Publications | ||||
|
||||
Journals | ||||
The
Geometry of Shared Secret Schemes, Bulletin of the |
||||
Resolvable Designs Applicable to Cryptographic Authentication Schemes, Journal of Comb. Mathematics and Comb. Computing, Vol 12 (1992), 153--160 (with Seberry, J. and Wild, P.). |
||||
New Secret Sharing Schemes from Old, Journal of Comb. Mathematics and Comb. Computing, Vol 14 (1993) 65--77. |
||||
Geometric
Secret Sharing Schemes and their Duals, Designs,
Codes and Cryptography, Vol 4 (1994) 83--95 (with |
||||
Ideal
Multisecret Sharing Schemes, Journal of Cryptology,
Vol 9 (1996) 233--250 (with |
||||
Perfect Secret Sharing Schemes
on Five Participants, Designs, Codes and
Cryptography, Vol 9 (1996) 267--286 (with |
||||
A
Construction for Multisecret Threshold Schemes,
Designs, Codes and Cryptography, Vol 9 (1996) 287--303 (with |
||||
A Combinatorial Interpretation
of Ramp Schemes, Australasian
Journal of Combinatorics, Vol 14 (1996) 51--60 (with |
||||
Efficient
Constructions for One Sharing of Many Secrets, Australasian
Journal of Combinatorics, Vol 14 (1996) 283--296 (with |
||||
A
Note on Duality in Linear Secret Sharing Schemes,
Bulletin of the |
||||
Mutually
Trusted Authority free Secret Sharing Schemes,
Journal of Cryptology, Vol 10 (1997) 261--289 (with |
||||
The
Filing Cabinet Problem,
Bulletin of the
|
||||
Bounds and Constructions for Authentication Schemes offering Secrecy, Designs Codes and Cryptography, Vol. 13 (1998) 107--129 (with Casse, L.R.A. and Wild, P.R.). | ||||
Combinatorial Models for Perfect
Secret Sharing Schemes, Journal of Comb. Mathematics and
Comb.
Computing, Vol. 28 (1998) 249--265 (with |
||||
A General Decomposition Construction for Incomplete Secret Sharing Schemes, Designs Codes and Cryptography, Vol. 15, No. 3 (1998) 301--321 (with van Dijk, M. and Jackson, W.-A.). | ||||
Simplification and
Generalisation of the Wu-Wu Broadcasting Cryptosystem, Electronics Letters, Vol.
34, No. 24 (1998) 2328--2329. |
||||
Analysis of a hash-function of Yi and Lam, Electronics Letters, Vol. 34, No. 24 (1998) 2327--2328 (with Mitchell, C.J.). | ||||
In Search of Multiple Domain Key Recovery, Journal of Computer Security, Vol. 6, No. 4 (1998) 219--236 (with Knudsen, L.R.). | ||||
An Algorithm for Efficient Geometric Secret Sharing, Utilitas Mathematica, Vol. 54 (1998) 127--150 (with Jackson, W.-A.). | ||||
Comments on an optimized protocol for mobile network authentication and security, Mobile Computing and Communications Review, Vol. 3, No. 2 (1999) 37 (with Mitchell, C.J.). | ||||
Changing thresholds in the absence of secure channels, Australian Computer Journal, Vol. 31, No. 2 (1999) 34--43 (with J. Pieprzyk, R. Safavi-Naini and H. Wang). | ||||
Bounds and techniques for efficient redistribution of secret shares to new access structures, The Computer Journal, Vol. 42, No. 8 (1999) 638-649 (with R. Safavi-Naini and H. Wang). | ||||
Weaknesses of protocols for updating the parameters of an established threshold scheme, IEE Computers and Digital Techniques, Vol. 148, No. 1 (2001) 45-48 (with J. Nakahara Jr.). | ||||
Evaluation of authentication protocols for mobile environment value-added services, IEEE Transactions on Vehicular Technology, Vol. 51, No. 2 (2002) 383-392 (with G. Horn and C.J. Mitchell). | ||||
Providing anonymity in unconditionally secure secret sharing schemes, Designs Codes and Cryptography, Vol. 28 (2003) 227-245 (with M. Guillermo and C.M. O'Keefe). | ||||
Geometrical contributions to secret sharing theory, Journal of Geometry, Vol. 79 1-2 (2004) 102-133 (with W.-A. Jackson and C.M. O'Keefe). | ||||
Sharing the encryption and decryption of a block cipher, Designs Codes and Cryptography, Vol. 36 (3) (2005) 263-287 (with R. Safavi-Naini, H. Wang and P. Wild). | ||||
A general approach to robust web metering, Designs Codes and Cryptography, Vol. 36 (1) (2005) 5--27 (with S.G. Barwick and W.-A. Jackson). | ||||
Updating the parameters of a threshold scheme by minimal broadcast, IEEE Transactions Information Theory, Vol. 51 (2) (2005) 620—633. (with S.G. Barwick and W.-A. Jackson). | ||||
Optimal updating of ideal threshold schemes, Australasian Journal of Combinatorics, Vol. 36 (2006) 123-132 (with S.G. Barwick, W.-A. Jackson and C.M. O’Keefe). | ||||
A provably secure refreshable partially anonymous token and its applications, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E89-A(5) (2006) 1396-1406 (with R. Shigetomi, A. Otsuka, J. Furukawa and H. Imai). | ||||
The combinatorics of generalised cumulative arrays, Journal of Mathematical Cryptology, Vol. 1 (2007) 13-32 (with S.-L. Ng). | ||||
The combinatorics of cryptographic key establishment, in Surveys in Combinatorics 2007, London Mathematical Society Lecture Note Series 346 (2007) 223-273, Cambridge University Press. | ||||
Establishing the broadcast efficiency of the Subset Difference revocation scheme, Designs Codes and Cryptography Vol. 51 (3) (2009) 315-334 (with T. Martin and P. Wild). | ||||
Threats to the swarm: security considerations for swarm robotics. International Journal on Advances in Security, Vol.2 (2&3) (2009) 288-297 (with F. Higgins and A. Tomlinson). | ||||
Two-dimensional patterns with distinct differences – constructions, bounds and maximal anticodes, IEEE Transactions in Information Theory, Vol.56 (3) (2010) 1216-1229 (with S.R. Blackburn, T. Etzion and M.B. Paterson) | ||||
Distinct difference configurations: multihop paths and key predistribution in sensor networks, IEEE Transactions in Information Theory, Vol. 56 (8) (2010) 3961-3972 (with S.R. Blackburn, T. Etzion and M.B. Paterson). | ||||
Key predistribution for homogeneous wireless sensor networks with group deployment of nodes, ACM Transactions on Sensor Networks, Vol. 7 (2) Article No. 11 (2010) (with D.R. Stinson and M.B. Paterson). | ||||
Provably secure multisignature scheme with document decomposition and signer anonymity, ICIC Express Letters, Vol. 5 (9B) (2011) 3579-3584 (with K.-Y. Tsai, T.-C. Wu and C.-L. Hsu). | ||||
Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures, Cryptography and Communications, Vol. 3 (2011) 65-86 (with D.R. Stinson and M.B. Paterson). Official version available from Springer Online. | ||||
Refereed Conferences Proceedings | ||||
Some Remarks on Authentication
Systems, Advances in Cryptology - Auscrypt'90, Lecture Notes in Computer Science, Vol. 453, Springer-Verlag (1990), 122--139 (with Anthony, M.H.G., Seberry, J. and Wild, P.R.). |
||||
Untrustworthy Participants in Secret Sharing Schemes, Proceedings of the 3rd IMA Conference on Cryptography and Coding (1993) 255--264. | ||||
Orientable Sequences, Proceedings of the 3rd IMA Conference on Cryptography and Coding (1993) 97--115 (with Dai, Z.D., Robshaw, M.J.B. and Wild, P.R.). | ||||
Cumulative Arrays and Geometric Secret Sharing Schemes, Advances in Cryptology: Auscrypt '92, Lecture Notes in Computer Science 718 (1993) 48--55 (with Jackson, W.-A.). | ||||
Multisecret Threshold Schemes, Advances in Cryptology: Crypto '93, Lecture Notes in Computer Science 773 (1994) 126--135 (with Jackson, W.-A. and O'Keefe, C.M.). | ||||
On Sharing Many Secrets, Advances in Cryptology: Asiacrypt '94, Lecture Notes in Computer Science 917 (1995) 42--54 (with Jackson, W.-A. and O'Keefe, C.M.) | ||||
Efficient Secret Sharing without a Mutually Trusted Authority, Advances in Cryptology: Eurocrypt '95, Lecture Notes in Computer Science 921 (1995) 183--193 (with Jackson, W.-A. and O'Keefe, C.M.). | ||||
Sharing Secret Information in Hierarchical Groups, Information and Communications Security, Lecture Notes in Computer Science 1334 (1997) 81--86 (with Charnes, C., Pieprzyk, J. and Safavi-Naini, R.). | ||||
Multisender authentication systems with unconditional security, Information and Communications Security, Lecture Notes in Computer Science 1334 (1997) 130--143 (with Safavi-Naini, R.). | ||||
Increasing Efficiency of International Key Escrow in Mutually Mistrusting Domains, Cryptography and Coding, Lecture Notes in Computer Science 1355 (1997) 221--232. | ||||
Secure Billing for Mobile Information Services in UMTS, 5th International Conference in Services and Networks, IS&N '98, Lecture Notes in Computer Science 1430 (1998) 535--548 (with Preneel, B., Mitchell, C., Hitz, H.J., Horn, G., Poliakova, A. and Howard, P.). | ||||
Trialling Secure Billing with Trusted Third Party Support, Proceedings of 3rd ACTS Mobile Communications Summit (1998) 574--579 (with Horn, G., Howard, P., Mitchell, C.J., Preneel, B. and Rantos, K.). | ||||
Changing thresholds in the absence of secure channels, Information Security and Privacy, 4th Australasian Conference, ACISP99, Lecture Notes in Computer Science 1587 (1999) 177--191 (with J. Pieprzyk, R. Safavi-Naini and H. Wang). | ||||
Size of broadcast in threshold schemes with disenrollment, Information Security and Privacy, 7th Australasian Conference, ACISP02, Lecture Notes in Computer Science 2384 (2002) 71--88 (with Barwick, S.G., Jackson, W.-A. and Wild, P.R.). | ||||
Threshold MACs, Information Security and Cryptology – ICISC 2002, Lecture Notes in Computer Science 2587 (2003) 237—252 (with J. Pieprzyk, R. Safavi-Naini, H. Wang and P.R. Wild). | ||||
Ten years of information security Masters programmes: reflections and new challenges, Security Education and Critical Infrastructures: Proceedings of WISE03, Kluwer (2003) 215—230 (with C. Ciechanowicz, F.C. Piper and M.J.B. Robshaw). | ||||
Group communication: Design challenges in the development of key management frameworks in wireless mobile environments, Proceedings of Security & Management (SAM ’05), Las Vegas (2005) 385—391 (with M.L. Mat Kiah). | ||||
Dynamic access policies for unconditionally secure secret sharing schemes, Proceedings of IEEE Information Theory Workshop (ITW 05), Awaji Island, Japan (2005). | ||||
A generic group key management framework for group communication in wireless mobile environments, Proceedings of the 6th International Network Conference (INC2006) (with M.L. Mat Kiah). | ||||
On key assignment for hierarchical access control, Proceedings of 19th Computer Security Foundations Workshop, (2006) 98-111 (with J. Crampton and P.R. Wild). | ||||
Distributed Certificate Authority in cluster-based ad hoc networks, Proceedings of 3rd International Conference on Mobile Computing and Ubiquitous Networking (2006) (with G. Chaddoud). | ||||
Evolution of support for an on-line information security masters programme, Proceedings of 1st Annual Conference on Education in Information Security (2006) (with S. Balfe, L. Coles-Kemp and H. Ganley). | ||||
An application-oriented framework for wireless sensor network key establishment, Proceedings of the Third Workshop on Cryptography for Ad-hoc Networks WCAN'07, Electronic Notes in Theoretical Computer Science 192(2), 31 - 41 (2008) (with M.B. Paterson). | ||||
Host mobility protocol for secure group communication in wireless mobile environments, Proceedings of 2007 International Conference on Future Generation Communication and Networking (FGCN 2007) (with M.L. Mat Kiah). | ||||
A framework for design and analysis of asymmetric fingerprinting protocols, Proceedings of Third International Symposium on Information Assurance and Security IAS 2007 (2007) 457-461 (with G.S. Poh). | ||||
Efficient key predistribution for grid-based wireless sensor networks, Information Theoretic Security, Lecture Notes in Computer Science 5155, 54 - 69, 2008 (with S.R. Blackburn, T. Etzion and M.B. Paterson). Official conference version available from Springer Online. | ||||
Key refreshing in wireless sensor networks, Information Theoretic Security, Lecture Notes in Computer Science 5155, 156 - 170, 2008 (with S.R. Blackburn, M.B. Paterson and D.R. Stinson). Official conference version available from Springer Online. | ||||
Design Flaws of A Secure Watermarking Scheme for Buyer-Seller Identification and Copyright Protection, Proceedings of the International Cryptology Workshop and Conference 2008 (Cryptology 2008), Kuala Lumpur, 9-12 June, 2008 (with G.S. Poh). | ||||
On the (In)security of Two Buyer-Seller Watermarking Protocols. Proceedings of the International Conference on Security and Cryptography (SECRYPT 2008), Porto, Portugal, July 26-29, 2008, INSTICC Press, 253-260 (with G.S. Poh). | ||||
Challenging the adversary model in secret sharing schemes, Coding and Cryptography II. Proceedings of the Royal Flemish Academy of Belgium for Science and the Arts, 45-63, 2008. | ||||
An efficient buyer-seller watermarking protocol based on Chameleon encryption, Digital Watermarking, 7th International Workshop (IWDW 2008), Lecture Notes in Computer Science 5450, 433-447, 2009 (with G.S. Poh). | ||||
Survey on security challenges for swarm robotics, Proceedings of The Fifth International Conference on Autonomic and Autonomous Systems (ICAS 2009), 307-312, 2009, IEEE Press (with F. Higgins and A. Tomlinson). Official conference version available from IEEE Computer Society. | ||||
An offline peer-to-peer broadcasting scheme with anonymity, Proceedings
of the International Conference on Security and Cryptography (SECRYPT
2009), Milan, Italy, July 7-10, 2009, INSTICC Press, 75-82
(with S. Kiyomoto and K. Fukushima). |
||||
On the applicability of combinatorial designs to key predistribution for wireless sensor networks, Coding and Cryptology (IWCC2009), Lecture Notes in Computer Science 5557, 124-145, 2009. Official conference version available from Springer Online. | ||||
Classification framework for fair content tracing protocols, Digital Watermarking, 8th International Workshop (IWDW 2009), Lecture Notes in Computer Science 5703, 252-267, 2009 (with G.S. Poh). Official conference version available from Springer Online. | ||||
Ultra-lightweight key predistribution in wireless sensor networks for monitoring linear infrastructure, Information Security Theory and Practice: Smart Devices, Pervasive Systems and Ubiquitous Networks (WISTP 2009), Lecture Notes in Computer Science 5746, 143 - 152, 2009 (with M.B. Paterson). Official conference version available from Springer Online. | ||||
Privacy-aware location database service for granular queries, Information Security Theory and Practice: Smart Devices, Pervasive Systems and Ubiquitous Networks (WISTP 2009), Lecture Notes in Computer Science 5746, 28 -37, 2009 (with S. Kiyomoto and K. Fukushima). Official conference version available from Springer Online. | ||||
Constructing key assignment schemes from chain partitions, Data and Applications Security XXIV (DBSec 2010), Lecture Notes in Computer Science 6166, 130-145, 2010 (with J. Crampton and R. Daud). Official conference version available from Springer Online. | ||||
A secure marketplace for online services that induces good conduct, Proceedings of Fourth IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2010), 65-72, 2010 (with Q. Li). | ||||
A viable grid marketplace, Proceedings of IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA 2010), 427-432, 2010, IEEE Press (with Q. Li). | ||||
The rise and fall and rise of combinatorial key predistribution, Selected Areas in Cryptography (SAC 2010), Lecture Notes in Computer Science 6544, 92-98, 2011. Official conference version available from Springer Online. | ||||
Towards a common notion of privacy leakage on public database. Proceedings of Fifth International Conference on Broadband and Wireless Computing, Communications and Applications (BWCCA 2010), 186-191, 2010 (with S. Kiyomoto). | ||||
Design of a multiagent-based e-marketplace to secure service trading on the internet. Proceedings of the 13th International Conference on Electronic Commerce (ICEC 2011), 2011 (with Q. Li and J. Zhang). | ||||
A survey of security services and techniques in distributed storage systems. Proceedings of 2011 International Conference on Security and Management (SAM'11), 3-9, 2011 (with Z. Xu and C.L. Kotnik). | ||||
On the Role of Expander Graphs in Key
Predistribution Schemes for Wireless Sensor Networks, to
appear in Proceedings of WeWORC 2011, Lecture Notes in Computer Science (with
M. Kendall). |
||||
Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption in Cloud Storage, to appear in Proceedings of 2nd IEEE International Symposium on Trust and Security in Cloud Computing (TSCloud 2012) (with Z. Xu). | ||||
Other Publications | ||||
Applying Cryptography within the ASPeCT Project, Information Security Technical Report, Elsevier Advanced Technology Vol.2, No.4 (1998)41--53. | ||||
Security, Chapter of E-Commerce Handbook, Thomson-Gee (2003). | ||||
White hat vs. white hat: a new approach to managing business risk, ISSA Journal, April 2008, 10 - 15 and cover (with I.D. MacKinnon). | ||||
Keith's Electronic Domicile |