Alice and Bob/Related Articles: Difference between revisions
Jump to navigation
Jump to search
imported>Daniel Mietchen m (Robot: encapsulating subpages template in noinclude tag) |
imported>Howard C. Berkowitz |
||
Line 8: | Line 8: | ||
==Other related topics== | ==Other related topics== | ||
{{r|Bob and Carol and Ted and Alice}} | |||
<!-- Remove the section below after copying links to the other sections. --> | |||
==Bot-suggested topics== | ==Bot-suggested topics== | ||
Auto-populated based on [[Special:WhatLinksHere/Alice and Bob]]. Needs checking by a human. | Auto-populated based on [[Special:WhatLinksHere/Alice and Bob]]. Needs checking by a human. |
Revision as of 02:15, 2 January 2010
- See also changes related to Alice and Bob, or pages that link to Alice and Bob or to this page or whose text contains "Alice and Bob".
Parent topics
Subtopics
Bot-suggested topics
Auto-populated based on Special:WhatLinksHere/Alice and Bob. Needs checking by a human.
- Cryptography [r]: A field at the intersection of mathematics and computer science that is concerned with the security of information, typically the confidentiality, integrity and authenticity of some message. [e]
- Diffie-Hellman [r]: A technique that allows two parties to safely establish a shared secret for use as a cryptographic key, even if someone is eavesdropping on their interaction. It requires that the parties have some means of authentication to be sure they are talking to the right person. [e]
- Man-in-the-middle attack [r]: An attack on a communications system in which the attacker deceives the communicating parties so they both talk to him while believing they are talking to each other. [e]