1. 1998
  2. Published

    Bounds on Partial Correlations of Sequences

    Paterson, K. G. & Lothian, P. J. G., 1998, In: IEEE Transactions on Information Theory. 44, p. 1164-1175 12 p.

    Research output: Contribution to journalArticlepeer-review

  3. Published

    Coding Techniques for Power Controlled OFDM

    Paterson, K. G., 1998, Proceedings of 9th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC '98). IEEE Computer Society Press, Vol. 2. p. 801-805 5 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  4. Published

    Combinatorial Models for Perfect Secret Sharing Schemes

    Martin, K. M. & Jackson, W-A., 1998, In: Journal of Combinatorial Mathematics and Combinatorial Computing. 28, p. 249-265 17 p.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    Comment: Signature scheme based on discrete logarithm without using one-way hash-function.

    Yeun, C. Y., Mitchell, C. J. & Ng, S-L., 1998, In: Electronics Letters. 34, 24, p. 2329-2330 2 p.

    Research output: Contribution to journalComment/debatepeer-review

  6. Published

    Cryptanalysis of a Keystream Generator due to Chan and Cheng

    Blackburn, S. R., 1998, In: Electronics Letters. 34, 18, p. 1737-1738 2 p.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    Exponentiation Using Division Chains

    Walter, C. D., 1998, In: IEEE Transactions on Computers. 47, 7, p. 757-765 9 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    Fixing a problem in the Helsinki protocol

    Mitchell, C. J. & Yeun, C. Y., 1998, In: Operating Systems Review. 32, 4, p. 21-24 4 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    How to identify all cheaters in Pinch's scheme

    Yeun, C. Y. & Mitchell, C. J., 1998, Proceedings of JWIS '98, Singapore, December 1998. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    In Search of Multiple Domain Key Recovery

    Knudsen, L. R. & Martin, K. M., 1998, In: Journal of Computer Security. 6, 4, p. 219-236 18 p.

    Research output: Contribution to journalArticlepeer-review

  11. Published

    Java card technology and security

    Markantonakis, K., 1998, In: Information Security Technical Report. 3, 2, p. 82 - 89

    Research output: Contribution to journalArticlepeer-review

  12. Published

    Key control in key agreement protocols

    Mitchell, C. J., Ward, M. & Wilson, P., 1998, In: Electronics Letters. 34, p. 980-981 2 p.

    Research output: Contribution to journalArticlepeer-review

  13. Published

    On integer-valued rational polynomials and depth distributions of binary codes

    Mitchell, C. J., 1998, In: IEEE Transactions on Information Theory. 44, p. 3146-3150 5 p.

    Research output: Contribution to journalArticlepeer-review

  14. Published

    On solutions to the key escrow problem

    Hoyle, M. P. & Mitchell, C. J., 1998, State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 1997. Preneel, B. & Rijmen, V. (eds.). Springer-Verlag, p. 277-306 30 p. (Lecture Notes in Computer Science; no. 1528).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Optimal linear perfect hash families

    Blackburn, S. R. & Wild, P. R., 1998, In: Journal of Combinatorial Theory, Series A. 83, p. 233-250 18 p.

    Research output: Contribution to journalArticlepeer-review

  16. Published

    Orthogonal Sequences of Polynomials over Arbitrary Fields

    Blackburn, S. R., 1998, In: Journal of Number Theory. 68, 1, p. 99-111 13 p.

    Research output: Contribution to journalArticlepeer-review

  17. Published

    Perfect Factors from Cyclic Codes and Interleaving

    Mitchell, C. J. & Paterson, K. G., 1998, In: SIAM Journal on Discrete Mathematics. 11, p. 241-264 24 p.

    Research output: Contribution to journalArticlepeer-review

  18. Published

    Root Counting, the DFT and the Linear Complexity of Nonlinear Filtering

    Paterson, K. G., 1998, In: Designs, Codes and Cryptography. 14, p. 247-259 13 p.

    Research output: Contribution to journalArticlepeer-review

  19. Published

    Secure Billing for Mobile Information Services in UMTS

    Martin, K. M., Preneel, B., Mitchell, C. J., Hitz, H. J., Horn, G., Poliakova, A. & Howard, P., 1998, Intelligence in Services and Networks: Technology for Ubiquitous Telecom Services, (Proceedings of the Fifth International Conference, IS&N 98, Antwerp, Belgium, 25-28 May 1998) . Trigila, S., Mullery, A., Campolargo, M. & Mampaey, M. (eds.). Springer-Verlag, Vol. 1430. p. 535-548 14 p. (Lecture Notes in Computer Science; no. 1430).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  20. Published

    Secure Log File Download Mechanisms for Smart Cards.

    Markantonakis, K., 1998, CARDIS'98. p. 285-304 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Simplification and Generalisation of the Wu-Wu Broadcasting Cryptosystem

    Martin, K. M., 1998, In: Electronics Letters. 34, 24, p. 2328-2329 2 p.

    Research output: Contribution to journalArticlepeer-review

  22. Published

    Some New Circuit Codes

    Paterson, K. G. & Tuliani, J., 1998, In: IEEE Transactions on Information Theory. 44, p. 1305-1309 5 p.

    Research output: Contribution to journalArticlepeer-review

  23. Published

    Techniques for the Hardware Implementation of Modular Multiplication

    Walter, C. D., 1998, Recent Advances in Information Science and Technology. Mastorakis, N. (ed.). World Scientific, p. 157-161 5 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  24. Published

    The Case for a Secure Multi-Application Smart Card Operating System

    Markantonakis, K., 1998, Proceedings of the First International Workshop on Information Security. London, UK: Springer-Verlag, p. 188-197 10 p. (ISW '97).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    The Filing Cabinet Problem

    Martin, K. M. & Koumandos, S., 1998, In: Bulletin of the ICA. 22, p. 25-30 6 p.

    Research output: Contribution to journalArticlepeer-review

  26. Published

    Trialling Secure Billing with Trusted Third Party Support for UMTS Applications

    Horn, G., Howard, P., Martin, K. M., Mitchell, C. J., Preneel, B. & Rantos, K., 1998, Proceedings of 3rd ACTS Mobile Communications Summit, Rhodes, Greece, 9-11 June 1998. p. 574-579 6 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

Previous 1...5 6 7 8 9 10 11 12 ...86 Next