The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Michael Walker: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Nigel Jefferies, Chris J. Mitchell, Michael Walker
    A Proposed Architecture for Trusted Third Party Services. [Citation Graph (0, 0)][DBLP]
    Cryptography: Policy and Algorithms, 1995, pp:98-104 [Conf]
  2. Henry Beker, Michael Walker
    Key Management for Secure Electronic Funds Transfer in a Retail Environment. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:401-410 [Conf]
  3. Mike Burmester, Yvo Desmedt, Fred Piper, Michael Walker
    A General Zero-Knowledge Scheme (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:122-133 [Conf]
  4. Louis C. Guillou, Jean-Jacques Quisquater, Michael Walker, Peter Landrock, Caroline Shafer
    Precautions Taken Against Various Potential Attacks in ISO/IEC DIS 9796 "Digital Signature Scheme Giving Message Recovery". [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1990, pp:465-473 [Conf]
  5. Marijke De Soete, Klaus Vedder, Michael Walker
    Cartesian Authentication Schemes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:476-490 [Conf]
  6. Michael Walker
    On the Security of 3GPP Networks. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2000, pp:102-103 [Conf]
  7. E. V. Stansfield, Michael Walker
    Coding and Cryptography for Speech and Vision. [Citation Graph (0, 0)][DBLP]
    IMA Conf., 1995, pp:213-236 [Conf]
  8. Brian S. White, Michael Walker, Marty Humphrey, Andrew S. Grimshaw
    LegionFS: a secure and scalable file system supporting cross-domain high-performance applications. [Citation Graph (0, 0)][DBLP]
    SC, 2001, pp:59- [Conf]
  9. Chris J. Mitchell, D. Rush, Michael Walker
    A Secure Messaging Architecture Implementing the X.400-1988 Security Features. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1990, v:33, n:4, pp:290-295 [Journal]
  10. Mike Burmester, Yvo Desmedt, Fred Piper, Michael Walker
    A General Zero-Knowledge Scheme. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1997, v:12, n:1, pp:13-37 [Journal]
  11. Siaw-Lynn Ng, Michael Walker
    On the Composition of Matroids and Ideal Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2001, v:24, n:1, pp:49-67 [Journal]
  12. Chris J. Mitchell, Fred Piper, Michael Walker, Peter R. Wild
    Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1996, v:7, n:1-2, pp:101-110 [Journal]
  13. Michael Walker
    Spreads Covered by Derivable Partial Spreads. [Citation Graph (0, 0)][DBLP]
    J. Comb. Theory, Ser. A, 1985, v:38, n:2, pp:113-130 [Journal]
  14. Michael Walker
    Information-Theoretic Bounds for Authentication Schemes. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1990, v:2, n:3, pp:131-143 [Journal]
  15. Fred Piper, Michael Walker
    Linear Ciphers and Spreads. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1989, v:1, n:3, pp:185-188 [Journal]
  16. Wuxue Zhang, Yong Zhang, Hui Zheng, Chen Zhang, Wei Xiong, John G. Olyarchuk, Michael Walker, Weifeng Xu, Min Zhao, Shuqi Zhao, Zhuan Zhou, Liping Wei
    SynDB: a Synapse protein DataBase based on synapse ontology. [Citation Graph (0, 0)][DBLP]
    Nucleic Acids Research, 2007, v:35, n:Database-Issue, pp:737-741 [Journal]
  17. Chris J. Mitchell, Michael Walker, Peter R. Wild
    The Combinatorics of Perfect Authentication Schemes. [Citation Graph (0, 0)][DBLP]
    SIAM J. Discrete Math., 1994, v:7, n:1, pp:102-107 [Journal]

  18. A remark on hash functions for message authentication. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002