2018 Open de Guadeloupe – Doubles
James Cerretani and Antal van der Duim were the defending champions but only Cerretani chose to defend his title, partnering Nicholas Monroe. Cerretani lost in the first round to Ruben Bemelmans and Jonathan Eysseric.
Doubles | |
---|---|
2018 Open de Guadeloupe | |
Champions | |
Runners-up | |
Final score | 7–6(7–3), 6–4 |
Neal Skupski and John-Patrick Smith won the title after defeating Bemelmans and Eysseric 7–6(7–3), 6–4 in the final.
Seeds
James Cerretani / Nicholas Monroe (First round) Neal Skupski / John-Patrick Smith (Champions) Sander Gillé / Joran Vliegen (Quarterfinals) Treat Huey / Denis Kudla (First round)
Draw
Key
- Q = Qualifier
- WC = Wild Card
- LL = Lucky Loser
- Alt = Alternate
- SE = Special Exempt
- PR = Protected Ranking
- ITF = ITF entry
- JE = Junior Exempt
- w/o = Walkover
- r = Retired
- d = Defaulted
First Round | Quarterfinals | Semifinals | Final | ||||||||||||||||||||||||
1 | 6 | 4 | [8] | ||||||||||||||||||||||||
3 | 6 | [10] | 64 | 7 | [10] | ||||||||||||||||||||||
6 | 3 | [2] | WC | 77 | 5 | [8] | |||||||||||||||||||||
WC | 3 | 6 | [10] | 7 | 6 | ||||||||||||||||||||||
3 | 65 | 6 | [10] | 5 | 3 | ||||||||||||||||||||||
WC | 77 | 3 | [8] | 3 | 67 | 78 | [8] | ||||||||||||||||||||
6 | 6 | 79 | 66 | [10] | |||||||||||||||||||||||
4 | 2 | 63 | 4 | ||||||||||||||||||||||||
2 | 1 | 2 | 77 | 6 | |||||||||||||||||||||||
6 | 6 | 5 | 3 | ||||||||||||||||||||||||
WC | 1 | 78 | [10] | WC | 7 | 6 | |||||||||||||||||||||
4 | 6 | 66 | [7] | WC | 2 | 5 | |||||||||||||||||||||
3 | 4 | 2 | 6 | 7 | |||||||||||||||||||||||
6 | 6 | 610 | 3 | ||||||||||||||||||||||||
1 | 1 | 2 | 712 | 6 | |||||||||||||||||||||||
2 | 6 | 6 |
gollark: Or connection.
gollark: No, you would keep one counter per client.
gollark: You can keep a counter on each side, increment it when a message is sent/received, and ignore any with the wrong value, or just send a time (encrypted) and complain if it's more than a second or so off.
gollark: Replay attacks are easy enough to deal with.
gollark: Possibly. But you run into a similar issue to the symmetric encryption thing: what if someone steals a device with access to it and/or reads the keys off?
References
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.