Keith M. Martin

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Selective delegation of attributes in mercurial signature credentials
 
2024-08-30Paper
Identity confidentiality in 5G mobile telephony systems
Security Standardisation Research
2023-10-16Paper
Strong post-compromise secure proxy re-encryption
 
2020-05-27Paper
Efficient, XOR-based, ideal \((t,n)\)-threshold schemes
 
2018-10-26Paper
Revisiting and extending the AONT-RS scheme: a robust computationally secure secret sharing scheme
Progress in Cryptology - AFRICACRYPT 2017
2017-08-04Paper
Two-Dimensional Patterns With Distinct Differences—Constructions, Bounds, and Maximal Anticodes
IEEE Transactions on Information Theory
2017-07-27Paper
Distinct Difference Configurations: Multihop Paths and Key Predistribution in Sensor Networks
IEEE Transactions on Information Theory
2017-07-27Paper
Everyday cryptography. Fundamental principles and applications.
 
2017-06-20Paper
Localised multisecret sharing
Cryptography and Communications
2017-04-03Paper
Graph-theoretic design and analysis of key predistribution schemes
Designs, Codes and Cryptography
2016-08-31Paper
Extended functionality in verifiable searchable encryption
Cryptography and Information Security in the Balkans
2016-04-26Paper
Applications of Galois geometry to cryptology
 
2016-01-27Paper
A Combinatorial Model of Interference in Frequency Hopping Schemes
 
2015-08-11Paper
An application-oriented framework for wireless sensor network key establishment
Electronic Notes in Theoretical Computer Science
2013-12-06Paper
On the role of expander graphs in key predistribution schemes for wireless sensor networks
Research in Cryptology
2012-10-16Paper
Everyday cryptography. Fundamental principles and applications.
 
2012-04-18Paper
Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures
Cryptography and Communications
2012-02-21Paper
The rise and fall and rise of combinatorial key predistribution
Selected Areas in Cryptography
2011-03-15Paper
On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks
Lecture Notes in Computer Science
2009-07-23Paper
Efficient Key Predistribution for Grid-Based Wireless Sensor Networks
Lecture Notes in Computer Science
2009-01-09Paper
Key Refreshing in Wireless Sensor Networks
Lecture Notes in Computer Science
2009-01-09Paper
Updating the Parameters of a Threshold Scheme by Minimal Broadcast
IEEE Transactions on Information Theory
2008-12-21Paper
The combinatorics of generalised cumulative arrays
Mathematical Cryptology
2008-02-21Paper
scientific article; zbMATH DE number 5204734 (Why is no real title available?)
 
2007-10-24Paper
Optimal updating of ideal threshold schemes
 
2006-12-05Paper
Distributing the encryption and decryption of a block cipher
Designs, Codes and Cryptography
2005-11-07Paper
A general approach to robust web metering
Designs, Codes and Cryptography
2005-08-17Paper
Geometrical contributions to secret sharing theory
Journal of Geometry
2004-09-22Paper
scientific article; zbMATH DE number 1950333 (Why is no real title available?)
 
2003-07-17Paper
scientific article; zbMATH DE number 1950616 (Why is no real title available?)
 
2003-07-17Paper
Providing anonymity in unconditionally secure secret sharing schemes
Designs, Codes and Cryptography
2003-07-01Paper
scientific article; zbMATH DE number 1279036 (Why is no real title available?)
 
2002-01-27Paper
scientific article; zbMATH DE number 1676642 (Why is no real title available?)
 
2001-11-25Paper
A general decomposition construction for incomplete secret sharing schemes
Designs, Codes and Cryptography
2001-09-18Paper
Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures
The Computer Journal
2000-07-27Paper
scientific article; zbMATH DE number 1360745 (Why is no real title available?)
 
1999-11-10Paper
scientific article; zbMATH DE number 1303970 (Why is no real title available?)
 
1999-06-17Paper
scientific article; zbMATH DE number 1248184 (Why is no real title available?)
 
1999-05-13Paper
scientific article; zbMATH DE number 994583 (Why is no real title available?)
 
1999-05-05Paper
Mutually trusted authority-free secret sharing schemes
Journal of Cryptology
1998-11-12Paper
scientific article; zbMATH DE number 1182519 (Why is no real title available?)
 
1998-08-02Paper
scientific article; zbMATH DE number 1107681 (Why is no real title available?)
 
1998-06-07Paper
scientific article; zbMATH DE number 1123783 (Why is no real title available?)
 
1998-03-30Paper
Secret sharing in hierarchical groups
Information and Communications Security
1998-02-16Paper
scientific article; zbMATH DE number 1023998 (Why is no real title available?)
 
1997-09-07Paper
scientific article; zbMATH DE number 969190 (Why is no real title available?)
 
1997-07-06Paper
Ideal secret sharing schemes with multiple secrets
Journal of Cryptology
1997-06-30Paper
scientific article; zbMATH DE number 1024050 (Why is no real title available?)
 
1997-06-18Paper
scientific article; zbMATH DE number 1024084 (Why is no real title available?)
 
1997-06-18Paper
scientific article; zbMATH DE number 969170 (Why is no real title available?)
 
1997-05-26Paper
Perfect secret sharing schemes on five participants
Designs, Codes and Cryptography
1997-03-23Paper
A construction for multisecret threshold schemes
Designs, Codes and Cryptography
1997-03-23Paper
scientific article; zbMATH DE number 812038 (Why is no real title available?)
 
1995-11-02Paper
scientific article; zbMATH DE number 721907 (Why is no real title available?)
 
1995-06-22Paper
Geometric secret sharing schemes and their duals
Designs, Codes and Cryptography
1994-09-11Paper
scientific article; zbMATH DE number 553905 (Why is no real title available?)
 
1994-04-21Paper
scientific article; zbMATH DE number 109201 (Why is no real title available?)
 
1993-03-09Paper
scientific article; zbMATH DE number 4193604 (Why is no real title available?)
 
1990-01-01Paper


Research outcomes over time


This page was built for person: Keith M. Martin