


default search action
Fred Piper
Person information
- affiliation: Royal Holloway, University of London, Department of Information Security, UK
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2019
- [j20]Yvo Desmedt
, Fred Piper:
Perfect Anonymity. IEEE Trans. Inf. Theory 65(6): 3990-3997 (2019) - 2010
- [j19]Dimitrios Patsos, Chez Ciechanowicz, Fred Piper:
The status of National PKIs - A European overview. Inf. Secur. Tech. Rep. 15(1): 13-20 (2010) - 2007
- [j18]Chris J. Mitchell
, Fred Piper, Peter R. Wild:
ID-based cryptography using symmetric primitives. Des. Codes Cryptogr. 44(1-3): 249-262 (2007) - 2005
- [j17]Fred Piper:
Cyberworld Security-the Good, the Bad and the Ugly*. Comput. J. 48(2): 145-156 (2005) - 2003
- [j16]Fred Piper:
Reseacrh in cryptography and security mechanisms. Comput. Secur. 22(1): 22-25 (2003) - [j15]Fred Piper, Geraint Price, Kenny Paterson:
Introduction. Inf. Secur. Tech. Rep. 8(3): 5 (2003) - 1997
- [j14]Mike Burmester, Yvo Desmedt, Fred Piper, Michael Walker:
A General Zero-Knowledge Scheme. Des. Codes Cryptogr. 12(1): 13-37 (1997) - [j13]Fred Piper:
Introduction to cryptology. Inf. Secur. Tech. Rep. 2(2): 10-13 (1997) - 1996
- [j12]Chris J. Mitchell, Fred Piper, Michael Walker, Peter R. Wild:
Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes. Des. Codes Cryptogr. 7(1-2): 101-110 (1996) - 1994
- [j11]Jonathan Jedwab, Chris J. Mitchell
, Fred Piper, Peter R. Wild:
Perfect binary arrays and difference sets. Discret. Math. 125(1-3): 241-254 (1994) - 1992
- [j10]Fred Piper, Peter R. Wild:
Incidence structures applied to cryptography. Discret. Math. 106-107: 383-389 (1992) - 1991
- [j9]Fred Piper:
Comment. Comput. Commun. 14(3): 131-132 (1991) - [j8]Wen-Ai Jackson, Fred Piper, Peter R. Wild:
Non-embedding of non prime- power unitals with point-regular group. Discret. Math. 98(1): 23-28 (1991) - 1990
- [j7]Fred Piper:
Computer and communications security: J A Cooper. Comput. Commun. 13(1): 54 (1990) - [j6]A. J. Bromfield, Fred C. Piper:
Linear recursion properties of uncorrelated binary sequences. Discret. Appl. Math. 27(3): 187-193 (1990) - 1989
- [j5]Fred Piper, Michael Walker:
Linear Ciphers and Spreads. J. Cryptol. 1(3): 185-188 (1989) - 1988
- [j4]Chris J. Mitchell
, Fred Piper:
Key storage in secure networks. Discret. Appl. Math. 21(3): 215-228 (1988) - 1987
- [j3]Chris J. Mitchell
, Fred Piper:
The cost of reducing key-storage requirements in secure networks. Comput. Secur. 6(4): 339-341 (1987) - 1986
- [j2]Fred Piper:
Primality and cryptography. Comput. Commun. 9(6): 318 (1986) - 1977
- [j1]Henry Beker, Fred Piper:
Some Designs Which Admit Strong Tactical Decompositions. J. Comb. Theory A 22(1): 38-42 (1977)
Conference and Workshop Papers
- 2018
- [c7]Steven Furnell, Michael K, Fred Piper, Chris E, Catherine H, Chris Ensor:
A National Certification Programme for Academic Degrees in Cyber Security. World Conference on Information Security Education 2018: 133-145 - 2009
- [c6]Fred Piper:
The Changing Face of Cryptography. IWDW 2009: 2 - 2003
- [c5]Chez Ciechanowicz, Keith M. Martin, Fred Piper, Matthew J. B. Robshaw:
Ten Years of Information Security Masters Programmes. World Conference on Information Security Education 2003: 215-230 - 1997
- [c4]Fred Piper:
Trusted Third Parties for Secure Electronic Commerce - Are They Needed? ACISP 1997: 1 - 1989
- [c3]Mike Burmester, Yvo Desmedt, Fred Piper, Michael Walker:
A General Zero-Knowledge Scheme (Extended Abstract). EUROCRYPT 1989: 122-133 - 1984
- [c2]Thomas Beth, Fred Piper:
The Stop-and-Go Generator. EUROCRYPT 1984: 88-92 - 1982
- [c1]Fred Piper:
Stream Ciphers. EUROCRYPT 1982: 181-188
Parts in Books or Collections
- 2007
- [p1]Constantinos Markantonakis, Keith Mayes, Michael Tunstall
, Damien Sauveron, Fred Piper:
Smart Card Security. Computational Intelligence in Information Assurance and Security 2007: 201-233
Editorship
- 2012
- [e1]Muttukrishnan Rajarajan, Fred Piper, Haining Wang, George Kesidis:
Security and Privacy in Communication Networks - 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 96, Springer 2012, ISBN 978-3-642-31908-2 [contents]
Informal and Other Publications
- 2004
- [i1]Kenneth G. Paterson, Fred Piper, Rüdiger Schack:
Quantum cryptography: a practical information security perspective. IACR Cryptol. ePrint Arch. 2004: 156 (2004)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint