Search the dblp DataBase
Keith M. Martin :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Susan G. Barwick , Wen-Ai Jackson , Keith M. Martin , Peter R. Wild Size of Broadcast in Threshold Schemes with Disenrollment. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:71-88 [Conf ] Keith M. Martin , Josef Pieprzyk , Reihaneh Safavi-Naini , Huaxiong Wang Changing Thresholds in the Absence of Secure Channels. [Citation Graph (0, 0)][DBLP ] ACISP, 1999, pp:177-191 [Conf ] Martin Anthony , Keith M. Martin , Jennifer Seberry , Peter R. Wild Some Remarks on Authentication Systems. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:122-139 [Conf ] Wen-Ai Jackson , Keith M. Martin Cumulative Arrays and Geometric Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1992, pp:48-55 [Conf ] Wen-Ai Jackson , Keith M. Martin , Christine M. O'Keefe On Sharing Many Secrets (Extended Abstract). [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1994, pp:42-54 [Conf ] Wen-Ai Jackson , Keith M. Martin , Christine M. O'Keefe Multisecret Threshold Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:126-135 [Conf ] Jason Crampton , Keith Martin , Peter Wild On Key Assignment for Hierarchical Access Control. [Citation Graph (0, 0)][DBLP ] CSFW, 2006, pp:98-111 [Conf ] Miss Laiha Mat Kiah , Keith M. Martin Group Communication: Design Challenges in the Development of Key Management Frameworks in Wireless Mobile Environments. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:385-391 [Conf ] Wen-Ai Jackson , Keith M. Martin , Christine M. O'Keefe Efficient Secret Sharing Without a Mutually Trusted Authority (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:183-193 [Conf ] Chris Charnes , Keith M. Martin , Josef Pieprzyk , Reihaneh Safavi-Naini Secret sharing in hierarchical groups. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:81-86 [Conf ] Keith M. Martin , Reihaneh Safavi-Naini Multisender authentication systems with unconditional security. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:130-143 [Conf ] Keith M. Martin , Josef Pieprzyk , Reihaneh Safavi-Naini , Huaxiong Wang , Peter R. Wild Threshold MACs. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:237-252 [Conf ] Chez Ciechanowicz , Keith M. Martin , Fred Piper , Matthew J. B. Robshaw Ten Years of Information Security Masters Programmes. [Citation Graph (0, 0)][DBLP ] World Conference on Information Security Education, 2003, pp:215-230 [Conf ] Keith M. Martin Increasing Efficiency of International Key Escrow in Mutually Mistrusting Domains. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1997, pp:221-232 [Conf ] Keith M. Martin , Bart Preneel , Chris J. Mitchell , Hans-Joachim Hitz , Günther Horn , A. Poliakova , P. Howard Secure Billing for Mobile Information Services in UMTS. [Citation Graph (0, 0)][DBLP ] IS&N, 1998, pp:535-548 [Conf ] Keith M. Martin , Josef Pieprzyk , Reihaneh Safavi-Naini , Huaxiong Wang Changing Thresholds in the Absence of Secure Channels. [Citation Graph (0, 0)][DBLP ] Australian Computer Journal, 1999, v:31, n:2, pp:34-43 [Journal ] Keith M. Martin , Reihaneh Safavi-Naini , Huaxiong Wang Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures. [Citation Graph (0, 0)][DBLP ] Comput. J., 1999, v:42, n:8, pp:638-649 [Journal ] Susan G. Barwick , Wen-Ai Jackson , Keith M. Martin A General Approach to Robust Web Metering. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2005, v:36, n:1, pp:5-27 [Journal ] L. R. A. Casse , Keith M. Martin , Peter R. Wild Bounds and Characterizations of Authentication/Secrecy Schemes. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 1998, v:13, n:2, pp:107-129 [Journal ] Marten van Dijk , Wen-Ai Jackson , Keith M. Martin A General Decomposition Construction for Incomplete Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 1998, v:15, n:3, pp:301-321 [Journal ] Mida Guillermo , Keith M. Martin , Christine M. O'Keefe Providing Anonymity in Unconditionally Secure Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2003, v:28, n:3, pp:227-245 [Journal ] Wen-Ai Jackson , Keith M. Martin , Christine M. O'Keefe A Construction for Multisecret Threshold Schemes. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 1996, v:9, n:3, pp:287-303 [Journal ] Wen-Ai Jackson , Keith M. Martin Geometric Secret Sharing Schemes and Their Duals. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 1994, v:4, n:1, pp:83-95 [Journal ] Wen-Ai Jackson , Keith M. Martin Perfect Secret Sharing Schemes on Five Participants. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 1996, v:9, n:3, pp:267-286 [Journal ] Keith M. Martin , Reihaneh Safavi-Naini , Huaxiong Wang , Peter R. Wild Distributing the Encryption and Decryption of a Block Cipher. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2005, v:36, n:3, pp:263-287 [Journal ] Lars R. Knudsen , Keith M. Martin In Search of Multiple Domain Key Recovery. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1998, v:6, n:4, pp:219-236 [Journal ] Wen-Ai Jackson , Keith M. Martin , Christine M. O'Keefe Ideal Secret Sharing Schemes with Multiple Secrets. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1996, v:9, n:4, pp:233-250 [Journal ] Wen-Ai Jackson , Keith M. Martin , Christine M. O'Keefe Mutually Trusted Authority-Free Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1997, v:10, n:4, pp:261-289 [Journal ] Susan G. Barwick , Wen-Ai Jackson , Keith M. Martin Updating the parameters of a threshold scheme by minimal broadcast. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2005, v:51, n:2, pp:620-633 [Journal ] Constructing Key Assignment Schemes from Chain Partitions. [Citation Graph (, )][DBLP ] Survey on Security Challenges for Swarm Robotics. [Citation Graph (, )][DBLP ] Classification Framework for Fair Content Tracing Protocols. [Citation Graph (, )][DBLP ] An Efficient Buyer-Seller Watermarking Protocol Based on Chameleon Encryption. [Citation Graph (, )][DBLP ] On the (In)Security of Two Buyer-Seller Watermarking Protocols. [Citation Graph (, )][DBLP ] An Offline Peer-to-peer Broadcasting Scheme with Anonymity. [Citation Graph (, )][DBLP ] Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure. [Citation Graph (, )][DBLP ] Privacy-Aware Location Database Service for Granular Queries. [Citation Graph (, )][DBLP ] A Framework for Design and Analysis of Asymmetric Fingerprinting Protocols. [Citation Graph (, )][DBLP ] Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments. [Citation Graph (, )][DBLP ] Efficient Key Predistribution for Grid-Based Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Key Refreshing in Wireless Sensor Networks. [Citation Graph (, )][DBLP ] On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks. [Citation Graph (, )][DBLP ] On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks [Citation Graph (, )][DBLP ] Establishing the broadcast efficiency of the Subset Difference Revocation Scheme. [Citation Graph (, )][DBLP ] An Application-Oriented Framework for Wireless Sensor Network Key Establishment. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.308secs