Alice and Bob

Results: 105



#Item
81Michigan Film Advisory Commission Minutes November 19, 2003 The Chairperson, Richard McLellan, called the meeting to order at 3:00 p.m. Members present: Mary Kay Baribeau, Bob Brown, Jim Burnstein, Harry Carlson, Alice G

Michigan Film Advisory Commission Minutes November 19, 2003 The Chairperson, Richard McLellan, called the meeting to order at 3:00 p.m. Members present: Mary Kay Baribeau, Bob Brown, Jim Burnstein, Harry Carlson, Alice G

Add to Reading List

Source URL: www.michiganfilmoffice.org

Language: English - Date: 2009-04-29 15:04:42
82Knowledge and Distributed Computation by Mark R. Tuttle B.S., University of Nebraska{Lincoln (1984)

Knowledge and Distributed Computation by Mark R. Tuttle B.S., University of Nebraska{Lincoln (1984)

Add to Reading List

Source URL: www.markrtuttle.com

Language: English - Date: 2007-04-26 00:00:00
83On Robust Key Agreement Based on Public Key Authentication (Short Paper) Feng Hao Thales E-Security, Cambridge, UK [removed]

On Robust Key Agreement Based on Public Key Authentication (Short Paper) Feng Hao Thales E-Security, Cambridge, UK [removed]

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2011-12-25 18:38:22
84Smushing RDF instances: are Alice and Bob the same open source developer? Lian Shi1 , Diego Berrueta1 , Sergio Fern´andez1 , Luis Polo1 , and Silvino Fern´andez2 1

Smushing RDF instances: are Alice and Bob the same open source developer? Lian Shi1 , Diego Berrueta1 , Sergio Fern´andez1 , Luis Polo1 , and Silvino Fern´andez2 1

Add to Reading List

Source URL: ceur-ws.org

Language: English - Date: 2008-10-06 04:41:50
85int3.rolemode sherol.4-26

int3.rolemode sherol.4-26

Add to Reading List

Source URL: adamsmith.as

Language: English - Date: 2013-03-17 01:17:52
86Smushing RDF instances: are Alice and Bob the same open source developer? Lian Shi, Diego Berrueta, Sergio Fernández, Luis Polo and Silvino Fernández  FUNDACIÓN CTIC

Smushing RDF instances: are Alice and Bob the same open source developer? Lian Shi, Diego Berrueta, Sergio Fernández, Luis Polo and Silvino Fernández FUNDACIÓN CTIC

Add to Reading List

Source URL: www.wikier.org

Language: English - Date: 2013-02-12 09:19:20
87News, continued classical. Thus the team simply blasted Bob’s detector with a laser while intercepting Alice’s data and then sending Bob a classical bit. Since the detectors always register a 0 or a 1, they can’t t

News, continued classical. Thus the team simply blasted Bob’s detector with a laser while intercepting Alice’s data and then sending Bob a classical bit. Since the detectors always register a 0 or a 1, they can’t t

Add to Reading List

Source URL: peterbyrne.info

Language: English - Date: 2014-01-11 01:05:01
88Perfect eavesdropping on a quantum cryptography system Ilja Gerhardt,1, 2 Qin Liu,1, 3 Ant´ıa Lamas-Linares,2 Johannes Skaar,3, 4 Christian Kurtsiefer,2, a) and Vadim Makarov3, b) 1) These authors contributed equally t

Perfect eavesdropping on a quantum cryptography system Ilja Gerhardt,1, 2 Qin Liu,1, 3 Ant´ıa Lamas-Linares,2 Johannes Skaar,3, 4 Christian Kurtsiefer,2, a) and Vadim Makarov3, b) 1) These authors contributed equally t

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2010-11-01 20:12:12
89Preface The creation of public key cryptography by Diffie and Hellman in 1976 and the subsequent invention of the RSA public key cryptosystem by Rivest, Shamir, and Adleman in 1978 are watershed events in the long histor

Preface The creation of public key cryptography by Diffie and Hellman in 1976 and the subsequent invention of the RSA public key cryptosystem by Rivest, Shamir, and Adleman in 1978 are watershed events in the long histor

Add to Reading List

Source URL: www.math.brown.edu

Language: English - Date: 2008-03-20 11:45:18