default search action
Fred Piper
Person information
- affiliation: Royal Holloway, University of London, Department of Information Security, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j20]Yvo Desmedt, Fred Piper:
Perfect Anonymity. IEEE Trans. Inf. Theory 65(6): 3990-3997 (2019) - 2018
- [c7]Steven Furnell, Michael K, Fred Piper, Chris E, Catherine H, Chris Ensor:
A National Certification Programme for Academic Degrees in Cyber Security. World Conference on Information Security Education 2018: 133-145 - 2012
- [e1]Muttukrishnan Rajarajan, Fred Piper, Haining Wang, George Kesidis:
Security and Privacy in Communication Networks - 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 96, Springer 2012, ISBN 978-3-642-31908-2 [contents] - 2010
- [j19]Dimitrios Patsos, Chez Ciechanowicz, Fred Piper:
The status of National PKIs - A European overview. Inf. Secur. Tech. Rep. 15(1): 13-20 (2010)
2000 – 2009
- 2009
- [c6]Fred Piper:
The Changing Face of Cryptography. IWDW 2009: 2 - 2007
- [j18]Chris J. Mitchell, Fred Piper, Peter R. Wild:
ID-based cryptography using symmetric primitives. Des. Codes Cryptogr. 44(1-3): 249-262 (2007) - [p1]Constantinos Markantonakis, Keith Mayes, Michael Tunstall, Damien Sauveron, Fred Piper:
Smart Card Security. Computational Intelligence in Information Assurance and Security 2007: 201-233 - 2005
- [j17]Fred Piper:
Cyberworld Security-the Good, the Bad and the Ugly*. Comput. J. 48(2): 145-156 (2005) - 2004
- [i1]Kenneth G. Paterson, Fred Piper, Rüdiger Schack:
Quantum cryptography: a practical information security perspective. IACR Cryptol. ePrint Arch. 2004: 156 (2004) - 2003
- [j16]Fred Piper:
Reseacrh in cryptography and security mechanisms. Comput. Secur. 22(1): 22-25 (2003) - [j15]Fred Piper, Geraint Price, Kenny Paterson:
Introduction. Inf. Secur. Tech. Rep. 8(3): 5 (2003) - [c5]Chez Ciechanowicz, Keith M. Martin, Fred Piper, Matthew J. B. Robshaw:
Ten Years of Information Security Masters Programmes. World Conference on Information Security Education 2003: 215-230
1990 – 1999
- 1997
- [j14]Mike Burmester, Yvo Desmedt, Fred Piper, Michael Walker:
A General Zero-Knowledge Scheme. Des. Codes Cryptogr. 12(1): 13-37 (1997) - [j13]Fred Piper:
Introduction to cryptology. Inf. Secur. Tech. Rep. 2(2): 10-13 (1997) - [c4]Fred Piper:
Trusted Third Parties for Secure Electronic Commerce - Are They Needed? ACISP 1997: 1 - 1996
- [j12]Chris J. Mitchell, Fred Piper, Michael Walker, Peter R. Wild:
Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes. Des. Codes Cryptogr. 7(1-2): 101-110 (1996) - 1994
- [j11]Jonathan Jedwab, Chris J. Mitchell, Fred Piper, Peter R. Wild:
Perfect binary arrays and difference sets. Discret. Math. 125(1-3): 241-254 (1994) - 1992
- [j10]Fred Piper, Peter R. Wild:
Incidence structures applied to cryptography. Discret. Math. 106-107: 383-389 (1992) - 1991
- [j9]Fred Piper:
Comment. Comput. Commun. 14(3): 131-132 (1991) - [j8]Wen-Ai Jackson, Fred Piper, Peter R. Wild:
Non-embedding of non prime- power unitals with point-regular group. Discret. Math. 98(1): 23-28 (1991) - 1990
- [j7]Fred Piper:
Computer and communications security: J A Cooper. Comput. Commun. 13(1): 54 (1990) - [j6]A. J. Bromfield, Fred C. Piper:
Linear recursion properties of uncorrelated binary sequences. Discret. Appl. Math. 27(3): 187-193 (1990)
1980 – 1989
- 1989
- [j5]Fred Piper, Michael Walker:
Linear Ciphers and Spreads. J. Cryptol. 1(3): 185-188 (1989) - [c3]Mike Burmester, Yvo Desmedt, Fred Piper, Michael Walker:
A General Zero-Knowledge Scheme (Extended Abstract). EUROCRYPT 1989: 122-133 - 1988
- [j4]Chris J. Mitchell, Fred Piper:
Key storage in secure networks. Discret. Appl. Math. 21(3): 215-228 (1988) - 1987
- [j3]Chris J. Mitchell, Fred Piper:
The cost of reducing key-storage requirements in secure networks. Comput. Secur. 6(4): 339-341 (1987) - 1986
- [j2]Fred Piper:
Primality and cryptography. Comput. Commun. 9(6): 318 (1986) - 1984
- [c2]Thomas Beth, Fred Piper:
The Stop-and-Go Generator. EUROCRYPT 1984: 88-92 - 1982
- [c1]Fred Piper:
Stream Ciphers. EUROCRYPT 1982: 181-188
1970 – 1979
- 1977
- [j1]Henry Beker, Fred Piper:
Some Designs Which Admit Strong Tactical Decompositions. J. Comb. Theory A 22(1): 38-42 (1977)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-05 01:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint