2009 |
35 | EE | Keith M. Martin:
On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks
CoRR abs/0902.0458: (2009) |
34 | EE | Thomas Martin,
Keith M. Martin,
Peter R. Wild:
Establishing the broadcast efficiency of the Subset Difference Revocation Scheme.
Des. Codes Cryptography 51(3): 315-334 (2009) |
2008 |
33 | EE | Simon R. Blackburn,
Keith M. Martin,
Maura B. Paterson,
Douglas R. Stinson:
Key Refreshing in Wireless Sensor Networks.
ICITS 2008: 156-170 |
32 | EE | Simon R. Blackburn,
Tuvi Etzion,
Keith M. Martin,
Maura B. Paterson:
Efficient Key Predistribution for Grid-Based Wireless Sensor Networks.
ICITS 2008: 54-69 |
2007 |
31 | EE | Miss Laiha Mat Kiah,
Keith M. Martin:
Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments.
FGCN (1) 2007: 100-107 |
30 | EE | Geong Sen Poh,
Keith M. Martin:
A Framework for Design and Analysis of Asymmetric Fingerprinting Protocols.
IAS 2007: 457-461 |
2006 |
29 | EE | Jason Crampton,
Keith M. Martin,
Peter R. Wild:
On Key Assignment for Hierarchical Access Control.
CSFW 2006: 98-111 |
2005 |
28 | | Miss Laiha Mat Kiah,
Keith M. Martin:
Group Communication: Design Challenges in the Development of Key Management Frameworks in Wireless Mobile Environments.
Security and Management 2005: 385-391 |
27 | EE | Susan G. Barwick,
Wen-Ai Jackson,
Keith M. Martin:
A General Approach to Robust Web Metering.
Des. Codes Cryptography 36(1): 5-27 (2005) |
26 | EE | Keith M. Martin,
Reihaneh Safavi-Naini,
Huaxiong Wang,
Peter R. Wild:
Distributing the Encryption and Decryption of a Block Cipher.
Des. Codes Cryptography 36(3): 263-287 (2005) |
25 | EE | Susan G. Barwick,
Wen-Ai Jackson,
Keith M. Martin:
Updating the parameters of a threshold scheme by minimal broadcast.
IEEE Transactions on Information Theory 51(2): 620-633 (2005) |
2003 |
24 | | Chez Ciechanowicz,
Keith M. Martin,
Fred Piper,
Matthew J. B. Robshaw:
Ten Years of Information Security Masters Programmes.
World Conference on Information Security Education 2003: 215-230 |
23 | EE | Mida Guillermo,
Keith M. Martin,
Christine M. O'Keefe:
Providing Anonymity in Unconditionally Secure Secret Sharing Schemes.
Des. Codes Cryptography 28(3): 227-245 (2003) |
2002 |
22 | EE | Susan G. Barwick,
Wen-Ai Jackson,
Keith M. Martin,
Peter R. Wild:
Size of Broadcast in Threshold Schemes with Disenrollment.
ACISP 2002: 71-88 |
21 | EE | Keith M. Martin,
Josef Pieprzyk,
Reihaneh Safavi-Naini,
Huaxiong Wang,
Peter R. Wild:
Threshold MACs.
ICISC 2002: 237-252 |
1999 |
20 | EE | Keith M. Martin,
Josef Pieprzyk,
Reihaneh Safavi-Naini,
Huaxiong Wang:
Changing Thresholds in the Absence of Secure Channels.
ACISP 1999: 177-191 |
19 | | Keith M. Martin,
Josef Pieprzyk,
Reihaneh Safavi-Naini,
Huaxiong Wang:
Changing Thresholds in the Absence of Secure Channels.
Australian Computer Journal 31(2): 34-43 (1999) |
18 | | Keith M. Martin,
Reihaneh Safavi-Naini,
Huaxiong Wang:
Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures.
Comput. J. 42(8): 638-649 (1999) |
1998 |
17 | EE | Keith M. Martin,
Bart Preneel,
Chris J. Mitchell,
Hans-Joachim Hitz,
Günther Horn,
A. Poliakova,
P. Howard:
Secure Billing for Mobile Information Services in UMTS.
IS&N 1998: 535-548 |
16 | | L. R. A. Casse,
Keith M. Martin,
Peter R. Wild:
Bounds and Characterizations of Authentication/Secrecy Schemes.
Des. Codes Cryptography 13(2): 107-129 (1998) |
15 | | Marten van Dijk,
Wen-Ai Jackson,
Keith M. Martin:
A General Decomposition Construction for Incomplete Secret Sharing Schemes.
Des. Codes Cryptography 15(3): 301-321 (1998) |
14 | | Lars R. Knudsen,
Keith M. Martin:
In Search of Multiple Domain Key Recovery.
Journal of Computer Security 6(4): 219-236 (1998) |
1997 |
13 | | Keith M. Martin,
Reihaneh Safavi-Naini:
Multisender authentication systems with unconditional security.
ICICS 1997: 130-143 |
12 | | Chris Charnes,
Keith M. Martin,
Josef Pieprzyk,
Reihaneh Safavi-Naini:
Secret sharing in hierarchical groups.
ICICS 1997: 81-86 |
11 | | Keith M. Martin:
Increasing Efficiency of International Key Escrow in Mutually Mistrusting Domains.
IMA Int. Conf. 1997: 221-232 |
10 | EE | Wen-Ai Jackson,
Keith M. Martin,
Christine M. O'Keefe:
Mutually Trusted Authority-Free Secret Sharing Schemes.
J. Cryptology 10(4): 261-289 (1997) |
1996 |
9 | | Wen-Ai Jackson,
Keith M. Martin:
Perfect Secret Sharing Schemes on Five Participants.
Des. Codes Cryptography 9(3): 267-286 (1996) |
8 | | Wen-Ai Jackson,
Keith M. Martin,
Christine M. O'Keefe:
A Construction for Multisecret Threshold Schemes.
Des. Codes Cryptography 9(3): 287-303 (1996) |
7 | | Wen-Ai Jackson,
Keith M. Martin,
Christine M. O'Keefe:
Ideal Secret Sharing Schemes with Multiple Secrets.
J. Cryptology 9(4): 233-250 (1996) |
1995 |
6 | EE | Wen-Ai Jackson,
Keith M. Martin,
Christine M. O'Keefe:
Efficient Secret Sharing Without a Mutually Trusted Authority (Extended Abstract).
EUROCRYPT 1995: 183-193 |
1994 |
5 | | Wen-Ai Jackson,
Keith M. Martin,
Christine M. O'Keefe:
On Sharing Many Secrets (Extended Abstract).
ASIACRYPT 1994: 42-54 |
4 | | Wen-Ai Jackson,
Keith M. Martin:
Geometric Secret Sharing Schemes and Their Duals.
Des. Codes Cryptography 4(1): 83-95 (1994) |
1993 |
3 | EE | Wen-Ai Jackson,
Keith M. Martin,
Christine M. O'Keefe:
Multisecret Threshold Schemes.
CRYPTO 1993: 126-135 |
1992 |
2 | | Wen-Ai Jackson,
Keith M. Martin:
Cumulative Arrays and Geometric Secret Sharing Schemes.
AUSCRYPT 1992: 48-55 |
1990 |
1 | | Martin Anthony,
Keith M. Martin,
Jennifer Seberry,
Peter R. Wild:
Some Remarks on Authentication Systems.
AUSCRYPT 1990: 122-139 |