Cryptographers' World
 

Keith M. Martin



15 papers in database with 284 citations Star

H-number: 10

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Keith M. Martin,  Reihaneh Safavi-Naini,  Huaxiong Wang,  Peter R. Wild,  Distributing the Encryption and Decryption of a Block Cipher, Designs, Codes and Cryptography, Volume 36(3), pp. 263 - 287, Springer, 2005.

[Electronic Edition][Cited 12 times ]

2. Susan G. Barwick,  Wen-Ai Jackson,  Keith M. Martin,  A General Approach to Robust Web Metering, Designs, Codes and Cryptography, Volume 36(1), pp. 5 - 27, Springer, 2005.

[Electronic Edition][Cited 2 times ]

3. Mida Guillermo,  Keith M. Martin,  Christine M. O'Keefe,  Providing Anonymity in Unconditionally Secure Secret Sharing Schemes, Designs, Codes and Cryptography, Volume 28(3), pp. 227 - 245, Springer, 2003.

[Electronic Edition][Cited 3 times ]

4. Marten van Dijk,  Wen-Ai Jackson,  Keith M. Martin,  A General Decomposition Construction for Incomplete Secret Sharing Schemes, Designs, Codes and Cryptography, Volume 15(3), pp. 301 - 321, Springer, 1998.

[Electronic Edition][Cited 5 times ]

5. L. R. A. Casse,  Keith M. Martin,  Peter R. Wild,  Bounds and Characterizations of Authentication/Secrecy Schemes, Designs, Codes and Cryptography, Volume 13(2), pp. 107 - 129, Springer, 1998.

[Electronic Edition][Cited 10 times ]

6. Wen-Ai Jackson,  Keith M. Martin,  Christine M. O'Keefe,  Mutually Trusted Authority-Free Secret Sharing Schemes, Journal of Cryptology, Volume 10(4), pp. 261 - 289, Springer, 1997.

[Cited 13 times ]

7. Wen-Ai Jackson,  Keith M. Martin,  Christine M. O'Keefe,  Ideal Secret Sharing Schemes with Multiple Secrets, Journal of Cryptology, Volume 9(4), pp. 233 - 250, Springer, 1996.

[Cited 13 times ]

8. Wen-Ai Jackson,  Keith M. Martin,  Christine M. O'Keefe,  A Construction for Multisecret Threshold Schemes, Designs, Codes and Cryptography, Volume 9(3), pp. 287 - 303, Springer, 1996.

[Electronic Edition][Cited 39 times ]

9. Wen-Ai Jackson,  Keith M. Martin,  Perfect Secret Sharing Schemes on Five Participants, Designs, Codes and Cryptography, Volume 9(3), pp. 267 - 286, Springer, 1996.

[Electronic Edition][Cited 30 times ]

10. Wen-Ai Jackson,  Keith M. Martin,  Geometric Secret Sharing Schemes and Their Duals, Designs, Codes and Cryptography, Volume 4(1), pp. 83 - 95, Springer, 1994.

[Electronic Edition][Cited 44 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Wen-Ai Jackson,  Keith M. Martin,  Christine M. O'Keefe,  Efficient Secret Sharing Without a Mutually Trusted Authority (Extended Abstract), pp. 183 - 193, EUROCRYPT 1995.

[Electronic Edition][Cited 8 times ]

2. Wen-Ai Jackson,  Keith M. Martin,  Christine M. O'Keefe,  On Sharing Many Secrets (Extended Abstract), pp. 42 - 54, ASIACRYPT 1994.

[Electronic Edition][Cited 35 times ]

3. Wen-Ai Jackson,  Keith M. Martin,  Christine M. O'Keefe,  Multisecret Threshold Schemes, pp. 126 - 135, CRYPTO 1993.

[Electronic Edition][Cited 49 times ]

4. Wen-Ai Jackson,  Keith M. Martin,  Cumulative Arrays and Geometric Secret Sharing Schemes, pp. 48 - 55, ASIACRYPT 1992.

[Electronic Edition][Cited 17 times ]

5. Martin Anthony,  Keith M. Martin,  Jennifer Seberry,  Peter R. Wild,  Some Remarks on Authentication Systems, pp. 122 - 139, ASIACRYPT 1990.

[Electronic Edition][Cited 4 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...