×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [bob alice]
Cryptography in networks
148 views
Theory of Computing Lecture 23 MAS 714 Hartmut Klauck
226 views
Resource Management for Virtualized Systems Carl Waldspurger VMware R&D
219 views
Implementation of Practically Secure Quantum Bit Commitment Protocol Ariel Danan School of Physics Tel Aviv University September 2008
219 views
Covert Channels in TCP and IP Headers Drew Hintz
[email protected]
213 views
CRYPTOGRAPHY. WHAT IS PUBLIC-KEY ENCRYPTION? Encryption is the key to information security The main idea- by using only public information, a sender can
218 views
Analysis of Security Protocols (I) John C. Mitchell Stanford University
216 views
HOW TO PLAN A COUP D’ETAT COVERT MULTI-PARTY COMPUTATION YINMENG ZHANG ALADDIN REU 2005 LUIS VON AHN MANUEL BLUM
213 views
Privacy Issues and Techniques for Monitoring Applications Vibhor Rastogi RFID Security Group
213 views
Alice and Bob’s Revenge? AliceBob Elvis. If there is a protocol If there is a protocol then there must be a shortest protocol 1.Alice Bob : ??? 2.Bob
222 views
Authentication Advanced Software Engineering (CSE870) Instructor: Dr. B. Cheng Contact info: chengb at cse dot msu dot edu Eduardo Diaz Dan Fiedler Andres
215 views
Eddy Rubens Microsoft Services Belgium eID workshop - 24/06/2004
226 views
< Prev
Next >