Cryptography: theory and practice DR Stinson, M Paterson CRC press, 2018 | 6357 | 2018 |
Combinatorial batch codes MB Paterson, DR Stinson, R Wei Advances in Mathematics of Communications 3 (1), 13, 2009 | 75 | 2009 |
A unified approach to combinatorial key predistribution schemes for sensor networks MB Paterson, DR Stinson Designs, Codes and Cryptography 71 (3), 433-457, 2014 | 65 | 2014 |
Efficient key predistribution for grid-based wireless sensor networks SR Blackburn, T Etzion, KM Martin, MB Paterson International conference on information theoretic security, 54-69, 2008 | 49 | 2008 |
An application-oriented framework for wireless sensor network key establishment KM Martin, M Paterson Electronic Notes in Theoretical Computer Science 192 (2), 31-41, 2008 | 49 | 2008 |
Key predistribution for homogeneous wireless sensor networks with group deployment of nodes KM Martin, MB Paterson, DR Stinson ACM Transactions on Sensor Networks (TOSN) 7 (2), 1-27, 2010 | 37 | 2010 |
Ultra-lightweight key predistribution in wireless sensor networks for monitoring linear infrastructure KM Martin, MB Paterson IFIP international workshop on information security theory and practices …, 2009 | 27 | 2009 |
PIR schemes with small download complexity and low storage requirements SR Blackburn, T Etzion, MB Paterson IEEE Transactions on Information Theory 66 (1), 557-571, 2019 | 24 | 2019 |
Distinct difference configurations: multihop paths and key predistribution in sensor networks SR Blackburn, T Etzion, KM Martin, MB Paterson IEEE Transactions on Information Theory 56 (8), 3961-3972, 2010 | 21 | 2010 |
Combinatorial characterizations of algebraic manipulation detection codes involving generalized difference families MB Paterson, DR Stinson Discrete Mathematics 339 (12), 2891-2906, 2016 | 18 | 2016 |
Two-dimensional patterns with distinct differences—constructions, bounds, and maximal anticodes SR Blackburn, T Etzion, KM Martin, MB Paterson IEEE transactions on information theory 56 (3), 1216-1229, 2010 | 17 | 2010 |
Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures KM Martin, MB Paterson, DR Stinson Cryptography and Communications 3 (2), 65-86, 2011 | 15 | 2011 |
A simple combinatorial treatment of constructions and threshold gaps of ramp schemes MB Paterson, DR Stinson Cryptography and Communications 5 (4), 229-240, 2013 | 14 | 2013 |
Two attacks on a sensor network key distribution scheme of Cheng and Agrawal MB Paterson, DR Stinson Journal of Mathematical Cryptology 2 (4), 393-403, 2008 | 14 | 2008 |
A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage MB Paterson, DR Stinson, J Upadhyay Journal of Mathematical Cryptology 7 (3), 183-216, 2013 | 13 | 2013 |
Practical approaches to varying network size in combinatorial key predistribution schemes K Henry, MB Paterson, DR Stinson International Conference on Selected Areas in Cryptography, 89-117, 2013 | 12 | 2013 |
Yet another hat game MB Paterson, DR Stinson arXiv preprint arXiv:1001.3850, 2010 | 12 | 2010 |
A geometric view of cryptographic equation solving S Murphy, MB Paterson Journal of Mathematical Cryptology 2 (1), 63-107, 2008 | 12 | 2008 |
Disjoint difference families and their applications SL Ng, MB Paterson Designs, Codes and Cryptography 78 (1), 103-127, 2016 | 11 | 2016 |
Multi-prover proof of retrievability MB Paterson, DR Stinson, J Upadhyay Journal of Mathematical Cryptology 12 (4), 203-220, 2018 | 10 | 2018 |