Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 210,201,741 papers from all fields of science
Search
Sign In
Create Free Account
Alice and Bob
Known as:
Eve (disambiguation)
, Eve (cryptography)
, Bob
Expand
Alice and Bob are two commonly used placeholder names. They are used for archetypal characters in fields such as cryptography, game theory and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Adversary (cryptography)
Arthur–Merlin protocol
BB84
Bell's theorem
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
Intel SGX Explained
Victor Costan
,
S. Devadas
IACR Cryptology ePrint Archive
2016
Corpus ID: 28642809
Intel’s Software Guard Extensions (SGX) is a set of extensions to the Intel architecture that aims to provide integrity and…
Expand
Highly Cited
2012
Highly Cited
2012
PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake
S. King
,
Scott Nadal
2012
Corpus ID: 42319203
A peer-to-peer crypto-currency design derived from Satoshi Nakamoto’s Bitcoin. Proof-of-stake replaces proof-of-work to provide…
Expand
Highly Cited
2009
Highly Cited
2009
Asymmetric Gaussian steering: When Alice and Bob disagree
S. Midgley
,
A. Ferris
,
M. Olsen
2009
Corpus ID: 119241276
Asymmetric steering is an effect whereby an inseparable bipartite system can be found to be described by either quantum mechanics…
Expand
Highly Cited
2007
Highly Cited
2007
Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob?
C. V. Wright
,
L. Ballard
,
F. Monrose
,
G. Masson
USENIX Security Symposium
2007
Corpus ID: 5611936
Voice over IP (VoIP) has become a popular protocol for making phone calls over the Internet. Due to the potential transit of…
Expand
Highly Cited
2007
Highly Cited
2007
Preventing Location-Based Identity Inference in Anonymous Spatial Queries
Panos Kalnis
,
Gabriel Ghinita
,
K. Mouratidis
,
D. Papadias
IEEE Transactions on Knowledge and Data…
2007
Corpus ID: 2580518
The increasing trend of embedding positioning capabilities (for example, GPS) in mobile devices facilitates the widespread use of…
Expand
Highly Cited
2006
Highly Cited
2006
Secrecy Capacity of Wireless Channels
J. Barros
,
M. Rodrigues
IEEE International Symposium on Information…
2006
Corpus ID: 15696735
We consider the transmission of confidential data over wireless channels with multiple communicating parties. Based on an…
Expand
Highly Cited
2001
Highly Cited
2001
Quantum cryptography
H. Zbinden
,
H. Bechmann-Pasquinucci
,
N. Gisin
,
G. Ribordy
2001
Corpus ID: 6979295
II A beautiful idea 2 A The intuition . . . . . . . . . . . . . . . 2 B Classical cryptography . . . . . . . . . 3 1 Asymmetrical…
Expand
Highly Cited
1998
Highly Cited
1998
Divertible Protocols and Atomic Proxy Cryptography
M. Blaze
,
G. Bleumer
,
M. Strauss
International Conference on the Theory and…
1998
Corpus ID: 7395578
First, we introduce the notion of divertibility as a protocol property as opposed to the existing notion as a language property…
Expand
Highly Cited
1992
Highly Cited
1992
Learning by Collaborating: Convergent Conceptual Change
J. Roschelle
1992
Corpus ID: 18096491
The goal of this article is to construct an integrated approach to collaboration and conceptual change. To this end, a case of…
Expand
Review
1976
Review
1976
Stress response syndromes
M. Horowitz
1976
Corpus ID: 142794582
The signs and symptoms of response to a stressful life event are expressed in two predominant phases: the intrusive state…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE