BIROn - Birkbeck Institutional Research Online
    Up a level
    Export as [feed] Atom [feed] RSS
    Group by: Item Type | Date | Journal or Publication Title | No Grouping
    Number of items: 7.

    Electronic Journal of Combinatorics

    Blackburn, S.R. and Panoui, A. and Paterson, Maura B. and Stinson, D.R. (2010) Honeycomb arrays. Electronic Journal of Combinatorics 17 (R172), ISSN 1077-8926.

    IEEE International Symposium on Information Theory

    Blackburn, S.R. and Etzion, T. and Paterson, Maura B. (2019) PIR schemes with small download complexity and low storage requirements. IEEE International Symposium on Information Theory , ISSN 0018-9448.

    IEEE Transactions on Information Theory

    Blackburn, S.R. and Etzion, T. and Martin, K.M. and Paterson, Maura B. (2010) Distinct difference configurations: multihop paths and key predistribution in sensor networks. IEEE Transactions on Information Theory 56 (8), pp. 3961-3972. ISSN 0018-9448.

    Blackburn, S.R. and Etzion, T. and Martin, K.M. and Paterson, Maura B. (2010) Two-dimensional patterns with distinct differences; constructions, bounds, and maximal anticodes. IEEE Transactions on Information Theory 56 (3), pp. 1216-1229. ISSN 0018-9448.

    Information Theoretic Security: Lecture Notes in Computer Science

    Blackburn, S.R. and Etzion, T. and Martin, K.M. and Paterson, Maura B. (2008) Efficient key predistribution for grid-based wireless sensor networks. In: Fehr, S. (ed.) Information Theoretic Security. Lecture Notes in Computer Science 5155. Berlin, Germany: Springer-Verlag, pp. 54-69. ISBN 9783540850922.

    Journal of Combinatorial Mathematics and Combinatorial Computing

    Blackburn, S.R. and Paterson, Maura B. and Stinson, D.R. (2011) Putting dots in triangles. Journal of Combinatorial Mathematics and Combinatorial Computing 78 , pp. 23-32. ISSN 0835-3026.

    Lecture Notes in Computer Science, 2008, Volume 5155, Information Theoretic Security

    Blackburn, S.R. and Martin, K.M. and Paterson, Maura B. and Stinson, D.R. (2008) Key refreshing in wireless sensor networks. In: Safavi-Naini, R. (ed.) Information Theoretic Security. Lecture Notes in Computer Science 5155. Berlin, Germany: Springer, pp. 156-170. ISBN 9783540850922.

    This list was generated on Thu Oct 10 06:55:03 2024 BST.