Description:
Alice, Bob, Eve, Mallory and Trent are some fictional characters used in academic papers and books to describe cryptographic protocols.
Suitable for:
Cryptographers, PhDs, security experts and mathematicians.
Customers who bought this item also bought: