The Alice and Bob After Dinner Speech
given at the Zurich Seminar, April 1984
by John Gordon
http://www.conceptlabs.co.uk/alicebob.html
On Fri, 22 Feb 2002 john(_dot_)dlugosz(_at_)kodak(_dot_)com wrote:
From: John Dlugosz
I know about Alice and Bob in general. But does anyone have a pointer to a
complete list of which names are commonly used, and what Roles those names
are used for? E.g. Eve is used for an evesdropper. Someone else (I forgot
who) can alter packets, though.
--John
--
Robert Guerra <rguerra(_at_)cpsr(_dot_)org>
Director, Computer Professionals for Social Responsibility (CPSR)
<http://www.cpsr.org>