Follow
Keith M. Martin
Keith M. Martin
Verified email at rhul.ac.uk - Homepage
Title
Cited by
Cited by
Year
Everyday cryptography
KM Martin
The Australian Mathematical Society 231 (6), 2012
2422012
A reputation-based announcement scheme for VANETs
Q Li, A Malip, KM Martin, SL Ng, J Zhang
IEEE Transactions on Vehicular Technology 61 (9), 4095-4108, 2012
2312012
Geometric shared secret and/or shared control schemes
GJ Simmons
Conference on the Theory and Application of Cryptography, 216-241, 1990
204*1990
On key assignment for hierarchical access control
J Crampton, K Martin, P Wild
19th IEEE Computer Security Foundations Workshop (CSFW'06), 14 pp.-111, 2006
1772006
Authentication protocols for mobile network environment value-added services
G Horn, KM Martin, CJ Mitchell
IEEE Transactions on Vehicular Technology 51 (2), 383-392, 2002
1462002
Perfect secret sharing schemes on five participants
WA Jackson, KM Martin
Designs, codes and cryptography 9, 267-286, 1996
1341996
Survey on security challenges for swarm robotics
F Higgins, A Tomlinson, KM Martin
2009 Fifth International Conference on Autonomic and Autonomous Systems, 307-312, 2009
1152009
Stability of nanometer-thick layers in hard coatings
SA Barnett, A Madan, I Kim, K Martin
Mrs Bulletin 28 (3), 169-172, 2003
1032003
Geometric secret sharing schemes and their duals
WA Jackson, KM Martin
Designs, Codes and Cryptography 4 (1), 83-95, 1994
1021994
Threats to the swarm: Security considerations for swarm robotics
F Higgins, A Tomlinson, KM Martin
International Journal on Advances in Security 2 (2&3), 2009
1002009
Multisecret threshold schemes
WA Jackson, KM Martin, CM O’Keefe
Annual International Cryptology Conference, 126-135, 1993
941993
On sharing many secrets
WA Jackson, KM Martin, CM O'Keefe
International Conference on the theory and application of cryptology, 42-54, 1994
891994
Dynamic user revocation and key refreshing for attribute-based encryption in cloud storage
Z Xu, KM Martin
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
842012
Changing thresholds in the absence of secure channels
KM Martin, J Pieprzyk, R Safavi-Naini, H Wang
Information Security and Privacy: 4th Australasian Conference, ACISP’99 …, 1999
82*1999
New secret sharing schemes from old
KM Martin
J. Combin. Math. Combin. Comput 14, 65-77, 1993
811993
A combinatorial interpretation of ramp schemes
WA Jackson, KM Martin
Australasian Journal of Combinatorics 14, 51-60, 1996
661996
Efficient key predistribution for grid-based wireless sensor networks
SR Blackburn, T Etzion, KM Martin, MB Paterson
Information Theoretic Security: Third International Conference, ICITS 2008 …, 2008
592008
Bounds and techniques for efficient redistribution of secret shares to new access structures
KM Martin, R Safavi-Naini, H Wang
The Computer Journal 42 (8), 638-649, 1999
591999
Ideal secret sharing schemes with multiple secrets
WA Jackson, KM Martin, CM O'keefe
Journal of Cryptology 9 (4), 233-250, 1996
581996
Discrete structures in the theory of secret sharing
KM Martin
University of London, 1991
581991
The system can't perform the operation now. Try again later.
Articles 1–20