BIROn - Birkbeck Institutional Research Online
    Up a level
    Export as [feed] Atom [feed] RSS
    Group by: Item Type | Date | Journal or Publication Title | No Grouping
    Number of items: 33.

    ACM Transactions on Sensor Networks

    Kendall, M. and Martin, K.M. and Ng, S.-L. and Paterson, Maura B. and Stinson, D.R. (2014) Broadcast-enhanced key predistribution schemes. ACM Transactions on Sensor Networks 11 (1), 6:1-6:33. ISSN 1550-4859.

    Martin, K.M. and Paterson, Maura B. and Stinson, D.R. (2010) Key predistribution for homogeneous wireless sensor networks with group deployment of nodes. ACM Transactions on Sensor Networks 7 (2), ISSN 1550-4859.

    Advances in Mathematics of Communications

    Paterson, Maura B. and Stinson, D.R. (2021) Splitting authentication codes with perfect secrecy: new results, constructions and connections with algebraic manipulation detection codes. Advances in Mathematics of Communications , ISSN 1930-5346. (Submitted)

    Stinson, D.R. and Wei, R. and Paterson, Maura B. (2009) Combinatorial batch codes. Advances in Mathematics of Communications 3 (1), pp. 13-27. ISSN 1930-5346.

    Archiv der Mathematik

    Huczynska, S. and Paterson, Maura B. (2019) Characterising bimodal collections of sets in finite groups. Archiv der Mathematik 113 , pp. 571-580. ISSN 0003-889X.

    Cryptography and Communications

    Laing, T.M. and Martin, K.M. and Paterson, Maura B. and Stinson, D.R. (2016) Localised multisecret sharing. Cryptography and Communications 9 (5), pp. 581-597. ISSN 1936-2447.

    Paterson, Maura B. and Stinson, D.R. and Wang, Y. (2016) On encoding symbol degrees of array BP-XOR codes. Cryptography and Communications 8 (1), pp. 19-32. ISSN 1936-2447.

    Paterson, Maura B. and Stinson, D.R. (2013) A simple combinatorial treatment of constructions and threshold gaps of ramp schemes. Cryptography and Communications 5 (4), pp. 229-240. ISSN 1936-2447.

    Martin, K.M. and Paterson, Maura B. and Stinson, D.R. (2011) Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures. Cryptography and Communications 3 (2), pp. 65-86. ISSN 1936-2447.

    Designs, Codes and Cryptography

    Ng, S.-L. and Paterson, Maura B. (2019) Functional repair codes: a view from projective geometry. Designs, Codes and Cryptography 87 (164), pp. 2701-2722. ISSN 0925-1022.

    Ng, S.-L. and Paterson, Maura B. (2016) Disjoint difference families and their applications. Designs, Codes and Cryptography 78 (1), pp. 103-127. ISSN 0925-1022.

    Paterson, Maura B. and Stinson, D.R. (2014) A unified approach to combinatorial key predistribution schemes for sensor networks. Designs, Codes and Cryptography 71 , pp. 433-457. ISSN 0925-1022.

    Dinitz, J.H. and Paterson, Maura B. and Stinson, D.R. and Wei, R. (2012) Constructions for retransmission permutation arrays. Designs, Codes and Cryptography 65 (3), pp. 325-351. ISSN 0925-1022.

    Paterson, Maura B. (2007) Sequential and dynamic frameproof codes. Designs, Codes and Cryptography 42 (3), pp. 317-326. ISSN 0925-1022.

    Paterson, Maura B. (2007) Sliding-window dynamic frameproof codes. Designs, Codes and Cryptography 42 (2), pp. 195-212. ISSN 0925-1022.

    Discrete Mathematics

    Huczynska, S. and Paterson, Maura B. (2018) Weighted external difference families and R-optimal AMD codes. Discrete Mathematics 342 (3), 855 - 867. ISSN 0012-365X.

    Huczynska, S. and Paterson, Maura B. (2017) Existence and non-existence results for strong external difference families. Discrete Mathematics 341 (1), pp. 87-95. ISSN 0012-365X.

    Paterson, Maura B. and Stinson, D. (2016) Combinatorial characterizations of algebraic manipulation detection codes involving generalized difference families. Discrete Mathematics 339 (12), pp. 2891-2906. ISSN 0012-365X.

    Electronic Journal of Combinatorics

    Paterson, Maura B. and Stinson, D.R. (2012) Yet another hat game. Electronic Journal of Combinatorics 17 , ISSN 1077-8926.

    Blackburn, S.R. and Panoui, A. and Paterson, Maura B. and Stinson, D.R. (2010) Honeycomb arrays. Electronic Journal of Combinatorics 17 (R172), ISSN 1077-8926.

    Electronic Notes in Theoretical Computer Science

    Martin, K.M. and Paterson, Maura B. (2008) An application-oriented framework for wireless sensor network key establishment. Electronic Notes in Theoretical Computer Science 192 (2), p. 31. ISSN 1571-0661.

    IEEE International Symposium on Information Theory

    Blackburn, S.R. and Etzion, T. and Paterson, Maura B. (2019) PIR schemes with small download complexity and low storage requirements. IEEE International Symposium on Information Theory , ISSN 0018-9448.

    IEEE Transactions on Information Theory

    Blackburn, S.R. and Etzion, T. and Martin, K.M. and Paterson, Maura B. (2010) Distinct difference configurations: multihop paths and key predistribution in sensor networks. IEEE Transactions on Information Theory 56 (8), pp. 3961-3972. ISSN 0018-9448.

    Blackburn, S.R. and Etzion, T. and Martin, K.M. and Paterson, Maura B. (2010) Two-dimensional patterns with distinct differences; constructions, bounds, and maximal anticodes. IEEE Transactions on Information Theory 56 (3), pp. 1216-1229. ISSN 0018-9448.

    Information Theoretic Security: Lecture Notes in Computer Science

    Blackburn, S.R. and Etzion, T. and Martin, K.M. and Paterson, Maura B. (2008) Efficient key predistribution for grid-based wireless sensor networks. In: Fehr, S. (ed.) Information Theoretic Security. Lecture Notes in Computer Science 5155. Berlin, Germany: Springer-Verlag, pp. 54-69. ISBN 9783540850922.

    Journal of Combinatorial Mathematics and Combinatorial Computing

    Blackburn, S.R. and Paterson, Maura B. and Stinson, D.R. (2011) Putting dots in triangles. Journal of Combinatorial Mathematics and Combinatorial Computing 78 , pp. 23-32. ISSN 0835-3026.

    Journal of Mathematical Cryptology

    Paterson, Maura B. and Stinson, D.R. (2015) Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs. Journal of Mathematical Cryptology 9 (4), pp. 215-225. ISSN 1862-2976.

    Paterson, Maura B. and Stinson, D.R. and Upadhyay, J. (2013) A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage. Journal of Mathematical Cryptology 7 (3), pp. 181-277. ISSN 1862-2976.

    Paterson, Maura B. and Stinson, D.R. (2009) Two attacks on a sensor network key distribution scheme of Cheng and Agrawal. Journal of Mathematical Cryptology 2 (4), pp. 393-403. ISSN 1862-2976.

    Murphy, S. and Paterson, Maura B. (2008) A geometric view of cryptographic equation solving. Journal of Mathematical Cryptology 2 (1), pp. 63-107. ISSN 1862-2976.

    Lecture Notes in Computer Science

    Murphy, S. and Paterson, Maura B. (2009) Geometric ideas for cryptographic equation solving in even characteristic. In: Parker, M.G. (ed.) Cryptography and Coding. Lecture Notes in Computer Science 5921. Berlin, Germany: Springer, pp. 202-221. ISBN 9783642108679.

    Lecture Notes in Computer Science, 2008, Volume 5155, Information Theoretic Security

    Blackburn, S.R. and Martin, K.M. and Paterson, Maura B. and Stinson, D.R. (2008) Key refreshing in wireless sensor networks. In: Safavi-Naini, R. (ed.) Information Theoretic Security. Lecture Notes in Computer Science 5155. Berlin, Germany: Springer, pp. 156-170. ISBN 9783540850922.

    Lecture Notes in Computer Science: Information Security Theory and Practice: Smart Devices, Pervasive Systems and Ubiquitous Networks

    Martin, K.M. and Paterson, Maura B. (2009) Ultra-lightweight key predistribution in wireless sensor networks for monitoring linear infrastructure. In: Markowitch, O. and Bilas, A. and Hoepman, J.H. and Mitchell, C.J. and Quisquater, J.J. (eds.) Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks. Lecture Notes in Computer Science 5746. Berlin, Germany: Springer, p. 152. ISBN 9783642039447.

    This list was generated on Thu Mar 28 06:13:53 2024 GMT.