- 10 results
Search results
-
2011
The rise and fall and rise of combinatorial key predistribution
Martin, K. M., 2011, Selected Areas in Cryptography. Springer, Vol. 6544. p. 93-98 (Lecture Notes in Computer Science).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2010
Distinct difference configurations: multihop paths and key predistribution in sensor networks
Blackburn, S. R., Etzion, T., Martin, K. M. & Paterson, M. B., Aug 2010, In: IEEE Transactions on Information Theory. 56, 8, p. 3961-3972 12 p.Research output: Contribution to journal › Article › peer-review
-
Key predistribution for homogeneous wireless sensor networks with group deployment of nodes
Martin, K. M., Paterson, M. B. & Stinson, D. R., Aug 2010, In: ACM Transactions on Sensor Networks. 7, 2, 11.Research output: Contribution to journal › Article › peer-review
-
Two-dimensional patterns with distinct differences - constructions, bounds, and maximal anticodes
Blackburn, S. R., Etzion, T., Martin, K. M. & Paterson, M. B., Mar 2010, In: IEEE Transactions on Information Theory. 56, 3, p. 1216-1229 14 p.Research output: Contribution to journal › Article › peer-review
-
2009
On the applicability of combinatorial designs to key predistribution for wireless sensor networks
Martin, K. M., 2009, Coding and Cryptology (IWCC2009). Springer, Vol. 5557. p. 124-145 22 p. (Lecture Notes in Computer Science).Research output: Chapter in Book/Report/Conference proceeding › Chapter
-
Ultra-lightweight key predistribution in wireless sensor networks for monitoring linear infrastructure
Martin, K. M. & Paterson, M. B., 2009, Information Security Theory and Practice: Smart Devices, Pervasive Systems and Ubiquitous Networks (WISTP 2009). Springer, Vol. 5746. p. 143-152 10 p. (Lecture Notes in Computer Science).Research output: Chapter in Book/Report/Conference proceeding › Chapter
-
2008
An application-oriented framework for wireless sensor network key establishment
Martin, K. M. & Paterson, M. B., 2008, Electronic Notes in Theoretical Computer Science: Proceedings of the Third Workshop on Cryptography for Ad-hoc Networks WCAN'07. 2 ed. Vol. 192. p. 31-41 11 p. (Electronic Notes in Theoretical Computer Science).Research output: Chapter in Book/Report/Conference proceeding › Chapter
-
Efficient key predistribution for grid-based wireless sensor networks
Blackburn, S. R., Etzion, T., Martin, K. M. & Paterson, M. B., 2008, Information Theoretic Security. Safavi-Naini, R. (ed.). Berlin: Springer, Vol. 5155. p. 54-69 16 p. (Lecture Notes in Computer Science; vol. 5155).Research output: Chapter in Book/Report/Conference proceeding › Chapter
-
Key refreshing in wireless sensor networks
Blackburn, S. R., Martin, K. M., Paterson, M. B. & Stinson, D. R., 2008, Information Theoretic Security: Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008: Proceedings . Safavi-Naini, R. (ed.). Berlin: Springer, Vol. 5155. p. 156-170 15 p. (Lecture Notes in Computer Science; vol. 5155).Research output: Chapter in Book/Report/Conference proceeding › Chapter
-
2007
The combinatorics of cryptographic key establishment
Martin, K. M., 2007, Surveys in Combinatorics. Cambridge University Press, Vol. 346. p. 223-273 51 p. (London Mathematical Society Lecture Note Series).Research output: Chapter in Book/Report/Conference proceeding › Chapter