherr, and Matt Blaze Distributed Systems Lab Department of Computer and Information Science

Add to Reading List

Source URL: www.crypto.com

Language: English - Date: 2006-02-03 16:13:56
72Make noise and whisper: a solution to relay attacks Omar Choudary and Frank Stajano Computer Laboratory University of Cambridge

Make noise and whisper: a solution to relay attacks Omar Choudary and Frank Stajano Computer Laboratory University of Cambridge

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-05-13 10:59:01
73This article was published in 2003 and has not been updated or revised.  ® BEYOND DISCOVERY T H E PAT H F R O M R E S E A R C H T O H U M A N B E N E F I T

This article was published in 2003 and has not been updated or revised. ® BEYOND DISCOVERY T H E PAT H F R O M R E S E A R C H T O H U M A N B E N E F I T

Add to Reading List

Source URL: www.nasonline.org

Language: English - Date: 2014-08-04 15:09:41
74Quantum information and quantum mechanics: fundamental issues John Preskill, Caltech 23 February 2004

Quantum information and quantum mechanics: fundamental issues John Preskill, Caltech 23 February 2004

Add to Reading List

Source URL: www.theory.caltech.edu

Language: English - Date: 2004-11-03 21:17:40
75Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob? Charles V. Wright Lucas Ballard

Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob? Charles V. Wright Lucas Ballard

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:51
76An Abuse-Free Fair Contract Signing Protocol Based on the RSA Signature Guilin Wang Infocomm Security Department Institute for Infocomm Research (I2 R) 21 Heng Mui Keng Terrace, Singapore[removed]

An Abuse-Free Fair Contract Signing Protocol Based on the RSA Signature Guilin Wang Infocomm Security Department Institute for Infocomm Research (I2 R) 21 Heng Mui Keng Terrace, Singapore[removed]

Add to Reading List

Source URL: www2005.org

Language: English - Date: 2005-03-31 05:24:15
77Revised[removed]Act 264 Advisory Board 95 South Main Street, Waterbury April 10, [removed]:00 – 1:00

Revised[removed]Act 264 Advisory Board 95 South Main Street, Waterbury April 10, [removed]:00 – 1:00

Add to Reading List

Source URL: mentalhealth.vermont.gov

Language: English - Date: 2011-05-08 22:57:40
78Apres - A System For Anonymous Presence Ben Laurie Step 2, 17 Perryn Road, London W3 7LR, United Kingdom [removed] Abstract. If Alice wants to know when Bob is online, and they don’t want anyone else to know th

Apres - A System For Anonymous Presence Ben Laurie Step 2, 17 Perryn Road, London W3 7LR, United Kingdom [removed] Abstract. If Alice wants to know when Bob is online, and they don’t want anyone else to know th

Add to Reading List

Source URL: www.apache-ssl.org

Language: English - Date: 2009-01-02 13:32:36
79

PDF Document

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2009-10-07 06:24:40
80NIST Workshop on Cybersecurity in a Post-Quantum World

NIST Workshop on Cybersecurity in a Post-Quantum World

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2014-03-26 13:34:11