Keith Martin - Academia.edu (original) (raw)
Uploads
Papers by Keith Martin
IET Information Security, 2016
ABSTRACT
The Canadian Electrical Code (CEC) is a prescriptive code that mandates the use of products that ... more The Canadian Electrical Code (CEC) is a prescriptive code that mandates the use of products that are certified to CSA standards and defines how electrical systems are installed. In Section 18, the CEC requires that the zone method of hazardous area classification be used for all new installations. The code is not specific about the products used and permits both
Proceedings of the 4th Australasian Conference on Information Security and Privacy, 1999
Architectural Science Review, 1989
In order to provide information about the temperatures experienced by a bituminuous membrane on a... more In order to provide information about the temperatures experienced by a bituminuous membrane on a multi-layered roof in Canberra, Australia, an array of 36 thermocouples was included in a prototype section of the construction, and monitored for a period of 110 days. The frequency distributions of temperatures over an eleven-year period were calculated for the surface, the bituminuous membrane, and the ceiling, considering the effects of air conditioning and insulation. Temperature hazard indexes for degradation of components at different localities can be derived, if the relevant climatic data are available.
Proceedings of the First International Conference on Information and Communication Security, Nov 11, 1997
We consider an extension of the classical model of unconditionally secure authentication in which... more We consider an extension of the classical model of unconditionally secure authentication in which a single transmitter is replaced by a group of transmitters such that only certain specified subsets can generate authentic messages. We provide a model and derive sufficient conditions for systems that provide perfect protection. We give two generic constructions using secret sharing schemes and authentication codes
Proceedings of the 3rd Ifip Wg 11 2 International Workshop on Information Security Theory and Practice Smart Devices Pervasive Systems and Ubiquitous Networks, Aug 30, 2009
One-dimensional wireless sensor networks are important for such security-critical applications as... more One-dimensional wireless sensor networks are important for such security-critical applications as pipeline monitoring and perimeter surveillance. When considering the distribution of symmetric keys to secure the communication in such networks, the specific topology leads to security and performance requirements that are markedly distinct from those of the more widely-studied case of a planar network. We consider these requirements in detail, proposing a new measure for connectivity in one-dimensional environments. We show that, surprisingly, optimal results may be obtained through the use of extremely lightweight key predistribution schemes.
Designs, Codes and Cryptography, 1998
Ieee Transactions on Information Theory, Aug 1, 2010
Motivated by an application of these structures in key predistribution for wireless sensor networ... more Motivated by an application of these structures in key predistribution for wireless sensor networks, we define the kkk-hop coverage of a distinct difference configuration to be the number of distinct vectors that can be expressed as the sum of kkk or fewer difference vectors. This is an important parameter when distinct difference configurations are used in the wireless sensor application, as this parameter describes the density of nodes that can be reached by a short secure path in the network. We provide upper and lower bounds for the kkk-hop coverage of a distinct difference configuration with mmm points, and exploit a connection with BhB_{h}Bh sequences to construct configurations with maximal kkk-hop coverage. We also construct distinct difference configurations that enable all small vectors to be expressed as the sum of two of the difference vectors of the configuration, an important task for local secure connectivity in the application.
Ieee Transactions on Information Theory, 2005
IET Information Security, 2016
ABSTRACT
The Canadian Electrical Code (CEC) is a prescriptive code that mandates the use of products that ... more The Canadian Electrical Code (CEC) is a prescriptive code that mandates the use of products that are certified to CSA standards and defines how electrical systems are installed. In Section 18, the CEC requires that the zone method of hazardous area classification be used for all new installations. The code is not specific about the products used and permits both
Proceedings of the 4th Australasian Conference on Information Security and Privacy, 1999
Architectural Science Review, 1989
In order to provide information about the temperatures experienced by a bituminuous membrane on a... more In order to provide information about the temperatures experienced by a bituminuous membrane on a multi-layered roof in Canberra, Australia, an array of 36 thermocouples was included in a prototype section of the construction, and monitored for a period of 110 days. The frequency distributions of temperatures over an eleven-year period were calculated for the surface, the bituminuous membrane, and the ceiling, considering the effects of air conditioning and insulation. Temperature hazard indexes for degradation of components at different localities can be derived, if the relevant climatic data are available.
Proceedings of the First International Conference on Information and Communication Security, Nov 11, 1997
We consider an extension of the classical model of unconditionally secure authentication in which... more We consider an extension of the classical model of unconditionally secure authentication in which a single transmitter is replaced by a group of transmitters such that only certain specified subsets can generate authentic messages. We provide a model and derive sufficient conditions for systems that provide perfect protection. We give two generic constructions using secret sharing schemes and authentication codes
Proceedings of the 3rd Ifip Wg 11 2 International Workshop on Information Security Theory and Practice Smart Devices Pervasive Systems and Ubiquitous Networks, Aug 30, 2009
One-dimensional wireless sensor networks are important for such security-critical applications as... more One-dimensional wireless sensor networks are important for such security-critical applications as pipeline monitoring and perimeter surveillance. When considering the distribution of symmetric keys to secure the communication in such networks, the specific topology leads to security and performance requirements that are markedly distinct from those of the more widely-studied case of a planar network. We consider these requirements in detail, proposing a new measure for connectivity in one-dimensional environments. We show that, surprisingly, optimal results may be obtained through the use of extremely lightweight key predistribution schemes.
Designs, Codes and Cryptography, 1998
Ieee Transactions on Information Theory, Aug 1, 2010
Motivated by an application of these structures in key predistribution for wireless sensor networ... more Motivated by an application of these structures in key predistribution for wireless sensor networks, we define the kkk-hop coverage of a distinct difference configuration to be the number of distinct vectors that can be expressed as the sum of kkk or fewer difference vectors. This is an important parameter when distinct difference configurations are used in the wireless sensor application, as this parameter describes the density of nodes that can be reached by a short secure path in the network. We provide upper and lower bounds for the kkk-hop coverage of a distinct difference configuration with mmm points, and exploit a connection with BhB_{h}Bh sequences to construct configurations with maximal kkk-hop coverage. We also construct distinct difference configurations that enable all small vectors to be expressed as the sum of two of the difference vectors of the configuration, an important task for local secure connectivity in the application.
Ieee Transactions on Information Theory, 2005