The SCEAS System
Navigation Menu

Search the dblp DataBase


Fred Piper: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Fred Piper
    Trusted Third Parties for Secure Electronic Commerce - Are They Needed? [Citation Graph (0, 0)][DBLP]
    ACISP, 1997, pp:1- [Conf]
  2. Thomas Beth, Fred Piper
    The Stop-and-Go Generator. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:88-92 [Conf]
  3. Mike Burmester, Yvo Desmedt, Fred Piper, Michael Walker
    A General Zero-Knowledge Scheme (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:122-133 [Conf]
  4. Fred Piper
    Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1982, pp:181-188 [Conf]
  5. Chez Ciechanowicz, Keith M. Martin, Fred Piper, Matthew J. B. Robshaw
    Ten Years of Information Security Masters Programmes. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:215-230 [Conf]
  6. Fred Piper
    Cyberworld Security-the Good, the Bad and the Ugly*. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2005, v:48, n:2, pp:145-156 [Journal]
  7. Fred Piper
    Primality and cryptography. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1986, v:9, n:6, pp:318- [Journal]
  8. Fred Piper
    Computer and communications security: J A Cooper. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1990, v:13, n:1, pp:54- [Journal]
  9. Fred Piper
    Comment. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1991, v:14, n:3, pp:131-132 [Journal]
  10. Fred Piper
    Reseacrh in cryptography and security mechanisms. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:1, pp:22-25 [Journal]
  11. Mike Burmester, Yvo Desmedt, Fred Piper, Michael Walker
    A General Zero-Knowledge Scheme. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1997, v:12, n:1, pp:13-37 [Journal]
  12. Chris J. Mitchell, Fred Piper, Michael Walker, Peter R. Wild
    Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1996, v:7, n:1-2, pp:101-110 [Journal]
  13. Henry Beker, Fred Piper
    Some Designs Which Admit Strong Tactical Decompositions. [Citation Graph (0, 0)][DBLP]
    J. Comb. Theory, Ser. A, 1977, v:22, n:1, pp:38-42 [Journal]
  14. Fred Piper, Michael Walker
    Linear Ciphers and Spreads. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1989, v:1, n:3, pp:185-188 [Journal]
  15. Chris J. Mitchell, Fred Piper, Peter R. Wild
    ID-based cryptography using symmetric primitives. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2007, v:44, n:1-3, pp:249-262 [Journal]
  16. Wen-Ai Jackson, Fred Piper, Peter R. Wild
    Non-embedding of non prime- power unitals with point-regular group. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 1991, v:98, n:1, pp:23-28 [Journal]
  17. Fred Piper, Peter R. Wild
    Incidence structures applied to cryptography. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 1992, v:106, n:, pp:383-389 [Journal]
  18. Jonathan Jedwab, Chris J. Mitchell, Fred Piper, Peter R. Wild
    Perfect binary arrays and difference sets. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 1994, v:125, n:1-3, pp:241-254 [Journal]

  19. The Changing Face of Cryptography. [Citation Graph (, )][DBLP]

  20. Key storage in secure networks. [Citation Graph (, )][DBLP]

Search in 0.091secs, Finished in 0.092secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002