default search action
Maura B. Paterson
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Maura B. Paterson, Douglas R. Stinson:
Circular external difference families, graceful labellings and cyclotomy. Discret. Math. 347(10): 114103 (2024) - 2023
- [j28]Maura B. Paterson, Douglas R. Stinson:
Splitting authentication codes with perfect secrecy: New results, constructions and connections with algebraic manipulation detection codes. Adv. Math. Commun. 17(6): 1364-1387 (2023) - [i27]Maura B. Paterson, Douglas R. Stinson:
Circular external difference families, graceful labellings and cyclotomy. CoRR abs/2310.02810 (2023) - 2021
- [j27]Maura B. Paterson, Douglas R. Stinson:
On the equivalence of authentication codes and robust (2, 2)-threshold schemes. J. Math. Cryptol. 15(1): 179-196 (2021) - [e1]Maura B. Paterson:
Cryptography and Coding - 18th IMA International Conference, IMACC 2021, Virtual Event, December 14-15, 2021, Proceedings. Lecture Notes in Computer Science 13129, Springer 2021, ISBN 978-3-030-92640-3 [contents] - [i26]Maura B. Paterson, Douglas R. Stinson:
Splitting authentication codes with perfect secrecy: new results, constructions and connections with algebraic manipulation detection codes. CoRR abs/2104.11076 (2021) - [i25]Maura B. Paterson, Douglas R. Stinson:
Splitting authentication codes with perfect secrecy: new results, constructions and connections with algebraic manipulation detection codes. IACR Cryptol. ePrint Arch. 2021: 534 (2021) - 2020
- [j26]Simon R. Blackburn, Tuvi Etzion, Maura B. Paterson:
PIR Schemes With Small Download Complexity and Low Storage Requirements. IEEE Trans. Inf. Theory 66(1): 557-571 (2020) - [c10]Sean Murphy, Maura B. Paterson, Christine Swart:
Boolean Ring Cryptographic Equation Solving. SAC 2020: 252-272 - [i24]Sean Murphy, Maura B. Paterson, Christine Swart:
Boolean Ring Cryptographic Equation Solving. IACR Cryptol. ePrint Arch. 2020: 1255 (2020)
2010 – 2019
- 2019
- [j25]Siaw-Lynn Ng, Maura B. Paterson:
Functional repair codes: a view from projective geometry. Des. Codes Cryptogr. 87(11): 2701-2722 (2019) - [j24]Sophie Huczynska, Maura B. Paterson:
Weighted external difference families and R-optimal AMD codes. Discret. Math. 342(3): 855-867 (2019) - [i23]Maura B. Paterson, Douglas R. Stinson:
On the equivalence of authentication codes and robust (2, 2)-threshold schemes. CoRR abs/1910.05572 (2019) - [i22]Maura B. Paterson, Douglas R. Stinson:
On the equivalence of authentication codes and robust (2, 2)-threshold schemes. IACR Cryptol. ePrint Arch. 2019: 1191 (2019) - 2018
- [j23]Sophie Huczynska, Maura B. Paterson:
Existence and non-existence results for strong external difference families. Discret. Math. 341(1): 87-95 (2018) - [j22]Maura B. Paterson, Douglas R. Stinson, Jalaj Upadhyay:
Multi-prover proof of retrievability. J. Math. Cryptol. 12(4): 203-220 (2018) - [i21]Siaw-Lynn Ng, Maura B. Paterson:
Functional repair codes: a view from projective geometry. CoRR abs/1809.08138 (2018) - 2017
- [j21]Thalia M. Laing, Keith M. Martin, Maura B. Paterson, Douglas R. Stinson:
Localised multisecret sharing. Cryptogr. Commun. 9(5): 581-597 (2017) - [c9]Ayman El Hajjar, George Roussos, Maura B. Paterson:
Secure routing in IoT networks with SISLOF. GIoTS 2017: 1-6 - [c8]Simon R. Blackburn, Tuvi Etzion, Maura B. Paterson:
PIR schemes with small download complexity and low storage requirements. ISIT 2017: 146-150 - 2016
- [j20]Maura B. Paterson, Douglas R. Stinson, Yongge Wang:
On encoding symbol degrees of array BP-XOR codes. Cryptogr. Commun. 8(1): 19-32 (2016) - [j19]Siaw-Lynn Ng, Maura Beth Paterson:
Disjoint difference families and their applications. Des. Codes Cryptogr. 78(1): 103-127 (2016) - [j18]Maura B. Paterson, Douglas R. Stinson:
Combinatorial characterizations of algebraic manipulation detection codes involving generalized difference families. Discret. Math. 339(12): 2891-2906 (2016) - [c7]Ayman El Hajjar, George Roussos, Maura B. Paterson:
On the Performance of Key Pre-distribution for RPL-Based IoT Networks. InterIoT/SaSeIoT 2016: 67-78 - [i20]Maura B. Paterson, Douglas R. Stinson, Jalaj Upadhyay:
Multi-prover Proof-of-Retrievability. CoRR abs/1603.02671 (2016) - [i19]Simon R. Blackburn, Tuvi Etzion, Maura B. Paterson:
PIR schemes with small download complexity and low storage requirements. CoRR abs/1609.07027 (2016) - [i18]Maura B. Paterson, Douglas R. Stinson, Jalaj Upadhyay:
Multi-prover Proof-of-Retrievability. IACR Cryptol. ePrint Arch. 2016: 265 (2016) - 2015
- [j17]Maura B. Paterson, Douglas R. Stinson:
Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs. J. Math. Cryptol. 9(4): 215-225 (2015) - [i17]Maura B. Paterson, Douglas R. Stinson:
Combinatorial Characterizations of Algebraic Manipulation Detection Codes Involving Generalized Difference Families. CoRR abs/1506.02711 (2015) - [i16]Siaw-Lynn Ng, Maura B. Paterson:
Disjoint difference families and their applications. CoRR abs/1509.05255 (2015) - [i15]Thalia M. Laing, Keith M. Martin, Maura B. Paterson, Douglas R. Stinson:
Localised Multisecret Sharing. IACR Cryptol. ePrint Arch. 2015: 922 (2015) - 2014
- [j16]Maura B. Paterson, Douglas R. Stinson:
A unified approach to combinatorial key predistribution schemes for sensor networks. Des. Codes Cryptogr. 71(3): 433-457 (2014) - [j15]Michelle Kendall, Keith M. Martin, Siaw-Lynn Ng, Maura B. Paterson, Douglas R. Stinson:
Broadcast-Enhanced Key Predistribution Schemes. ACM Trans. Sens. Networks 11(1): 6:1-6:33 (2014) - [i14]Maura B. Paterson, Douglas R. Stinson:
Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs. CoRR abs/1403.1468 (2014) - [i13]Maura B. Paterson, Douglas R. Stinson:
Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs. IACR Cryptol. ePrint Arch. 2014: 179 (2014) - 2013
- [j14]Maura B. Paterson, Douglas R. Stinson:
A simple combinatorial treatment of constructions and threshold gaps of ramp schemes. Cryptogr. Commun. 5(4): 229-240 (2013) - [j13]Maura B. Paterson, Douglas R. Stinson, Jalaj Upadhyay:
A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage. J. Math. Cryptol. 7(3): 183-216 (2013) - [c6]Kevin J. Henry, Maura B. Paterson, Douglas R. Stinson:
Practical Approaches to Varying Network Size in Combinatorial Key Predistribution Schemes. Selected Areas in Cryptography 2013: 89-117 - [i12]Kevin J. Henry, Maura B. Paterson, Douglas R. Stinson:
Practical approaches to varying network size in combinatorial key predistribution schemes. IACR Cryptol. ePrint Arch. 2013: 558 (2013) - 2012
- [j12]Jeffrey H. Dinitz, Maura B. Paterson, Douglas R. Stinson, Ruizhong Wei:
Constructions for retransmission permutation arrays. Des. Codes Cryptogr. 65(3): 325-351 (2012) - [i11]Maura B. Paterson, Douglas R. Stinson, Jalaj Upadhyay:
A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage. CoRR abs/1210.7756 (2012) - [i10]Michelle Kendall, Keith M. Martin, Siaw-Lynn Ng, Maura B. Paterson, Douglas R. Stinson:
Broadcast-enhanced Key Predistribution Schemes. IACR Cryptol. ePrint Arch. 2012: 295 (2012) - [i9]Maura B. Paterson, Douglas R. Stinson:
A Simplified Combinatorial Treatment of Constructions and Threshold Gaps of Ramp Schemes. IACR Cryptol. ePrint Arch. 2012: 534 (2012) - [i8]Maura B. Paterson, Douglas R. Stinson, Jalaj Upadhyay:
A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage. IACR Cryptol. ePrint Arch. 2012: 611 (2012) - 2011
- [j11]Keith M. Martin, Maura B. Paterson, Douglas R. Stinson:
Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures. Cryptogr. Commun. 3(2): 65-86 (2011) - [i7]Maura B. Paterson, Douglas R. Stinson:
A Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks. IACR Cryptol. ePrint Arch. 2011: 76 (2011) - 2010
- [j10]Simon R. Blackburn, Anastasia Panoui, Maura B. Paterson, Douglas R. Stinson:
Honeycomb Arrays. Electron. J. Comb. 17(1) (2010) - [j9]Maura B. Paterson, Douglas R. Stinson:
Yet Another Hat Game. Electron. J. Comb. 17(1) (2010) - [j8]Simon R. Blackburn, Tuvi Etzion, Keith M. Martin, Maura B. Paterson:
Two-dimensional patterns with distinct differences: constructions, bounds, and maximal anticodes. IEEE Trans. Inf. Theory 56(3): 1216-1229 (2010) - [j7]Simon R. Blackburn, Tuvi Etzion, Keith M. Martin, Maura B. Paterson:
Distinct difference configurations: multihop paths and key predistribution in sensor networks. IEEE Trans. Inf. Theory 56(8): 3961-3972 (2010) - [j6]Keith M. Martin, Maura B. Paterson, Douglas R. Stinson:
Key predistribution for homogeneous wireless sensor networks with group deployment of nodes. ACM Trans. Sens. Networks 7(2): 11:1-11:27 (2010)
2000 – 2009
- 2009
- [j5]Maura B. Paterson, Douglas R. Stinson, Ruizhong Wei:
Combinatorial batch codes. Adv. Math. Commun. 3(1): 13-27 (2009) - [c5]Sean Murphy, Maura B. Paterson:
Geometric Ideas for Cryptographic Equation Solving in Even Characteristic. IMACC 2009: 202-221 - [c4]Keith M. Martin, Maura B. Paterson:
Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure. WISTP 2009: 143-152 - [i6]Simon R. Blackburn, Maura B. Paterson, Douglas R. Stinson:
Putting Dots in Triangles. CoRR abs/0910.4325 (2009) - [i5]Simon R. Blackburn, Tuvi Etzion, Keith M. Martin, Maura B. Paterson:
Key Predistribution Techniques for Grid-Based Wireless Sensor Networks. IACR Cryptol. ePrint Arch. 2009: 14 (2009) - [i4]Keith M. Martin, Maura B. Paterson, Douglas R. Stinson:
Error Decodable Secret Sharing and One-Round Perfectly Secure Message Transmission for General Adversary Structures. IACR Cryptol. ePrint Arch. 2009: 487 (2009) - 2008
- [j4]Sean Murphy, Maura B. Paterson:
A geometric view of cryptographic equation solving. J. Math. Cryptol. 2(1): 63-107 (2008) - [j3]Maura B. Paterson, Douglas R. Stinson:
Two attacks on a sensor network key distribution scheme of Cheng and Agrawal. J. Math. Cryptol. 2(4): 393-403 (2008) - [c3]Simon R. Blackburn, Tuvi Etzion, Keith M. Martin, Maura B. Paterson:
Efficient Key Predistribution for Grid-Based Wireless Sensor Networks. ICITS 2008: 54-69 - [c2]Simon R. Blackburn, Keith M. Martin, Maura B. Paterson, Douglas R. Stinson:
Key Refreshing in Wireless Sensor Networks. ICITS 2008: 156-170 - [i3]Maura B. Paterson, Douglas R. Stinson, Ruizhong Wei:
Combinatorial batch codes. IACR Cryptol. ePrint Arch. 2008: 306 (2008) - [i2]Maura B. Paterson, Douglas R. Stinson:
Two attacks on a sensor network key distribution scheme of Cheng and Agrawal. IACR Cryptol. ePrint Arch. 2008: 326 (2008) - [i1]Keith M. Martin, Maura B. Paterson, Douglas R. Stinson:
Key Predistribution for Homogeneous Wireless Sensor Networks with Group Deployment of Nodes. IACR Cryptol. ePrint Arch. 2008: 412 (2008) - 2007
- [j2]Maura B. Paterson:
Sliding-window dynamic frameproof codes. Des. Codes Cryptogr. 42(2): 195-212 (2007) - [j1]Maura B. Paterson:
Sequential and dynamic frameproof codes. Des. Codes Cryptogr. 42(3): 317-326 (2007) - [c1]Keith M. Martin, Maura B. Paterson:
An Application-Oriented Framework for Wireless Sensor Network Key Establishment. WCAN@ICALP 2007: 31-41 - 2005
- [b1]Maura Beth Paterson:
Dynamic frameproof codes. Royal Holloway, University of London, UK, 2005
Coauthor Index
aka: Douglas R. Stinson
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-05 20:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint