Maura Paterson

From MaRDI portal
(Redirected from Person:267790)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Decomposing complete graphs into isomorphic complete multipartite graphs2024-10-02Paper
Circular external difference families, graceful labellings and cyclotomy
Discrete Mathematics
2024-07-10Paper
Circular external difference families, graceful labellings and cyclotomy2023-10-04Paper
Splitting authentication codes with perfect secrecy: new results, constructions and connections with algebraic manipulation detection codes
Advances in Mathematics of Communications
2023-09-12Paper
Boolean ring cryptographic equation solving2022-03-25Paper
On the equivalence of authentication codes and robust (2, 2)-threshold schemes
Journal of Mathematical Cryptology
2021-06-17Paper
PIR Schemes With Small Download Complexity and Low Storage Requirements
IEEE Transactions on Information Theory
2020-01-28Paper
Characterising bimodal collections of sets in finite groups
Archiv der Mathematik
2019-11-22Paper
Characterising bimodal collections of sets in finite groups
Archiv der Mathematik
2019-11-22Paper
Functional repair codes: a view from projective geometry
Designs, Codes and Cryptography
2019-10-17Paper
Functional repair codes: a view from projective geometry
Designs, Codes and Cryptography
2019-10-17Paper
Characterising bimodal collections of sets in finite groups
(available as arXiv preprint)
2019-03-27Paper
Weighted external difference families and R-optimal AMD codes
Discrete Mathematics
2019-01-22Paper
Weighted external difference families and R-optimal AMD codes
Discrete Mathematics
2019-01-22Paper
Multi-prover proof of retrievability
Journal of Mathematical Cryptology
2019-01-11Paper
Multi-prover proof of retrievability
Journal of Mathematical Cryptology
2019-01-11Paper
Existence and non-existence results for strong external difference families
Discrete Mathematics
2017-10-24Paper
Existence and non-existence results for strong external difference families
Discrete Mathematics
2017-10-24Paper
Two-Dimensional Patterns With Distinct Differences—Constructions, Bounds, and Maximal Anticodes
IEEE Transactions on Information Theory
2017-07-27Paper
Distinct Difference Configurations: Multihop Paths and Key Predistribution in Sensor Networks
IEEE Transactions on Information Theory
2017-07-27Paper
Localised multisecret sharing
Cryptography and Communications
2017-04-03Paper
Combinatorial characterizations of algebraic manipulation detection codes involving generalized difference families
Discrete Mathematics
2016-08-16Paper
Cryptography. Theory and practice2016-07-05Paper
On encoding symbol degrees of array BP-XOR codes
Cryptography and Communications
2016-04-11Paper
Disjoint difference families and their applications
Designs, Codes and Cryptography
2016-02-02Paper
Applications of Galois geometry to cryptology2016-01-27Paper
Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs
Journal of Mathematical Cryptology
2015-12-07Paper
Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs
Journal of Mathematical Cryptology
2015-12-07Paper
Practical approaches to varying network size in combinatorial key predistribution schemes
Selected Areas in Cryptography -- SAC 2013
2015-10-01Paper
A unified approach to combinatorial key predistribution schemes for sensor networks
Designs, Codes and Cryptography
2014-04-29Paper
An application-oriented framework for wireless sensor network key establishment
Electronic Notes in Theoretical Computer Science
2013-12-06Paper
A simple combinatorial treatment of constructions and threshold gaps of ramp schemes
Cryptography and Communications
2013-11-14Paper
A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage
Journal of Mathematical Cryptology
2013-11-12Paper
A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage
Journal of Mathematical Cryptology
2013-11-12Paper
Constructions for retransmission permutation arrays
Designs, Codes and Cryptography
2012-11-28Paper
Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures
Cryptography and Communications
2012-02-21Paper
Putting dots in triangles2011-08-24Paper
Honeycomb arrays
The Electronic Journal of Combinatorics
2010-12-16Paper
Honeycomb arrays
The Electronic Journal of Combinatorics
2010-12-16Paper
Honeycomb arrays
The Electronic Journal of Combinatorics
2010-12-16Paper
Yet another hat game
The Electronic Journal of Combinatorics
2010-06-16Paper
Yet another hat game
The Electronic Journal of Combinatorics
2010-06-16Paper
Yet another hat game
The Electronic Journal of Combinatorics
2010-06-16Paper
Combinatorial batch codes
Advances in Mathematics of Communications
2010-03-10Paper
Geometric ideas for cryptographic equation solving in even characteristic
Cryptography and Coding
2010-01-07Paper
Two attacks on a sensor network key distribution scheme of Cheng and Agrawal
Journal of Mathematical Cryptology
2009-03-03Paper
Efficient Key Predistribution for Grid-Based Wireless Sensor Networks
Lecture Notes in Computer Science
2009-01-09Paper
Key Refreshing in Wireless Sensor Networks
Lecture Notes in Computer Science
2009-01-09Paper
A geometric view of cryptographic equation solving
Journal of Mathematical Cryptology
2008-08-11Paper
Sequential and dynamic frameproof codes
Designs, Codes and Cryptography
2007-09-20Paper
Sliding-window dynamic frameproof codes
Designs, Codes and Cryptography
2007-09-20Paper


Research outcomes over time


This page was built for person: Maura Paterson