Browse by Person
Up a level |
ACM Transactions on Sensor Networks
Kendall, M. and Martin, K.M. and Ng, S.-L. and Paterson, Maura B. and Stinson, D.R. (2014) Broadcast-enhanced key predistribution schemes. ACM Transactions on Sensor Networks 11 (1), 6:1-6:33. ISSN 1550-4859.
Martin, K.M. and Paterson, Maura B. and Stinson, D.R. (2010) Key predistribution for homogeneous wireless sensor networks with group deployment of nodes. ACM Transactions on Sensor Networks 7 (2), ISSN 1550-4859.
Advances in Mathematics of Communications
Paterson, Maura B. and Stinson, D.R. (2021) Splitting authentication codes with perfect secrecy: new results, constructions and connections with algebraic manipulation detection codes. Advances in Mathematics of Communications , ISSN 1930-5346. (Submitted)
Stinson, D.R. and Wei, R. and Paterson, Maura B. (2009) Combinatorial batch codes. Advances in Mathematics of Communications 3 (1), pp. 13-27. ISSN 1930-5346.
Cryptography and Communications
Laing, T.M. and Martin, K.M. and Paterson, Maura B. and Stinson, D.R. (2016) Localised multisecret sharing. Cryptography and Communications 9 (5), pp. 581-597. ISSN 1936-2447.
Paterson, Maura B. and Stinson, D.R. and Wang, Y. (2016) On encoding symbol degrees of array BP-XOR codes. Cryptography and Communications 8 (1), pp. 19-32. ISSN 1936-2447.
Paterson, Maura B. and Stinson, D.R. (2013) A simple combinatorial treatment of constructions and threshold gaps of ramp schemes. Cryptography and Communications 5 (4), pp. 229-240. ISSN 1936-2447.
Martin, K.M. and Paterson, Maura B. and Stinson, D.R. (2011) Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures. Cryptography and Communications 3 (2), pp. 65-86. ISSN 1936-2447.
Designs, Codes and Cryptography
Paterson, Maura B. and Stinson, D.R. (2014) A unified approach to combinatorial key predistribution schemes for sensor networks. Designs, Codes and Cryptography 71 , pp. 433-457. ISSN 0925-1022.
Dinitz, J.H. and Paterson, Maura B. and Stinson, D.R. and Wei, R. (2012) Constructions for retransmission permutation arrays. Designs, Codes and Cryptography 65 (3), pp. 325-351. ISSN 0925-1022.
Discrete Mathematics
Paterson, Maura B. and Stinson, D.R. (2024) Circular external difference families, graceful labellings and cyclotomy. Discrete Mathematics 347 (10), p. 114103. ISSN 0012-365X.
Electronic Journal of Combinatorics
Paterson, Maura B. and Stinson, D.R. (2012) Yet another hat game. Electronic Journal of Combinatorics 17 , ISSN 1077-8926.
Blackburn, S.R. and Panoui, A. and Paterson, Maura B. and Stinson, D.R. (2010) Honeycomb arrays. Electronic Journal of Combinatorics 17 (R172), ISSN 1077-8926.
Journal of Combinatorial Mathematics and Combinatorial Computing
Blackburn, S.R. and Paterson, Maura B. and Stinson, D.R. (2011) Putting dots in triangles. Journal of Combinatorial Mathematics and Combinatorial Computing 78 , pp. 23-32. ISSN 0835-3026.
Journal of Mathematical Cryptology
Paterson, M.B. and Stinson, D.R. and Upadhyay, J. (2018) Multi-prover proof of retrievability. Journal of Mathematical Cryptology 12 (4), pp. 203-220. ISSN 1862-2976.
Paterson, Maura B. and Stinson, D.R. (2015) Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs. Journal of Mathematical Cryptology 9 (4), pp. 215-225. ISSN 1862-2976.
Paterson, Maura B. and Stinson, D.R. and Upadhyay, J. (2013) A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage. Journal of Mathematical Cryptology 7 (3), pp. 181-277. ISSN 1862-2976.
Paterson, Maura B. and Stinson, D.R. (2009) Two attacks on a sensor network key distribution scheme of Cheng and Agrawal. Journal of Mathematical Cryptology 2 (4), pp. 393-403. ISSN 1862-2976.
Lecture Notes in Computer Science, 2008, Volume 5155, Information Theoretic Security
Blackburn, S.R. and Martin, K.M. and Paterson, Maura B. and Stinson, D.R. (2008) Key refreshing in wireless sensor networks. In: Safavi-Naini, R. (ed.) Information Theoretic Security. Lecture Notes in Computer Science 5155. Berlin, Germany: Springer, pp. 156-170. ISBN 9783540850922.