Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Alice and Bob

Known as: Eve (disambiguation), Eve (cryptography), Bob 
Alice and Bob are two commonly used placeholder names. They are used for archetypal characters in fields such as cryptography, game theory and… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
A peer-to-peer crypto-currency design derived from Satoshi Nakamoto’s Bitcoin. Proof-of-stake replaces proof-of-work to provide… Expand
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Asymmetric steering is an effect whereby an inseparable bipartite system can be found to be described by either quantum mechanics… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 4
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Voice over IP (VoIP) has become a popular protocol for making phone calls over the Internet. Due to the potential transit of… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2007
Highly Cited
2007
The increasing trend of embedding positioning capabilities (for example, GPS) in mobile devices facilitates the widespread use of… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
We consider the transmission of confidential data over wireless channels with multiple communicating parties. Based on an… Expand
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 7
Is this relevant?
2005
2005
Alice&Bob-notation is a simple notation for describing security protocols as sequences of message exchanges. We show that… Expand
Is this relevant?
Highly Cited
1998
Highly Cited
1998
First, we introduce the notion of divertibility as a protocol property as opposed to the existing notion as a language property… Expand
  • figure 1
Is this relevant?
Highly Cited
1992
Highly Cited
1992
The goal of this article is to construct an integrated approach to collaboration and conceptual change. To this end, a case of… Expand
  • figure 1
  • figure 2
  • figure 5
  • figure 6
  • figure 7
Is this relevant?
Highly Cited
1990
Highly Cited
1990
We describe initial results from an apparatus and protocol designed to implement quantum public key distribution, by which two… Expand
Is this relevant?
Highly Cited
1988
Highly Cited
1988
In this paper, we investigate how the use of a channel with perfect authenticity but no privacy can be used to repair the defects… Expand
Is this relevant?