dblp.uni-trier.dewww.uni-trier.de

Wen-Ai Jackson

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2007
20EEWen-Ai Jackson, S. Murphy: Projective aspects of the AES inversion. Des. Codes Cryptography 43(2-3): 167-179 (2007)
19EESusan G. Barwick, Wen-Ai Jackson: A sequence approach to linear perfect hash families. Des. Codes Cryptography 45(1): 95-121 (2007)
2005
18EESusan G. Barwick, Wen-Ai Jackson, Keith M. Martin: A General Approach to Robust Web Metering. Des. Codes Cryptography 36(1): 5-27 (2005)
17EESusan G. Barwick, Wen-Ai Jackson: An Optimal Multisecret Threshold Scheme Construction. Des. Codes Cryptography 37(3): 367-389 (2005)
16EESusan G. Barwick, Wen-Ai Jackson, Keith M. Martin: Updating the parameters of a threshold scheme by minimal broadcast. IEEE Transactions on Information Theory 51(2): 620-633 (2005)
2002
15EESusan G. Barwick, Wen-Ai Jackson, Keith M. Martin, Peter R. Wild: Size of Broadcast in Threshold Schemes with Disenrollment. ACISP 2002: 71-88
1998
14 Marten van Dijk, Wen-Ai Jackson, Keith M. Martin: A General Decomposition Construction for Incomplete Secret Sharing Schemes. Des. Codes Cryptography 15(3): 301-321 (1998)
1997
13 Wen-Ai Jackson, Peter R. Wild: On GMW Designs and Cyclic Hadamard Designs. Des. Codes Cryptography 10(2): 185-191 (1997)
12EEWen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe: Mutually Trusted Authority-Free Secret Sharing Schemes. J. Cryptology 10(4): 261-289 (1997)
1996
11 Wen-Ai Jackson, Kathleen A. S. Quinn, Peter R. Wild: Quadrics and difference sets. Ars Comb. 42: (1996)
10 Wen-Ai Jackson, Keith M. Martin: Perfect Secret Sharing Schemes on Five Participants. Des. Codes Cryptography 9(3): 267-286 (1996)
9 Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe: A Construction for Multisecret Threshold Schemes. Des. Codes Cryptography 9(3): 287-303 (1996)
8 Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe: Ideal Secret Sharing Schemes with Multiple Secrets. J. Cryptology 9(4): 233-250 (1996)
1995
7EEWen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe: Efficient Secret Sharing Without a Mutually Trusted Authority (Extended Abstract). EUROCRYPT 1995: 183-193
1994
6 Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe: On Sharing Many Secrets (Extended Abstract). ASIACRYPT 1994: 42-54
5 Wen-Ai Jackson, Keith M. Martin: Geometric Secret Sharing Schemes and Their Duals. Des. Codes Cryptography 4(1): 83-95 (1994)
1993
4EEWen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe: Multisecret Threshold Schemes. CRYPTO 1993: 126-135
1992
3 Wen-Ai Jackson, Keith M. Martin: Cumulative Arrays and Geometric Secret Sharing Schemes. AUSCRYPT 1992: 48-55
2 Wen-Ai Jackson, Peter R. Wild: Relations between Two Perfect Ternary Sequence Constructions. Des. Codes Cryptography 2(4): 325-332 (1992)
1991
1EEWen-Ai Jackson, Fred Piper, Peter R. Wild: Non-embedding of non prime- power unitals with point-regular group. Discrete Mathematics 98(1): 23-28 (1991)

Coauthor Index

1Susan G. Barwick [15] [16] [17] [18] [19]
2Marten van Dijk [14]
3Keith M. Martin [3] [4] [5] [6] [7] [8] [9] [10] [12] [14] [15] [16] [18]
4S. Murphy [20]
5Christine M. O'Keefe [4] [6] [7] [8] [9] [12]
6Fred Piper [1]
7Kathleen A. S. Quinn [11]
8Peter R. Wild [1] [2] [11] [13] [15]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)