Keith M. Martin

According to our database1, Keith M. Martin authored at least 90 papers between 1990 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
A survey of subscription privacy on the 5G radio interface - The past, present and future.
J. Inf. Secur. Appl., 2020

Pragmatic Authenticated Key Agreement for IEEE Std 802.15.6.
IACR Cryptol. ePrint Arch., 2020

2019
On the Efficacy of New Privacy Attacks against 5G AKA.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

2018
Host mobility key management in dynamic secure group communication.
Wirel. Networks, 2018

Identity Confidentiality in 5G Mobile Telephony Systems.
IACR Cryptol. ePrint Arch., 2018

Highly Efficient Privacy-Preserving Key Agreement for Wireless Body Area Networks.
Proceedings of the 17th IEEE International Conference On Trust, 2018

2017
Private reputation retrieval in public - a privacy-aware announcement scheme for VANETs.
IET Inf. Secur., 2017

Multi-level Access in Searchable Symmetric Encryption.
IACR Cryptol. ePrint Arch., 2017

Practical Architectures for Deployment of Searchable Encryption in a Cloud Environment.
Cryptogr., 2017

Localised multisecret sharing.
Cryptogr. Commun., 2017

Reputation Schemes for Pervasive Social Networks with Anonymity (Short Paper).
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

Private Outsourced Kriging Interpolation.
Proceedings of the Financial Cryptography and Data Security, 2017

2016
Revisiting and Extending the AONT-RS scheme: a Robust Computationally Secure Secret Sharing Scheme.
IACR Cryptol. ePrint Arch., 2016

Graph-theoretic design and analysis of key predistribution schemes.
Des. Codes Cryptogr., 2016

Are information security professionals expected value maximizers?: An experiment and survey-based test.
J. Cybersecur., 2016

Efficient, XOR-Based, Ideal (t, n)- threshold Schemes.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
Extended Functionality in Verifiable Searchable Encryption.
IACR Cryptol. ePrint Arch., 2015

A Combinatorial Model of Interference in Frequency Hopping Schemes.
CoRR, 2015

Balancing Privacy and Surveillance in the Cloud.
IEEE Cloud Comput., 2015

Experimental Elicitation of Risk Behaviour amongst Information Security Professionals.
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015

2014
Broadcast-Enhanced Key Predistribution Schemes.
ACM Trans. Sens. Networks, 2014

Anonymous User Revocation for Using Attribute-Based Signature in Cloud Computing.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

2013
A privacy-aware reputation-based announcement scheme for VANETs.
Proceedings of the 5th IEEE International Symposium on Wireless Vehicular Communications, 2013

A Practical Deployment Framework for Use of Attribute-Based Encryption in Data Protection.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

2012
A Reputation-Based Announcement Scheme for VANETs.
IEEE Trans. Veh. Technol., 2012

Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption in Cloud Storage.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Feedback as "Shadow of the Present": An Alternative to Reputation Systems for E-marketplaces.
Proceedings of the 11th IEEE International Conference on Trust, 2012

2011
Model for a Common Notion of Privacy Leakage on Public Database.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011

On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks.
IACR Cryptol. ePrint Arch., 2011

Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures.
Cryptogr. Commun., 2011

Design of a multiagent-based e-marketplace to secure service trading on the internet.
Proceedings of the 13th International Conference on Electronic Commerce, 2011

2010
Key predistribution for homogeneous wireless sensor networks with group deployment of nodes.
ACM Trans. Sens. Networks, 2010

Distinct difference configurations: multihop paths and key predistribution in sensor networks.
IEEE Trans. Inf. Theory, 2010

Two-dimensional patterns with distinct differences: constructions, bounds, and maximal anticodes.
IEEE Trans. Inf. Theory, 2010

The Rise and Fall and Rise of Combinatorial Key Predistribution.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010

A Viable Grid Marketplace.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2010

Constructing Key Assignment Schemes from Chain Partitions.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

Towards a Common Notion of Privacy Leakage on Public Database.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

2009
Key Predistribution Techniques for Grid-Based Wireless Sensor Networks.
IACR Cryptol. ePrint Arch., 2009

Establishing the broadcast efficiency of the Subset Difference Revocation Scheme.
Des. Codes Cryptogr., 2009

Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure.
Proceedings of the Information Security Theory and Practice. Smart Devices, 2009

Privacy-Aware Location Database Service for Granular Queries.
Proceedings of the Information Security Theory and Practice. Smart Devices, 2009

An Offline Peer-to-peer Broadcasting Scheme with Anonymity.
Proceedings of the SECRYPT 2009, 2009

Classification Framework for Fair Content Tracing Protocols.
Proceedings of the Digital Watermarking, 8th International Workshop, 2009

Offline Peer-to-Peer Broadcast with Anonymity.
Proceedings of the e-Business and Telecommunications - 6th International Joint Conference, 2009

Survey on Security Challenges for Swarm Robotics.
Proceedings of the Fifth International Conference on Autonomic and Autonomous Systems, 2009

On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks.
Proceedings of the Coding and Cryptology, Second International Workshop, 2009

2008
An Application-Oriented Framework for Wireless Sensor Network Key Establishment.
Electron. Notes Theor. Comput. Sci., 2008

On the (In)Security of Two Buyer-Seller Watermarking Protocols.
Proceedings of the SECRYPT 2008, 2008

An Efficient Buyer-Seller Watermarking Protocol Based on Chameleon Encryption.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

Key Refreshing in Wireless Sensor Networks.
Proceedings of the Information Theoretic Security, Third International Conference, 2008

Efficient Key Predistribution for Grid-Based Wireless Sensor Networks.
Proceedings of the Information Theoretic Security, Third International Conference, 2008

On the Design of Buyer-Seller Watermarking Protocols without a Watermark Authority.
Proceedings of the e-Business and Telecommunications - International Conference, 2008

2007
The combinatorics of generalised cumulative arrays.
J. Math. Cryptol., 2007

Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments.
Proceedings of the Future Generation Communication and Networking, 2007

A Framework for Design and Analysis of Asymmetric Fingerprinting Protocols.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
On Key Assignment for Hierarchical Access Control.
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006

2005
Updating the parameters of a threshold scheme by minimal broadcast.
IEEE Trans. Inf. Theory, 2005

Distributing the Encryption and Decryption of a Block Cipher.
Des. Codes Cryptogr., 2005

A General Approach to Robust Web Metering.
Des. Codes Cryptogr., 2005

Dynamic access policies for unconditionally secure secret sharing schemes.
Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005

Group Communication: Design Challenges in the Development of Key Management Frameworks in Wireless Mobile Environments.
Proceedings of The 2005 International Conference on Security and Management, 2005

2004
Optimal Updating of Ideal Threshold Schemes.
IACR Cryptol. ePrint Arch., 2004

2003
Providing Anonymity in Unconditionally Secure Secret Sharing Schemes.
Des. Codes Cryptogr., 2003

Ten Years of Information Security Masters Programmes.
Proceedings of the Security Education and Critical Infrastructures, 2003

2002
Authentication protocols for mobile network environment value-added services.
IEEE Trans. Veh. Technol., 2002

Threshold MACs.
Proceedings of the Information Security and Cryptology, 2002

Size of Broadcast in Threshold Schemes with Disenrollment.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

1999
Comments on an optimized protocol for mobile network authentication and security.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 1999

Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures.
Comput. J., 1999

Changing Thresholds in the Absence of Secure Channels.
Aust. Comput. J., 1999

1998
In Search of Multiple Domain Key Recovery.
J. Comput. Secur., 1998

A General Decomposition Construction for Incomplete Secret Sharing Schemes.
Des. Codes Cryptogr., 1998

Bounds and Characterizations of Authentication/Secrecy Schemes.
Des. Codes Cryptogr., 1998

Secure Billing for Mobile Information Services in UMTS.
Proceedings of the Intelligence in Services and Networks: Technology for Ubiquitous Telecom Services, 1998

1997
Mutually Trusted Authority-Free Secret Sharing Schemes.
J. Cryptol., 1997

Increasing Efficiency of International Key Escrow in Mutually Mistrusting Domains.
Proceedings of the Cryptography and Coding, 1997

Multisender authentication systems with unconditional security.
Proceedings of the Information and Communication Security, First International Conference, 1997

Secret sharing in hierarchical groups.
Proceedings of the Information and Communication Security, First International Conference, 1997

1996
Ideal Secret Sharing Schemes with Multiple Secrets.
J. Cryptol., 1996

A Construction for Multisecret Threshold Schemes.
Des. Codes Cryptogr., 1996

Perfect Secret Sharing Schemes on Five Participants.
Des. Codes Cryptogr., 1996

Efficient constructions for one sharing of many secrets.
Australas. J Comb., 1996

A combinatorial interpretation of ramp schemes.
Australas. J Comb., 1996

1995
Efficient Secret Sharing Without a Mutually Trusted Authority (Extended Abstract).
Proceedings of the Advances in Cryptology, 1995

1994
Geometric Secret Sharing Schemes and Their Duals.
Des. Codes Cryptogr., 1994

On Sharing Many Secrets (Extended Abstract).
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994

1993
Multisecret Threshold Schemes.
Proceedings of the Advances in Cryptology, 1993

1992
Cumulative Arrays and Geometric Secret Sharing Schemes.
Proceedings of the Advances in Cryptology, 1992

1990
Some Remarks on Authentication Systems.
Proceedings of the Advances in Cryptology, 1990


  Loading...