Follow
Keith M. Martin
Keith M. Martin
Verified email at rhul.ac.uk - Homepage
Title
Cited by
Cited by
Year
Everyday cryptography
KM Martin
The Australian Mathematical Society 231 (6), 2012
2082012
A reputation-based announcement scheme for VANETs
Q Li, A Malip, KM Martin, SL Ng, J Zhang
IEEE Transactions on Vehicular Technology 61 (9), 4095-4108, 2012
1852012
On key assignment for hierarchical access control
J Crampton, K Martin, P Wild
19th IEEE Computer Security Foundations Workshop (CSFW'06), 14 pp.-111, 2006
1772006
The geometry of shared secret schemes
GJ Simmons
Bulletin of the Institute of Combinatorics and its Applications 1, 71-88, 1991
1701991
Authentication protocols for mobile network environment value-added services
G Horn, KM Martin, CJ Mitchell
IEEE Transactions on Vehicular Technology 51 (2), 383-392, 2002
1412002
Perfect secret sharing schemes on five participants
WA Jackson, KM Martin
Designs, Codes and Cryptography 9 (3), 267-286, 1996
1261996
Survey on security challenges for swarm robotics
F Higgins, A Tomlinson, KM Martin
2009 Fifth International Conference on Autonomic and Autonomous Systems, 307-312, 2009
1002009
Geometric secret sharing schemes and their duals
WA Jackson, KM Martin
Designs, Codes and Cryptography 4 (1), 83-95, 1994
971994
Multisecret threshold schemes
WA Jackson, KM Martin, CM O’Keefe
Annual International Cryptology Conference, 126-135, 1993
951993
Multisecret threshold schemes
WA Jackson, KM Martin, CM O’Keefe
Annual International Cryptology Conference, 126-135, 1993
951993
Stability of nanometer-thick layers in hard coatings
SA Barnett, A Madan, I Kim, K Martin
Mrs Bulletin 28 (3), 169-172, 2003
932003
Threats to the swarm: Security considerations for swarm robotics
F Higgins, A Tomlinson, KM Martin
International Journal on Advances in Security 2 (2&3), 2009
892009
On sharing many secrets
WA Jackson, KM Martin, CM O'Keefe
International Conference on the theory and application of cryptology, 42-54, 1994
851994
Dynamic user revocation and key refreshing for attribute-based encryption in cloud storage
Z Xu, KM Martin
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
832012
New secret sharing schemes from old
KM Martin
J. Combin. Math. Combin. Comput 14, 65-77, 1993
801993
Changing thresholds in the absence of secure channels
KM Martin, J Pieprzyk, R Safavi-Naini, H Wang
Australasian Conference on Information Security and Privacy, 177-191, 1999
72*1999
Changing thresholds in the absence of secure channels
KM Martin, J Pieprzyk, R Safavi-Naini, H Wang
Australasian Conference on Information Security and Privacy, 177-191, 1999
701999
A combinatorial interpretation of ramp schemes
WA Jackson, KM Martin
Australasian Journal of Combinatorics 14, 51-60, 1996
651996
Discrete structures in the theory of secret sharing
KM Martin
University of London, 1991
571991
Efficient key predistribution for grid-based wireless sensor networks
SR Blackburn, T Etzion, KM Martin, MB Paterson
International conference on information theoretic security, 54-69, 2008
562008
The system can't perform the operation now. Try again later.
Articles 1–20