Professor Keith M. Martin

  1. 2017
  2. Published

    Host mobility key management in dynamic secure group communication

    Daghighi, B., Mat Kiah, M. L., Iqbal, S., Habib Ur Rehman, M. & Martin, K. 28 Apr 2017 In : Wireless Networks. p. 1-19 19 p.

    Research output: Contribution to journalArticle

  3. Published

    Revisiting and Extending the AONT-RS Scheme: A Robust Computationally Secure Secret Sharing Scheme

    Laing, T., Chen, L. I. & Martin, K. 20 Apr 2017 Progress in Cryptology - AFRICACRYPT 2017: 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings. Springer, p. 40 - 57 18 p. (Lecture Notes in Computer Science; vol. 10239)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Private Outsourced Kriging Interpolation

    Alderman, J., Curtis, B., Farràs Ventura, O., Martin, K. & Ribes-González, J. 7 Apr 2017

    Research output: Contribution to conferencePaper

  5. 2016
  6. Published

    Are Information Security Professionals Expected Value Maximisers?: An Experimental and Survey-based Test

    Mersinas, K., Hartig, B., Martin, K. & Seltzer, A. 22 Dec 2016 In : Journal of Cybersecurity. 2, 1, p. 57-70 14 p.

    Research output: Contribution to journalArticle

  7. E-pub ahead of print

    Efficient, XOR-based, Ideal (t; n)-threshold Schemes

    Chen, L., Laing, T. & Martin, K. 28 Oct 2016 Proceedings of 15th International Conference on Cryptology and Network Security (CANS 2016). Springer, Vol. 10052, p. 467-483 17 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  8. Published

    Localised Multisecret Sharing

    Laing, T., Martin, K., Paterson, M. & Stinson, D. 31 Aug 2016 In : Cryptography and Communications. p. 1-17 17 p.

    Research output: Contribution to journalArticle

  9. E-pub ahead of print

    Private reputation retrieval in public - a privacy-aware announcement scheme for VANETs

    Ng, S., Martin, K., Chen, L. I. & Li, Q. 22 Aug 2016 In : IET Information Security .

    Research output: Contribution to journalArticle

  10. Published

    Measuring Attitude towards Risk Treatment Actions amongst Information Security Professionals: an Experimental Approach

    Mersinas, K., Hartig, B., Martin, K. & Seltzer, A. 13 Jun 2016 Workshop on the Economics of Information Security.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Extended Functionality in Verifiable Searchable Encryption

    Alderman, J., Janson, C., Martin, K. & Renwick, S. 9 Jan 2016 Proceedings of the 2nd International Conference on Cryptography and Information Security in the Balkans - BalkanCryptSec 2015. Springer, Vol. 9540, p. 187-205 19 p. (Lecture Notes in Computer Science - LNCS; vol. 9540). (Lecture Notes in Computer Science; vol. 9540)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Cryptographic Tools for Cloud Environments

    Alderman, J., Crampton, J. & Martin, K. 2016 Guide to Security Assurance for Cloud Computing. Zhu, S. Y., Hill, R. & Trovati, M. (eds.). Springer, Vol. Guide to Security Assurance for Cloud Computing

    Research output: Chapter in Book/Report/Conference proceedingChapter

  13. 2015
  14. Published

    Security in Swarm Robotics

    Laing, T., Martin, K., Ng, S. & Tomlinson, A. Dec 2015 Handbook of Research on Design, Control, and Modeling of Swarm Robotics. Tan, Y. (ed.). IGI Global, p. 42-66 25 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  15. Published

    Cover-free codes and frequency hopping multiple access.

    Nyirenda, M., Ng, S-L. & Martin, K. M. Apr 2015

    Research output: Contribution to conferenceAbstract

  16. Published

    Multiple Attacks on Authentication Protocols for Low-Cost RFID Tags

    Bilal, Z., Martin, K. M. & Saeed, Q. 1 Mar 2015 In : Applied Mathematics and Information Sciences. 9, 2, p. 561-569 9 p.

    Research output: Contribution to journalArticle

  17. Published

    Balancing Privacy and Surveillance in the Cloud: The Pivotal Role of the Private Sector

    Macropoulos, C. & Martin, K. 2015 In : IEEE Cloud Computing . 2, 4, p. 14-21 8 p.

    Research output: Contribution to journalArticle

  18. Published

    Cyber Security Education, Qualifications and Training

    Martin, K. M. 2015 Engineering and Technology Reference. IET

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  19. Published

    Experimental Elicitation of Risk Behaviour amongst Information Security Professionals

    Mersinas, K., Hartig, B., Martin, K. & Seltzer, A. 2015 Workshop on the Economics of Information Security .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Graph-theoretic design and analysis of key predistribution schemes

    Kendall, M. & Martin, K. 2015 In : Designs, Codes and Cryptography. p. 1-24 24 p.

    Research output: Contribution to journalArticle

  21. 2014
  22. Published

    A combinatorial framework for frequency hopping multiple access

    Nyirenda, M., Ng, S-L. & Martin, K. M. 2014 Proceedings of the Fourteenth International Workshop on Algebraic and Combinatorial Coding Theory. p. 271 276 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    A Hierarchical Anti-Counterfeit Mechanism: Securing the Supply Chain using RFIDs

    Bilal, Z. & Martin, K. M. 2014 Foundations and Practice of Security. Springer, Vol. 8352, p. 291-305 (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Adaptive online/offline RFID scheme for supply chain management systems

    Bilal, Z. & Martin, K. M. 2014 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS) . IEEE, p. 1-9

    Research output: Chapter in Book/Report/Conference proceedingChapter

  25. Published

    Anonymous User Revocation for Using Attribute-Based Signature in Cloud Computing

    Xu, Z. & Martin, K. M. 2014 The 6th IEEE International Conference on Cloud Computing Technology and Science. IEEE, p. 358-365

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Broadcast-enhanced Key Predistribution Schemes

    Kendall, M., Martin, K. M., Ng, S-L., Paterson, M. & Stinson, D. 2014 In : ACM Transactions on Sensor Networks. 11, 1, 33 p., 6

    Research output: Contribution to journalArticle

  27. Published

    The Militarisation of Cyberspace: Implications for the Private Sector

    Macropoulos, C. & Martin, K. M. 2014 ISSA Journal. 11 ed. ISSA, Vol. 12, p. 32-36

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  28. 2013
  29. Published

    A Practical Deployment Framework for Use of Attribute-Based Encryption in Data Protection

    Xu, Z. & Martin, K. M. 2013 The 15th IEEE International Conference on High Performance Computing and Communications. IEEE, p. 1593-1598

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    A privacy-aware reputation-based announcement scheme for VANETs

    Chen, L. I., Li, Q., Martin, K. M. & Ng, S-L. 2013 Wireless Vehicular Communications (WiVeC), 2013 IEEE 5th International Symposium on. IEEE, p. 1-5

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Ultra-lightweight Mutual Authentication Protocols: Weaknesses and Countermeasures

    Bilal, Z. & Martin, K. M. 2013 Availability, Reliability and Security (ARES), 2013 Eighth International Conference on. IEEE, p. 304-309

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. 2012
  33. Published

    A reputation-based announcement scheme for VANETs

    Li, Q., Malip, A., Martin, K. M., Ng, S-L. & Zhang, J. 23 Jul 2012 In : IEEE Transaction on Vehicular Technology. 61, 9, p. 4095-4108

    Research output: Contribution to journalArticle

  34. Published

    Everyday Cryptography: Fundamental Principles and Applications

    Martin, K. M. 1 Mar 2012 Oxford: Oxford University Press. 530 p.

    Research output: Book/ReportBook

  35. Published

    Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption in Cloud Storage

    Xu, Z. & Martin, K. M. 2012 Proceedings of 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012). IEEE Computer Society Press, p. 844-849

    Research output: Chapter in Book/Report/Conference proceedingChapter

  36. Published

    Feedback as “Shadow of the Present”: An Alternative to Reputation Systems for E-Marketplaces

    Li, Q., Zhang, J. & Martin, K. M. 2012 Proceedings of 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012) . IEEE Computer Society Press, p. 334-341

    Research output: Chapter in Book/Report/Conference proceedingChapter

  37. Published

    On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks

    Kendall, M. & Martin, K. M. 2012 Research in Cryptology – 4th Western European Workshop WEWoRC 2011. Springer, Vol. 7242, p. 62-82 (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. 2011
  39. Published

    Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures

    Martin, K. M., Paterson, M. B. & Stinson, D. R. 1 Jun 2011 In : Cryptography and Communications. 3, 2, p. 65-86

    Research output: Contribution to journalArticle

  40. Published

    A survey of security services and techniques in distributed storage systems

    Xu, Z., Martin, K. M. & Kotnik, C. 2011 Proceedings of the 2011 International Conference on Security and Management (SAM '11). p. 3-9

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Applications of galois geometry to cryptology

    Martin, K. M. 2011 Current Research Topics in Galois Geometry. Nova science, p. 215-244 (Mathematics Research Developments: Cryptography, Steganography and Data Security)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  42. Published

    Design of a multiagent-based e-marketplace to secure service trading on the Internet

    Li, Q., Martin, K. M. & Zhang, J. 2011 Proceedings of the 13th International Conference on Electronic Commerce (ICEC 2011) .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Offline Peer-to-Peer Broadcast with Anonymity

    Kiyomoto, S., Fukushima, K. & Martin, K. M. 2011 E-business and Telecommunications. 3 ed. Springer, Vol. 130, p. 174-185 (Communications in Computer and Information Science )

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    On security vulnerabilities and mitigation in the cognition cycle of Distributed Cognitive Radio Networks

    Yau, K-L. A., Komisarczuk, P., Poh, G-S. & Martin, K. 2011 Proceedings of the 6th International Conference on Broadband Communications & Biomedical Applications. IEEE, p. 132-137

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Provably secure multisignature scheme with document decomposition and signer anonymity

    Martin, K. M., Tsai, K-Y., Wu, T-Z. & Hsu, C-L. 2011 In : ICIC Express Letters. 5, 9, p. 3579-3583

    Research output: Contribution to journalArticle

  46. Published

    The rise and fall and rise of combinatorial key predistribution

    Martin, K. M. 2011 Selected Areas in Cryptography. Springer, Vol. 6544, p. 93-98 (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. 2010
  48. Published

    Distinct difference configurations: multihop paths and key predistribution in sensor networks

    Blackburn, S. R., Etzion, T., Martin, K. M. & Paterson, M. B. Aug 2010 In : IEEE Transactions on Information Theory. 56, 8, p. 3961-3972 12 p.

    Research output: Contribution to journalArticle

  49. Published

    Key predistribution for homogeneous wireless sensor networks with group deployment of nodes

    Martin, K. M., Paterson, M. B. & Stinson, D. R. Aug 2010 In : ACM Transactions on Sensor Networks. 7, 2, 11

    Research output: Contribution to journalArticle

  50. Published

    Two-dimensional patterns with distinct differences - constructions, bounds, and maximal anticodes

    Blackburn, S. R., Etzion, T., Martin, K. M. & Paterson, M. B. Mar 2010 In : IEEE Transactions on Information Theory. 56, 3, p. 1216-1229 14 p.

    Research output: Contribution to journalArticle

  51. Published

    A secure marketplace for online services that induces good conduct

    Li, Q. & Martin, K. M. 2010 Proceedings of Fourth IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2010). p. 65-72

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    A viable grid marketplace

    Li, Q. & Martin, K. M. 2010 Proceedings of IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA 2010). IEEE Computer Society Press, p. 427-432

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Constructing Key Assignment Schemes from Chain Partitions

    Crampton, J., Daud, R., Martin, K. M., Foresti, S. (ed.) & Jajodia, S. (ed.) 2010 Data and Applications Security and Privacy XXIV. Springer, Vol. 6166, p. 130-145 16 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Towards a Common Notion of Privacy Leakage on Public Database

    Kiyomoto, S. & Martin, K. M. 2010 Proceedings of Fifth International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA’10). IEEE Computer Society Press, p. 186-191

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. 2009
  56. Published

    Survey on Security Challenges for Swarm Robotics

    Higgins, F., Tomlinson, A. & Martin, K. M. Apr 2009 p. 307- 312

    Research output: Contribution to conferencePaper

  57. Published

    An efficient buyer-seller watermarking protocol based on Chameleon encryption

    Martin, K. M. & Poh, G. S. 2009 Digital Watermarking, 7th International Workshop (IWDW 2008). Springer, Vol. 5450, p. 433-447 15 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  58. Published

    An offline peer-to-peer broadcasting scheme with anonymity

    Kiyomoto, S., Fukushima, K. & Martin, K. M. 2009 Proceedings of the International Conference on Security and Cryptography (SECRYPT 2009), Milan, Italy, July 7-10. INSTICC Press, p. 75-82 8 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  59. Published

    Classification framework for fair content tracing protocols

    Martin, K. M. & Poh, G. S. 2009 Digital Watermarking, 8th International Workshop (IWDW 2009). Springer, Vol. 5703, p. 252-267 16 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  60. Published

    Design Flaws of A Secure Watermarking Scheme for Buyer-Seller Identification and Copyright Protection

    Martin, K. M. & Poh, G. S. 2009 In : International Journal of Cryptology Research. 1, 1, p. 55-64

    Research output: Contribution to journalArticle

  61. Published

    Establishing the broadcast efficiency of the Subset Difference revocation scheme

    Martin, K. M., Martin, T. & Wild, P. 2009 In : Designs, Codes and Cryptography. 51, 3, p. 315-334 20 p.

    Research output: Contribution to journalArticle

  62. Published

    On the applicability of combinatorial designs to key predistribution for wireless sensor networks

    Martin, K. M. 2009 Coding and Cryptology (IWCC2009). Springer, Vol. 5557, p. 124-145 22 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  63. Published

    Privacy-aware location database service for granular queries

    Kiyomoto, S., Martin, K. M. & Fukushima, K. 2009 Information Security Theory and Practice: Smart Devices, Pervasive Systems and Ubiquitous Networks (WISTP 2009). Springer, Vol. 5746, p. 28-37 10 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  64. Published

    Threats to the Swarm: Security Considerations for Swarm Robotics

    Higgins, F., Tomlinson, A. & Martin, K. M. 2009 In : International Journal on Advances in Security. 2, 2&3, p. 288 - 297

    Research output: Contribution to journalArticle

  65. Published

    Ultra-lightweight key predistribution in wireless sensor networks for monitoring linear infrastructure

    Martin, K. M. & Paterson, M. B. 2009 Information Security Theory and Practice: Smart Devices, Pervasive Systems and Ubiquitous Networks (WISTP 2009). Springer, Vol. 5746, p. 143-152 10 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  66. 2008
  67. Published

    An application-oriented framework for wireless sensor network key establishment

    Martin, K. M. & Paterson, M. B. 2008 Electronic Notes in Theoretical Computer Science: Proceedings of the Third Workshop on Cryptography for Ad-hoc Networks WCAN'07. 2 ed. Vol. 192, p. 31-41 11 p. (Electronic Notes in Theoretical Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  68. Published

    Challenging the adversary model in secret sharing schemes

    Martin, K. M. 2008 Coding and Cryptography II. Proceedings of the Royal Flemish Academy of Belgium for Science and the Arts. p. 45-63 19 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  69. Published

    Efficient key predistribution for grid-based wireless sensor networks

    Blackburn, S. R., Etzion, T., Martin, K. M. & Paterson, M. B. 2008 Information Theoretic Security. Safavi-Naini, R. (ed.). Berlin: Springer, Vol. 5155, p. 54-69 16 p. (Lecture Notes in Computer Science; vol. 5155)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  70. Published

    Key refreshing in wireless sensor networks

    Blackburn, S. R., Martin, K. M., Paterson, M. B. & Stinson, D. R. 2008 Information Theoretic Security: Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008: Proceedings . Safavi-Naini, R. (ed.). Berlin: Springer, Vol. 5155, p. 156-170 15 p. (Lecture Notes in Computer Science; vol. 5155)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  71. Published

    On the (In)security of Two Buyer-Seller Watermarking Protocols

    Martin, K. M. & Poh, G. S. 2008 Proceedings of the International Conference on Security and Cryptography (SECRYPT 2008), Porto, Portugal, July 26-29. INSTICC Press, p. 253-260 8 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  72. Published

    White hat vs. white hat: a new approach to managing business risk

    Martin, K. M. & MacKinnon, I. D. 2008 In : ISSA Journal. April, p. 10-15 and cover

    Research output: Contribution to journalArticle

  73. 2007
  74. Published

    A framework for design and analysis of asymmetric fingerprinting protocols

    Martin, K. M. & Poh, G. S. 2007 Proceedings of Third International Symposium on Information Assurance and Security IAS 2007. IEEE Computer Society Press, p. 457-461 5 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  75. Published

    Host mobility protocol for secure group communication in wireless mobile environments

    Martin, K. M. & Kiah, M. L. M. 2007 Proceedings of 2007 International Conference on Future Generation Communication and Networking (FGCN 2007). IEEE Computer Society Press, p. 100-107

    Research output: Chapter in Book/Report/Conference proceedingChapter

  76. Published

    The combinatorics of cryptographic key establishment

    Martin, K. M. 2007 Surveys in Combinatorics. Cambridge University Press, Vol. 346, p. 223-273 51 p. (London Mathematical Society Lecture Note Series)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  77. Published

    The combinatorics of generalised cumulative arrays.

    Martin, K. M. & Ng, S-L. 2007 In : Journal of Mathematical Cryptology. 1, 1, p. 13-32 20 p.

    Research output: Contribution to journalArticle

  78. 2006
  79. Published

    A generic group key management framework for group communication in wireless mobile environments

    Martin, K. M. & Kiah, M. L. M. 2006 Proceedings of the 6th International Network Conference (INC2006).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  80. Published

    A provably secure refreshable partially anonymous token and its applications

    Shigetomi, R., Otsuka, A., Furukawa, J., Martin, K. M. & Imai, H. 2006 In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E89-A(5), p. 1396-1406 11 p.

    Research output: Contribution to journalArticle

  81. Published

    Distributed Certificate Authority in cluster-based ad hoc networks

    Martin, K. M. & Chaddoud, G. 2006 Proceedings of 3rd International Conference on Mobile Computing and Ubiquitous Networking. p. 278-283

    Research output: Chapter in Book/Report/Conference proceedingChapter

  82. Published

    Evolution of support for an on-line information security masters programme

    Martin, K. M., Balfe, S., Coles-Kemp, L. & Ganley, H. 2006 Proceedings of 1st Annual Conference on Education in Information Security.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  83. Published

    On Key Assignment for Hierarchical Access Control

    Crampton, J., Martin, K. M. & Wild, P. 2006 Proceedings of 19th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, p. 98-111 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Optimal updating of ideal threshold schemes

    Martin, K. M., Barwick, S. G., Jackson, W-A. & O'Keefe, C. M. 2006 In : Australasian Journal of Combinatorics. 36, p. 123-132 10 p.

    Research output: Contribution to journalArticle

  85. 2005
  86. Published

    A general approach to robust web metering

    Barwick, S. G., Jackson, W-A. & Martin, K. M. 2005 In : Designs, Codes and Cryptography. 36, 1, p. 5-27 23 p.

    Research output: Contribution to journalArticle

  87. Published

    Distributing the encryption and decryption of a block cipher

    Martin, K. M., Safavi-Naini, R., Wang, H. & Wild, P. 2005 In : Designs, Codes and Cryptography. 36, 3, p. 263-287 25 p.

    Research output: Contribution to journalArticle

  88. Published

    Dynamic access policies for unconditionally secure secret sharing schemes

    Martin, K. M. 2005 Proceedings of IEEE Information Theory Workshop (ITW 05), Awaji Island, Japan. IEEE Computer Society Press, p. 61-66

    Research output: Chapter in Book/Report/Conference proceedingChapter

  89. Published

    Group communication: Design challenges in the development of key management frameworks in wireless mobile environments

    Martin, K. M. & Kiah, M. L. M. 2005 Proceedings of Security & Management (SAM '05), Las Vegas. p. 385-391 7 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  90. Published

    Updating the parameters of a threshold scheme by minimal broadcast

    Barwick, S. G., Jackson, W-A. & Martin, K. M. 2005 In : IEEE Transactions on Information Theory. 51, 2, p. 620-633 14 p.

    Research output: Contribution to journalArticle

  91. 2004
  92. Published

    Geometrical contributions to secret sharing theory

    Jackson, W-A., Martin, K. M. & O'Keefe, C. M. 2004 In : Journal of Geometry. 79, 1-2, p. 102-133 32 p.

    Research output: Contribution to journalArticle

  93. 2003
  94. Published

    Providing anonymity in unconditionally secure secret sharing schemes

    Guillermo, M., Martin, K. M. & O'Keefe, C. M. 2003 In : Designs, Codes and Cryptography. 28, p. 227-245 19 p.

    Research output: Contribution to journalArticle

  95. Published

    Security

    Martin, K. M. 2003 E-Commerce Handbook. Thomson-Gee

    Research output: Chapter in Book/Report/Conference proceedingChapter

  96. Published

    Ten years of information security Masters programmes: reflections and new challenges

    Martin, K. M., Ciechanowicz, C., Piper, F. C. & Robshaw, M. J. B. 2003 Security Education and Critical Infrastructures: Proceedings of WISE03. Kluwer, p. 215-230 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  97. Published

    Threshold MACs

    Martin, K. M., Pieprzyk, J., Safavi-Naini, R., Wang, H. & Wild, P. R. 2003 Information Security and Cryptology - ICISC 2002. Springer, Vol. 2587, p. 237-252 16 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  98. 2002
  99. Published

    Authentication protocols for mobile environment value-added services

    Horn, G., Martin, K. M. & Mitchell, C. J. 2002 In : IEEE Transaction on Vehicular Technology. 51, 2, p. 383-392 10 p.

    Research output: Contribution to journalArticle

  100. Published

    Size of broadcast in threshold schemes with disenrollment

    Martin, K. M., Barwick, S. G., Jackson, W-A. & Wild, P. R. 2002 Information Security and Privacy, 7th Australasian Conference, ACISP02. Springer, Vol. 2384, p. 71-88 18 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  101. 2001
  102. Published

    Weaknesses of protocols for updating the parameters of an established threshold scheme

    Martin, K. M. & Nakahara Jr, J. 2001 In : IEE Proc. Computers and Digital Techniques. 148, 1, p. 45-48 4 p.

    Research output: Contribution to journalArticle

  103. 1999
  104. Published

    Bounds and techniques for efficient redistribution of secret shares to new access structures

    Martin, K. M., Safavi-Naini, R. & Wang, H. 1999 In : The Computer Journal. 42, 8, p. 638-649 12 p.

    Research output: Contribution to journalArticle

  105. Published

    Changing thresholds in the absence of secure channels

    Martin, K. M., Pieprzyk, J., Safavi-Naini, R. & Wang, H. 1999 Information Security and Privacy, 4th Australasian Conference, ACISP99. Springer, Vol. 1587, p. 177-191 15 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  106. Published

    Changing thresholds in the absence of secure channels

    Martin, K. M., Pieprzyk, J., Safavi-Naini, R. & Wang, H. 1999 In : Australian Computer Journal. 31, 2, p. 34-43 10 p.

    Research output: Contribution to journalArticle

  107. Published

    Comments on an optimized protocol for mobile network authentication and security

    Martin, K. M. & Mitchell, C. J. 1999 In : Mobile Computing and Communications Review. 3, 2, p. 37

    Research output: Contribution to journalArticle

  108. 1998
  109. Published

    A General Decomposition Construction for Incomplete Secret Sharing Schemes

    van Dijk, M., Jackson, W-A. & Martin, K. M. 1998 In : Designs, Codes and Cryptography. 15, 3, p. 301-321 21 p.

    Research output: Contribution to journalArticle

  110. Published

    An Algorithm for Efficient Geometric Secret Sharing

    Martin, K. M. & Jackson, W-A. 1998 In : Utilitas Mathematica. 54, p. 127-150 24 p.

    Research output: Contribution to journalArticle

  111. Published

    Analysis of a hash-function of Yi and Lam

    Martin, K. M. & Mitchell, C. J. 1998 In : Electronics Letters. 34, 24, p. 2327-2328 2 p.

    Research output: Contribution to journalArticle

  112. Published

    Applying Cryptography within the ASPeCT Project, Information Security Technical Report

    Martin, K. M. 1998 In : Elsevier Advanced Technology. 2, 4, p. 41-53 13 p.

    Research output: Contribution to journalArticle

  113. Published

    Bounds and Constructions for Authentication Schemes offering Secrecy

    Martin, K. M., Casse, L. R. A. & Wild, P. R. 1998 In : Designs, Codes and Cryptography. 13, p. 107-129 23 p.

    Research output: Contribution to journalArticle

  114. Published

    Combinatorial Models for Perfect Secret Sharing Schemes

    Martin, K. M. & Jackson, W-A. 1998 In : Journal of Combinatorial Mathematics and Combinatorial Computing. 28, p. 249-265 17 p.

    Research output: Contribution to journalArticle

  115. Published

    In Search of Multiple Domain Key Recovery

    Knudsen, L. R. & Martin, K. M. 1998 In : Journal of Computer Security. 6, 4, p. 219-236 18 p.

    Research output: Contribution to journalArticle

  116. Published

    Secure Billing for Mobile Information Services in UMTS

    Martin, K. M., Preneel, B., Mitchell, C. J., Hitz, H. J., Horn, G., Poliakova, A. & Howard, P. 1998 Intelligence in Services and Networks: Technology for Ubiquitous Telecom Services, (Proceedings of the Fifth International Conference, IS&N 98, Antwerp, Belgium, 25-28 May 1998) . Trigila, S., Mullery, A., Campolargo, M. & Mampaey, M. (eds.). Springer-Verlag, Vol. 1430, p. 535-548 14 p. (Lecture Notes in Computer Science; no. 1430)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  117. Published

    Simplification and Generalisation of the Wu-Wu Broadcasting Cryptosystem

    Martin, K. M. 1998 In : Electronics Letters. 34, 24, p. 2328-2329 2 p.

    Research output: Contribution to journalArticle

  118. Published

    The Filing Cabinet Problem

    Martin, K. M. & Koumandos, S. 1998 In : Bulletin of the ICA. 22, p. 25-30 6 p.

    Research output: Contribution to journalArticle

  119. Published

    Trialling Secure Billing with Trusted Third Party Support for UMTS Applications

    Horn, G., Howard, P., Martin, K. M., Mitchell, C. J., Preneel, B. & Rantos, K. 1998 Proceedings of 3rd ACTS Mobile Communications Summit, Rhodes, Greece, 9-11 June 1998. p. 574-579 6 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

Previous 1 2 Next