|
Search the dblp DataBase
Michael Walker:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Nigel Jefferies, Chris J. Mitchell, Michael Walker
A Proposed Architecture for Trusted Third Party Services. [Citation Graph (0, 0)][DBLP] Cryptography: Policy and Algorithms, 1995, pp:98-104 [Conf]
- Henry Beker, Michael Walker
Key Management for Secure Electronic Funds Transfer in a Retail Environment. [Citation Graph (0, 0)][DBLP] CRYPTO, 1984, pp:401-410 [Conf]
- Mike Burmester, Yvo Desmedt, Fred Piper, Michael Walker
A General Zero-Knowledge Scheme (Extended Abstract). [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1989, pp:122-133 [Conf]
- Louis C. Guillou, Jean-Jacques Quisquater, Michael Walker, Peter Landrock, Caroline Shafer
Precautions Taken Against Various Potential Attacks in ISO/IEC DIS 9796 "Digital Signature Scheme Giving Message Recovery". [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1990, pp:465-473 [Conf]
- Marijke De Soete, Klaus Vedder, Michael Walker
Cartesian Authentication Schemes. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1989, pp:476-490 [Conf]
- Michael Walker
On the Security of 3GPP Networks. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2000, pp:102-103 [Conf]
- E. V. Stansfield, Michael Walker
Coding and Cryptography for Speech and Vision. [Citation Graph (0, 0)][DBLP] IMA Conf., 1995, pp:213-236 [Conf]
- Brian S. White, Michael Walker, Marty Humphrey, Andrew S. Grimshaw
LegionFS: a secure and scalable file system supporting cross-domain high-performance applications. [Citation Graph (0, 0)][DBLP] SC, 2001, pp:59- [Conf]
- Chris J. Mitchell, D. Rush, Michael Walker
A Secure Messaging Architecture Implementing the X.400-1988 Security Features. [Citation Graph (0, 0)][DBLP] Comput. J., 1990, v:33, n:4, pp:290-295 [Journal]
- Mike Burmester, Yvo Desmedt, Fred Piper, Michael Walker
A General Zero-Knowledge Scheme. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1997, v:12, n:1, pp:13-37 [Journal]
- Siaw-Lynn Ng, Michael Walker
On the Composition of Matroids and Ideal Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2001, v:24, n:1, pp:49-67 [Journal]
- Chris J. Mitchell, Fred Piper, Michael Walker, Peter R. Wild
Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1996, v:7, n:1-2, pp:101-110 [Journal]
- Michael Walker
Spreads Covered by Derivable Partial Spreads. [Citation Graph (0, 0)][DBLP] J. Comb. Theory, Ser. A, 1985, v:38, n:2, pp:113-130 [Journal]
- Michael Walker
Information-Theoretic Bounds for Authentication Schemes. [Citation Graph (0, 0)][DBLP] J. Cryptology, 1990, v:2, n:3, pp:131-143 [Journal]
- Fred Piper, Michael Walker
Linear Ciphers and Spreads. [Citation Graph (0, 0)][DBLP] J. Cryptology, 1989, v:1, n:3, pp:185-188 [Journal]
- Wuxue Zhang, Yong Zhang, Hui Zheng, Chen Zhang, Wei Xiong, John G. Olyarchuk, Michael Walker, Weifeng Xu, Min Zhao, Shuqi Zhao, Zhuan Zhou, Liping Wei
SynDB: a Synapse protein DataBase based on synapse ontology. [Citation Graph (0, 0)][DBLP] Nucleic Acids Research, 2007, v:35, n:Database-Issue, pp:737-741 [Journal]
- Chris J. Mitchell, Michael Walker, Peter R. Wild
The Combinatorics of Perfect Authentication Schemes. [Citation Graph (0, 0)][DBLP] SIAM J. Discrete Math., 1994, v:7, n:1, pp:102-107 [Journal]
A remark on hash functions for message authentication. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs
|