Skip to search formSkip to main contentSkip to account menu

Alice and Bob

Known as: Eve (disambiguation), Eve (cryptography), Bob 
Alice and Bob are two commonly used placeholder names. They are used for archetypal characters in fields such as cryptography, game theory and… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
Intel’s Software Guard Extensions (SGX) is a set of extensions to the Intel architecture that aims to provide integrity and… 
Highly Cited
2012
Highly Cited
2012
A peer-to-peer crypto-currency design derived from Satoshi Nakamoto’s Bitcoin. Proof-of-stake replaces proof-of-work to provide… 
Highly Cited
2009
Highly Cited
2009
Asymmetric steering is an effect whereby an inseparable bipartite system can be found to be described by either quantum mechanics… 
Highly Cited
2007
Highly Cited
2007
Voice over IP (VoIP) has become a popular protocol for making phone calls over the Internet. Due to the potential transit of… 
Highly Cited
2007
Highly Cited
2007
The increasing trend of embedding positioning capabilities (for example, GPS) in mobile devices facilitates the widespread use of… 
Highly Cited
2006
Highly Cited
2006
We consider the transmission of confidential data over wireless channels with multiple communicating parties. Based on an… 
Highly Cited
2001
Highly Cited
2001
II A beautiful idea 2 A The intuition . . . . . . . . . . . . . . . 2 B Classical cryptography . . . . . . . . . 3 1 Asymmetrical… 
Highly Cited
1998
Highly Cited
1998
First, we introduce the notion of divertibility as a protocol property as opposed to the existing notion as a language property… 
Highly Cited
1992
Highly Cited
1992
The goal of this article is to construct an integrated approach to collaboration and conceptual change. To this end, a case of… 
Review
1976
Review
1976
The signs and symptoms of response to a stressful life event are expressed in two predominant phases: the intrusive state…