1. 1993
  2. Published

    End-to-end protocol performance in ATM/satellite interconnected LANs

    Komisarczuk, P., Hadjitheodosiou, MH., Coakley, F., Jeans, T. & Smythe, C., 1993, Broadband Services, Systems and Networks, 1993., Second International Conference on. p. 87-91 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Hardware Implementation of Montgomery's Modular Multiplication Algorithm

    Eldridge, S. E. & Walter, C. D., 1993, In: IEEE Transactions on Computers. 42, 6, p. 693-699 7 p.

    Research output: Contribution to journalArticlepeer-review

  4. Published

    Hypersensitivity to perturbations in the quantum baker's map

    Schack, R. & Caves, C. M., 1993, In: Physical Review Letters. 71, p. 525-528 4 p.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    Information and available work in the perturbed baker's map

    Schack, R. & Caves, C. M., 1993, Workshop on Physics and Computation: PhysComp '92. Los Alamitos, California: IEEE Computer Society Press, p. 69-74

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Management of secure systems and security within OSI

    Mitchell, C. J., 1993, Information Security. Ettinger, J. E. (ed.). Chapman & Hall, p. 47-60 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  7. Published

    New Secret Sharing Schemes from Old

    Martin, K. M., 1993, In: Journal of Combinatorial Mathematics and Combinatorial Computing. 14, p. 65-77 13 p.

    Research output: Contribution to journalArticlepeer-review

  8. Unpublished

    On sequences and arrays with specific window properties

    Paterson, K. G., 1993, (Unpublished)

    Research output: ThesisDoctoral Thesis

  9. Published

    Orientable Sequences

    Martin, K. M., Dai, Z. D., Robshaw, M. J. B. & Wild, P. R., 1993, Proceedings of the 3rd IMA Conference on Cryptography and Coding. p. 97-115 19 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  10. Published

    Standardising authentication protocols based on public key techniques

    Mitchell, C. J. & Thomas, A., 1993, In: Journal of Computer Security. 2, p. 23-36 14 p.

    Research output: Contribution to journalArticlepeer-review

  11. Published

    Systolic Modular Multiplication

    Walter, C. D., 1993, In: IEEE Transactions on Computers. 42, 3, p. 376-378 3 p.

    Research output: Contribution to journalArticlepeer-review