The following pages link to Keith M. Martin (Q306045):
Displayed 50 items.
- Graph-theoretic design and analysis of key predistribution schemes (Q306046) (← links)
- Localised multisecret sharing (Q520075) (← links)
- Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures (Q662167) (← links)
- Perfect secret sharing schemes on five participants (Q676919) (← links)
- A construction for multisecret threshold schemes (Q676920) (← links)
- A general decomposition construction for incomplete secret sharing schemes (Q1281416) (← links)
- Geometric secret sharing schemes and their duals (Q1321560) (← links)
- Mutually trusted authority-free secret sharing schemes (Q1382145) (← links)
- Providing anonymity in unconditionally secure secret sharing schemes (Q1395762) (← links)
- Geometrical contributions to secret sharing theory (Q1879097) (← links)
- Efficient, XOR-based, ideal \((t,n)\)-threshold schemes (Q1989458) (← links)
- Strong post-compromise secure proxy re-encryption (Q2183914) (← links)
- A general approach to robust web metering (Q2486871) (← links)
- Ideal secret sharing schemes with multiple secrets (Q2563545) (← links)
- Distributing the encryption and decryption of a block cipher (Q2572965) (← links)
- (Q2757242) (← links)
- Extended Functionality in Verifiable Searchable Encryption (Q2802427) (← links)
- An Application-Oriented Framework for Wireless Sensor Network Key Establishment (Q2864366) (← links)
- On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks (Q2920412) (← links)
- The Rise and Fall and Rise of Combinatorial Key Predistribution (Q3084246) (← links)
- (Q3126447) (← links)
- (Q3412134) (← links)
- (Q3464681) (← links)
- Updating the Parameters of a Threshold Scheme by Minimal Broadcast (Q3546543) (← links)
- (Q4024337) (← links)
- (Q4228220) (← links)
- (Q4239591) (← links)
- (Q4250638) (← links)
- (Q4269754) (← links)
- (Q4288075) (← links)
- (Q4322858) (← links)
- (Q4341671) (← links)
- (Q4341738) (← links)
- (Q4341778) (← links)
- Secret sharing in hierarchical groups (Q4373614) (← links)
- (Q4373624) (← links)
- (Q4379737) (← links)
- (Q4400584) (← links)
- (Q4412961) (← links)
- (Q4413328) (← links)
- (Q4853712) (← links)
- Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures (Q4950860) (← links)
- Revisiting and Extending the AONT-RS Scheme: A Robust Computationally Secure Secret Sharing Scheme (Q4975177) (← links)
- (Q5202143) (← links)
- (Q5268510) (← links)
- Distinct Difference Configurations: Multihop Paths and Key Predistribution in Sensor Networks (Q5281354) (← links)
- Two-Dimensional Patterns With Distinct Differences—Constructions, Bounds, and Maximal Anticodes (Q5281579) (← links)
- (Q5284641) (← links)
- (Q5284662) (← links)
- On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks (Q5323004) (← links)