2007 |
20 | EE | Constantinos Markantonakis,
Keith Mayes,
Michael Tunstall,
Damien Sauveron,
Fred Piper:
Smart Card Security.
Computational Intelligence in Information Assurance and Security 2007: 201-233 |
19 | EE | Chris J. Mitchell,
Fred Piper,
Peter R. Wild:
ID-based cryptography using symmetric primitives.
Des. Codes Cryptography 44(1-3): 249-262 (2007) |
2005 |
18 | EE | Fred Piper:
Cyberworld Security-the Good, the Bad and the Ugly*.
Comput. J. 48(2): 145-156 (2005) |
2003 |
17 | | Chez Ciechanowicz,
Keith M. Martin,
Fred Piper,
Matthew J. B. Robshaw:
Ten Years of Information Security Masters Programmes.
World Conference on Information Security Education 2003: 215-230 |
16 | | Fred Piper:
Reseacrh in cryptography and security mechanisms.
Computers & Security 22(1): 22-25 (2003) |
1997 |
15 | | Fred Piper:
Trusted Third Parties for Secure Electronic Commerce - Are They Needed?
ACISP 1997: 1 |
14 | | Mike Burmester,
Yvo Desmedt,
Fred Piper,
Michael Walker:
A General Zero-Knowledge Scheme.
Des. Codes Cryptography 12(1): 13-37 (1997) |
1996 |
13 | | Chris J. Mitchell,
Fred Piper,
Michael Walker,
Peter R. Wild:
Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes.
Des. Codes Cryptography 7(1-2): 101-110 (1996) |
1994 |
12 | EE | Jonathan Jedwab,
Chris J. Mitchell,
Fred Piper,
Peter R. Wild:
Perfect binary arrays and difference sets.
Discrete Mathematics 125(1-3): 241-254 (1994) |
1992 |
11 | EE | Fred Piper,
Peter R. Wild:
Incidence structures applied to cryptography.
Discrete Mathematics 106-107: 383-389 (1992) |
1991 |
10 | EE | Fred Piper:
Comment.
Computer Communications 14(3): 131-132 (1991) |
9 | EE | Wen-Ai Jackson,
Fred Piper,
Peter R. Wild:
Non-embedding of non prime- power unitals with point-regular group.
Discrete Mathematics 98(1): 23-28 (1991) |
1990 |
8 | EE | Fred Piper:
Computer and communications security: J A Cooper.
Computer Communications 13(1): 54 (1990) |
1989 |
7 | EE | Mike Burmester,
Yvo Desmedt,
Fred Piper,
Michael Walker:
A General Zero-Knowledge Scheme (Extended Abstract).
EUROCRYPT 1989: 122-133 |
6 | | Fred Piper,
Michael Walker:
Linear Ciphers and Spreads.
J. Cryptology 1(3): 185-188 (1989) |
1988 |
5 | EE | Chris J. Mitchell,
Fred Piper:
Key storage in secure networks.
Discrete Applied Mathematics 21(3): 215-228 (1988) |
1986 |
4 | EE | Fred Piper:
Primality and cryptography.
Computer Communications 9(6): 318 (1986) |
1984 |
3 | EE | Thomas Beth,
Fred Piper:
The Stop-and-Go Generator.
EUROCRYPT 1984: 88-92 |
1982 |
2 | EE | Fred Piper:
Stream Ciphers.
EUROCRYPT 1982: 181-188 |
1977 |
1 | | Henry Beker,
Fred Piper:
Some Designs Which Admit Strong Tactical Decompositions.
J. Comb. Theory, Ser. A 22(1): 38-42 (1977) |