dblp.uni-trier.dewww.uni-trier.de

Fred Piper

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2007
20EEConstantinos Markantonakis, Keith Mayes, Michael Tunstall, Damien Sauveron, Fred Piper: Smart Card Security. Computational Intelligence in Information Assurance and Security 2007: 201-233
19EEChris J. Mitchell, Fred Piper, Peter R. Wild: ID-based cryptography using symmetric primitives. Des. Codes Cryptography 44(1-3): 249-262 (2007)
2005
18EEFred Piper: Cyberworld Security-the Good, the Bad and the Ugly*. Comput. J. 48(2): 145-156 (2005)
2003
17 Chez Ciechanowicz, Keith M. Martin, Fred Piper, Matthew J. B. Robshaw: Ten Years of Information Security Masters Programmes. World Conference on Information Security Education 2003: 215-230
16 Fred Piper: Reseacrh in cryptography and security mechanisms. Computers & Security 22(1): 22-25 (2003)
1997
15 Fred Piper: Trusted Third Parties for Secure Electronic Commerce - Are They Needed? ACISP 1997: 1
14 Mike Burmester, Yvo Desmedt, Fred Piper, Michael Walker: A General Zero-Knowledge Scheme. Des. Codes Cryptography 12(1): 13-37 (1997)
1996
13 Chris J. Mitchell, Fred Piper, Michael Walker, Peter R. Wild: Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes. Des. Codes Cryptography 7(1-2): 101-110 (1996)
1994
12EEJonathan Jedwab, Chris J. Mitchell, Fred Piper, Peter R. Wild: Perfect binary arrays and difference sets. Discrete Mathematics 125(1-3): 241-254 (1994)
1992
11EEFred Piper, Peter R. Wild: Incidence structures applied to cryptography. Discrete Mathematics 106-107: 383-389 (1992)
1991
10EEFred Piper: Comment. Computer Communications 14(3): 131-132 (1991)
9EEWen-Ai Jackson, Fred Piper, Peter R. Wild: Non-embedding of non prime- power unitals with point-regular group. Discrete Mathematics 98(1): 23-28 (1991)
1990
8EEFred Piper: Computer and communications security: J A Cooper. Computer Communications 13(1): 54 (1990)
1989
7EEMike Burmester, Yvo Desmedt, Fred Piper, Michael Walker: A General Zero-Knowledge Scheme (Extended Abstract). EUROCRYPT 1989: 122-133
6 Fred Piper, Michael Walker: Linear Ciphers and Spreads. J. Cryptology 1(3): 185-188 (1989)
1988
5EEChris J. Mitchell, Fred Piper: Key storage in secure networks. Discrete Applied Mathematics 21(3): 215-228 (1988)
1986
4EEFred Piper: Primality and cryptography. Computer Communications 9(6): 318 (1986)
1984
3EEThomas Beth, Fred Piper: The Stop-and-Go Generator. EUROCRYPT 1984: 88-92
1982
2EEFred Piper: Stream Ciphers. EUROCRYPT 1982: 181-188
1977
1 Henry Beker, Fred Piper: Some Designs Which Admit Strong Tactical Decompositions. J. Comb. Theory, Ser. A 22(1): 38-42 (1977)

Coauthor Index

1Henry Beker [1]
2Thomas Beth [3]
3Mike Burmester [7] [14]
4Chez Ciechanowicz [17]
5Yvo Desmedt [7] [14]
6Wen-Ai Jackson [9]
7Jonathan Jedwab [12]
8Constantinos Markantonakis [20]
9Keith M. Martin [17]
10Keith Mayes [20]
11Chris J. Mitchell [5] [12] [13] [19]
12Matthew J. B. Robshaw [17]
13Damien Sauveron [20]
14Michael Tunstall [20]
15Michael Walker [6] [7] [13] [14]
16Peter R. Wild [9] [11] [12] [13] [19]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)