BIROn - Birkbeck Institutional Research Online
    Up a level
    Export as [feed] Atom [feed] RSS
    Number of items: 23.

    Article

    Paterson, Maura B. and Stinson, D.R. (2021) Splitting authentication codes with perfect secrecy: new results, constructions and connections with algebraic manipulation detection codes. Advances in Mathematics of Communications , ISSN 1930-5346. (Submitted)

    Paterson, M.B. and Stinson, D.R. and Upadhyay, J. (2018) Multi-prover proof of retrievability. Journal of Mathematical Cryptology 12 (4), pp. 203-220. ISSN 1862-2976.

    Laing, T.M. and Martin, K.M. and Paterson, Maura B. and Stinson, D.R. (2016) Localised multisecret sharing. Cryptography and Communications 9 (5), pp. 581-597. ISSN 1936-2447.

    Paterson, Maura B. and Stinson, D.R. and Wang, Y. (2016) On encoding symbol degrees of array BP-XOR codes. Cryptography and Communications 8 (1), pp. 19-32. ISSN 1936-2447.

    Paterson, Maura B. and Stinson, D.R. (2015) Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs. Journal of Mathematical Cryptology 9 (4), pp. 215-225. ISSN 1862-2976.

    Kendall, M. and Martin, K.M. and Ng, S.-L. and Paterson, Maura B. and Stinson, D.R. (2014) Broadcast-enhanced key predistribution schemes. ACM Transactions on Sensor Networks 11 (1), 6:1-6:33. ISSN 1550-4859.

    Paterson, Maura B. and Stinson, D.R. (2014) A unified approach to combinatorial key predistribution schemes for sensor networks. Designs, Codes and Cryptography 71 , pp. 433-457. ISSN 0925-1022.

    Paterson, Maura B. and Stinson, D.R. (2013) A simple combinatorial treatment of constructions and threshold gaps of ramp schemes. Cryptography and Communications 5 (4), pp. 229-240. ISSN 1936-2447.

    Paterson, Maura B. and Stinson, D.R. and Upadhyay, J. (2013) A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage. Journal of Mathematical Cryptology 7 (3), pp. 181-277. ISSN 1862-2976.

    Dinitz, J.H. and Paterson, Maura B. and Stinson, D.R. and Wei, R. (2012) Constructions for retransmission permutation arrays. Designs, Codes and Cryptography 65 (3), pp. 325-351. ISSN 0925-1022.

    Paterson, Maura B. and Stinson, D.R. (2012) Yet another hat game. Electronic Journal of Combinatorics 17 , ISSN 1077-8926.

    Blackburn, S.R. and Paterson, Maura B. and Stinson, D.R. (2011) Putting dots in triangles. Journal of Combinatorial Mathematics and Combinatorial Computing 78 , pp. 23-32. ISSN 0835-3026.

    Martin, K.M. and Paterson, Maura B. and Stinson, D.R. (2011) Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures. Cryptography and Communications 3 (2), pp. 65-86. ISSN 1936-2447.

    Blackburn, S.R. and Panoui, A. and Paterson, Maura B. and Stinson, D.R. (2010) Honeycomb arrays. Electronic Journal of Combinatorics 17 (R172), ISSN 1077-8926.

    Martin, K.M. and Paterson, Maura B. and Stinson, D.R. (2010) Key predistribution for homogeneous wireless sensor networks with group deployment of nodes. ACM Transactions on Sensor Networks 7 (2), ISSN 1550-4859.

    Stinson, D.R. and Wei, R. and Paterson, Maura B. (2009) Combinatorial batch codes. Advances in Mathematics of Communications 3 (1), pp. 13-27. ISSN 1930-5346.

    Paterson, Maura B. and Stinson, D.R. (2009) Two attacks on a sensor network key distribution scheme of Cheng and Agrawal. Journal of Mathematical Cryptology 2 (4), pp. 393-403. ISSN 1862-2976.

    Book Section

    Blackburn, S.R. and Martin, K.M. and Paterson, Maura B. and Stinson, D.R. (2008) Key refreshing in wireless sensor networks. In: Safavi-Naini, R. (ed.) Information Theoretic Security. Lecture Notes in Computer Science 5155. Berlin, Germany: Springer, pp. 156-170. ISBN 9783540850922.

    Monograph

    Paterson, Maura and Stinson, D.R. (2019) On the equivalence of authentication codes and robust (2,2)-threshold schemes. Technical Report. Birkbeck, University of London, London, UK.

    Paterson, Maura B. and Stinson, D.R. and Upadhyay, J. (2016) Multi-prover proof-of-retrievability. Technical Report. Birkbeck, University of London, London, UK.

    Laing, T.M. and Martin, K.M. and Paterson, Maura B. and Stinson, D.R. (2015) Localised multisecret sharing. Technical Report. Birkbeck, University of London, London, UK.

    Paterson, Maura B. and Stinson, D.R. (2015) Combinatorial characterizations of algebraic manipulation detection codes involving generalized difference families. Technical Report. Birkbeck, University of London, London, UK.

    Paterson, Maura B. and Stinson, D.R. (2014) Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs. Technical Report. Birkbeck, University of London, London, UK.

    This list was generated on Tue Oct 19 17:11:39 2021 BST.