The Full Wiki

More info on Articles with Alice and Bob explanations

Top articles with Alice and Bob explanations (Trending topics)

Advertisements
  

The following are the current most viewed articles on Wikipedia within Wikipedia's Articles with Alice and Bob explanations category. Think of it as a What's Hot list for Articles with Alice and Bob explanations. More info »

This is a beta release and so the figures may be a day or two out of date. We'd love to get your thoughts.

Rank Topic Wikipedia views
1 Email 12,155 Sparkline of topic views for 2 weeks
2 Social network service 8,817 Sparkline of topic views for 2 weeks
3 RSA 4,019 Sparkline of topic views for 2 weeks
4 Public-key cryptography 3,383 Sparkline of topic views for 2 weeks
5 Cross-site scripting 3,268 Sparkline of topic views for 2 weeks
6 Cryptographic hash function 1,829 Sparkline of topic views for 2 weeks
7 Erdős number 1,771 Sparkline of topic views for 2 weeks
8 Man-in-the-middle attack 1,421 Sparkline of topic views for 2 weeks
9 Anonymity 1,415 Sparkline of topic views for 2 weeks
10 Public key certificate 1,182 Sparkline of topic views for 2 weeks
11 Diffie–Hellman key exchange 1,139 Sparkline of topic views for 2 weeks
12 Certificate authority 1,131 Sparkline of topic views for 2 weeks
13 EPR paradox 1,070 Sparkline of topic views for 2 weeks
14 One-time pad 1,033 Sparkline of topic views for 2 weeks
15 Bell's theorem 882 Sparkline of topic views for 2 weeks
16 SYN flood 660 Sparkline of topic views for 2 weeks
17 Birthday attack 590 Sparkline of topic views for 2 weeks
18 Quantum teleportation 583 Sparkline of topic views for 2 weeks
19 Placeholder name 536 Sparkline of topic views for 2 weeks
20 Alice and Bob 414 Sparkline of topic views for 2 weeks
21 Replay attack 369 Sparkline of topic views for 2 weeks
22 Methods of website linking 354 Sparkline of topic views for 2 weeks
23 History of cryptography 334 Sparkline of topic views for 2 weeks
24 Online Certificate Status Protocol 297 Sparkline of topic views for 2 weeks
25 Self-signed certificate 285 Sparkline of topic views for 2 weeks
26 War (card game) 277 Sparkline of topic views for 2 weeks
27 Principle of locality 250 Sparkline of topic views for 2 weeks
28 Quantum indeterminacy 249 Sparkline of topic views for 2 weeks
29 Traffic analysis 246 Sparkline of topic views for 2 weeks
30 Zero-knowledge proof 233 Sparkline of topic views for 2 weeks
31 Speak of the devil 229 Sparkline of topic views for 2 weeks
32 Session fixation 218 Sparkline of topic views for 2 weeks
33 Communication complexity 207 Sparkline of topic views for 2 weeks
34 Rainbows End 207 Sparkline of topic views for 2 weeks
35 Diplomatic bag 203 Sparkline of topic views for 2 weeks
36 Unclean hands 190 Sparkline of topic views for 2 weeks
37 Ruritania 189 Sparkline of topic views for 2 weeks
38 Ex turpi causa non oritur actio 152 Sparkline of topic views for 2 weeks
39 Deniable encryption 149 Sparkline of topic views for 2 weeks
40 Mental poker 118 Sparkline of topic views for 2 weeks
41 Needham-Schroeder protocol 113 Sparkline of topic views for 2 weeks
42 Elliptic Curve DSA 110 Sparkline of topic views for 2 weeks
43 Quantum key distribution 107 Sparkline of topic views for 2 weeks
44 Anonymous internet banking 97 Sparkline of topic views for 2 weeks
45 Commitment scheme 94 Sparkline of topic views for 2 weeks
46 Liberal paradox 93 Sparkline of topic views for 2 weeks
47 Bell state 79 Sparkline of topic views for 2 weeks
48 Elliptic curve Diffie–Hellman 79 Sparkline of topic views for 2 weeks
49 Chaffing and winnowing 78 Sparkline of topic views for 2 weeks
50 No-communication theorem 78 Sparkline of topic views for 2 weeks
51 Secure multi-party computation 72 Sparkline of topic views for 2 weeks
52 Lamport signature 62 Sparkline of topic views for 2 weeks
53 Adversary (cryptography) 61 Sparkline of topic views for 2 weeks
54 Jefferson disk 56 Sparkline of topic views for 2 weeks
55 SuEXEC 56 Sparkline of topic views for 2 weeks
56 Decibel (KDE) 46 Sparkline of topic views for 2 weeks
57 Cramer–Shoup cryptosystem 44 Sparkline of topic views for 2 weeks
58 Fluhrer, Mantin and Shamir attack 42 Sparkline of topic views for 2 weeks
59 Yao's principle 33 Sparkline of topic views for 2 weeks
60 Wide Mouth Frog protocol 27 Sparkline of topic views for 2 weeks
61 Blinding (cryptography) 21 Sparkline of topic views for 2 weeks
62 SPEKE (cryptography) 21 Sparkline of topic views for 2 weeks
63 Merkle's Puzzles 20 Sparkline of topic views for 2 weeks
64 Lawburrows 13 Sparkline of topic views for 2 weeks
65 Security protocol notation 10 Sparkline of topic views for 2 weeks
66 Neuman-Stubblebine protocol 10 Sparkline of topic views for 2 weeks
67 Predictable serial number attack less than 5 views

Parent categories


Encyclopedia

From Wikipedia, the free encyclopedia

Articles which include explanations constructed using the Alice and Bob placeholders, common in communication, cryptography, law, physics and mathematics.

Pages in category "Articles with Alice and Bob explanations"

The following 67 pages are in this category, out of 67 total. This list may not reflect recent changes (learn more).

A

B

C

D

E

E cont.

F

H

J

L

M

N

O

P

Q

Q cont.

R

S

T

U

W

Y

Z


Advertisements






Got something to say? Make a comment.
Your name
Your email address
Message