| 2007 |
| 19 | EE | Wuxue Zhang,
Yong Zhang,
Hui Zheng,
Chen Zhang,
Wei Xiong,
John G. Olyarchuk,
Michael Walker,
Weifeng Xu,
Min Zhao,
Shuqi Zhao,
Zhuan Zhou,
Liping Wei:
SynDB: a Synapse protein DataBase based on synapse ontology.
Nucleic Acids Research 35(Database-Issue): 737-741 (2007) |
| 2001 |
| 18 | EE | Brian S. White,
Michael Walker,
Marty Humphrey,
Andrew S. Grimshaw:
LegionFS: a secure and scalable file system supporting cross-domain high-performance applications.
SC 2001: 59 |
| 17 | | Siaw-Lynn Ng,
Michael Walker:
On the Composition of Matroids and Ideal Secret Sharing Schemes.
Des. Codes Cryptography 24(1): 49-67 (2001) |
| 2000 |
| 16 | EE | Michael Walker:
On the Security of 3GPP Networks.
EUROCRYPT 2000: 102-103 |
| 1999 |
| 15 | | Michael Walker:
Cryptography and Coding, 7th IMA International Conference, Cirencester, UK, December 20-22, 1999, Proceedings
Springer 1999 |
| 1997 |
| 14 | | Mike Burmester,
Yvo Desmedt,
Fred Piper,
Michael Walker:
A General Zero-Knowledge Scheme.
Des. Codes Cryptography 12(1): 13-37 (1997) |
| 1996 |
| 13 | | Chris J. Mitchell,
Fred Piper,
Michael Walker,
Peter R. Wild:
Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes.
Des. Codes Cryptography 7(1-2): 101-110 (1996) |
| 1995 |
| 12 | | Nigel Jefferies,
Chris J. Mitchell,
Michael Walker:
A Proposed Architecture for Trusted Third Party Services.
Cryptography: Policy and Algorithms 1995: 98-104 |
| 11 | | E. V. Stansfield,
Michael Walker:
Coding and Cryptography for Speech and Vision.
IMA Conf. 1995: 213-236 |
| 1994 |
| 10 | EE | Chris J. Mitchell,
Michael Walker,
Peter R. Wild:
The Combinatorics of Perfect Authentication Schemes.
SIAM J. Discrete Math. 7(1): 102-107 (1994) |
| 1990 |
| 9 | EE | Louis C. Guillou,
Jean-Jacques Quisquater,
Michael Walker,
Peter Landrock,
Caroline Shafer:
Precautions Taken Against Various Potential Attacks in ISO/IEC DIS 9796 "Digital Signature Scheme Giving Message Recovery".
EUROCRYPT 1990: 465-473 |
| 8 | | Chris J. Mitchell,
Dave Rush,
Michael Walker:
A Secure Messaging Architecture Implementing the X.400-1988 Security Features.
Comput. J. 33(4): 290-295 (1990) |
| 7 | | Michael Walker:
Information-Theoretic Bounds for Authentication Schemes.
J. Cryptology 2(3): 131-143 (1990) |
| 1989 |
| 6 | EE | Mike Burmester,
Yvo Desmedt,
Fred Piper,
Michael Walker:
A General Zero-Knowledge Scheme (Extended Abstract).
EUROCRYPT 1989: 122-133 |
| 5 | EE | Marijke De Soete,
Klaus Vedder,
Michael Walker:
Cartesian Authentication Schemes.
EUROCRYPT 1989: 476-490 |
| 4 | EE | Chris J. Mitchell,
Dave Rush,
Michael Walker:
A remark on hash functions for message authentication.
Computers & Security 8(1): 55-58 (1989) |
| 3 | | Fred Piper,
Michael Walker:
Linear Ciphers and Spreads.
J. Cryptology 1(3): 185-188 (1989) |
| 1985 |
| 2 | | Michael Walker:
Spreads Covered by Derivable Partial Spreads.
J. Comb. Theory, Ser. A 38(2): 113-130 (1985) |
| 1984 |
| 1 | EE | Henry Beker,
Michael Walker:
Key Management for Secure Electronic Funds Transfer in a Retail Environment.
CRYPTO 1984: 401-410 |