dblp.uni-trier.dewww.uni-trier.de

Keith M. Martin

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
35EEKeith M. Martin: On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks CoRR abs/0902.0458: (2009)
34EEThomas Martin, Keith M. Martin, Peter R. Wild: Establishing the broadcast efficiency of the Subset Difference Revocation Scheme. Des. Codes Cryptography 51(3): 315-334 (2009)
2008
33EESimon R. Blackburn, Keith M. Martin, Maura B. Paterson, Douglas R. Stinson: Key Refreshing in Wireless Sensor Networks. ICITS 2008: 156-170
32EESimon R. Blackburn, Tuvi Etzion, Keith M. Martin, Maura B. Paterson: Efficient Key Predistribution for Grid-Based Wireless Sensor Networks. ICITS 2008: 54-69
2007
31EEMiss Laiha Mat Kiah, Keith M. Martin: Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments. FGCN (1) 2007: 100-107
30EEGeong Sen Poh, Keith M. Martin: A Framework for Design and Analysis of Asymmetric Fingerprinting Protocols. IAS 2007: 457-461
2006
29EEJason Crampton, Keith M. Martin, Peter R. Wild: On Key Assignment for Hierarchical Access Control. CSFW 2006: 98-111
2005
28 Miss Laiha Mat Kiah, Keith M. Martin: Group Communication: Design Challenges in the Development of Key Management Frameworks in Wireless Mobile Environments. Security and Management 2005: 385-391
27EESusan G. Barwick, Wen-Ai Jackson, Keith M. Martin: A General Approach to Robust Web Metering. Des. Codes Cryptography 36(1): 5-27 (2005)
26EEKeith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild: Distributing the Encryption and Decryption of a Block Cipher. Des. Codes Cryptography 36(3): 263-287 (2005)
25EESusan G. Barwick, Wen-Ai Jackson, Keith M. Martin: Updating the parameters of a threshold scheme by minimal broadcast. IEEE Transactions on Information Theory 51(2): 620-633 (2005)
2003
24 Chez Ciechanowicz, Keith M. Martin, Fred Piper, Matthew J. B. Robshaw: Ten Years of Information Security Masters Programmes. World Conference on Information Security Education 2003: 215-230
23EEMida Guillermo, Keith M. Martin, Christine M. O'Keefe: Providing Anonymity in Unconditionally Secure Secret Sharing Schemes. Des. Codes Cryptography 28(3): 227-245 (2003)
2002
22EESusan G. Barwick, Wen-Ai Jackson, Keith M. Martin, Peter R. Wild: Size of Broadcast in Threshold Schemes with Disenrollment. ACISP 2002: 71-88
21EEKeith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild: Threshold MACs. ICISC 2002: 237-252
1999
20EEKeith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang: Changing Thresholds in the Absence of Secure Channels. ACISP 1999: 177-191
19 Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang: Changing Thresholds in the Absence of Secure Channels. Australian Computer Journal 31(2): 34-43 (1999)
18 Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang: Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures. Comput. J. 42(8): 638-649 (1999)
1998
17EEKeith M. Martin, Bart Preneel, Chris J. Mitchell, Hans-Joachim Hitz, Günther Horn, A. Poliakova, P. Howard: Secure Billing for Mobile Information Services in UMTS. IS&N 1998: 535-548
16 L. R. A. Casse, Keith M. Martin, Peter R. Wild: Bounds and Characterizations of Authentication/Secrecy Schemes. Des. Codes Cryptography 13(2): 107-129 (1998)
15 Marten van Dijk, Wen-Ai Jackson, Keith M. Martin: A General Decomposition Construction for Incomplete Secret Sharing Schemes. Des. Codes Cryptography 15(3): 301-321 (1998)
14 Lars R. Knudsen, Keith M. Martin: In Search of Multiple Domain Key Recovery. Journal of Computer Security 6(4): 219-236 (1998)
1997
13 Keith M. Martin, Reihaneh Safavi-Naini: Multisender authentication systems with unconditional security. ICICS 1997: 130-143
12 Chris Charnes, Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini: Secret sharing in hierarchical groups. ICICS 1997: 81-86
11 Keith M. Martin: Increasing Efficiency of International Key Escrow in Mutually Mistrusting Domains. IMA Int. Conf. 1997: 221-232
10EEWen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe: Mutually Trusted Authority-Free Secret Sharing Schemes. J. Cryptology 10(4): 261-289 (1997)
1996
9 Wen-Ai Jackson, Keith M. Martin: Perfect Secret Sharing Schemes on Five Participants. Des. Codes Cryptography 9(3): 267-286 (1996)
8 Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe: A Construction for Multisecret Threshold Schemes. Des. Codes Cryptography 9(3): 287-303 (1996)
7 Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe: Ideal Secret Sharing Schemes with Multiple Secrets. J. Cryptology 9(4): 233-250 (1996)
1995
6EEWen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe: Efficient Secret Sharing Without a Mutually Trusted Authority (Extended Abstract). EUROCRYPT 1995: 183-193
1994
5 Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe: On Sharing Many Secrets (Extended Abstract). ASIACRYPT 1994: 42-54
4 Wen-Ai Jackson, Keith M. Martin: Geometric Secret Sharing Schemes and Their Duals. Des. Codes Cryptography 4(1): 83-95 (1994)
1993
3EEWen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe: Multisecret Threshold Schemes. CRYPTO 1993: 126-135
1992
2 Wen-Ai Jackson, Keith M. Martin: Cumulative Arrays and Geometric Secret Sharing Schemes. AUSCRYPT 1992: 48-55
1990
1 Martin Anthony, Keith M. Martin, Jennifer Seberry, Peter R. Wild: Some Remarks on Authentication Systems. AUSCRYPT 1990: 122-139

Coauthor Index

1Martin Anthony [1]
2Susan G. Barwick [22] [25] [27]
3Simon R. Blackburn [32] [33]
4L. R. A. Casse [16]
5Chris Charnes [12]
6Chez Ciechanowicz [24]
7Jason Crampton [29]
8Marten van Dijk [15]
9Tuvi Etzion [32]
10Mida Guillermo [23]
11Hans-Joachim Hitz [17]
12Günther Horn [17]
13P. Howard [17]
14Wen-Ai Jackson [2] [3] [4] [5] [6] [7] [8] [9] [10] [15] [22] [25] [27]
15Miss Laiha Mat Kiah [28] [31]
16Lars R. Knudsen [14]
17Thomas Martin [34]
18Chris J. Mitchell [17]
19Christine M. O'Keefe [3] [5] [6] [7] [8] [10] [23]
20Maura B. Paterson [32] [33]
21Josef Pieprzyk [12] [19] [20] [21]
22Fred Piper [24]
23Geong Sen Poh [30]
24A. Poliakova [17]
25Bart Preneel [17]
26Matthew J. B. Robshaw [24]
27Reihaneh Safavi-Naini [12] [13] [18] [19] [20] [21] [26]
28Jennifer Seberry (Jennifer Seberry Wallis) [1]
29Douglas R. Stinson [33]
30Huaxiong Wang [18] [19] [20] [21] [26]
31Peter R. Wild [1] [16] [21] [22] [26] [29] [34]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)