2007 |
19 | EE | Wuxue Zhang,
Yong Zhang,
Hui Zheng,
Chen Zhang,
Wei Xiong,
John G. Olyarchuk,
Michael Walker,
Weifeng Xu,
Min Zhao,
Shuqi Zhao,
Zhuan Zhou,
Liping Wei:
SynDB: a Synapse protein DataBase based on synapse ontology.
Nucleic Acids Research 35(Database-Issue): 737-741 (2007) |
2001 |
18 | EE | Brian S. White,
Michael Walker,
Marty Humphrey,
Andrew S. Grimshaw:
LegionFS: a secure and scalable file system supporting cross-domain high-performance applications.
SC 2001: 59 |
17 | | Siaw-Lynn Ng,
Michael Walker:
On the Composition of Matroids and Ideal Secret Sharing Schemes.
Des. Codes Cryptography 24(1): 49-67 (2001) |
2000 |
16 | EE | Michael Walker:
On the Security of 3GPP Networks.
EUROCRYPT 2000: 102-103 |
1999 |
15 | | Michael Walker:
Cryptography and Coding, 7th IMA International Conference, Cirencester, UK, December 20-22, 1999, Proceedings
Springer 1999 |
1997 |
14 | | Mike Burmester,
Yvo Desmedt,
Fred Piper,
Michael Walker:
A General Zero-Knowledge Scheme.
Des. Codes Cryptography 12(1): 13-37 (1997) |
1996 |
13 | | Chris J. Mitchell,
Fred Piper,
Michael Walker,
Peter R. Wild:
Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes.
Des. Codes Cryptography 7(1-2): 101-110 (1996) |
1995 |
12 | | Nigel Jefferies,
Chris J. Mitchell,
Michael Walker:
A Proposed Architecture for Trusted Third Party Services.
Cryptography: Policy and Algorithms 1995: 98-104 |
11 | | E. V. Stansfield,
Michael Walker:
Coding and Cryptography for Speech and Vision.
IMA Conf. 1995: 213-236 |
1994 |
10 | EE | Chris J. Mitchell,
Michael Walker,
Peter R. Wild:
The Combinatorics of Perfect Authentication Schemes.
SIAM J. Discrete Math. 7(1): 102-107 (1994) |
1990 |
9 | EE | Louis C. Guillou,
Jean-Jacques Quisquater,
Michael Walker,
Peter Landrock,
Caroline Shafer:
Precautions Taken Against Various Potential Attacks in ISO/IEC DIS 9796 "Digital Signature Scheme Giving Message Recovery".
EUROCRYPT 1990: 465-473 |
8 | | Chris J. Mitchell,
Dave Rush,
Michael Walker:
A Secure Messaging Architecture Implementing the X.400-1988 Security Features.
Comput. J. 33(4): 290-295 (1990) |
7 | | Michael Walker:
Information-Theoretic Bounds for Authentication Schemes.
J. Cryptology 2(3): 131-143 (1990) |
1989 |
6 | EE | Mike Burmester,
Yvo Desmedt,
Fred Piper,
Michael Walker:
A General Zero-Knowledge Scheme (Extended Abstract).
EUROCRYPT 1989: 122-133 |
5 | EE | Marijke De Soete,
Klaus Vedder,
Michael Walker:
Cartesian Authentication Schemes.
EUROCRYPT 1989: 476-490 |
4 | EE | Chris J. Mitchell,
Dave Rush,
Michael Walker:
A remark on hash functions for message authentication.
Computers & Security 8(1): 55-58 (1989) |
3 | | Fred Piper,
Michael Walker:
Linear Ciphers and Spreads.
J. Cryptology 1(3): 185-188 (1989) |
1985 |
2 | | Michael Walker:
Spreads Covered by Derivable Partial Spreads.
J. Comb. Theory, Ser. A 38(2): 113-130 (1985) |
1984 |
1 | EE | Henry Beker,
Michael Walker:
Key Management for Secure Electronic Funds Transfer in a Retail Environment.
CRYPTO 1984: 401-410 |