Maura B. Paterson

Orcid: 0000-0002-3515-8436

According to our database1, Maura B. Paterson authored at least 42 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Circular external difference families, graceful labellings and cyclotomy.
CoRR, 2023

Splitting authentication codes with perfect secrecy: New results, constructions and connections with algebraic manipulation detection codes.
Adv. Math. Commun., 2023

2020
PIR Schemes With Small Download Complexity and Low Storage Requirements.
IEEE Trans. Inf. Theory, 2020

Boolean Ring Cryptographic Equation Solving.
IACR Cryptol. ePrint Arch., 2020

2019
On the equivalence of authentication codes and robust (2, 2)-threshold schemes.
IACR Cryptol. ePrint Arch., 2019

Weighted external difference families and R-optimal AMD codes.
Discret. Math., 2019

Functional repair codes: a view from projective geometry.
Des. Codes Cryptogr., 2019

2018
Existence and non-existence results for strong external difference families.
Discret. Math., 2018

2017
Localised multisecret sharing.
Cryptogr. Commun., 2017

Secure routing in IoT networks with SISLOF.
Proceedings of the Global Internet of Things Summit, 2017

2016
Multi-prover Proof-of-Retrievability.
IACR Cryptol. ePrint Arch., 2016

Combinatorial characterizations of algebraic manipulation detection codes involving generalized difference families.
Discret. Math., 2016

Disjoint difference families and their applications.
Des. Codes Cryptogr., 2016

On encoding symbol degrees of array BP-XOR codes.
Cryptogr. Commun., 2016

On the Performance of Key Pre-distribution for RPL-Based IoT Networks.
Proceedings of the Interoperability, Safety and Security in IoT, 2016

2014
Broadcast-Enhanced Key Predistribution Schemes.
ACM Trans. Sens. Networks, 2014

Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs.
IACR Cryptol. ePrint Arch., 2014

A unified approach to combinatorial key predistribution schemes for sensor networks.
Des. Codes Cryptogr., 2014

2013
Practical approaches to varying network size in combinatorial key predistribution schemes.
IACR Cryptol. ePrint Arch., 2013

A simple combinatorial treatment of constructions and threshold gaps of ramp schemes.
Cryptogr. Commun., 2013

2012
A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage.
IACR Cryptol. ePrint Arch., 2012

A Simplified Combinatorial Treatment of Constructions and Threshold Gaps of Ramp Schemes.
IACR Cryptol. ePrint Arch., 2012

Constructions for retransmission permutation arrays.
Des. Codes Cryptogr., 2012

2011
Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures.
Cryptogr. Commun., 2011

2010
Key predistribution for homogeneous wireless sensor networks with group deployment of nodes.
ACM Trans. Sens. Networks, 2010

Distinct difference configurations: multihop paths and key predistribution in sensor networks.
IEEE Trans. Inf. Theory, 2010

Two-dimensional patterns with distinct differences: constructions, bounds, and maximal anticodes.
IEEE Trans. Inf. Theory, 2010

Yet Another Hat Game.
Electron. J. Comb., 2010

Honeycomb Arrays.
Electron. J. Comb., 2010

2009
Key Predistribution Techniques for Grid-Based Wireless Sensor Networks.
IACR Cryptol. ePrint Arch., 2009

Putting Dots in Triangles
CoRR, 2009

Combinatorial batch codes.
Adv. Math. Commun., 2009

Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure.
Proceedings of the Information Security Theory and Practice. Smart Devices, 2009

Geometric Ideas for Cryptographic Equation Solving in Even Characteristic.
Proceedings of the Cryptography and Coding, 2009

2008
A geometric view of cryptographic equation solving.
J. Math. Cryptol., 2008

Two attacks on a sensor network key distribution scheme of Cheng and Agrawal.
IACR Cryptol. ePrint Arch., 2008

Key Refreshing in Wireless Sensor Networks.
Proceedings of the Information Theoretic Security, Third International Conference, 2008

Efficient Key Predistribution for Grid-Based Wireless Sensor Networks.
Proceedings of the Information Theoretic Security, Third International Conference, 2008

2007
An Application-Oriented Framework for Wireless Sensor Network Key Establishment.
Proceedings of theThird Workshop on Cryptography for Ad-hoc Networks, 2007

Sequential and dynamic frameproof codes.
Des. Codes Cryptogr., 2007

Sliding-window dynamic frameproof codes.
Des. Codes Cryptogr., 2007

2005
Dynamic frameproof codes.
PhD thesis, 2005


  Loading...