Cryptographers' World
 

Wen-Ai Jackson



14 papers in database with 263 citations Star

H-number: 8

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Susan G. Barwick,  Wen-Ai Jackson,  A sequence approach to linear perfect hash families, Designs, Codes and Cryptography, Volume 45(1), pp. 95 - 121, Springer, 2007.

[Electronic Edition][Cited 5 times ]

2. Wen-Ai Jackson,  Sean Murphy,  Projective aspects of the AES inversion, Designs, Codes and Cryptography, Volume 43(2), pp. 167 - 179, Springer, 2007.

[Electronic Edition][Cited 2 times ]

3. Susan G. Barwick,  Wen-Ai Jackson,  An Optimal Multisecret Threshold Scheme Construction, Designs, Codes and Cryptography, Volume 37(3), pp. 367 - 389, Springer, 2005.

[Electronic Edition][Cited 1 times ]

4. Susan G. Barwick,  Wen-Ai Jackson,  Keith M. Martin,  A General Approach to Robust Web Metering, Designs, Codes and Cryptography, Volume 36(1), pp. 5 - 27, Springer, 2005.

[Electronic Edition][Cited 2 times ]

5. Marten van Dijk,  Wen-Ai Jackson,  Keith M. Martin,  A General Decomposition Construction for Incomplete Secret Sharing Schemes, Designs, Codes and Cryptography, Volume 15(3), pp. 301 - 321, Springer, 1998.

[Electronic Edition][Cited 5 times ]

6. Wen-Ai Jackson,  Keith M. Martin,  Christine M. O'Keefe,  Mutually Trusted Authority-Free Secret Sharing Schemes, Journal of Cryptology, Volume 10(4), pp. 261 - 289, Springer, 1997.

[Cited 13 times ]

7. Wen-Ai Jackson,  Keith M. Martin,  Christine M. O'Keefe,  Ideal Secret Sharing Schemes with Multiple Secrets, Journal of Cryptology, Volume 9(4), pp. 233 - 250, Springer, 1996.

[Cited 13 times ]

8. Wen-Ai Jackson,  Keith M. Martin,  Christine M. O'Keefe,  A Construction for Multisecret Threshold Schemes, Designs, Codes and Cryptography, Volume 9(3), pp. 287 - 303, Springer, 1996.

[Electronic Edition][Cited 39 times ]

9. Wen-Ai Jackson,  Keith M. Martin,  Perfect Secret Sharing Schemes on Five Participants, Designs, Codes and Cryptography, Volume 9(3), pp. 267 - 286, Springer, 1996.

[Electronic Edition][Cited 30 times ]

10. Wen-Ai Jackson,  Keith M. Martin,  Geometric Secret Sharing Schemes and Their Duals, Designs, Codes and Cryptography, Volume 4(1), pp. 83 - 95, Springer, 1994.

[Electronic Edition][Cited 44 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Wen-Ai Jackson,  Keith M. Martin,  Christine M. O'Keefe,  Efficient Secret Sharing Without a Mutually Trusted Authority (Extended Abstract), pp. 183 - 193, EUROCRYPT 1995.

[Electronic Edition][Cited 8 times ]

2. Wen-Ai Jackson,  Keith M. Martin,  Christine M. O'Keefe,  On Sharing Many Secrets (Extended Abstract), pp. 42 - 54, ASIACRYPT 1994.

[Electronic Edition][Cited 35 times ]

3. Wen-Ai Jackson,  Keith M. Martin,  Christine M. O'Keefe,  Multisecret Threshold Schemes, pp. 126 - 135, CRYPTO 1993.

[Electronic Edition][Cited 49 times ]

4. Wen-Ai Jackson,  Keith M. Martin,  Cumulative Arrays and Geometric Secret Sharing Schemes, pp. 48 - 55, ASIACRYPT 1992.

[Electronic Edition][Cited 17 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...