×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [alice bob]
My talk about recommendation and search to the Hive
1.183 views
Network Security Notes
10 views
Bowling Alone and Trust Decline in Social Network Sites
1.622 views
Towards Mining Semantic Maturity in Social Bookmarking Systems
103 views
One Tag to bind them all: Measuring Term abstractness in Social Metadata
106 views
1 Cryptography: on the Hope for Privacy in a Digital World Omer Reingold VVeizmann and Harvard CRCS
212 views
GENI Distributed Services Preliminary Requirements and Design Tom Anderson and Amin Vahdat (co-chairs) David Andersen, Mic Bowman, Frans Kaashoek, Arvind
213 views
1 Access Control Today we will start to cover Access Control –material is from Gollmanns Computer Security book (Chapter 3 and partially 4) (most slides
213 views
Experimental Demonstration of Polarization Encoding Measurement-Device-Independent Quantum Key Distribution Zhiyuan Tang, Zhongfa Liao, Feihu Xu, Bing
217 views
CNS2010lecture 6 :: key management1 ELEC5616 computer and network security matt barrie
[email protected]
214 views
Qkd and de finetti theorem
246 views
Digital Signature
3.214 views
Next >