On key assignment for hierarchical access control J Crampton, K Martin, P Wild 19th IEEE Computer Security Foundations Workshop (CSFW'06), 14 pp.-111, 2006 | 170 | 2006 |
The geometry of shared secret schemes GJ Simmons Bulletin of the Institute of Combinatorics and its Applications 1, 71-88, 1991 | 162 | 1991 |
Everyday cryptography KM Martin The Australian Mathematical Society 231 (6), 2012 | 155 | 2012 |
Authentication protocols for mobile network environment value-added services G Horn, KM Martin, CJ Mitchell IEEE Transactions on Vehicular Technology 51 (2), 383-392, 2002 | 137 | 2002 |
A reputation-based announcement scheme for VANETs Q Li, A Malip, KM Martin, SL Ng, J Zhang IEEE Transactions on Vehicular Technology 61 (9), 4095-4108, 2012 | 126 | 2012 |
Perfect secret sharing schemes on five participants WA Jackson, KM Martin Designs, Codes and Cryptography 9 (3), 267-286, 1996 | 118 | 1996 |
Geometric secret sharing schemes and their duals WA Jackson, KM Martin Designs, Codes and Cryptography 4 (1), 83-95, 1994 | 97 | 1994 |
Multisecret threshold schemes WA Jackson, KM Martin, CM O’Keefe Annual International Cryptology Conference, 126-135, 1993 | 87 | 1993 |
Multisecret threshold schemes WA Jackson, KM Martin, CM O’Keefe Annual International Cryptology Conference, 126-135, 1993 | 87 | 1993 |
Survey on security challenges for swarm robotics F Higgins, A Tomlinson, KM Martin 2009 Fifth International Conference on Autonomic and Autonomous Systems, 307-312, 2009 | 83 | 2009 |
On sharing many secrets WA Jackson, KM Martin, CM O'Keefe International Conference on the theory and application of cryptology, 42-54, 1994 | 82 | 1994 |
Dynamic user revocation and key refreshing for attribute-based encryption in cloud storage Z Xu, KM Martin 2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012 | 75 | 2012 |
New secret sharing schemes from old KM Martin J. Combin. Math. Combin. Comput 14, 65-77, 1993 | 74 | 1993 |
Changing thresholds in the absence of secure channels KM Martin, J Pieprzyk, R Safavi-Naini, H Wang Australasian Conference on Information Security and Privacy, 177-191, 1999 | 61 | 1999 |
A combinatorial interpretation of ramp schemes WA Jackson, KM Martin Australasian Journal of Combinatorics 14, 51-60, 1996 | 61 | 1996 |
Changing thresholds in the absence of secure channels KM Martin, J Pieprzyk, R Safavi-Naini, H Wang Australasian Conference on Information Security and Privacy, 177-191, 1999 | 60 | 1999 |
Secure billing for mobile information services in UMTS KM Martin, B Preneel, CJ Mitchell, HJ Hitz, G Horn, A Poliakova, ... International Conference on Intelligence in Services and Networks, 535-548, 1998 | 56 | 1998 |
Discrete structures in the theory of secret sharing KM Martin University of London, 1991 | 55 | 1991 |
Threats to the swarm: Security considerations for swarm robotics F Higgins, A Tomlinson, KM Martin International Journal on Advances in Security 2 (2&3), 2009 | 52 | 2009 |
Bounds and techniques for efficient redistribution of secret shares to new access structures KM Martin, R Safavi-Naini, H Wang The Computer Journal 42 (8), 638-649, 1999 | 52 | 1999 |