Maura Paterson

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Decomposing complete graphs into isomorphic complete multipartite graphs2024-10-02Paper
Circular external difference families, graceful labellings and cyclotomy
Discrete Mathematics
2024-07-10Paper
Circular external difference families, graceful labellings and cyclotomy2023-10-04Paper
Splitting authentication codes with perfect secrecy: new results, constructions and connections with algebraic manipulation detection codes
Advances in Mathematics of Communications
2023-09-12Paper
Boolean ring cryptographic equation solving2022-03-25Paper
On the equivalence of authentication codes and robust (2, 2)-threshold schemes
Journal of Mathematical Cryptology
2021-06-17Paper
PIR Schemes With Small Download Complexity and Low Storage Requirements
IEEE Transactions on Information Theory
2020-01-28Paper
Characterising bimodal collections of sets in finite groups
Archiv der Mathematik
2019-11-22Paper
Characterising bimodal collections of sets in finite groups
Archiv der Mathematik
2019-11-22Paper
Functional repair codes: a view from projective geometry
Designs, Codes and Cryptography
2019-10-17Paper
Functional repair codes: a view from projective geometry
Designs, Codes and Cryptography
2019-10-17Paper
Characterising bimodal collections of sets in finite groups
(available as arXiv preprint)
2019-03-27Paper
Weighted external difference families and R-optimal AMD codes
Discrete Mathematics
2019-01-22Paper
Weighted external difference families and R-optimal AMD codes
Discrete Mathematics
2019-01-22Paper
Multi-prover proof of retrievability
Journal of Mathematical Cryptology
2019-01-11Paper
Multi-prover proof of retrievability
Journal of Mathematical Cryptology
2019-01-11Paper
Existence and non-existence results for strong external difference families
Discrete Mathematics
2017-10-24Paper
Existence and non-existence results for strong external difference families
Discrete Mathematics
2017-10-24Paper
Two-Dimensional Patterns With Distinct Differences—Constructions, Bounds, and Maximal Anticodes
IEEE Transactions on Information Theory
2017-07-27Paper
Distinct Difference Configurations: Multihop Paths and Key Predistribution in Sensor Networks
IEEE Transactions on Information Theory
2017-07-27Paper
Localised multisecret sharing
Cryptography and Communications
2017-04-03Paper
Combinatorial characterizations of algebraic manipulation detection codes involving generalized difference families
Discrete Mathematics
2016-08-16Paper
Cryptography. Theory and practice2016-07-05Paper
On encoding symbol degrees of array BP-XOR codes
Cryptography and Communications
2016-04-11Paper
Disjoint difference families and their applications
Designs, Codes and Cryptography
2016-02-02Paper
Applications of Galois geometry to cryptology2016-01-27Paper
Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs
Journal of Mathematical Cryptology
2015-12-07Paper
Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs
Journal of Mathematical Cryptology
2015-12-07Paper
Practical approaches to varying network size in combinatorial key predistribution schemes
Selected Areas in Cryptography -- SAC 2013
2015-10-01Paper
A unified approach to combinatorial key predistribution schemes for sensor networks
Designs, Codes and Cryptography
2014-04-29Paper
An application-oriented framework for wireless sensor network key establishment
Electronic Notes in Theoretical Computer Science
2013-12-06Paper
A simple combinatorial treatment of constructions and threshold gaps of ramp schemes
Cryptography and Communications
2013-11-14Paper
A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage
Journal of Mathematical Cryptology
2013-11-12Paper
A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage
Journal of Mathematical Cryptology
2013-11-12Paper
Constructions for retransmission permutation arrays
Designs, Codes and Cryptography
2012-11-28Paper
Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures
Cryptography and Communications
2012-02-21Paper
Putting dots in triangles2011-08-24Paper
Honeycomb arrays
The Electronic Journal of Combinatorics
2010-12-16Paper
Honeycomb arrays
The Electronic Journal of Combinatorics
2010-12-16Paper
Honeycomb arrays
The Electronic Journal of Combinatorics
2010-12-16Paper
Yet another hat game
The Electronic Journal of Combinatorics
2010-06-16Paper
Yet another hat game
The Electronic Journal of Combinatorics
2010-06-16Paper
Yet another hat game
The Electronic Journal of Combinatorics
2010-06-16Paper
Combinatorial batch codes
Advances in Mathematics of Communications
2010-03-10Paper
Geometric ideas for cryptographic equation solving in even characteristic
Cryptography and Coding
2010-01-07Paper
Two attacks on a sensor network key distribution scheme of Cheng and Agrawal
Journal of Mathematical Cryptology
2009-03-03Paper
Efficient Key Predistribution for Grid-Based Wireless Sensor Networks
Lecture Notes in Computer Science
2009-01-09Paper
Key Refreshing in Wireless Sensor Networks
Lecture Notes in Computer Science
2009-01-09Paper
A geometric view of cryptographic equation solving
Journal of Mathematical Cryptology
2008-08-11Paper
Sequential and dynamic frameproof codes
Designs, Codes and Cryptography
2007-09-20Paper
Sliding-window dynamic frameproof codes
Designs, Codes and Cryptography
2007-09-20Paper


Research outcomes over time


This page was built for person: Maura Paterson