Browse by Person
Up a level |
ACM Transactions on Sensor Networks
Kendall, M. and Martin, K.M. and Ng, S.-L. and Paterson, Maura B. and Stinson, D.R. (2014) Broadcast-enhanced key predistribution schemes. ACM Transactions on Sensor Networks 11 (1), 6:1-6:33. ISSN 1550-4859.
Martin, K.M. and Paterson, Maura B. and Stinson, D.R. (2010) Key predistribution for homogeneous wireless sensor networks with group deployment of nodes. ACM Transactions on Sensor Networks 7 (2), ISSN 1550-4859.
Cryptography and Communications
Laing, T.M. and Martin, K.M. and Paterson, Maura B. and Stinson, D.R. (2016) Localised multisecret sharing. Cryptography and Communications 9 (5), pp. 581-597. ISSN 1936-2447.
Martin, K.M. and Paterson, Maura B. and Stinson, D.R. (2011) Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures. Cryptography and Communications 3 (2), pp. 65-86. ISSN 1936-2447.
Electronic Notes in Theoretical Computer Science
Martin, K.M. and Paterson, Maura B. (2008) An application-oriented framework for wireless sensor network key establishment. Electronic Notes in Theoretical Computer Science 192 (2), p. 31. ISSN 1571-0661.
IEEE Pervasive Computing
Angus, A. and Papadogkonas, D. and Papamarkos, G. and Roussos, George and Lane, G. and Martin, K.M. and West, N. and Thelwall, S. and Sujon, Z. and Silverstone, R. (2008) Urban social tapestries. IEEE Pervasive Computing 7 (4), pp. 44-51. ISSN 1536-1268.
IEEE Transactions on Information Theory
Blackburn, S.R. and Etzion, T. and Martin, K.M. and Paterson, Maura B. (2010) Distinct difference configurations: multihop paths and key predistribution in sensor networks. IEEE Transactions on Information Theory 56 (8), pp. 3961-3972. ISSN 0018-9448.
Blackburn, S.R. and Etzion, T. and Martin, K.M. and Paterson, Maura B. (2010) Two-dimensional patterns with distinct differences; constructions, bounds, and maximal anticodes. IEEE Transactions on Information Theory 56 (3), pp. 1216-1229. ISSN 0018-9448.
Information Theoretic Security: Lecture Notes in Computer Science
Blackburn, S.R. and Etzion, T. and Martin, K.M. and Paterson, Maura B. (2008) Efficient key predistribution for grid-based wireless sensor networks. In: Fehr, S. (ed.) Information Theoretic Security. Lecture Notes in Computer Science 5155. Berlin, Germany: Springer-Verlag, pp. 54-69. ISBN 9783540850922.
Lecture Notes in Computer Science, 2008, Volume 5155, Information Theoretic Security
Blackburn, S.R. and Martin, K.M. and Paterson, Maura B. and Stinson, D.R. (2008) Key refreshing in wireless sensor networks. In: Safavi-Naini, R. (ed.) Information Theoretic Security. Lecture Notes in Computer Science 5155. Berlin, Germany: Springer, pp. 156-170. ISBN 9783540850922.
Lecture Notes in Computer Science: Information Security Theory and Practice: Smart Devices, Pervasive Systems and Ubiquitous Networks
Martin, K.M. and Paterson, Maura B. (2009) Ultra-lightweight key predistribution in wireless sensor networks for monitoring linear infrastructure. In: Markowitch, O. and Bilas, A. and Hoepman, J.H. and Mitchell, C.J. and Quisquater, J.J. (eds.) Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks. Lecture Notes in Computer Science 5746. Berlin, Germany: Springer, p. 152. ISBN 9783642039447.
Leonardo
Marshall, J. and Airantzis, D. and Angus, A. and Bryan-Kinns, N. and Fencott, R. and Lane, G. and Lesage, F. and Martin, K.M. and Roussos, George and Taylor, J. and Warren, L. and Woods, O. (2010) Sensory threads. Leonardo 43 (2), pp. 196-197. ISSN 0024-094X.