Keith M. Martin
Orcid: 0000-0001-7877-9075
According to our database1,
Keith M. Martin
authored at least 92 papers
between 1990 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Security Standardisation Research - 8th International Conference, 2023
2020
A survey of subscription privacy on the 5G radio interface - The past, present and future.
J. Inf. Secur. Appl., 2020
IACR Cryptol. ePrint Arch., 2020
2019
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
2018
Wirel. Networks, 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
2017
Private reputation retrieval in public - a privacy-aware announcement scheme for VANETs.
IET Inf. Secur., 2017
IACR Cryptol. ePrint Arch., 2017
Practical Architectures for Deployment of Searchable Encryption in a Cloud Environment.
Cryptogr., 2017
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
Proceedings of the Financial Cryptography and Data Security, 2017
2016
Revisiting and Extending the AONT-RS scheme: a Robust Computationally Secure Secret Sharing Scheme.
IACR Cryptol. ePrint Arch., 2016
Des. Codes Cryptogr., 2016
Are information security professionals expected value maximizers?: An experiment and survey-based test.
J. Cybersecur., 2016
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Experimental Elicitation of Risk Behaviour amongst Information Security Professionals.
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015
2014
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014
2013
Proceedings of the 5th IEEE International Symposium on Wireless Vehicular Communications, 2013
A Practical Deployment Framework for Use of Attribute-Based Encryption in Data Protection.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
2012
Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption in Cloud Storage.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Feedback as "Shadow of the Present": An Alternative to Reputation Systems for E-marketplaces.
Proceedings of the 11th IEEE International Conference on Trust, 2012
2011
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011
On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks.
IACR Cryptol. ePrint Arch., 2011
Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures.
Cryptogr. Commun., 2011
Design of a multiagent-based e-marketplace to secure service trading on the internet.
Proceedings of the 13th International Conference on Electronic Commerce, 2011
2010
Key predistribution for homogeneous wireless sensor networks with group deployment of nodes.
ACM Trans. Sens. Networks, 2010
Distinct difference configurations: multihop paths and key predistribution in sensor networks.
IEEE Trans. Inf. Theory, 2010
Two-dimensional patterns with distinct differences: constructions, bounds, and maximal anticodes.
IEEE Trans. Inf. Theory, 2010
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2010
Proceedings of the Data and Applications Security and Privacy XXIV, 2010
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Des. Codes Cryptogr., 2009
Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure.
Proceedings of the Information Security Theory and Practice. Smart Devices, 2009
Proceedings of the Information Security Theory and Practice. Smart Devices, 2009
An Offline Peer-to-peer Broadcasting Scheme with Anonymity.
Proceedings of the SECRYPT 2009, 2009
Proceedings of the Digital Watermarking, 8th International Workshop, 2009
Proceedings of the e-Business and Telecommunications - 6th International Joint Conference, 2009
Proceedings of the Fifth International Conference on Autonomic and Autonomous Systems, 2009
On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks.
Proceedings of the Coding and Cryptology, Second International Workshop, 2009
2008
On the (In)Security of Two Buyer-Seller Watermarking Protocols.
Proceedings of the SECRYPT 2008, 2008
Proceedings of the Digital Watermarking, 7th International Workshop, 2008
Proceedings of the Information Theoretic Security, Third International Conference, 2008
Proceedings of the Information Theoretic Security, Third International Conference, 2008
Proceedings of the e-Business and Telecommunications - International Conference, 2008
2007
Proceedings of theThird Workshop on Cryptography for Ad-hoc Networks, 2007
Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments.
Proceedings of the Future Generation Communication and Networking, 2007
Proceedings of the Third International Symposium on Information Assurance and Security, 2007
2006
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006
2005
IEEE Trans. Inf. Theory, 2005
Des. Codes Cryptogr., 2005
Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005
Group Communication: Design Challenges in the Development of Key Management Frameworks in Wireless Mobile Environments.
Proceedings of The 2005 International Conference on Security and Management, 2005
2003
Des. Codes Cryptogr., 2003
Ten Years of Information Security Masters Programmes.
Proceedings of the Security Education and Critical Infrastructures, 2003
2002
IEEE Trans. Veh. Technol., 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
1999
ACM SIGMOBILE Mob. Comput. Commun. Rev., 1999
Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures.
Comput. J., 1999
Changing Thresholds in the Absence of Secure Channels.
Aust. Comput. J., 1999
1998
Des. Codes Cryptogr., 1998
Des. Codes Cryptogr., 1998
Proceedings of the Intelligence in Services and Networks: Technology for Ubiquitous Telecom Services, 1998
1997
Proceedings of the Cryptography and Coding, 1997
Proceedings of the Information and Communication Security, First International Conference, 1997
Proceedings of the Information and Communication Security, First International Conference, 1997
1996
1995
Proceedings of the Advances in Cryptology, 1995
1994
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994
1993
1992
Proceedings of the Advances in Cryptology, 1992
1990
Proceedings of the Advances in Cryptology, 1990