Publications
Journals Conferences Other
Journals

The Geometry of Shared Secret Schemes, Bulletin of the ICA, Vol. 1
(1991), 71--88 (with Simmons, G.J. and Jackson, W.-A.).

Resolvable Designs Applicable to Cryptographic Authentication Schemes, Journal of Comb. Mathematics and Comb. Computing, Vol 12 (1992), 153--160 (with Seberry, J. and Wild, P.).

New Secret Sharing Schemes from Old, Journal of Comb. Mathematics and Comb. Computing, Vol 14 (1993) 65--77.

Geometric Secret Sharing Schemes and their Duals, Designs, Codes and Cryptography, Vol 4 (1994) 83--95 (with Jackson, W.-A.).

Ideal Multisecret Sharing Schemes, Journal of Cryptology, Vol 9 (1996) 233--250 (with Jackson, W.-A. and O'Keefe, C.M.).

Perfect Secret Sharing Schemes on Five Participants, Designs, Codes and Cryptography, Vol 9 (1996) 267--286 (with Jackson, W.-A.).

A Construction for Multisecret Threshold Schemes, Designs, Codes and Cryptography, Vol 9 (1996) 287--303 (with Jackson, W.-A. and O'Keefe, C.M.).

A Combinatorial Interpretation of Ramp Schemes, Australasian Journal of Combinatorics, Vol 14 (1996) 51--60 (with Jackson, W.-A.).

Efficient Constructions for One Sharing of Many Secrets, Australasian Journal of Combinatorics, Vol 14 (1996) 283--296 (with Jackson, W.-A.).

A Note on Duality in Linear Secret Sharing Schemes, Bulletin of the ICA, Vol 19 (1997) 93--101  (with van Dijk, M. and Jackson, W.-A.).

Mutually Trusted Authority free Secret Sharing Schemes, Journal of Cryptology, Vol 10 (1997) 261--289 (with Jackson, W.-A. and O'Keefe, C.M.).

The Filing Cabinet Problem, Bulletin of the ICA, Vol. 22 (1998) 25--30 (with Koumandos, S.).
Bounds and Constructions for Authentication Schemes offering Secrecy, Designs Codes and Cryptography, Vol. 13 (1998) 107--129 (with Casse, L.R.A. and Wild, P.R.).
Combinatorial Models for Perfect Secret Sharing Schemes, Journal of Comb. Mathematics and Comb. Computing, Vol. 28 (1998) 249--265 (with Jackson, W.-A.).
A General Decomposition Construction for Incomplete Secret Sharing Schemes,  Designs Codes and Cryptography, Vol. 15, No. 3 (1998) 301--321 (with van Dijk, M. and Jackson, W.-A.).
Simplification and Generalisation of the Wu-Wu Broadcasting Cryptosystem, Electronics Letters, Vol. 34, No. 24 (1998) 2328--2329.
Analysis of a hash-function of Yi and Lam, Electronics Letters, Vol. 34, No. 24 (1998) 2327--2328 (with Mitchell, C.J.).
In Search of Multiple Domain Key Recovery, Journal of Computer Security, Vol. 6, No. 4 (1998) 219--236 (with Knudsen, L.R.).
An Algorithm for Efficient Geometric Secret Sharing, Utilitas Mathematica, Vol. 54 (1998) 127--150 (with Jackson, W.-A.).
Comments on an optimized protocol for mobile network authentication and security, Mobile Computing and Communications Review, Vol. 3, No. 2 (1999) 37 (with Mitchell, C.J.).
Changing thresholds in the absence of secure channels,  Australian Computer Journal, Vol. 31, No. 2 (1999) 34--43 (with J. Pieprzyk, R. Safavi-Naini and H. Wang).
Bounds and techniques for efficient redistribution of secret shares to new access structures, The Computer Journal, Vol. 42, No. 8 (1999) 638-649 (with R. Safavi-Naini and H. Wang).
Weaknesses of protocols for updating the parameters of an established threshold scheme, IEE Computers and Digital Techniques, Vol. 148, No. 1 (2001) 45-48  (with J. Nakahara Jr.).
Evaluation of authentication protocols for mobile environment value-added services, IEEE Transactions on Vehicular Technology, Vol. 51, No. 2 (2002) 383-392 (with G. Horn and C.J. Mitchell).
Providing anonymity in unconditionally secure secret sharing schemes, Designs Codes and Cryptography, Vol. 28 (2003) 227-245 (with M. Guillermo and C.M. O'Keefe).
Geometrical contributions to secret sharing theory, Journal of Geometry, Vol. 79 1-2 (2004) 102-133  (with W.-A. Jackson and C.M. O'Keefe).
Sharing the encryption and decryption of a block cipher, Designs Codes and Cryptography, Vol. 36 (3) (2005) 263-287 (with R. Safavi-Naini, H. Wang and P. Wild).
A general approach to robust web metering, Designs Codes and Cryptography, Vol. 36 (1) (2005) 5--27 (with S.G. Barwick and W.-A. Jackson).
Updating the parameters of a threshold scheme by minimal broadcast, IEEE Transactions Information Theory, Vol. 51 (2) (2005) 620—633. (with S.G. Barwick and W.-A. Jackson).
Optimal updating of ideal threshold schemes, Australasian Journal of Combinatorics, Vol. 36 (2006) 123-132 (with S.G. Barwick, W.-A. Jackson and C.M. O’Keefe).
A provably secure refreshable partially anonymous token and its applications, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E89-A(5) (2006) 1396-1406 (with R. Shigetomi, A. Otsuka, J. Furukawa and H. Imai).
The combinatorics of generalised cumulative arrays, Journal of Mathematical Cryptology, Vol. 1 (2007) 13-32 (with S.-L. Ng).
The combinatorics of cryptographic key establishment, in Surveys in Combinatorics 2007, London Mathematical Society Lecture Note Series 346 (2007) 223-273, Cambridge University Press.
Establishing the broadcast efficiency of the Subset Difference revocation scheme, Designs Codes and Cryptography Vol. 51 (3) (2009) 315-334 (with T. Martin and P. Wild).
Threats to the swarm: security considerations for swarm robotics. International Journal on Advances in Security, Vol.2 (2&3) (2009) 288-297 (with F. Higgins and A. Tomlinson).
Two-dimensional patterns with distinct differences – constructions, bounds and maximal anticodes, IEEE Transactions in Information Theory, Vol.56 (3) (2010) 1216-1229 (with S.R. Blackburn, T. Etzion and M.B. Paterson)
Distinct difference configurations: multihop paths and key predistribution in sensor networks, IEEE Transactions in Information Theory, Vol. 56 (8) (2010) 3961-3972 (with S.R. Blackburn, T. Etzion and M.B. Paterson).
Key predistribution for homogeneous wireless sensor networks with group deployment of nodes, ACM Transactions on Sensor Networks, Vol. 7 (2) Article No. 11 (2010) (with D.R. Stinson and M.B. Paterson).
Provably secure multisignature scheme with document decomposition and signer anonymity, ICIC Express Letters, Vol. 5 (9B) (2011) 3579-3584 (with K.-Y. Tsai, T.-C. Wu and C.-L. Hsu).
Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures, Cryptography and Communications, Vol. 3 (2011) 65-86 (with D.R. Stinson and M.B. Paterson). Official version available from Springer Online.
Refereed Conferences Proceedings
Some Remarks on Authentication Systems, Advances in Cryptology -
Auscrypt'90, Lecture Notes in Computer Science, Vol. 453,
Springer-Verlag (1990), 122--139 (with Anthony, M.H.G., Seberry, J. and Wild, P.R.).
Untrustworthy Participants in Secret Sharing Schemes, Proceedings of the 3rd IMA Conference on Cryptography and Coding (1993) 255--264.
Orientable Sequences, Proceedings of the 3rd IMA Conference on Cryptography and Coding (1993) 97--115 (with Dai, Z.D., Robshaw, M.J.B. and Wild, P.R.).
Cumulative Arrays and Geometric Secret Sharing Schemes,  Advances in Cryptology: Auscrypt '92, Lecture Notes in Computer Science 718 (1993) 48--55 (with Jackson, W.-A.).
Multisecret Threshold Schemes,  Advances in Cryptology: Crypto '93, Lecture Notes in Computer Science 773 (1994) 126--135 (with Jackson, W.-A. and O'Keefe, C.M.).
On Sharing Many Secrets,  Advances in Cryptology: Asiacrypt '94, Lecture Notes in Computer Science 917 (1995) 42--54  (with Jackson, W.-A. and O'Keefe, C.M.)
Efficient Secret Sharing without a Mutually Trusted Authority, Advances in Cryptology: Eurocrypt '95, Lecture Notes in Computer Science 921 (1995) 183--193  (with Jackson, W.-A. and O'Keefe, C.M.).
Sharing Secret Information in Hierarchical Groups, Information and Communications Security, Lecture Notes in Computer Science 1334 (1997) 81--86 (with Charnes, C., Pieprzyk, J. and Safavi-Naini, R.).
Multisender authentication systems with unconditional security, Information and Communications Security, Lecture Notes in Computer Science 1334 (1997) 130--143 (with Safavi-Naini, R.).
Increasing Efficiency of International Key Escrow in Mutually Mistrusting Domains, Cryptography and Coding, Lecture Notes in Computer Science 1355 (1997) 221--232.
Secure Billing for Mobile Information Services in UMTS, 5th International Conference in Services and Networks, IS&N '98, Lecture Notes in Computer Science 1430 (1998) 535--548 (with Preneel, B., Mitchell, C., Hitz, H.J., Horn, G., Poliakova, A. and Howard, P.).
Trialling Secure Billing with Trusted Third Party Support, Proceedings of 3rd ACTS Mobile Communications Summit (1998) 574--579 (with Horn, G., Howard, P., Mitchell, C.J., Preneel, B. and Rantos, K.).
Changing thresholds in the absence of secure channels,  Information Security and Privacy, 4th Australasian Conference, ACISP99, Lecture Notes in Computer Science 1587 (1999) 177--191 (with J. Pieprzyk, R. Safavi-Naini and H. Wang).
Size of broadcast in threshold schemes with disenrollment, Information Security and Privacy, 7th Australasian Conference, ACISP02, Lecture Notes in Computer Science 2384 (2002) 71--88 (with Barwick, S.G., Jackson, W.-A. and Wild, P.R.).
Threshold MACs, Information Security and Cryptology – ICISC 2002, Lecture Notes in Computer Science 2587 (2003) 237—252 (with J. Pieprzyk, R. Safavi-Naini, H. Wang and P.R. Wild).
Ten years of information security Masters programmes: reflections and new challenges, Security Education and Critical Infrastructures: Proceedings of WISE03, Kluwer (2003) 215—230 (with C. Ciechanowicz, F.C. Piper and M.J.B. Robshaw).
Group communication: Design challenges in the development of key management frameworks in wireless mobile environments, Proceedings of Security & Management (SAM ’05), Las Vegas (2005) 385—391 (with M.L. Mat Kiah).
Dynamic access policies for unconditionally secure secret sharing schemes, Proceedings of IEEE Information Theory Workshop (ITW 05), Awaji Island, Japan (2005).
A generic group key management framework for group communication in wireless mobile environments, Proceedings of the 6th International Network Conference (INC2006) (with M.L. Mat Kiah).
On key assignment for hierarchical access control, Proceedings of 19th Computer Security Foundations Workshop, (2006) 98-111 (with J. Crampton and P.R. Wild).
Distributed Certificate Authority in cluster-based ad hoc networks, Proceedings of 3rd International Conference on Mobile Computing and Ubiquitous Networking (2006) (with G. Chaddoud).
Evolution of support for an on-line information security masters programme, Proceedings of 1st Annual Conference on Education in Information Security (2006) (with S. Balfe, L. Coles-Kemp and H. Ganley).
An application-oriented framework for wireless sensor network key establishmentProceedings of the Third Workshop on Cryptography for Ad-hoc Networks WCAN'07, Electronic Notes in Theoretical Computer Science 192(2), 31 - 41 (2008) (with M.B. Paterson).
Host mobility protocol for secure group communication in wireless mobile environments, Proceedings of 2007 International Conference on Future Generation Communication and Networking (FGCN 2007) (with M.L. Mat Kiah).
A framework for design and analysis of asymmetric fingerprinting protocols, Proceedings of Third International Symposium on Information Assurance and Security IAS 2007 (2007) 457-461 (with G.S. Poh).
Efficient key predistribution for grid-based wireless sensor networksInformation Theoretic Security, Lecture Notes in Computer Science 5155, 54 - 69, 2008 (with S.R. Blackburn, T. Etzion and M.B. Paterson). Official conference version available from Springer Online.
Key refreshing in wireless sensor networks, Information Theoretic Security, Lecture Notes in Computer Science 5155, 156 - 170, 2008 (with S.R. Blackburn, M.B. Paterson and D.R. Stinson). Official conference version available from Springer Online.
Design Flaws of A Secure Watermarking Scheme for Buyer-Seller Identification and Copyright Protection, Proceedings of the International Cryptology Workshop and Conference 2008 (Cryptology 2008), Kuala Lumpur, 9-12 June, 2008 (with G.S. Poh).
On the (In)security of Two Buyer-Seller Watermarking Protocols. Proceedings of the International Conference on Security and Cryptography (SECRYPT 2008), Porto, Portugal, July 26-29, 2008, INSTICC Press, 253-260 (with G.S. Poh).
Challenging the adversary model in secret sharing schemes, Coding and Cryptography II. Proceedings of the Royal Flemish Academy of Belgium for Science and the Arts, 45-63, 2008.
An efficient buyer-seller watermarking protocol based on Chameleon encryption, Digital Watermarking, 7th International Workshop (IWDW 2008), Lecture Notes in Computer Science 5450, 433-447, 2009 (with G.S. Poh).
Survey on security challenges for swarm robotics, Proceedings of The Fifth International Conference on Autonomic and Autonomous Systems (ICAS 2009), 307-312, 2009,  IEEE Press (with F. Higgins and A. Tomlinson)Official conference version available from IEEE Computer Society.
An offline peer-to-peer broadcasting scheme with anonymity, Proceedings of the International Conference on Security and Cryptography (SECRYPT 2009), Milan, Italy, July 7-10, 2009, INSTICC Press, 75-82 (with S. Kiyomoto and K. Fukushima).
On the applicability of combinatorial designs to key predistribution for wireless sensor networks, Coding and Cryptology (IWCC2009), Lecture Notes in Computer Science 5557, 124-145, 2009. Official conference version available from Springer Online.
Classification framework for fair content tracing protocols, Digital Watermarking, 8th International Workshop (IWDW 2009), Lecture Notes in Computer Science 5703, 252-267, 2009 (with G.S. Poh)Official conference version available from Springer Online.
Ultra-lightweight key predistribution in wireless sensor networks for monitoring linear infrastructure, Information Security Theory and Practice: Smart Devices, Pervasive Systems and Ubiquitous Networks (WISTP 2009), Lecture Notes in Computer Science 5746, 143 - 152, 2009 (with M.B. Paterson). Official conference version available from Springer Online.
Privacy-aware location database service for granular queries, Information Security Theory and Practice: Smart Devices, Pervasive Systems and Ubiquitous Networks (WISTP 2009), Lecture Notes in Computer Science 5746, 28 -37, 2009 (with S. Kiyomoto and K. Fukushima). Official conference version available from Springer Online.
Constructing key assignment schemes from chain partitions, Data and Applications Security XXIV (DBSec 2010), Lecture Notes in Computer Science 6166, 130-145, 2010 (with J. Crampton and R. Daud)Official conference version available from Springer Online.
A secure marketplace for online services that induces good conduct, Proceedings of Fourth IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2010), 65-72, 2010 (with Q. Li).
A viable grid marketplace, Proceedings of IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA 2010), 427-432, 2010, IEEE Press (with Q. Li).
The rise and fall and rise of combinatorial key predistribution, Selected Areas in Cryptography (SAC 2010), Lecture Notes in Computer Science 6544, 92-98, 2011. Official conference version available from Springer Online.
Towards a common notion of privacy leakage on public database. Proceedings of Fifth International Conference on Broadband and Wireless Computing, Communications and Applications (BWCCA 2010), 186-191, 2010 (with S. Kiyomoto).
Design of a multiagent-based e-marketplace to secure service trading on the internet. Proceedings of the 13th International Conference on Electronic Commerce (ICEC 2011), 2011 (with Q. Li and J. Zhang).
A survey of security services and techniques in distributed storage systems. Proceedings of 2011 International Conference on Security and Management (SAM'11), 3-9, 2011  (with Z. Xu and C.L. Kotnik).

On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks, to appear in Proceedings of WeWORC 2011, Lecture Notes in Computer Science (with M. Kendall).

Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption in Cloud Storage, to appear in Proceedings of 2nd IEEE International Symposium on Trust and Security in Cloud Computing (TSCloud 2012) (with Z. Xu).
Other Publications
Applying Cryptography within the ASPeCT Project, Information Security Technical Report, Elsevier Advanced Technology Vol.2, No.4 (1998)41--53.
Security, Chapter of E-Commerce Handbook, Thomson-Gee (2003).
White hat vs. white hat: a new approach to managing business risk, ISSA Journal, April 2008, 10 - 15 and cover (with I.D. MacKinnon).
Keith's Electronic Domicile