| 2009 |
| 35 | EE | Keith M. Martin:
On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks
CoRR abs/0902.0458: (2009) |
| 34 | EE | Thomas Martin,
Keith M. Martin,
Peter R. Wild:
Establishing the broadcast efficiency of the Subset Difference Revocation Scheme.
Des. Codes Cryptography 51(3): 315-334 (2009) |
| 2008 |
| 33 | EE | Simon R. Blackburn,
Keith M. Martin,
Maura B. Paterson,
Douglas R. Stinson:
Key Refreshing in Wireless Sensor Networks.
ICITS 2008: 156-170 |
| 32 | EE | Simon R. Blackburn,
Tuvi Etzion,
Keith M. Martin,
Maura B. Paterson:
Efficient Key Predistribution for Grid-Based Wireless Sensor Networks.
ICITS 2008: 54-69 |
| 2007 |
| 31 | EE | Miss Laiha Mat Kiah,
Keith M. Martin:
Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments.
FGCN (1) 2007: 100-107 |
| 30 | EE | Geong Sen Poh,
Keith M. Martin:
A Framework for Design and Analysis of Asymmetric Fingerprinting Protocols.
IAS 2007: 457-461 |
| 2006 |
| 29 | EE | Jason Crampton,
Keith M. Martin,
Peter R. Wild:
On Key Assignment for Hierarchical Access Control.
CSFW 2006: 98-111 |
| 2005 |
| 28 | | Miss Laiha Mat Kiah,
Keith M. Martin:
Group Communication: Design Challenges in the Development of Key Management Frameworks in Wireless Mobile Environments.
Security and Management 2005: 385-391 |
| 27 | EE | Susan G. Barwick,
Wen-Ai Jackson,
Keith M. Martin:
A General Approach to Robust Web Metering.
Des. Codes Cryptography 36(1): 5-27 (2005) |
| 26 | EE | Keith M. Martin,
Reihaneh Safavi-Naini,
Huaxiong Wang,
Peter R. Wild:
Distributing the Encryption and Decryption of a Block Cipher.
Des. Codes Cryptography 36(3): 263-287 (2005) |
| 25 | EE | Susan G. Barwick,
Wen-Ai Jackson,
Keith M. Martin:
Updating the parameters of a threshold scheme by minimal broadcast.
IEEE Transactions on Information Theory 51(2): 620-633 (2005) |
| 2003 |
| 24 | | Chez Ciechanowicz,
Keith M. Martin,
Fred Piper,
Matthew J. B. Robshaw:
Ten Years of Information Security Masters Programmes.
World Conference on Information Security Education 2003: 215-230 |
| 23 | EE | Mida Guillermo,
Keith M. Martin,
Christine M. O'Keefe:
Providing Anonymity in Unconditionally Secure Secret Sharing Schemes.
Des. Codes Cryptography 28(3): 227-245 (2003) |
| 2002 |
| 22 | EE | Susan G. Barwick,
Wen-Ai Jackson,
Keith M. Martin,
Peter R. Wild:
Size of Broadcast in Threshold Schemes with Disenrollment.
ACISP 2002: 71-88 |
| 21 | EE | Keith M. Martin,
Josef Pieprzyk,
Reihaneh Safavi-Naini,
Huaxiong Wang,
Peter R. Wild:
Threshold MACs.
ICISC 2002: 237-252 |
| 1999 |
| 20 | EE | Keith M. Martin,
Josef Pieprzyk,
Reihaneh Safavi-Naini,
Huaxiong Wang:
Changing Thresholds in the Absence of Secure Channels.
ACISP 1999: 177-191 |
| 19 | | Keith M. Martin,
Josef Pieprzyk,
Reihaneh Safavi-Naini,
Huaxiong Wang:
Changing Thresholds in the Absence of Secure Channels.
Australian Computer Journal 31(2): 34-43 (1999) |
| 18 | | Keith M. Martin,
Reihaneh Safavi-Naini,
Huaxiong Wang:
Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures.
Comput. J. 42(8): 638-649 (1999) |
| 1998 |
| 17 | EE | Keith M. Martin,
Bart Preneel,
Chris J. Mitchell,
Hans-Joachim Hitz,
Günther Horn,
A. Poliakova,
P. Howard:
Secure Billing for Mobile Information Services in UMTS.
IS&N 1998: 535-548 |
| 16 | | L. R. A. Casse,
Keith M. Martin,
Peter R. Wild:
Bounds and Characterizations of Authentication/Secrecy Schemes.
Des. Codes Cryptography 13(2): 107-129 (1998) |
| 15 | | Marten van Dijk,
Wen-Ai Jackson,
Keith M. Martin:
A General Decomposition Construction for Incomplete Secret Sharing Schemes.
Des. Codes Cryptography 15(3): 301-321 (1998) |
| 14 | | Lars R. Knudsen,
Keith M. Martin:
In Search of Multiple Domain Key Recovery.
Journal of Computer Security 6(4): 219-236 (1998) |
| 1997 |
| 13 | | Keith M. Martin,
Reihaneh Safavi-Naini:
Multisender authentication systems with unconditional security.
ICICS 1997: 130-143 |
| 12 | | Chris Charnes,
Keith M. Martin,
Josef Pieprzyk,
Reihaneh Safavi-Naini:
Secret sharing in hierarchical groups.
ICICS 1997: 81-86 |
| 11 | | Keith M. Martin:
Increasing Efficiency of International Key Escrow in Mutually Mistrusting Domains.
IMA Int. Conf. 1997: 221-232 |
| 10 | EE | Wen-Ai Jackson,
Keith M. Martin,
Christine M. O'Keefe:
Mutually Trusted Authority-Free Secret Sharing Schemes.
J. Cryptology 10(4): 261-289 (1997) |
| 1996 |
| 9 | | Wen-Ai Jackson,
Keith M. Martin:
Perfect Secret Sharing Schemes on Five Participants.
Des. Codes Cryptography 9(3): 267-286 (1996) |
| 8 | | Wen-Ai Jackson,
Keith M. Martin,
Christine M. O'Keefe:
A Construction for Multisecret Threshold Schemes.
Des. Codes Cryptography 9(3): 287-303 (1996) |
| 7 | | Wen-Ai Jackson,
Keith M. Martin,
Christine M. O'Keefe:
Ideal Secret Sharing Schemes with Multiple Secrets.
J. Cryptology 9(4): 233-250 (1996) |
| 1995 |
| 6 | EE | Wen-Ai Jackson,
Keith M. Martin,
Christine M. O'Keefe:
Efficient Secret Sharing Without a Mutually Trusted Authority (Extended Abstract).
EUROCRYPT 1995: 183-193 |
| 1994 |
| 5 | | Wen-Ai Jackson,
Keith M. Martin,
Christine M. O'Keefe:
On Sharing Many Secrets (Extended Abstract).
ASIACRYPT 1994: 42-54 |
| 4 | | Wen-Ai Jackson,
Keith M. Martin:
Geometric Secret Sharing Schemes and Their Duals.
Des. Codes Cryptography 4(1): 83-95 (1994) |
| 1993 |
| 3 | EE | Wen-Ai Jackson,
Keith M. Martin,
Christine M. O'Keefe:
Multisecret Threshold Schemes.
CRYPTO 1993: 126-135 |
| 1992 |
| 2 | | Wen-Ai Jackson,
Keith M. Martin:
Cumulative Arrays and Geometric Secret Sharing Schemes.
AUSCRYPT 1992: 48-55 |
| 1990 |
| 1 | | Martin Anthony,
Keith M. Martin,
Jennifer Seberry,
Peter R. Wild:
Some Remarks on Authentication Systems.
AUSCRYPT 1990: 122-139 |