|
Search the dblp DataBase
Peter R. Wild:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin, Peter R. Wild
Size of Broadcast in Threshold Schemes with Disenrollment. [Citation Graph (0, 0)][DBLP] ACISP, 2002, pp:71-88 [Conf]
- Liqun Chen, Dieter Gollmann, Chris J. Mitchell, Peter R. Wild
Secret Sharing with Reusable Polynomials. [Citation Graph (0, 0)][DBLP] ACISP, 1997, pp:183-193 [Conf]
- Martin Anthony, Keith M. Martin, Jennifer Seberry, Peter R. Wild
Some Remarks on Authentication Systems. [Citation Graph (0, 0)][DBLP] AUSCRYPT, 1990, pp:122-139 [Conf]
- Dongvu Tonien, Reihaneh Safavi-Naini, Peter R. Wild
Combinatorial characterizations of authentication codes in verification oracle model. [Citation Graph (0, 0)][DBLP] ASIACCS, 2007, pp:183-193 [Conf]
- Jason Crampton, Keith Martin, Peter Wild
On Key Assignment for Hierarchical Access Control. [Citation Graph (0, 0)][DBLP] CSFW, 2006, pp:98-111 [Conf]
- Simon R. Blackburn, Mike Burmester, Yvo Desmedt, Peter R. Wild
Efficient Multiplicative Sharing Schemes. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1996, pp:107-118 [Conf]
- Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild
Threshold MACs. [Citation Graph (0, 0)][DBLP] ICISC, 2002, pp:237-252 [Conf]
- Wen-Ai Jackson, Kathleen A. S. Quinn, Peter R. Wild
Quadrics and difference sets. [Citation Graph (0, 0)][DBLP] Ars Comb., 1996, v:42, n:, pp:- [Journal]
- Chester W. J. Liu, Peter R. Wild
Embeddings of Steiner Quadruple Systems. [Citation Graph (0, 0)][DBLP] Ars Comb., 2002, v:65, n:, pp:- [Journal]
- Chester W. J. Liu, Peter R. Wild
Embeddings of Steiner Quadruple Systems using Extensions of Linear Spaces. [Citation Graph (0, 0)][DBLP] Ars Comb., 2004, v:73, n:, pp:- [Journal]
- Siaw-Lynn Ng, Peter R. Wild
On k-arcs Covering a Line in Finite Projective Planes. [Citation Graph (0, 0)][DBLP] Ars Comb., 2001, v:58, n:, pp:- [Journal]
- L. R. A. Casse, Keith M. Martin, Peter R. Wild
Bounds and Characterizations of Authentication/Secrecy Schemes. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1998, v:13, n:2, pp:107-129 [Journal]
- Wen-Ai Jackson, Peter R. Wild
Relations between Two Perfect Ternary Sequence Constructions. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1992, v:2, n:4, pp:325-332 [Journal]
- Wen-Ai Jackson, Peter R. Wild
On GMW Designs and Cyclic Hadamard Designs. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1997, v:10, n:2, pp:185-191 [Journal]
- Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild
Distributing the Encryption and Decryption of a Block Cipher. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2005, v:36, n:3, pp:263-287 [Journal]
- Chris J. Mitchell, Fred Piper, Michael Walker, Peter R. Wild
Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1996, v:7, n:1-2, pp:101-110 [Journal]
- Siaw-Lynn Ng, Peter R. Wild
A New Family of Extended Generalized Quadrangles of Order (q + 1, q - 1). [Citation Graph (0, 0)][DBLP] Eur. J. Comb., 2000, v:21, n:3, pp:395-406 [Journal]
- Simon R. Blackburn, Peter R. Wild
Optimal Linear Perfect Hash Families. [Citation Graph (0, 0)][DBLP] J. Comb. Theory, Ser. A, 1998, v:83, n:2, pp:233-250 [Journal]
- Sean Murphy, Kenneth G. Paterson, Peter R. Wild
A Weak Cipher that Generates the Symmetric Group. [Citation Graph (0, 0)][DBLP] J. Cryptology, 1994, v:7, n:1, pp:61-65 [Journal]
- Chris J. Mitchell, Michael Walker, Peter R. Wild
The Combinatorics of Perfect Authentication Schemes. [Citation Graph (0, 0)][DBLP] SIAM J. Discrete Math., 1994, v:7, n:1, pp:102-107 [Journal]
- Chris J. Mitchell, Fred Piper, Peter R. Wild
ID-based cryptography using symmetric primitives. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2007, v:44, n:1-3, pp:249-262 [Journal]
- Peter R. Wild
Incidence graphs and subdesigns of semisymmetric designs. [Citation Graph (0, 0)][DBLP] Discrete Mathematics, 1983, v:44, n:2, pp:201-216 [Journal]
- Peter R. Wild
Difference basis systems. [Citation Graph (0, 0)][DBLP] Discrete Mathematics, 1987, v:63, n:1, pp:81-90 [Journal]
- Wen-Ai Jackson, Fred Piper, Peter R. Wild
Non-embedding of non prime- power unitals with point-regular group. [Citation Graph (0, 0)][DBLP] Discrete Mathematics, 1991, v:98, n:1, pp:23-28 [Journal]
- Fred Piper, Peter R. Wild
Incidence structures applied to cryptography. [Citation Graph (0, 0)][DBLP] Discrete Mathematics, 1992, v:106, n:, pp:383-389 [Journal]
- Peter R. Wild
Some families of semibiplanes. [Citation Graph (0, 0)][DBLP] Discrete Mathematics, 1995, v:138, n:1-3, pp:397-403 [Journal]
- Jonathan Jedwab, Chris J. Mitchell, Fred Piper, Peter R. Wild
Perfect binary arrays and difference sets. [Citation Graph (0, 0)][DBLP] Discrete Mathematics, 1994, v:125, n:1-3, pp:241-254 [Journal]
Establishing the broadcast efficiency of the Subset Difference Revocation Scheme. [Citation Graph (, )][DBLP]
Search in 0.047secs, Finished in 0.049secs
|