Alice
E461743
Alice is the conventional placeholder name used to represent a generic sender or participant in cryptographic protocols and security examples.
Statements (47)
| Predicate | Object |
|---|---|
| instanceOf |
fictional person
ⓘ
placeholder name ⓘ |
| appearsInNotation | A ⓘ |
| associatedWithConcept |
protocol notation
ⓘ
public-key cryptography ⓘ secure communication ⓘ symmetric-key cryptography ⓘ |
| commonlyAppearsIn |
authentication protocol examples
ⓘ
digital signature examples ⓘ encryption scheme descriptions ⓘ key exchange examples ⓘ |
| communicatesWith | Bob NERFINISHED ⓘ |
| contrastedWith | adversarial parties such as Eve and Mallory ⓘ |
| domain |
applied cryptography
ⓘ
information security education ⓘ |
| hasConventionalPartnerRole | Bob as receiver ⓘ |
| hasCounterpartType | honest party ⓘ |
| hasGenderConvention | female ⓘ |
| hasProperty | no fixed identity beyond role in example ⓘ |
| helpsIllustrate |
protocol steps
ⓘ
security goals ⓘ threat models ⓘ |
| introducedInField | cryptographic literature ⓘ |
| isAbstractionOf |
network endpoint
ⓘ
real-world user ⓘ |
| isOpposedBy | Eve NERFINISHED ⓘ |
| isTargetOf |
eavesdropping
ⓘ
impersonation attacks ⓘ man-in-the-middle attacks ⓘ |
| originOfName | common English given name ⓘ |
| pairedWith |
Bob
NERFINISHED
ⓘ
Carol NERFINISHED ⓘ Dave NERFINISHED ⓘ Eve NERFINISHED ⓘ Mallory NERFINISHED ⓘ Trent NERFINISHED ⓘ |
| receivesMessagesFrom | Bob NERFINISHED ⓘ |
| roleInCryptography |
generic participant
ⓘ
generic sender ⓘ |
| sendsMessagesTo | Bob NERFINISHED ⓘ |
| standardizedBy | informal cryptographic community practice ⓘ |
| usedAsExampleIn |
academic textbooks
ⓘ
educational tutorials ⓘ research papers ⓘ |
| usedIn |
computer security
ⓘ
cryptography ⓘ security protocol examples ⓘ |
Referenced by (3)
Full triples — surface form annotated when it differs from this entity's canonical label.