|
Search the dblp DataBase
Christine M. O'Keefe:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe
On Sharing Many Secrets (Extended Abstract). [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1994, pp:42-54 [Conf]
- Christine M. O'Keefe
A Comparison of Key Distribution Patterns Constructed from Circle Geometries. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1992, pp:517-527 [Conf]
- Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe
Multisecret Threshold Schemes. [Citation Graph (0, 0)][DBLP] CRYPTO, 1993, pp:126-135 [Conf]
- Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe
Efficient Secret Sharing Without a Mutually Trusted Authority (Extended Abstract). [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1995, pp:183-193 [Conf]
- Christine M. O'Keefe, Paul Greenfield
Role and Expression of Consent in Web Services. [Citation Graph (0, 0)][DBLP] ICWS, 2003, pp:382-388 [Conf]
- Huidong Jin, Jie Chen, Chris Kelman, Hongxing He, Damien McAullay, Christine M. O'Keefe
Mining Unexpected Associations for Signalling Potential Adverse Drug Reactions from Administrative Health Databases. [Citation Graph (0, 0)][DBLP] PAKDD, 2006, pp:867-876 [Conf]
- Kerry L. Taylor, Christine M. O'Keefe, John Colton, Rohan A. Baxter, Ross Sparks, Uma Srinivasan, Mark A. Cameron, Laurent Lefort
A Service Oriented Architecture for a Health Research Data Network. [Citation Graph (0, 0)][DBLP] SSDBM, 2004, pp:443-444 [Conf]
- Christine M. O'Keefe, Ming Yung, Lifang Gu, Rohan A. Baxter
Privacy-preserving data linkage protocols. [Citation Graph (0, 0)][DBLP] WPES, 2004, pp:94-102 [Conf]
- Werner Nickel, Alice C. Niemeyer, Christine M. O'Keefe, Tim Penttila, Cheryl E. Praeger
The Block-Transitive, Point-Imprimitive 2-(729, 8, 1) Designs. [Citation Graph (0, 0)][DBLP] Appl. Algebra Eng. Commun. Comput., 1992, v:3, n:, pp:47-61 [Journal]
- Christine M. O'Keefe, Paul Greenfield, Andrew Goodchild
A Decentralised Approach to Electronic Consent and Health Information Access Control. [Citation Graph (0, 0)][DBLP] Journal of Research and Practice in Information Technology, 2005, v:37, n:2, pp:- [Journal]
- Simeon Ball, Aart Blokhuis, Christine M. O'Keefe
On Unitals with Many Baer Sublines. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1999, v:17, n:1-3, pp:237-252 [Journal]
- Matthew R. Brown, Christine M. O'Keefe, Tim Penttila
Triads, Flocks of Conics and Q. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1999, v:18, n:1/3, pp:63-70 [Journal]
- Matthew R. Brown, Christine M. O'Keefe, Stanley E. Payne, Tim Penttila, Gordon F. Royle
Spreads of T2(o), alpha-flocks and Ovals. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2004, v:31, n:3, pp:251-282 [Journal]
- Mida Guillermo, Keith M. Martin, Christine M. O'Keefe
Providing Anonymity in Unconditionally Secure Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2003, v:28, n:3, pp:227-245 [Journal]
- Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe
A Construction for Multisecret Threshold Schemes. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1996, v:9, n:3, pp:287-303 [Journal]
- Christine M. O'Keefe
Key Distribution Patterns Using Minkowski Planes. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1995, v:5, n:3, pp:261-267 [Journal]
- Christine M. O'Keefe, Alan Rahilly
Spreads and Group Divisible Designs. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1993, v:3, n:3, pp:229-235 [Journal]
- Christine M. O'Keefe, Tim Penttila
Automorphism Groups of Generalized Quadrangles via an Unusual Action of P L (2, 2Sph). [Citation Graph (0, 0)][DBLP] Eur. J. Comb., 2002, v:23, n:2, pp:213-232 [Journal]
- Christine M. O'Keefe, Tim Penttila
Ovals in Translation Hyperovals and Ovoids. [Citation Graph (0, 0)][DBLP] Eur. J. Comb., 1997, v:18, n:6, pp:667-683 [Journal]
- Christine M. O'Keefe, Tim Penttila
Subquadrangles of Generalized Quadrangles of Order (q2, q), q Even. [Citation Graph (0, 0)][DBLP] J. Comb. Theory, Ser. A, 2001, v:94, n:2, pp:218-229 [Journal]
- Christine M. O'Keefe, Tim Penttila
Symmetries of Arcs. [Citation Graph (0, 0)][DBLP] J. Comb. Theory, Ser. A, 1994, v:66, n:1, pp:53-67 [Journal]
- Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe
Ideal Secret Sharing Schemes with Multiple Secrets. [Citation Graph (0, 0)][DBLP] J. Cryptology, 1996, v:9, n:4, pp:233-250 [Journal]
- Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe
Mutually Trusted Authority-Free Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP] J. Cryptology, 1997, v:10, n:4, pp:261-289 [Journal]
- Huidong Jin, Jie Chen, Hongxing He, Christine M. O'Keefe
Privacy-Preserving Sequential Pattern Release. [Citation Graph (0, 0)][DBLP] PAKDD, 2007, pp:547-554 [Conf]
- Aart Blokhuis, Christine M. O'Keefe
On deriving unitals. [Citation Graph (0, 0)][DBLP] Discrete Mathematics, 1999, v:197, n:, pp:137-141 [Journal]
- Christine M. O'Keefe, Tim Penttila, Cheryl E. Praeger
Block-transitive, point-imprimitive designs with lambda = 1. [Citation Graph (0, 0)][DBLP] Discrete Mathematics, 1993, v:115, n:1-3, pp:231-244 [Journal]
- Christine M. O'Keefe, Arlene A. Pascasio
Images of conics under derivation. [Citation Graph (0, 0)][DBLP] Discrete Mathematics, 1996, v:151, n:1-3, pp:189-199 [Journal]
- Christine M. O'Keefe
Ovoids in PG(3, q): a survey. [Citation Graph (0, 0)][DBLP] Discrete Mathematics, 1996, v:151, n:1-3, pp:175-188 [Journal]
A Remote Analysis Server - What Does Regression Output Look Like?. [Citation Graph (, )][DBLP]
A Data Network for Health e-Research. [Citation Graph (, )][DBLP]
Regression output from a remote analysis server. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.005secs
|