Keith M. Martin
Keith M. Martin
Bestätigte E-Mail-Adresse bei rhul.ac.uk - Startseite
Titel
Zitiert von
Zitiert von
Jahr
On key assignment for hierarchical access control
J Crampton, K Martin, P Wild
19th IEEE Computer Security Foundations Workshop (CSFW'06), 14 pp.-111, 2006
1712006
The geometry of shared secret schemes
GJ Simmons
Bulletin of the Institute of Combinatorics and its Applications 1, 71-88, 1991
1631991
Everyday cryptography
KM Martin
The Australian Mathematical Society 231 (6), 2012
1592012
A reputation-based announcement scheme for VANETs
Q Li, A Malip, KM Martin, SL Ng, J Zhang
IEEE Transactions on Vehicular Technology 61 (9), 4095-4108, 2012
1412012
Authentication protocols for mobile network environment value-added services
G Horn, KM Martin, CJ Mitchell
IEEE Transactions on Vehicular Technology 51 (2), 383-392, 2002
1382002
Perfect secret sharing schemes on five participants
WA Jackson, KM Martin
Designs, Codes and Cryptography 9 (3), 267-286, 1996
1211996
Geometric secret sharing schemes and their duals
WA Jackson, KM Martin
Designs, Codes and Cryptography 4 (1), 83-95, 1994
981994
Stability of nanometer-thick layers in hard coatings
SA Barnett, A Madan, I Kim, K Martin
Mrs Bulletin 28 (3), 169-172, 2003
932003
Multisecret threshold schemes
WA Jackson, KM Martin, CM O’Keefe
Annual International Cryptology Conference, 126-135, 1993
881993
Multisecret threshold schemes
WA Jackson, KM Martin, CM O’Keefe
Annual International Cryptology Conference, 126-135, 1993
881993
Survey on security challenges for swarm robotics
F Higgins, A Tomlinson, KM Martin
2009 Fifth International Conference on Autonomic and Autonomous Systems, 307-312, 2009
872009
On sharing many secrets
WA Jackson, KM Martin, CM O'Keefe
International Conference on the theory and application of cryptology, 42-54, 1994
831994
Dynamic user revocation and key refreshing for attribute-based encryption in cloud storage
Z Xu, KM Martin
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
772012
New secret sharing schemes from old
KM Martin
J. Combin. Math. Combin. Comput 14, 65-77, 1993
751993
Changing thresholds in the absence of secure channels
KM Martin, J Pieprzyk, R Safavi-Naini, H Wang
Australasian Conference on Information Security and Privacy, 177-191, 1999
651999
Changing thresholds in the absence of secure channels
KM Martin, J Pieprzyk, R Safavi-Naini, H Wang
Australasian Conference on Information Security and Privacy, 177-191, 1999
641999
A combinatorial interpretation of ramp schemes
WA Jackson, KM Martin
Australasian Journal of Combinatorics 14, 51-60, 1996
621996
Threats to the swarm: Security considerations for swarm robotics
F Higgins, A Tomlinson, KM Martin
International Journal on Advances in Security 2 (2&3), 2009
582009
Secure billing for mobile information services in UMTS
KM Martin, B Preneel, CJ Mitchell, HJ Hitz, G Horn, A Poliakova, ...
International Conference on Intelligence in Services and Networks, 535-548, 1998
561998
Discrete structures in the theory of secret sharing
KM Martin
University of London, 1991
551991
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20