dblp.uni-trier.dewww.uni-trier.de

Peter R. Wild

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
29EEThomas Martin, Keith M. Martin, Peter R. Wild: Establishing the broadcast efficiency of the Subset Difference Revocation Scheme. Des. Codes Cryptography 51(3): 315-334 (2009)
2008
28EEReihaneh Safavi-Naini, Peter R. Wild: Information Theoretic Bounds on Authentication Systems in Query Model. IEEE Transactions on Information Theory 54(6): 2426-2436 (2008)
2007
27EEDongvu Tonien, Reihaneh Safavi-Naini, Peter R. Wild: Combinatorial characterizations of authentication codes in verification oracle model. ASIACCS 2007: 183-193
26EEChris J. Mitchell, Fred Piper, Peter R. Wild: ID-based cryptography using symmetric primitives. Des. Codes Cryptography 44(1-3): 249-262 (2007)
2006
25EEJason Crampton, Keith M. Martin, Peter R. Wild: On Key Assignment for Hierarchical Access Control. CSFW 2006: 98-111
2005
24EEKeith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild: Distributing the Encryption and Decryption of a Block Cipher. Des. Codes Cryptography 36(3): 263-287 (2005)
2004
23 Chester W. J. Liu, Peter R. Wild: Embeddings of Steiner Quadruple Systems using Extensions of Linear Spaces. Ars Comb. 73: (2004)
2002
22EESusan G. Barwick, Wen-Ai Jackson, Keith M. Martin, Peter R. Wild: Size of Broadcast in Threshold Schemes with Disenrollment. ACISP 2002: 71-88
21EEKeith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild: Threshold MACs. ICISC 2002: 237-252
20 Chester W. J. Liu, Peter R. Wild: Embeddings of Steiner Quadruple Systems. Ars Comb. 65: (2002)
2001
19 Siaw-Lynn Ng, Peter R. Wild: On k-arcs Covering a Line in Finite Projective Planes. Ars Comb. 58: (2001)
2000
18EESiaw-Lynn Ng, Peter R. Wild: A New Family of Extended Generalized Quadrangles of Order (q + 1, q - 1). Eur. J. Comb. 21(3): 395-406 (2000)
1998
17 L. R. A. Casse, Keith M. Martin, Peter R. Wild: Bounds and Characterizations of Authentication/Secrecy Schemes. Des. Codes Cryptography 13(2): 107-129 (1998)
16EESimon R. Blackburn, Peter R. Wild: Optimal Linear Perfect Hash Families. J. Comb. Theory, Ser. A 83(2): 233-250 (1998)
1997
15 Liqun Chen, Dieter Gollmann, Chris J. Mitchell, Peter R. Wild: Secret Sharing with Reusable Polynomials. ACISP 1997: 183-193
14 Wen-Ai Jackson, Peter R. Wild: On GMW Designs and Cyclic Hadamard Designs. Des. Codes Cryptography 10(2): 185-191 (1997)
1996
13EESimon R. Blackburn, Mike Burmester, Yvo Desmedt, Peter R. Wild: Efficient Multiplicative Sharing Schemes. EUROCRYPT 1996: 107-118
12 Wen-Ai Jackson, Kathleen A. S. Quinn, Peter R. Wild: Quadrics and difference sets. Ars Comb. 42: (1996)
11 Chris J. Mitchell, Fred Piper, Michael Walker, Peter R. Wild: Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes. Des. Codes Cryptography 7(1-2): 101-110 (1996)
1995
10EEPeter R. Wild: Some families of semibiplanes. Discrete Mathematics 138(1-3): 397-403 (1995)
1994
9EEJonathan Jedwab, Chris J. Mitchell, Fred Piper, Peter R. Wild: Perfect binary arrays and difference sets. Discrete Mathematics 125(1-3): 241-254 (1994)
8 Sean Murphy, Kenneth G. Paterson, Peter R. Wild: A Weak Cipher that Generates the Symmetric Group. J. Cryptology 7(1): 61-65 (1994)
7EEChris J. Mitchell, Michael Walker, Peter R. Wild: The Combinatorics of Perfect Authentication Schemes. SIAM J. Discrete Math. 7(1): 102-107 (1994)
1992
6 Wen-Ai Jackson, Peter R. Wild: Relations between Two Perfect Ternary Sequence Constructions. Des. Codes Cryptography 2(4): 325-332 (1992)
5EEFred Piper, Peter R. Wild: Incidence structures applied to cryptography. Discrete Mathematics 106-107: 383-389 (1992)
1991
4EEWen-Ai Jackson, Fred Piper, Peter R. Wild: Non-embedding of non prime- power unitals with point-regular group. Discrete Mathematics 98(1): 23-28 (1991)
1990
3 Martin Anthony, Keith M. Martin, Jennifer Seberry, Peter R. Wild: Some Remarks on Authentication Systems. AUSCRYPT 1990: 122-139
1987
2EEPeter R. Wild: Difference basis systems. Discrete Mathematics 63(1): 81-90 (1987)
1983
1EEPeter R. Wild: Incidence graphs and subdesigns of semisymmetric designs. Discrete Mathematics 44(2): 201-216 (1983)

Coauthor Index

1Martin Anthony [3]
2Susan G. Barwick [22]
3Simon R. Blackburn [13] [16]
4Mike Burmester [13]
5L. R. A. Casse [17]
6Liqun Chen [15]
7Jason Crampton [25]
8Yvo Desmedt [13]
9Dieter Gollmann [15]
10Wen-Ai Jackson [4] [6] [12] [14] [22]
11Jonathan Jedwab [9]
12Chester W. J. Liu [20] [23]
13Keith M. Martin [3] [17] [21] [22] [24] [25] [29]
14Thomas Martin [29]
15Chris J. Mitchell [7] [9] [11] [15] [26]
16Sean Murphy [8]
17Siaw-Lynn Ng [18] [19]
18Kenneth G. Paterson [8]
19Josef Pieprzyk [21]
20Fred Piper [4] [5] [9] [11] [26]
21Kathleen A. S. Quinn [12]
22Reihaneh Safavi-Naini [21] [24] [27] [28]
23Jennifer Seberry (Jennifer Seberry Wallis) [3]
24Dongvu Tonien [27]
25Michael Walker [7] [11]
26Huaxiong Wang [21] [24]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)