The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Wen-Ai Jackson: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin, Peter R. Wild
    Size of Broadcast in Threshold Schemes with Disenrollment. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:71-88 [Conf]
  2. Wen-Ai Jackson, Keith M. Martin
    Cumulative Arrays and Geometric Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:48-55 [Conf]
  3. Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe
    On Sharing Many Secrets (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:42-54 [Conf]
  4. Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe
    Multisecret Threshold Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:126-135 [Conf]
  5. Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe
    Efficient Secret Sharing Without a Mutually Trusted Authority (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:183-193 [Conf]
  6. Wen-Ai Jackson, Kathleen A. S. Quinn, Peter R. Wild
    Quadrics and difference sets. [Citation Graph (0, 0)][DBLP]
    Ars Comb., 1996, v:42, n:, pp:- [Journal]
  7. Susan G. Barwick, Wen-Ai Jackson
    An Optimal Multisecret Threshold Scheme Construction. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:37, n:3, pp:367-389 [Journal]
  8. Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin
    A General Approach to Robust Web Metering. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:36, n:1, pp:5-27 [Journal]
  9. Marten van Dijk, Wen-Ai Jackson, Keith M. Martin
    A General Decomposition Construction for Incomplete Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1998, v:15, n:3, pp:301-321 [Journal]
  10. Wen-Ai Jackson, Peter R. Wild
    Relations between Two Perfect Ternary Sequence Constructions. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1992, v:2, n:4, pp:325-332 [Journal]
  11. Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe
    A Construction for Multisecret Threshold Schemes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1996, v:9, n:3, pp:287-303 [Journal]
  12. Wen-Ai Jackson, Peter R. Wild
    On GMW Designs and Cyclic Hadamard Designs. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1997, v:10, n:2, pp:185-191 [Journal]
  13. Wen-Ai Jackson, Keith M. Martin
    Geometric Secret Sharing Schemes and Their Duals. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1994, v:4, n:1, pp:83-95 [Journal]
  14. Wen-Ai Jackson, Keith M. Martin
    Perfect Secret Sharing Schemes on Five Participants. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1996, v:9, n:3, pp:267-286 [Journal]
  15. Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe
    Ideal Secret Sharing Schemes with Multiple Secrets. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1996, v:9, n:4, pp:233-250 [Journal]
  16. Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe
    Mutually Trusted Authority-Free Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1997, v:10, n:4, pp:261-289 [Journal]
  17. Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin
    Updating the parameters of a threshold scheme by minimal broadcast. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2005, v:51, n:2, pp:620-633 [Journal]
  18. Wen-Ai Jackson, S. Murphy
    Projective aspects of the AES inversion. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2007, v:43, n:2-3, pp:167-179 [Journal]
  19. Susan G. Barwick, Wen-Ai Jackson
    A sequence approach to linear perfect hash families. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2007, v:45, n:1, pp:95-121 [Journal]
  20. Wen-Ai Jackson, Fred Piper, Peter R. Wild
    Non-embedding of non prime- power unitals with point-regular group. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 1991, v:98, n:1, pp:23-28 [Journal]

Search in 0.024secs, Finished in 0.025secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002