1. 1999
  2. Published

    Information security technical report - prospectus: Interfacing with smartcard applications. (The OpenCard Framework and PC/SC)

    Markantonakis, K., 1 Jan 1999, In: Information Security Technical Report. 4, p. 7-8 2 p.

    Research output: Contribution to journalArticlepeer-review

  3. Published

    A fair certification protocol

    Mitchell, C. J. & Rantos, K., 1999, In: Computer Communication Review. 29, 3, p. 47-49 3 p.

    Research output: Contribution to journalArticlepeer-review

  4. Published

    Applications of Exponential Sums in Communications Theory

    Paterson, K. G., 1999, Cryptography and Coding. Walker, M. (ed.). Springer, p. 1-24 24 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  5. Published

    Attacks on MacDES MAC Algorithm

    Coppersmith, D. & Mitchell, C. J., 1999, In: Electronics Letters. 35, p. 1626-1627 2 p.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    Boundary Conditions that Influence Decisions about Log File Formats in Multi-Application Smart Cards

    Markantonakis, K., 1999, Proceedings of the Second International Conference on Information and Communication Security. Springer-Verlag, p. 230-243 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  7. Published

    Bounds and techniques for efficient redistribution of secret shares to new access structures

    Martin, K. M., Safavi-Naini, R. & Wang, H., 1999, In: The Computer Journal. 42, 8, p. 638-649 12 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    Changing thresholds in the absence of secure channels

    Martin, K. M., Pieprzyk, J., Safavi-Naini, R. & Wang, H., 1999, In: Australian Computer Journal. 31, 2, p. 34-43 10 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    Changing thresholds in the absence of secure channels

    Martin, K. M., Pieprzyk, J., Safavi-Naini, R. & Wang, H., 1999, Information Security and Privacy, 4th Australasian Conference, ACISP99. Springer, Vol. 1587. p. 177-191 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  10. Published

    Classical model for bulk-ensemble NMR quantum computation

    Schack, R. & Caves, C. M., 1999, In: Physical Review A. 60, p. 4354-4362 9 p.

    Research output: Contribution to journalArticlepeer-review

  11. Published

    Codes, Correlations and Power Control in OFDM

    Davis, J. A., Jedwab, J. & Paterson, K. G., 1999, Difference Sets, Sequences and their Correlation Properties. Pott, A. (ed.). Dordrecht: Kluwer Academic Publishers, p. 113-132 20 p. (NATO Science Series C).

    Research output: Chapter in Book/Report/Conference proceedingChapter