Maura B. Paterson
Orcid: 0000-0002-3515-8436
According to our database1,
Maura B. Paterson
authored at least 42 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Discret. Math., 2024
2023
Splitting authentication codes with perfect secrecy: New results, constructions and connections with algebraic manipulation detection codes.
Adv. Math. Commun., 2023
2021
J. Math. Cryptol., 2021
2020
IEEE Trans. Inf. Theory, 2020
2019
2018
Discret. Math., 2018
2017
Proceedings of the Global Internet of Things Summit, 2017
2016
Combinatorial characterizations of algebraic manipulation detection codes involving generalized difference families.
Discret. Math., 2016
Proceedings of the Interoperability, Safety and Security in IoT, 2016
2015
Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs.
J. Math. Cryptol., 2015
2014
Des. Codes Cryptogr., 2014
2013
A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage.
J. Math. Cryptol., 2013
Practical approaches to varying network size in combinatorial key predistribution schemes.
IACR Cryptol. ePrint Arch., 2013
A simple combinatorial treatment of constructions and threshold gaps of ramp schemes.
Cryptogr. Commun., 2013
2012
A Simplified Combinatorial Treatment of Constructions and Threshold Gaps of Ramp Schemes.
IACR Cryptol. ePrint Arch., 2012
2011
Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures.
Cryptogr. Commun., 2011
2010
Key predistribution for homogeneous wireless sensor networks with group deployment of nodes.
ACM Trans. Sens. Networks, 2010
Distinct difference configurations: multihop paths and key predistribution in sensor networks.
IEEE Trans. Inf. Theory, 2010
Two-dimensional patterns with distinct differences: constructions, bounds, and maximal anticodes.
IEEE Trans. Inf. Theory, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure.
Proceedings of the Information Security Theory and Practice. Smart Devices, 2009
Proceedings of the Cryptography and Coding, 2009
2008
J. Math. Cryptol., 2008
Proceedings of the Information Theoretic Security, Third International Conference, 2008
Proceedings of the Information Theoretic Security, Third International Conference, 2008
2007
Proceedings of theThird Workshop on Cryptography for Ad-hoc Networks, 2007
2005