Cryptography: theory and practice DR Stinson Chapman and Hall/CRC, 2005 | 7618 | 2005 |
Combinatorial batch codes DR Stinson, R Wei, MB Paterson Advances in Mathematics of Communications 3 (1), 13-27, 2009 | 94 | 2009 |
A unified approach to combinatorial key predistribution schemes for sensor networks MB Paterson, DR Stinson Designs, codes and cryptography 71, 433-457, 2014 | 80 | 2014 |
Efficient key predistribution for grid-based wireless sensor networks SR Blackburn, T Etzion, KM Martin, MB Paterson Information Theoretic Security: Third International Conference, ICITS 2008 …, 2008 | 59 | 2008 |
An application-oriented framework for wireless sensor network key establishment KM Martin, M Paterson Electronic Notes in Theoretical Computer Science 192 (2), 31-41, 2008 | 57 | 2008 |
Key predistribution for homogeneous wireless sensor networks with group deployment of nodes KM Martin, MB Paterson, DR Stinson ACM Transactions on Sensor Networks (TOSN) 7 (2), 1-27, 2010 | 39 | 2010 |
Combinatorial characterizations of algebraic manipulation detection codes involving generalized difference families MB Paterson, DR Stinson Discrete Mathematics 339 (12), 2891-2906, 2016 | 38 | 2016 |
PIR schemes with small download complexity and low storage requirements SR Blackburn, T Etzion, MB Paterson IEEE Transactions on Information Theory 66 (1), 557-571, 2019 | 36 | 2019 |
Ultra-lightweight key predistribution in wireless sensor networks for monitoring linear infrastructure KM Martin, MB Paterson Information Security Theory and Practice. Smart Devices, Pervasive Systems …, 2009 | 34 | 2009 |
Cryptography: Theory and Practice. Textbooks in Mathematics D Stinson, M Paterson Crc Press, 2018 | 26 | 2018 |
Distinct difference configurations: multihop paths and key predistribution in sensor networks SR Blackburn, T Etzion, KM Martin, MB Paterson IEEE Transactions on Information Theory 56 (8), 3961-3972, 2010 | 23 | 2010 |
Two-dimensional patterns with distinct differences—Constructions, bounds, and maximal anticodes SR Blackburn, T Etzion, KM Martin, MB Paterson IEEE Transactions on Information Theory 56 (3), 1216-1229, 2010 | 23 | 2010 |
Existence and non-existence results for strong external difference families S Huczynska, MB Paterson Discrete Mathematics 341 (1), 87-95, 2018 | 22 | 2018 |
Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures KM Martin, MB Paterson, DR Stinson Cryptography and Communications 3 (2), 65-86, 2011 | 20 | 2011 |
Disjoint difference families and their applications SL Ng, MB Paterson Designs, Codes and Cryptography 78, 103-127, 2016 | 19 | 2016 |
Kryptografia: w teorii iw praktyce DR Stinson, MB Paterson PWN, 2021 | 18 | 2021 |
Multi-prover proof of retrievability MB Paterson, DR Stinson, J Upadhyay Journal of Mathematical Cryptology 12 (4), 203-220, 2018 | 18 | 2018 |
A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage MB Paterson, DR Stinson, J Upadhyay Journal of Mathematical Cryptology 7 (3), 183-216, 2013 | 18 | 2013 |
Yet another hat game MB Paterson, DR Stinson arXiv preprint arXiv:1001.3850, 2010 | 15 | 2010 |
Two attacks on a sensor network key distribution scheme of Cheng and Agrawal MB Paterson, DR Stinson Journal of Mathematical Cryptology 2 (4), 393-403, 2008 | 15 | 2008 |