Fred Piper

Affiliations:
  • Royal Holloway, University of London, Department of Information Security, UK


According to our database1, Fred Piper authored at least 29 papers between 1977 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
Perfect Anonymity.
IEEE Trans. Inf. Theory, 2019

2018
A National Certification Programme for Academic Degrees in Cyber Security.
Proceedings of the Information Security Education - Towards a Cybersecure Society, 2018

2010
The status of National PKIs - A European overview.
Inf. Secur. Tech. Rep., 2010

2009
The Changing Face of Cryptography.
Proceedings of the Digital Watermarking, 8th International Workshop, 2009

2007
Smart Card Security.
Proceedings of the Computational Intelligence in Information Assurance and Security, 2007

ID-based cryptography using symmetric primitives.
Des. Codes Cryptogr., 2007

2005
Cyberworld Security-the Good, the Bad and the Ugly*.
Comput. J., 2005

2004
Quantum cryptography: a practical information security perspective.
IACR Cryptol. ePrint Arch., 2004

2003
Introduction.
Inf. Secur. Tech. Rep., 2003

Reseacrh in cryptography and security mechanisms.
Comput. Secur., 2003

Ten Years of Information Security Masters Programmes.
Proceedings of the Security Education and Critical Infrastructures, 2003

1997
Introduction to cryptology.
Inf. Secur. Tech. Rep., 1997

A General Zero-Knowledge Scheme.
Des. Codes Cryptogr., 1997

Trusted Third Parties for Secure Electronic Commerce - Are They Needed?
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997

1996
Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes.
Des. Codes Cryptogr., 1996

1994
Perfect binary arrays and difference sets.
Discret. Math., 1994

1992
Incidence structures applied to cryptography.
Discret. Math., 1992

1991
Non-embedding of non prime- power unitals with point-regular group.
Discret. Math., 1991

Comment.
Comput. Commun., 1991

1990
Linear recursion properties of uncorrelated binary sequences.
Discret. Appl. Math., 1990

Computer and communications security: J A Cooper.
Comput. Commun., 1990

1989
Linear Ciphers and Spreads.
J. Cryptol., 1989

A General Zero-Knowledge Scheme (Extended Abstract).
Proceedings of the Advances in Cryptology, 1989

1988
Key storage in secure networks.
Discret. Appl. Math., 1988

1987
The cost of reducing key-storage requirements in secure networks.
Comput. Secur., 1987

1986
Primality and cryptography.
Comput. Commun., 1986

1984
The Stop-and-Go Generator.
Proceedings of the Advances in Cryptology: Proceedings of EUROCRYPT 84, 1984

1982
Stream Ciphers.
Proceedings of the Cryptography, Proceedings of the Workshop on Cryptography, Burg Feuerstein, Germany, March 29, 1982

1977
Some Designs Which Admit Strong Tactical Decompositions.
J. Comb. Theory A, 1977


  Loading...