Keith M. Martin
Keith M. Martin
Adresse e-mail validée de rhul.ac.uk - Page d'accueil
Titre
Citée par
Citée par
Année
The geometry of shared secret schemes
GJ Simmons
Bulletin of the Institute of Combinatorics and its Applications 1, 71-88, 1991
1631991
On key assignment for hierarchical access control
J Crampton, K Martin, P Wild
19th IEEE Computer Security Foundations Workshop (CSFW'06), 14 pp.-111, 2006
1542006
Everyday cryptography
KM Martin
The Australian Mathematical Society 231 (6), 2012
1472012
Authentication protocols for mobile network environment value-added services
G Horn, KM Martin, CJ Mitchell
IEEE Transactions on Vehicular Technology 51 (2), 383-392, 2002
1312002
Perfect secret sharing schemes on five participants
WA Jackson, KM Martin
Designs, Codes and Cryptography 9 (3), 267-286, 1996
1191996
A reputation-based announcement scheme for VANETs
Q Li, A Malip, KM Martin, SL Ng, J Zhang
IEEE Transactions on Vehicular Technology 61 (9), 4095-4108, 2012
1112012
Geometric secret sharing schemes and their duals
WA Jackson, KM Martin
Designs, Codes and Cryptography 4 (1), 83-95, 1994
971994
Multisecret threshold schemes
WA Jackson, KM Martin, CM O’Keefe
Annual International Cryptology Conference, 126-135, 1993
871993
Multisecret threshold schemes
WA Jackson, KM Martin, CM O’Keefe
Annual International Cryptology Conference, 126-135, 1993
871993
On sharing many secrets
WA Jackson, KM Martin, CM O'Keefe
International Conference on the theory and application of cryptology, 42-54, 1994
801994
New secret sharing schemes from old
KM Martin
J. Combin. Math. Combin. Comput 14, 65-77, 1993
791993
Survey on security challenges for swarm robotics
F Higgins, A Tomlinson, KM Martin
2009 Fifth International Conference on Autonomic and Autonomous Systems, 307-312, 2009
742009
Dynamic user revocation and key refreshing for attribute-based encryption in cloud storage
Z Xu, KM Martin
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
662012
A combinatorial interpretation of ramp schemes
WA Jackson, KM Martin
Australasian Journal of Combinatorics 14, 51-60, 1996
611996
Changing thresholds in the absence of secure channels
KM Martin, J Pieprzyk, R Safavi-Naini, H Wang
Australasian Conference on Information Security and Privacy, 177-191, 1999
571999
Changing thresholds in the absence of secure channels
KM Martin, J Pieprzyk, R Safavi-Naini, H Wang
Australasian Conference on Information Security and Privacy, 177-191, 1999
571999
Discrete structures in the theory of secret sharing
KM Martin
University of London, 1991
571991
Secure billing for mobile information services in UMTS
KM Martin, B Preneel, CJ Mitchell, HJ Hitz, G Horn, A Poliakova, ...
International Conference on Intelligence in Services and Networks, 535-548, 1998
531998
Bounds and techniques for efficient redistribution of secret shares to new access structures
KM Martin, R Safavi-Naini, H Wang
The Computer Journal 42 (8), 638-649, 1999
501999
Ideal secret sharing schemes with multiple secrets
WA Jackson, KM Martin, CM O'keefe
Journal of Cryptology 9 (4), 233-250, 1996
501996
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20