Keith Martin - Academia.edu (original) (raw)

Uploads

Papers by Keith Martin

Research paper thumbnail of Private reputation retrieval in public – a privacy-aware announcement scheme for VANETs

IET Information Security, 2016

ABSTRACT

Research paper thumbnail of Global Health's Grand Challenge: A Healthy Planet and Healthy People

Research paper thumbnail of Evolution of a “hybrid” system that integrates the best concepts from the NEC, CEC and IEC

The Canadian Electrical Code (CEC) is a prescriptive code that mandates the use of products that ... more The Canadian Electrical Code (CEC) is a prescriptive code that mandates the use of products that are certified to CSA standards and defines how electrical systems are installed. In Section 18, the CEC requires that the zone method of hazardous area classification be used for all new installations. The code is not specific about the products used and permits both

Research paper thumbnail of Distributing the Encryption and Decryption of a Block Cipher

Research paper thumbnail of Changing Thresholds in the Absence of Secure Channels

Proceedings of the 4th Australasian Conference on Information Security and Privacy, 1999

Research paper thumbnail of Error Decodable Secret Sharing and One-Round Perfectly Secure Message Transmission for General Adversary Structures

Research paper thumbnail of A Hierarchical Anti-Counterfeit Mechanism: Securing the Supply Chain Using RFIDs

Research paper thumbnail of Optimal Updating of Ideal Threshold Schemes

Research paper thumbnail of Energy savings and improved precision with adjustable hydrodynamic bearings

Research paper thumbnail of Temperatures Calculated and Experienced by a Roof in Canberra, Australia

Architectural Science Review, 1989

In order to provide information about the temperatures experienced by a bituminuous membrane on a... more In order to provide information about the temperatures experienced by a bituminuous membrane on a multi-layered roof in Canberra, Australia, an array of 36 thermocouples was included in a prototype section of the construction, and monitored for a period of 110 days. The frequency distributions of temperatures over an eleven-year period were calculated for the surface, the bituminuous membrane, and the ceiling, considering the effects of air conditioning and insulation. Temperature hazard indexes for degradation of components at different localities can be derived, if the relevant climatic data are available.

Research paper thumbnail of Key Predistribution for Homogeneous Wireless Sensor Networks with Group Deployment of Nodes

Research paper thumbnail of Multisender authentication systems with unconditional security

Proceedings of the First International Conference on Information and Communication Security, Nov 11, 1997

We consider an extension of the classical model of unconditionally secure authentication in which... more We consider an extension of the classical model of unconditionally secure authentication in which a single transmitter is replaced by a group of transmitters such that only certain specified subsets can generate authentic messages. We provide a model and derive sufficient conditions for systems that provide perfect protection. We give two generic constructions using secret sharing schemes and authentication codes

Research paper thumbnail of Efficient Secret Sharing Without a Mutually Trusted Authority (Extended Abstract)

Research paper thumbnail of Performance of a novel configuration of journal bearing

Research paper thumbnail of Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure

Proceedings of the 3rd Ifip Wg 11 2 International Workshop on Information Security Theory and Practice Smart Devices Pervasive Systems and Ubiquitous Networks, Aug 30, 2009

One-dimensional wireless sensor networks are important for such security-critical applications as... more One-dimensional wireless sensor networks are important for such security-critical applications as pipeline monitoring and perimeter surveillance. When considering the distribution of symmetric keys to secure the communication in such networks, the specific topology leads to security and performance requirements that are markedly distinct from those of the more widely-studied case of a planar network. We consider these requirements in detail, proposing a new measure for connectivity in one-dimensional environments. We show that, surprisingly, optimal results may be obtained through the use of extremely lightweight key predistribution schemes.

Research paper thumbnail of Bounds and Characterizations of Authentication/Secrecy Schemes

Designs, Codes and Cryptography, 1998

Research paper thumbnail of Distinct Difference Configurations: Multihop Paths and Key Predistribution in Sensor Networks

Ieee Transactions on Information Theory, Aug 1, 2010

Motivated by an application of these structures in key predistribution for wireless sensor networ... more Motivated by an application of these structures in key predistribution for wireless sensor networks, we define the kkk-hop coverage of a distinct difference configuration to be the number of distinct vectors that can be expressed as the sum of kkk or fewer difference vectors. This is an important parameter when distinct difference configurations are used in the wireless sensor application, as this parameter describes the density of nodes that can be reached by a short secure path in the network. We provide upper and lower bounds for the kkk-hop coverage of a distinct difference configuration with mmm points, and exploit a connection with BhB_{h}Bh sequences to construct configurations with maximal kkk-hop coverage. We also construct distinct difference configurations that enable all small vectors to be expressed as the sum of two of the difference vectors of the configuration, an important task for local secure connectivity in the application.

Research paper thumbnail of Graph-theoretic design and analysis of key predistribution schemes

Research paper thumbnail of Updating the parameters of a threshold scheme by minimal broadcast

Ieee Transactions on Information Theory, 2005

Research paper thumbnail of Security Challenges for Swarm Robotics

Research paper thumbnail of Private reputation retrieval in public – a privacy-aware announcement scheme for VANETs

IET Information Security, 2016

ABSTRACT

Research paper thumbnail of Global Health's Grand Challenge: A Healthy Planet and Healthy People

Research paper thumbnail of Evolution of a “hybrid” system that integrates the best concepts from the NEC, CEC and IEC

The Canadian Electrical Code (CEC) is a prescriptive code that mandates the use of products that ... more The Canadian Electrical Code (CEC) is a prescriptive code that mandates the use of products that are certified to CSA standards and defines how electrical systems are installed. In Section 18, the CEC requires that the zone method of hazardous area classification be used for all new installations. The code is not specific about the products used and permits both

Research paper thumbnail of Distributing the Encryption and Decryption of a Block Cipher

Research paper thumbnail of Changing Thresholds in the Absence of Secure Channels

Proceedings of the 4th Australasian Conference on Information Security and Privacy, 1999

Research paper thumbnail of Error Decodable Secret Sharing and One-Round Perfectly Secure Message Transmission for General Adversary Structures

Research paper thumbnail of A Hierarchical Anti-Counterfeit Mechanism: Securing the Supply Chain Using RFIDs

Research paper thumbnail of Optimal Updating of Ideal Threshold Schemes

Research paper thumbnail of Energy savings and improved precision with adjustable hydrodynamic bearings

Research paper thumbnail of Temperatures Calculated and Experienced by a Roof in Canberra, Australia

Architectural Science Review, 1989

In order to provide information about the temperatures experienced by a bituminuous membrane on a... more In order to provide information about the temperatures experienced by a bituminuous membrane on a multi-layered roof in Canberra, Australia, an array of 36 thermocouples was included in a prototype section of the construction, and monitored for a period of 110 days. The frequency distributions of temperatures over an eleven-year period were calculated for the surface, the bituminuous membrane, and the ceiling, considering the effects of air conditioning and insulation. Temperature hazard indexes for degradation of components at different localities can be derived, if the relevant climatic data are available.

Research paper thumbnail of Key Predistribution for Homogeneous Wireless Sensor Networks with Group Deployment of Nodes

Research paper thumbnail of Multisender authentication systems with unconditional security

Proceedings of the First International Conference on Information and Communication Security, Nov 11, 1997

We consider an extension of the classical model of unconditionally secure authentication in which... more We consider an extension of the classical model of unconditionally secure authentication in which a single transmitter is replaced by a group of transmitters such that only certain specified subsets can generate authentic messages. We provide a model and derive sufficient conditions for systems that provide perfect protection. We give two generic constructions using secret sharing schemes and authentication codes

Research paper thumbnail of Efficient Secret Sharing Without a Mutually Trusted Authority (Extended Abstract)

Research paper thumbnail of Performance of a novel configuration of journal bearing

Research paper thumbnail of Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure

Proceedings of the 3rd Ifip Wg 11 2 International Workshop on Information Security Theory and Practice Smart Devices Pervasive Systems and Ubiquitous Networks, Aug 30, 2009

One-dimensional wireless sensor networks are important for such security-critical applications as... more One-dimensional wireless sensor networks are important for such security-critical applications as pipeline monitoring and perimeter surveillance. When considering the distribution of symmetric keys to secure the communication in such networks, the specific topology leads to security and performance requirements that are markedly distinct from those of the more widely-studied case of a planar network. We consider these requirements in detail, proposing a new measure for connectivity in one-dimensional environments. We show that, surprisingly, optimal results may be obtained through the use of extremely lightweight key predistribution schemes.

Research paper thumbnail of Bounds and Characterizations of Authentication/Secrecy Schemes

Designs, Codes and Cryptography, 1998

Research paper thumbnail of Distinct Difference Configurations: Multihop Paths and Key Predistribution in Sensor Networks

Ieee Transactions on Information Theory, Aug 1, 2010

Motivated by an application of these structures in key predistribution for wireless sensor networ... more Motivated by an application of these structures in key predistribution for wireless sensor networks, we define the kkk-hop coverage of a distinct difference configuration to be the number of distinct vectors that can be expressed as the sum of kkk or fewer difference vectors. This is an important parameter when distinct difference configurations are used in the wireless sensor application, as this parameter describes the density of nodes that can be reached by a short secure path in the network. We provide upper and lower bounds for the kkk-hop coverage of a distinct difference configuration with mmm points, and exploit a connection with BhB_{h}Bh sequences to construct configurations with maximal kkk-hop coverage. We also construct distinct difference configurations that enable all small vectors to be expressed as the sum of two of the difference vectors of the configuration, an important task for local secure connectivity in the application.

Research paper thumbnail of Graph-theoretic design and analysis of key predistribution schemes

Research paper thumbnail of Updating the parameters of a threshold scheme by minimal broadcast

Ieee Transactions on Information Theory, 2005

Research paper thumbnail of Security Challenges for Swarm Robotics

Log In