Everyday cryptography KM Martin The Australian Mathematical Society 231 (6), 2012 | 246 | 2012 |
A reputation-based announcement scheme for VANETs Q Li, A Malip, KM Martin, SL Ng, J Zhang IEEE Transactions on Vehicular Technology 61 (9), 4095-4108, 2012 | 233 | 2012 |
Geometric shared secret and/or shared control schemes GJ Simmons Conference on the Theory and Application of Cryptography, 216-241, 1990 | 204* | 1990 |
On key assignment for hierarchical access control J Crampton, K Martin, P Wild 19th IEEE Computer Security Foundations Workshop (CSFW'06), 14 pp.-111, 2006 | 178 | 2006 |
Authentication protocols for mobile network environment value-added services G Horn, KM Martin, CJ Mitchell IEEE Transactions on Vehicular Technology 51 (2), 383-392, 2002 | 146 | 2002 |
Perfect secret sharing schemes on five participants WA Jackson, KM Martin Designs, codes and cryptography 9, 267-286, 1996 | 134 | 1996 |
Survey on security challenges for swarm robotics F Higgins, A Tomlinson, KM Martin 2009 Fifth International Conference on Autonomic and Autonomous Systems, 307-312, 2009 | 122 | 2009 |
Stability of nanometer-thick layers in hard coatings SA Barnett, A Madan, I Kim, K Martin Mrs Bulletin 28 (3), 169-172, 2003 | 103 | 2003 |
Threats to the swarm: Security considerations for swarm robotics F Higgins, A Tomlinson, KM Martin International Journal on Advances in Security 2 (2&3), 2009 | 102 | 2009 |
Geometric secret sharing schemes and their duals WA Jackson, KM Martin Designs, Codes and Cryptography 4 (1), 83-95, 1994 | 102 | 1994 |
Multisecret threshold schemes WA Jackson, KM Martin, CM O’Keefe Annual International Cryptology Conference, 126-135, 1993 | 95 | 1993 |
On sharing many secrets WA Jackson, KM Martin, CM O'Keefe International Conference on the theory and application of cryptology, 42-54, 1994 | 89 | 1994 |
Dynamic user revocation and key refreshing for attribute-based encryption in cloud storage Z Xu, KM Martin 2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012 | 84 | 2012 |
Changing thresholds in the absence of secure channels KM Martin, J Pieprzyk, R Safavi-Naini, H Wang Information Security and Privacy: 4th Australasian Conference, ACISP’99 …, 1999 | 83* | 1999 |
New secret sharing schemes from old KM Martin J. Combin. Math. Combin. Comput 14, 65-77, 1993 | 81 | 1993 |
A combinatorial interpretation of ramp schemes WA Jackson, KM Martin Australasian Journal of Combinatorics 14, 51-60, 1996 | 66 | 1996 |
Efficient key predistribution for grid-based wireless sensor networks SR Blackburn, T Etzion, KM Martin, MB Paterson Information Theoretic Security: Third International Conference, ICITS 2008 …, 2008 | 59 | 2008 |
Bounds and techniques for efficient redistribution of secret shares to new access structures KM Martin, R Safavi-Naini, H Wang The Computer Journal 42 (8), 638-649, 1999 | 59 | 1999 |
Ideal secret sharing schemes with multiple secrets WA Jackson, KM Martin, CM O'keefe Journal of Cryptology 9 (4), 233-250, 1996 | 58 | 1996 |
Discrete structures in the theory of secret sharing KM Martin University of London, 1991 | 58 | 1991 |