The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Keith M. Martin: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin, Peter R. Wild
    Size of Broadcast in Threshold Schemes with Disenrollment. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:71-88 [Conf]
  2. Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang
    Changing Thresholds in the Absence of Secure Channels. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:177-191 [Conf]
  3. Martin Anthony, Keith M. Martin, Jennifer Seberry, Peter R. Wild
    Some Remarks on Authentication Systems. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:122-139 [Conf]
  4. Wen-Ai Jackson, Keith M. Martin
    Cumulative Arrays and Geometric Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:48-55 [Conf]
  5. Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe
    On Sharing Many Secrets (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:42-54 [Conf]
  6. Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe
    Multisecret Threshold Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:126-135 [Conf]
  7. Jason Crampton, Keith Martin, Peter Wild
    On Key Assignment for Hierarchical Access Control. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:98-111 [Conf]
  8. Miss Laiha Mat Kiah, Keith M. Martin
    Group Communication: Design Challenges in the Development of Key Management Frameworks in Wireless Mobile Environments. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:385-391 [Conf]
  9. Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe
    Efficient Secret Sharing Without a Mutually Trusted Authority (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:183-193 [Conf]
  10. Chris Charnes, Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini
    Secret sharing in hierarchical groups. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:81-86 [Conf]
  11. Keith M. Martin, Reihaneh Safavi-Naini
    Multisender authentication systems with unconditional security. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:130-143 [Conf]
  12. Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild
    Threshold MACs. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:237-252 [Conf]
  13. Chez Ciechanowicz, Keith M. Martin, Fred Piper, Matthew J. B. Robshaw
    Ten Years of Information Security Masters Programmes. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:215-230 [Conf]
  14. Keith M. Martin
    Increasing Efficiency of International Key Escrow in Mutually Mistrusting Domains. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1997, pp:221-232 [Conf]
  15. Keith M. Martin, Bart Preneel, Chris J. Mitchell, Hans-Joachim Hitz, Günther Horn, A. Poliakova, P. Howard
    Secure Billing for Mobile Information Services in UMTS. [Citation Graph (0, 0)][DBLP]
    IS&N, 1998, pp:535-548 [Conf]
  16. Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang
    Changing Thresholds in the Absence of Secure Channels. [Citation Graph (0, 0)][DBLP]
    Australian Computer Journal, 1999, v:31, n:2, pp:34-43 [Journal]
  17. Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang
    Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1999, v:42, n:8, pp:638-649 [Journal]
  18. Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin
    A General Approach to Robust Web Metering. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:36, n:1, pp:5-27 [Journal]
  19. L. R. A. Casse, Keith M. Martin, Peter R. Wild
    Bounds and Characterizations of Authentication/Secrecy Schemes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1998, v:13, n:2, pp:107-129 [Journal]
  20. Marten van Dijk, Wen-Ai Jackson, Keith M. Martin
    A General Decomposition Construction for Incomplete Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1998, v:15, n:3, pp:301-321 [Journal]
  21. Mida Guillermo, Keith M. Martin, Christine M. O'Keefe
    Providing Anonymity in Unconditionally Secure Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2003, v:28, n:3, pp:227-245 [Journal]
  22. Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe
    A Construction for Multisecret Threshold Schemes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1996, v:9, n:3, pp:287-303 [Journal]
  23. Wen-Ai Jackson, Keith M. Martin
    Geometric Secret Sharing Schemes and Their Duals. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1994, v:4, n:1, pp:83-95 [Journal]
  24. Wen-Ai Jackson, Keith M. Martin
    Perfect Secret Sharing Schemes on Five Participants. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1996, v:9, n:3, pp:267-286 [Journal]
  25. Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild
    Distributing the Encryption and Decryption of a Block Cipher. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:36, n:3, pp:263-287 [Journal]
  26. Lars R. Knudsen, Keith M. Martin
    In Search of Multiple Domain Key Recovery. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1998, v:6, n:4, pp:219-236 [Journal]
  27. Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe
    Ideal Secret Sharing Schemes with Multiple Secrets. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1996, v:9, n:4, pp:233-250 [Journal]
  28. Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe
    Mutually Trusted Authority-Free Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1997, v:10, n:4, pp:261-289 [Journal]
  29. Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin
    Updating the parameters of a threshold scheme by minimal broadcast. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2005, v:51, n:2, pp:620-633 [Journal]

  30. Constructing Key Assignment Schemes from Chain Partitions. [Citation Graph (, )][DBLP]


  31. Survey on Security Challenges for Swarm Robotics. [Citation Graph (, )][DBLP]


  32. Classification Framework for Fair Content Tracing Protocols. [Citation Graph (, )][DBLP]


  33. An Efficient Buyer-Seller Watermarking Protocol Based on Chameleon Encryption. [Citation Graph (, )][DBLP]


  34. On the (In)Security of Two Buyer-Seller Watermarking Protocols. [Citation Graph (, )][DBLP]


  35. An Offline Peer-to-peer Broadcasting Scheme with Anonymity. [Citation Graph (, )][DBLP]


  36. Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure. [Citation Graph (, )][DBLP]


  37. Privacy-Aware Location Database Service for Granular Queries. [Citation Graph (, )][DBLP]


  38. A Framework for Design and Analysis of Asymmetric Fingerprinting Protocols. [Citation Graph (, )][DBLP]


  39. Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments. [Citation Graph (, )][DBLP]


  40. Efficient Key Predistribution for Grid-Based Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  41. Key Refreshing in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  42. On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  43. On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks [Citation Graph (, )][DBLP]


  44. Establishing the broadcast efficiency of the Subset Difference Revocation Scheme. [Citation Graph (, )][DBLP]


  45. An Application-Oriented Framework for Wireless Sensor Network Key Establishment. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.308secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002