1. 1999
  2. Published

    Bounds and techniques for efficient redistribution of secret shares to new access structures

    Martin, K. M., Safavi-Naini, R. & Wang, H., 1999, In: The Computer Journal. 42, 8, p. 638-649 12 p.

    Research output: Contribution to journalArticlepeer-review

  3. Published

    Changing thresholds in the absence of secure channels

    Martin, K. M., Pieprzyk, J., Safavi-Naini, R. & Wang, H., 1999, In: Australian Computer Journal. 31, 2, p. 34-43 10 p.

    Research output: Contribution to journalArticlepeer-review

  4. Published

    Changing thresholds in the absence of secure channels

    Martin, K. M., Pieprzyk, J., Safavi-Naini, R. & Wang, H., 1999, Information Security and Privacy, 4th Australasian Conference, ACISP99. Springer, Vol. 1587. p. 177-191 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  5. Published

    Classical model for bulk-ensemble NMR quantum computation

    Schack, R. & Caves, C. M., 1999, In: Physical Review A. 60, p. 4354-4362 9 p.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    Codes, Correlations and Power Control in OFDM

    Davis, J. A., Jedwab, J. & Paterson, K. G., 1999, Difference Sets, Sequences and their Correlation Properties. Pott, A. (ed.). Dordrecht: Kluwer Academic Publishers, p. 113-132 20 p. (NATO Science Series C).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  7. Published

    Combinatorics and Threshold Cryptography

    Blackburn, S. R., 1999, Combinatorial Designs and their Applications. Holroyd, F. C., Quinn, K. A. S., Rowley, C. & Web, B. S. (eds.). London: CRC Press, p. 49-70 22 p. (Chapman and Hall/CRC Research Notes in Mathematics).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  8. Published

    Comment - Signature with message recovery

    Mitchell, C. J. & Yeun, C. Y., 1999, In: Electronics Letters. 35, p. 217 1 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    Comments on "On the Security of Three-Party Cryptographic Protocols" by Xu, Zhang and Zhu.

    Ng, S-L., 1999, In: Operating Systems Review. 33, 3, p. 5-6

    Research output: Contribution to journalComment/debate

  10. Published

    Comments on an optimized protocol for mobile network authentication and security

    Martin, K. M. & Mitchell, C. J., 1999, In: Mobile Computing and Communications Review. 3, 2, p. 37

    Research output: Contribution to journalArticlepeer-review

  11. Published

    Cryptanalysis of a public key cryptosystem due to Wu and Dawson

    Blackburn, S. R., 1999, In: IEE Proc. Computers and Digital Techniques. 146, 4, p. 185-186 2 p.

    Research output: Contribution to journalArticlepeer-review

  12. Published

    Cryptanalysis of two cryptosystems based on group actions

    Blackburn, S. R. & Galbraith, S. D., 1999, Advances in Cryptology -- ASIACRYPT '99. Lam, K. Y., Xing, C. & Okamoto, E. (eds.). Berlin: Springer, p. 52-61 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  13. Published

    Efficient Automata-Driven Pattern-Matching for Equational Programs

    Nedjah, N., Walter, C. D. & Eldridge, S. E., 1999, In: Softw., Pract. Exper.. 29, 9, p. 793-813 21 p.

    Research output: Contribution to journalArticlepeer-review

  14. Published

    Evaluating and improving access control

    Crampton, J., Loizou, G. & O'Shea, G., 1999.

    Research output: Working paper

  15. Published

    Groups of prime power order with derived subgroup of prime order

    Blackburn, S. R., 1999, In: Journal of Algebra. 219, p. 625-657 33 p.

    Research output: Contribution to journalArticlepeer-review

  16. Published

    Implementing a Secure Log File Download Manager for the Java Card

    Markantonakis, K. & Xenitellis, S., 1999, Proceedings of the IFIP TC6/TC11 Joint Working Conference on Secure Information Networks: Communications and Multimedia Security. Kluwer, B.V., p. 143-162 20 p. (CMS '99).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  17. Published

    Imprimitive permutation groups and trapdoors in iterated block ciphers

    Paterson, K. G., 1999, Proceedings, Fast Software Encryption Workshop. Knudsen, L. R. (ed.). Springer, p. 201-214 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  18. Published

    Interfacing with Smart Card Applications (The PC/SC and OpenCard Framework)

    Markantonakis, K., 1999, Interfacing with Smart Card Applications (The PC/ SC and OpenCard Framework). 2 ed. Elsevier, Vol. 4. p. 69 77 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  19. Published

    IP access service provision for broadband customers

    Komisarczuk, P., 1999, Services Over the Internet-What Does Quality Cost?(Ref. No. 1999/099), IEE Colloquium on. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Key recovery in ASPeCT authentication and initialisation of payment protocol

    Rantos, K. & Mitchell, C. J., 1999, Proceedings of the 4th ACTS Mobile Communications Summit, Sorrento, Italy, June 1999. 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Moduli for Testing Implementations of the RSA Cryptosystem

    Walter, C. D., 1999, 14th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 78-85 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Montgomery's Multiplication Technique: How to Make It Smaller and Faster

    Walter, C. D., 1999, CHES '99. Koç, Ç. K. & Paar, C. (eds.). Springer, Vol. 1717. p. 80-93 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Realizing the quantum baker's map on a NMR quantum computer

    Brun, T. A. & Schack, R., 1999, In: Physical Review A. 59, p. 2649-2658 10 p.

    Research output: Contribution to journalArticlepeer-review

  24. Published

    Remarks on KRA's key recovery block format

    Rantos, K. & Mitchell, C. J., 1999, In: Electronics Letters. 35, p. 632-634 3 p.

    Research output: Contribution to journalArticlepeer-review

  25. Published

    Security in future mobile multimedia networks

    Mitchell, C. J. & Chen, LI., 1999, Insights into Mobile Multimedia Communications. Bull, D. R., Canagarajah, C. N. & Nix, A. R. (eds.). Academic Press, p. 177-190 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  26. Published

    Separability of very noisy mixed states and implications for NMR quantum computing

    Braunstein, S. L., Caves, C. M., Jozsa, R., Linden, N., Popescu, S. & Schack, R., 1999, In: Physical Review Letters. 83, p. 1054-1057 4 p.

    Research output: Contribution to journalArticlepeer-review