2007 |
20 | EE | Wen-Ai Jackson,
S. Murphy:
Projective aspects of the AES inversion.
Des. Codes Cryptography 43(2-3): 167-179 (2007) |
19 | EE | Susan G. Barwick,
Wen-Ai Jackson:
A sequence approach to linear perfect hash families.
Des. Codes Cryptography 45(1): 95-121 (2007) |
2005 |
18 | EE | Susan G. Barwick,
Wen-Ai Jackson,
Keith M. Martin:
A General Approach to Robust Web Metering.
Des. Codes Cryptography 36(1): 5-27 (2005) |
17 | EE | Susan G. Barwick,
Wen-Ai Jackson:
An Optimal Multisecret Threshold Scheme Construction.
Des. Codes Cryptography 37(3): 367-389 (2005) |
16 | EE | Susan G. Barwick,
Wen-Ai Jackson,
Keith M. Martin:
Updating the parameters of a threshold scheme by minimal broadcast.
IEEE Transactions on Information Theory 51(2): 620-633 (2005) |
2002 |
15 | EE | Susan G. Barwick,
Wen-Ai Jackson,
Keith M. Martin,
Peter R. Wild:
Size of Broadcast in Threshold Schemes with Disenrollment.
ACISP 2002: 71-88 |
1998 |
14 | | Marten van Dijk,
Wen-Ai Jackson,
Keith M. Martin:
A General Decomposition Construction for Incomplete Secret Sharing Schemes.
Des. Codes Cryptography 15(3): 301-321 (1998) |
1997 |
13 | | Wen-Ai Jackson,
Peter R. Wild:
On GMW Designs and Cyclic Hadamard Designs.
Des. Codes Cryptography 10(2): 185-191 (1997) |
12 | EE | Wen-Ai Jackson,
Keith M. Martin,
Christine M. O'Keefe:
Mutually Trusted Authority-Free Secret Sharing Schemes.
J. Cryptology 10(4): 261-289 (1997) |
1996 |
11 | | Wen-Ai Jackson,
Kathleen A. S. Quinn,
Peter R. Wild:
Quadrics and difference sets.
Ars Comb. 42: (1996) |
10 | | Wen-Ai Jackson,
Keith M. Martin:
Perfect Secret Sharing Schemes on Five Participants.
Des. Codes Cryptography 9(3): 267-286 (1996) |
9 | | Wen-Ai Jackson,
Keith M. Martin,
Christine M. O'Keefe:
A Construction for Multisecret Threshold Schemes.
Des. Codes Cryptography 9(3): 287-303 (1996) |
8 | | Wen-Ai Jackson,
Keith M. Martin,
Christine M. O'Keefe:
Ideal Secret Sharing Schemes with Multiple Secrets.
J. Cryptology 9(4): 233-250 (1996) |
1995 |
7 | EE | Wen-Ai Jackson,
Keith M. Martin,
Christine M. O'Keefe:
Efficient Secret Sharing Without a Mutually Trusted Authority (Extended Abstract).
EUROCRYPT 1995: 183-193 |
1994 |
6 | | Wen-Ai Jackson,
Keith M. Martin,
Christine M. O'Keefe:
On Sharing Many Secrets (Extended Abstract).
ASIACRYPT 1994: 42-54 |
5 | | Wen-Ai Jackson,
Keith M. Martin:
Geometric Secret Sharing Schemes and Their Duals.
Des. Codes Cryptography 4(1): 83-95 (1994) |
1993 |
4 | EE | Wen-Ai Jackson,
Keith M. Martin,
Christine M. O'Keefe:
Multisecret Threshold Schemes.
CRYPTO 1993: 126-135 |
1992 |
3 | | Wen-Ai Jackson,
Keith M. Martin:
Cumulative Arrays and Geometric Secret Sharing Schemes.
AUSCRYPT 1992: 48-55 |
2 | | Wen-Ai Jackson,
Peter R. Wild:
Relations between Two Perfect Ternary Sequence Constructions.
Des. Codes Cryptography 2(4): 325-332 (1992) |
1991 |
1 | EE | Wen-Ai Jackson,
Fred Piper,
Peter R. Wild:
Non-embedding of non prime- power unitals with point-regular group.
Discrete Mathematics 98(1): 23-28 (1991) |