Sciweavers

100 search results - page 1 / 20
» Alice and Bob
Sort
View
STOC
2007
ACM
92views Algorithms» more  STOC 2007»
14 years 4 months ago
Parallel repetition: simplifications and the no-signaling case
: Consider a game where a referee chooses (x,y) according to a publicly known distribution, sends x to Alice, and y to Bob. Without communicating with each other, Alice responds wi...
Thomas Holenstein
IEEEARES
2009
IEEE
13 years 11 months ago
Algebraic Properties in Alice and Bob Notation
—Alice and Bob notation is a popular way to describe security protocols: it is intuitive, succinct, and yet expressive. Several formal protocol specification languages are based...
Sebastian Mödersheim
SPW
2005
Springer
13 years 10 months ago
Alice and Bob
John Gordon
CCR
2007
94views more  CCR 2007»
13 years 4 months ago
You must be joking...: why Alice killed Bob
Humor is something that I take very seriously. Recently, I have been thinking a lot about it. It all started with a pet peeve of mine that got spurred on by a comment from a stude...
Michalis Faloutsos
IACR
2011
89views more  IACR 2011»
12 years 4 months ago
Identity-Based Decryption
Identity-based decryption is an alternative to identity-based encryption, in which Alice encrypts a symmetric key for Bob under a trusted authority’s public key. Alice sends Bob...
Daniel R. L. Brown