|
Search the dblp DataBase
Fred Piper:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Fred Piper
Trusted Third Parties for Secure Electronic Commerce - Are They Needed? [Citation Graph (0, 0)][DBLP] ACISP, 1997, pp:1- [Conf]
- Thomas Beth, Fred Piper
The Stop-and-Go Generator. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1984, pp:88-92 [Conf]
- Mike Burmester, Yvo Desmedt, Fred Piper, Michael Walker
A General Zero-Knowledge Scheme (Extended Abstract). [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1989, pp:122-133 [Conf]
- Fred Piper
Stream Ciphers. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1982, pp:181-188 [Conf]
- Chez Ciechanowicz, Keith M. Martin, Fred Piper, Matthew J. B. Robshaw
Ten Years of Information Security Masters Programmes. [Citation Graph (0, 0)][DBLP] World Conference on Information Security Education, 2003, pp:215-230 [Conf]
- Fred Piper
Cyberworld Security-the Good, the Bad and the Ugly*. [Citation Graph (0, 0)][DBLP] Comput. J., 2005, v:48, n:2, pp:145-156 [Journal]
- Fred Piper
Primality and cryptography. [Citation Graph (0, 0)][DBLP] Computer Communications, 1986, v:9, n:6, pp:318- [Journal]
- Fred Piper
Computer and communications security: J A Cooper. [Citation Graph (0, 0)][DBLP] Computer Communications, 1990, v:13, n:1, pp:54- [Journal]
- Fred Piper
Comment. [Citation Graph (0, 0)][DBLP] Computer Communications, 1991, v:14, n:3, pp:131-132 [Journal]
- Fred Piper
Reseacrh in cryptography and security mechanisms. [Citation Graph (0, 0)][DBLP] Computers & Security, 2003, v:22, n:1, pp:22-25 [Journal]
- Mike Burmester, Yvo Desmedt, Fred Piper, Michael Walker
A General Zero-Knowledge Scheme. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1997, v:12, n:1, pp:13-37 [Journal]
- Chris J. Mitchell, Fred Piper, Michael Walker, Peter R. Wild
Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1996, v:7, n:1-2, pp:101-110 [Journal]
- Henry Beker, Fred Piper
Some Designs Which Admit Strong Tactical Decompositions. [Citation Graph (0, 0)][DBLP] J. Comb. Theory, Ser. A, 1977, v:22, n:1, pp:38-42 [Journal]
- Fred Piper, Michael Walker
Linear Ciphers and Spreads. [Citation Graph (0, 0)][DBLP] J. Cryptology, 1989, v:1, n:3, pp:185-188 [Journal]
- Chris J. Mitchell, Fred Piper, Peter R. Wild
ID-based cryptography using symmetric primitives. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2007, v:44, n:1-3, pp:249-262 [Journal]
- Wen-Ai Jackson, Fred Piper, Peter R. Wild
Non-embedding of non prime- power unitals with point-regular group. [Citation Graph (0, 0)][DBLP] Discrete Mathematics, 1991, v:98, n:1, pp:23-28 [Journal]
- Fred Piper, Peter R. Wild
Incidence structures applied to cryptography. [Citation Graph (0, 0)][DBLP] Discrete Mathematics, 1992, v:106, n:, pp:383-389 [Journal]
- Jonathan Jedwab, Chris J. Mitchell, Fred Piper, Peter R. Wild
Perfect binary arrays and difference sets. [Citation Graph (0, 0)][DBLP] Discrete Mathematics, 1994, v:125, n:1-3, pp:241-254 [Journal]
The Changing Face of Cryptography. [Citation Graph (, )][DBLP]
Key storage in secure networks. [Citation Graph (, )][DBLP]
Search in 0.091secs, Finished in 0.092secs
|