Skip to search formSkip to main contentSkip to account menu
You are currently offline. Some features of the site may not work correctly.

Alice and Bob

Known as: Eve (disambiguation), Eve (cryptography), Bob 
Alice and Bob are two commonly used placeholder names. They are used for archetypal characters in fields such as cryptography, game theory and… 
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
Intel’s Software Guard Extensions (SGX) is a set of extensions to the Intel architecture that aims to provide integrity and… 
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Highly Cited
2010
Highly Cited
2010
Asymmetric steering is an effect whereby an inseparable bipartite system can be found to be described by either quantum mechanics… 
  • figure 1
  • figure 3
  • figure 2
  • figure 4
Highly Cited
2007
Highly Cited
2007
Voice over IP (VoIP) has become a popular protocol for making phone calls over the Internet. Due to the potential transit of… 
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Highly Cited
2006
Highly Cited
2006
We consider the transmission of confidential data over wireless channels with multiple communicating parties. Based on an… 
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 7
2005
2005
Alice&Bob-notation is a simple notation for describing security protocols as sequences of message exchanges. We show that… 
Highly Cited
2001
Highly Cited
2001
II A beautiful idea 2 A The intuition . . . . . . . . . . . . . . . 2 B Classical cryptography . . . . . . . . . 3 1 Asymmetrical… 
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
1998
Highly Cited
1998
First, we introduce the notion of divertibility as a protocol property as opposed to the existing notion as a language property… 
  • figure 1
Highly Cited
1992
Highly Cited
1992
The goal of this article is to construct an integrated approach to collaboration and conceptual change. To this end, a case of… 
  • figure 1
  • figure 2
  • figure 5
  • figure 6
  • figure 7
Highly Cited
1990
Highly Cited
1990
We describe initial results from an apparatus and protocol designed to implement quantum public key distribution, by which two… 
Review
1976
Review
1976
The signs and symptoms of response to a stressful life event are expressed in two predominant phases: the intrusive state…