1. 1997
  2. Published

    Key escrow in multiple domains

    Chen, LI. & Mitchell, C. J., 1997, Proceedings of INFOSEC'COM '97, Paris, June 1997. p. 101-116 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Key escrow in mutually mistrusting domains

    Chen, LI., Gollmann, D. & Mitchell, C. J., 1997, Security Protocols - Proceedings, International Workshop, Cambridge, April 1996. Lomas, M. (ed.). Springer-Verlag, p. 139-153 15 p. (Lecture Notes in Computer Science; no. 1189).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Multisender authentication systems with unconditional security

    Martin, K. M. & Safavi-Naini, R., 1997, Information and Communications Security. Springer, Vol. 1334. p. 130-143 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  5. Published

    Mutually Trusted Authority free Secret Sharing Schemes

    Martin, K. M., Jackson, W-A. & O'Keefe, C. M., 1997, In: Journal of Cryptology. 10, p. 261-289 29 p.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    Network provider domain federation in TINA

    Pavón, J., Montes, E. & Komisarczuk, P., 1997, Global Convergence of Telecommunications and Distributed Object Computing, 1997. Proceedings., TINA 97. p. 334-342 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Optimal Left-to-Right Pattern-Matching Automata

    Nedjah, N., Walter, C. D. & Eldridge, S. E., 1997, ALP '97 - HOA '97. Hanus, M., Heering, J. & Meinke, K. (eds.). Springer, Vol. 1298. p. 273-286 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Secret Sharing in Hierarchical Groups

    Charnes, C., Martin, K. M., Pieprzyk, J. & Safavi-Naini, R., 1997, Information and Communications Security. Springer, Vol. 1334. p. 81-86 6 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  9. Published

    Secret sharing with reusable polynomials

    Chen, LI., Gollmann, D., Mitchell, C. J. & Wild, P., 1997, Information Security and Privacy - Proceedings 2nd Australasian Conference, ACISP '97, Sydney, Australia, July 1997. Varadharajan, V., Pieprzyk, J. & Mu, Y. (eds.). Springer-Verlag, p. 183-193 11 p. (Lecture Notes in Computer Science; no. 1270).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Space/Time Trade-Offs for Higher Radix Modular Multiplication using Repeated Addition

    Walter, C. D., 1997, In: IEEE Transactions on Computers. 46, 2, p. 139-141 3 p.

    Research output: Contribution to journalArticlepeer-review

  11. Published

    The Sajdak Conjecture

    Blackburn, S. R., 1997, In: Math. Spectrum. 30, No. 1, p. 15-16 2 p.

    Research output: Contribution to journalArticlepeer-review