Michael Walker

Affiliations:
  • University of London, Vodafone Airtouch and Royal Holloway College, UK
  • Racal Research Ltd, Reading, UK


According to our database1, Michael Walker authored at least 18 papers between 1984 and 2001.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2001
On the Composition of Matroids and Ideal Secret Sharing Schemes.
Des. Codes Cryptogr., 2001

2000
On the Security of 3GPP Networks.
Proceedings of the Advances in Cryptology, 2000

1999
The direction of telecommunications security.
Inf. Secur. Tech. Rep., 1999

1997
A General Zero-Knowledge Scheme.
Des. Codes Cryptogr., 1997

1996
Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes.
Des. Codes Cryptogr., 1996

1995
Coding and Cryptography for Speech and Vision.
Proceedings of the Cryptography and Coding, 1995

A Proposed Architecture for Trusted Third Party Services.
Proceedings of the Cryptography: Policy and Algorithms, 1995

1994
The Combinatorics of Perfect Authentication Schemes.
SIAM J. Discret. Math., 1994

1990
Information-Theoretic Bounds for Authentication Schemes.
J. Cryptol., 1990

A Secure Messaging Architecture Implementing the X.400-1988 Security Features.
Comput. J., 1990

Precautions Taken Against Various Potential Attacks in ISO/IEC DIS 9796 "Digital Signature Scheme Giving Message Recovery".
Proceedings of the Advances in Cryptology, 1990

1989
CCITT/ISO standards for secure message handling.
IEEE J. Sel. Areas Commun., 1989

Linear Ciphers and Spreads.
J. Cryptol., 1989

A remark on hash functions for message authentication.
Comput. Secur., 1989

Cartesian Authentication Schemes.
Proceedings of the Advances in Cryptology, 1989

A General Zero-Knowledge Scheme (Extended Abstract).
Proceedings of the Advances in Cryptology, 1989

1988
Solutions to the multidestination secure electronic mail problem.
Comput. Secur., 1988

1984
Key Management for Secure Electronic Funds Transfer in a Retail Environment.
Proceedings of the Advances in Cryptology, 1984


  Loading...