cryptography
Alice and Bob are the primary characters in a cast of characters first used in cryptographic circles as placeholder names to represent different parties in a transaction. The story goes like this. Alice wants to send a message to Bob, but she doesn’t want anyone but Bob to be able to read it. Bob also…
Read MoreThe JLINC Protocol is the interoperable solution for transparent crypto-contracts – cryptographically signed ‘data exchange contracts’.
Read More