The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Peter R. Wild: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin, Peter R. Wild
    Size of Broadcast in Threshold Schemes with Disenrollment. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:71-88 [Conf]
  2. Liqun Chen, Dieter Gollmann, Chris J. Mitchell, Peter R. Wild
    Secret Sharing with Reusable Polynomials. [Citation Graph (0, 0)][DBLP]
    ACISP, 1997, pp:183-193 [Conf]
  3. Martin Anthony, Keith M. Martin, Jennifer Seberry, Peter R. Wild
    Some Remarks on Authentication Systems. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:122-139 [Conf]
  4. Dongvu Tonien, Reihaneh Safavi-Naini, Peter R. Wild
    Combinatorial characterizations of authentication codes in verification oracle model. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:183-193 [Conf]
  5. Jason Crampton, Keith Martin, Peter Wild
    On Key Assignment for Hierarchical Access Control. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:98-111 [Conf]
  6. Simon R. Blackburn, Mike Burmester, Yvo Desmedt, Peter R. Wild
    Efficient Multiplicative Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1996, pp:107-118 [Conf]
  7. Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild
    Threshold MACs. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:237-252 [Conf]
  8. Wen-Ai Jackson, Kathleen A. S. Quinn, Peter R. Wild
    Quadrics and difference sets. [Citation Graph (0, 0)][DBLP]
    Ars Comb., 1996, v:42, n:, pp:- [Journal]
  9. Chester W. J. Liu, Peter R. Wild
    Embeddings of Steiner Quadruple Systems. [Citation Graph (0, 0)][DBLP]
    Ars Comb., 2002, v:65, n:, pp:- [Journal]
  10. Chester W. J. Liu, Peter R. Wild
    Embeddings of Steiner Quadruple Systems using Extensions of Linear Spaces. [Citation Graph (0, 0)][DBLP]
    Ars Comb., 2004, v:73, n:, pp:- [Journal]
  11. Siaw-Lynn Ng, Peter R. Wild
    On k-arcs Covering a Line in Finite Projective Planes. [Citation Graph (0, 0)][DBLP]
    Ars Comb., 2001, v:58, n:, pp:- [Journal]
  12. L. R. A. Casse, Keith M. Martin, Peter R. Wild
    Bounds and Characterizations of Authentication/Secrecy Schemes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1998, v:13, n:2, pp:107-129 [Journal]
  13. Wen-Ai Jackson, Peter R. Wild
    Relations between Two Perfect Ternary Sequence Constructions. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1992, v:2, n:4, pp:325-332 [Journal]
  14. Wen-Ai Jackson, Peter R. Wild
    On GMW Designs and Cyclic Hadamard Designs. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1997, v:10, n:2, pp:185-191 [Journal]
  15. Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild
    Distributing the Encryption and Decryption of a Block Cipher. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:36, n:3, pp:263-287 [Journal]
  16. Chris J. Mitchell, Fred Piper, Michael Walker, Peter R. Wild
    Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1996, v:7, n:1-2, pp:101-110 [Journal]
  17. Siaw-Lynn Ng, Peter R. Wild
    A New Family of Extended Generalized Quadrangles of Order (q + 1, q - 1). [Citation Graph (0, 0)][DBLP]
    Eur. J. Comb., 2000, v:21, n:3, pp:395-406 [Journal]
  18. Simon R. Blackburn, Peter R. Wild
    Optimal Linear Perfect Hash Families. [Citation Graph (0, 0)][DBLP]
    J. Comb. Theory, Ser. A, 1998, v:83, n:2, pp:233-250 [Journal]
  19. Sean Murphy, Kenneth G. Paterson, Peter R. Wild
    A Weak Cipher that Generates the Symmetric Group. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1994, v:7, n:1, pp:61-65 [Journal]
  20. Chris J. Mitchell, Michael Walker, Peter R. Wild
    The Combinatorics of Perfect Authentication Schemes. [Citation Graph (0, 0)][DBLP]
    SIAM J. Discrete Math., 1994, v:7, n:1, pp:102-107 [Journal]
  21. Chris J. Mitchell, Fred Piper, Peter R. Wild
    ID-based cryptography using symmetric primitives. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2007, v:44, n:1-3, pp:249-262 [Journal]
  22. Peter R. Wild
    Incidence graphs and subdesigns of semisymmetric designs. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 1983, v:44, n:2, pp:201-216 [Journal]
  23. Peter R. Wild
    Difference basis systems. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 1987, v:63, n:1, pp:81-90 [Journal]
  24. Wen-Ai Jackson, Fred Piper, Peter R. Wild
    Non-embedding of non prime- power unitals with point-regular group. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 1991, v:98, n:1, pp:23-28 [Journal]
  25. Fred Piper, Peter R. Wild
    Incidence structures applied to cryptography. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 1992, v:106, n:, pp:383-389 [Journal]
  26. Peter R. Wild
    Some families of semibiplanes. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 1995, v:138, n:1-3, pp:397-403 [Journal]
  27. Jonathan Jedwab, Chris J. Mitchell, Fred Piper, Peter R. Wild
    Perfect binary arrays and difference sets. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 1994, v:125, n:1-3, pp:241-254 [Journal]

  28. Establishing the broadcast efficiency of the Subset Difference Revocation Scheme. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.304secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002