dblp.uni-trier.dewww.uni-trier.de

Michael Walker

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2007
19EEWuxue Zhang, Yong Zhang, Hui Zheng, Chen Zhang, Wei Xiong, John G. Olyarchuk, Michael Walker, Weifeng Xu, Min Zhao, Shuqi Zhao, Zhuan Zhou, Liping Wei: SynDB: a Synapse protein DataBase based on synapse ontology. Nucleic Acids Research 35(Database-Issue): 737-741 (2007)
2001
18EEBrian S. White, Michael Walker, Marty Humphrey, Andrew S. Grimshaw: LegionFS: a secure and scalable file system supporting cross-domain high-performance applications. SC 2001: 59
17 Siaw-Lynn Ng, Michael Walker: On the Composition of Matroids and Ideal Secret Sharing Schemes. Des. Codes Cryptography 24(1): 49-67 (2001)
2000
16EEMichael Walker: On the Security of 3GPP Networks. EUROCRYPT 2000: 102-103
1999
15 Michael Walker: Cryptography and Coding, 7th IMA International Conference, Cirencester, UK, December 20-22, 1999, Proceedings Springer 1999
1997
14 Mike Burmester, Yvo Desmedt, Fred Piper, Michael Walker: A General Zero-Knowledge Scheme. Des. Codes Cryptography 12(1): 13-37 (1997)
1996
13 Chris J. Mitchell, Fred Piper, Michael Walker, Peter R. Wild: Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes. Des. Codes Cryptography 7(1-2): 101-110 (1996)
1995
12 Nigel Jefferies, Chris J. Mitchell, Michael Walker: A Proposed Architecture for Trusted Third Party Services. Cryptography: Policy and Algorithms 1995: 98-104
11 E. V. Stansfield, Michael Walker: Coding and Cryptography for Speech and Vision. IMA Conf. 1995: 213-236
1994
10EEChris J. Mitchell, Michael Walker, Peter R. Wild: The Combinatorics of Perfect Authentication Schemes. SIAM J. Discrete Math. 7(1): 102-107 (1994)
1990
9EELouis C. Guillou, Jean-Jacques Quisquater, Michael Walker, Peter Landrock, Caroline Shafer: Precautions Taken Against Various Potential Attacks in ISO/IEC DIS 9796 "Digital Signature Scheme Giving Message Recovery". EUROCRYPT 1990: 465-473
8 Chris J. Mitchell, Dave Rush, Michael Walker: A Secure Messaging Architecture Implementing the X.400-1988 Security Features. Comput. J. 33(4): 290-295 (1990)
7 Michael Walker: Information-Theoretic Bounds for Authentication Schemes. J. Cryptology 2(3): 131-143 (1990)
1989
6EEMike Burmester, Yvo Desmedt, Fred Piper, Michael Walker: A General Zero-Knowledge Scheme (Extended Abstract). EUROCRYPT 1989: 122-133
5EEMarijke De Soete, Klaus Vedder, Michael Walker: Cartesian Authentication Schemes. EUROCRYPT 1989: 476-490
4EEChris J. Mitchell, Dave Rush, Michael Walker: A remark on hash functions for message authentication. Computers & Security 8(1): 55-58 (1989)
3 Fred Piper, Michael Walker: Linear Ciphers and Spreads. J. Cryptology 1(3): 185-188 (1989)
1985
2 Michael Walker: Spreads Covered by Derivable Partial Spreads. J. Comb. Theory, Ser. A 38(2): 113-130 (1985)
1984
1EEHenry Beker, Michael Walker: Key Management for Secure Electronic Funds Transfer in a Retail Environment. CRYPTO 1984: 401-410

Coauthor Index

1Henry Beker [1]
2Mike Burmester [6] [14]
3Yvo Desmedt [6] [14]
4Andrew S. Grimshaw [18]
5Louis C. Guillou [9]
6Marty Humphrey (Marty A. Humphrey) [18]
7Nigel Jefferies [12]
8Peter Landrock [9]
9Chris J. Mitchell [4] [8] [10] [12] [13]
10Siaw-Lynn Ng [17]
11John G. Olyarchuk [19]
12Fred Piper [3] [6] [13] [14]
13Jean-Jacques Quisquater [9]
14Dave Rush [4] [8]
15Caroline Shafer [9]
16Marijke De Soete [5]
17E. V. Stansfield [11]
18Klaus Vedder [5]
19Liping Wei [19]
20Brian S. White [18]
21Peter R. Wild [10] [13]
22Wei Xiong [19]
23Weifeng Xu [19]
24Chen Zhang [19]
25Wuxue Zhang [19]
26Yong Zhang [19]
27Min Zhao [19]
28Shuqi Zhao [19]
29Hui Zheng [19]
30Zhuan Zhou [19]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)