Document Actions

Journal Papers

Localised Multisecret Sharing. Cryptography and Communications -  Discrete Structures, Boolean Functions and Sequences, (to appear,) with T.M. Laing, K.M. Martin and D.R. Stinson. eprint

Combinatorial characterizations of algebraic manipulation detection codes involving generalized difference families. Discrete Mathematics, 339(12): 2891–2906, 2016, with D.R. Stinson. journal arxiv

On encoding symbol degrees of array BP-XOR codes. Cryptography and Communications -  Discrete Structures, Boolean Functions and Sequences, 8(1): 19-32, 2016, with D.R. Stinson, Y. Wang. journal pdf format

Disjoint difference families and their applications. Designs, Codes and Cryptography, 78(1): 103-127, 2016, with S.-L. Ng. journal arxiv

Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs. Journal of Mathematical Cryptology, 9(4):215-225, 2015, with D.R. Stinson. journal arxiv

Broadcast-enhanced key predistribution schemes. ACM Transactions on Sensor Networks, 11(1), article 6, 2014, with M. Kendall, K.M. Martin, S-L Ng, D.R. Stinson. journal eprint

A unified approach to combinatorial key predistribution schemes for sensor networks. Designs, Codes and Cryptography, 71 (3): 433-457, 2014, with D.R. Stinson. journal eprint

A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage. Journal of Mathematical Cryptology, 7(3): 181-277, 2013, with D.R. Stinson, J. Upadhyay. journal eprint

A simplified combinatorial treatment of constructions and threshold gaps of ramp schemes. Cryptography and Communications -  Discrete Structures, Boolean Functions and Sequences, 5(4):229-240, 2013, with D.R. Stinson.  journal. eprint

Constructions for retransmission permutation arrays. Designs, Codes and Cryptography, 65(3):325-351, 2012 with J. H. Dinitz, D.R. Stinson, R. Wei. journal pdf format

Putting dots in triangles. The Journal of Combinatorial Mathematics and Combinatorial Computing, 78:23-32, 2011, with S.R. Blackburn, D.R. Stinson. arxiv

Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures. Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences, 3(2):65-86, 2011, with K.M. Martin, D.R. Stinson.  journal eprint

Honeycomb arrays. The Electronic Journal of Combinatorics, 17(1):R172, 2010, with S.R. Blackburn, A. Panoui, D.R. Stinson.  journal arxiv

Key predistribution for homogeneous wireless sensor networks with group deployment of nodes. ACM Transactions on Sensor Networks, 7(2):11, 2010, with K.M. Martin, D.R. Stinson. journal eprint

Yet another hat game.  The Electronic Journal of Combinatorics, 17(1):R86,  2010, with D.R. Stinson. journal arxiv

Distinct-difference configurations: multihop paths and key predistribution in sensor networks. IEEE Transactions in Information Theory, 56(8):3961-3972, 2010, with S.R. Blackburn, T. Etzion, K.M. Martin. journal arxiv

Two-dimensional patterns with distinct differences -constructions, bounds, and maximal anticodes. IEEE Transactions in Information Theory, 56(3):1216-1229, 2010, with S.R. Blackburn, T. Etzion, K.M. Martin. journal arxiv

Combinatorial batch codes. Advances in Mathematics of Communications, 3(1):13-27, 2009, with D.R. Stinson and R.Wei. journal eprint

Two attacks on a sensor network key distribution scheme of Cheng and Agrawal. Journal of Mathematical Cryptology, 2(4):393-403, 2008, with D.R. Stinson. journal eprint.

A geometric view of cryptographic equation solving. Journal of Mathematical Cryptology, 2(1):63-107, 2008, with S.Murphy. journal pdf format

Sliding-window dynamic frameproof codes. Designs, Codes and Cryptography, 42(2):195-212, 2007. journal pdf format

Sequential and dynamic frameproof codes. Designs, Codes and Cryptography, 42(3):317-326, 2007. journal pdf format

Conference Papers

Practical approaches to varying network size in combinatorial key predistribution schemes. SAC 2013, LNCS vol. 8282:89-117, 2014  with K. Henry, D.R. Stinson.  journal eprint

Geometric ideas for cryptographic equation solving in even characteristic. 12th IMA International Conference on Cryptography and Coding 2009, LNCS vol. 5921:202-221,2009,  with S. Murphy. journal pdf format

Ultra-lightweight key predistribution in wireless sensor networks for monitoring linear infrastructure. WISTP 2009, LNCS vol.  5746:143-152, 2009, with K.M. Martin. journal pdf format

Efficient key predistribution for grid-based wireless sensor networks. Third International Conference on Information Theoretic Security ICITS 2008, LNCS vol. 5155:64-69, 2008, with S.R. Blackburn, T. Etzion, K.M. Martin. journal pdf format

Key refreshing in wireless sensor networks. Third International Conference on Information Theoretic Security ICITS 2008, LNCS vol. 5155:156-170, 2008, with S.R. Blackburn, K.M. Martin, D.R. Stinson. journal pdf format

An application-oriented framework for wireless sensor network key establishment. Electronic Notes in Theoretical Computer Science. 192(2):31-41, 2008, with K.M. Martin. (proceedings of WCAN '07) journal pdf format

Contact details

Phone: +44 (0) 20 7631 6440

Email: m.paterson@bbk.ac.uk

Room: 749

Office hours: Tuesdays from 4:00 to 5:30 during term time

Current news

  • Colin Marshall Studentships

    Three Home/EU studentships of up to £12,000 pa full-time or equivalent part-time pro rata fee are available to MSc Economics or MSc Finance with Advanced Pathways applicants.

  • Sir Charles Bean on Brexit

    Sir Charles Bean, former Deputy Governor for Monetary Policy at the Bank of England, discussed issues surrounding the UK referendum on leaving the EU.

  • Postgraduate Student Prize Giving Ceremony

    Each year, the School of Business, Economics & Informatics awards a number of prizes to those students who have been particularly successful.