Sciweavers

100 search results - page 1 / 20
» Alice and Bob
Sort
View
STOC
2007
ACM
92views Algorithms» more  STOC 2007»
14 years 8 months ago
Parallel repetition: simplifications and the no-signaling case
: Consider a game where a referee chooses (x,y) according to a publicly known distribution, sends x to Alice, and y to Bob. Without communicating with each other, Alice responds wi...
Thomas Holenstein
IEEEARES
2009
IEEE
14 years 2 months ago
Algebraic Properties in Alice and Bob Notation
—Alice and Bob notation is a popular way to describe security protocols: it is intuitive, succinct, and yet expressive. Several formal protocol specification languages are based...
Sebastian Mödersheim
SPW
2005
Springer
14 years 1 months ago
Alice and Bob
John Gordon
CCR
2007
94views more  CCR 2007»
13 years 7 months ago
You must be joking...: why Alice killed Bob
Humor is something that I take very seriously. Recently, I have been thinking a lot about it. It all started with a pet peeve of mine that got spurred on by a comment from a stude...
Michalis Faloutsos
IACR
2011
89views more  IACR 2011»
12 years 7 months ago
Identity-Based Decryption
Identity-based decryption is an alternative to identity-based encryption, in which Alice encrypts a symmetric key for Bob under a trusted authority’s public key. Alice sends Bob...
Daniel R. L. Brown