|
Search the dblp DataBase
Wen-Ai Jackson:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin, Peter R. Wild
Size of Broadcast in Threshold Schemes with Disenrollment. [Citation Graph (0, 0)][DBLP] ACISP, 2002, pp:71-88 [Conf]
- Wen-Ai Jackson, Keith M. Martin
Cumulative Arrays and Geometric Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1992, pp:48-55 [Conf]
- Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe
On Sharing Many Secrets (Extended Abstract). [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1994, pp:42-54 [Conf]
- Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe
Multisecret Threshold Schemes. [Citation Graph (0, 0)][DBLP] CRYPTO, 1993, pp:126-135 [Conf]
- Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe
Efficient Secret Sharing Without a Mutually Trusted Authority (Extended Abstract). [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1995, pp:183-193 [Conf]
- Wen-Ai Jackson, Kathleen A. S. Quinn, Peter R. Wild
Quadrics and difference sets. [Citation Graph (0, 0)][DBLP] Ars Comb., 1996, v:42, n:, pp:- [Journal]
- Susan G. Barwick, Wen-Ai Jackson
An Optimal Multisecret Threshold Scheme Construction. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2005, v:37, n:3, pp:367-389 [Journal]
- Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin
A General Approach to Robust Web Metering. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2005, v:36, n:1, pp:5-27 [Journal]
- Marten van Dijk, Wen-Ai Jackson, Keith M. Martin
A General Decomposition Construction for Incomplete Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1998, v:15, n:3, pp:301-321 [Journal]
- Wen-Ai Jackson, Peter R. Wild
Relations between Two Perfect Ternary Sequence Constructions. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1992, v:2, n:4, pp:325-332 [Journal]
- Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe
A Construction for Multisecret Threshold Schemes. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1996, v:9, n:3, pp:287-303 [Journal]
- Wen-Ai Jackson, Peter R. Wild
On GMW Designs and Cyclic Hadamard Designs. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1997, v:10, n:2, pp:185-191 [Journal]
- Wen-Ai Jackson, Keith M. Martin
Geometric Secret Sharing Schemes and Their Duals. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1994, v:4, n:1, pp:83-95 [Journal]
- Wen-Ai Jackson, Keith M. Martin
Perfect Secret Sharing Schemes on Five Participants. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1996, v:9, n:3, pp:267-286 [Journal]
- Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe
Ideal Secret Sharing Schemes with Multiple Secrets. [Citation Graph (0, 0)][DBLP] J. Cryptology, 1996, v:9, n:4, pp:233-250 [Journal]
- Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe
Mutually Trusted Authority-Free Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP] J. Cryptology, 1997, v:10, n:4, pp:261-289 [Journal]
- Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin
Updating the parameters of a threshold scheme by minimal broadcast. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2005, v:51, n:2, pp:620-633 [Journal]
- Wen-Ai Jackson, S. Murphy
Projective aspects of the AES inversion. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2007, v:43, n:2-3, pp:167-179 [Journal]
- Susan G. Barwick, Wen-Ai Jackson
A sequence approach to linear perfect hash families. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2007, v:45, n:1, pp:95-121 [Journal]
- Wen-Ai Jackson, Fred Piper, Peter R. Wild
Non-embedding of non prime- power unitals with point-regular group. [Citation Graph (0, 0)][DBLP] Discrete Mathematics, 1991, v:98, n:1, pp:23-28 [Journal]
Search in 0.019secs, Finished in 0.021secs
|