| Everyday cryptography KM Martin The Australian Mathematical Society 231 (6), 2012 | 256 | 2012 |
| A reputation-based announcement scheme for VANETs Q Li, A Malip, KM Martin, SL Ng, J Zhang IEEE Transactions on Vehicular Technology 61 (9), 4095-4108, 2012 | 254 | 2012 |
| Geometric shared secret and/or shared control schemes GJ Simmons Conference on the Theory and Application of Cryptography, 216-241, 1990 | 209* | 1990 |
| On key assignment for hierarchical access control J Crampton, K Martin, P Wild 19th IEEE Computer Security Foundations Workshop (CSFW'06), 14 pp.-111, 2006 | 177 | 2006 |
| Authentication protocols for mobile network environment value-added services G Horn, KM Martin, CJ Mitchell IEEE Transactions on Vehicular Technology 51 (2), 383-392, 2002 | 149 | 2002 |
| Perfect secret sharing schemes on five participants WA Jackson, KM Martin Designs, codes and cryptography 9 (3), 267-286, 1996 | 141 | 1996 |
| Survey on security challenges for swarm robotics F Higgins, A Tomlinson, KM Martin 2009 Fifth International Conference on Autonomic and Autonomous Systems, 307-312, 2009 | 133 | 2009 |
| Stability of nanometer-thick layers in hard coatings SA Barnett, A Madan, I Kim, K Martin Mrs Bulletin 28 (3), 169-172, 2003 | 114 | 2003 |
| Geometric secret sharing schemes and their duals WA Jackson, KM Martin Designs, Codes and Cryptography 4 (1), 83-95, 1994 | 107 | 1994 |
| Threats to the swarm: Security considerations for swarm robotics F Higgins, A Tomlinson, KM Martin International Journal on Advances in Security 2 (2&3), 288-297, 2009 | 106 | 2009 |
| Multisecret threshold schemes WA Jackson, KM Martin, CM O’Keefe Annual International Cryptology Conference, 126-135, 1993 | 93 | 1993 |
| Changing thresholds in the absence of secure channels KM Martin, J Pieprzyk, R Safavi-Naini, H Wang Australasian Conference on Information Security and Privacy, 177-191, 1999 | 91* | 1999 |
| On sharing many secrets WA Jackson, KM Martin, CM O'Keefe International Conference on the theory and application of cryptology, 42-54, 1994 | 90 | 1994 |
| Dynamic user revocation and key refreshing for attribute-based encryption in cloud storage Z Xu, KM Martin 2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012 | 85 | 2012 |
| New secret sharing schemes from old KM Martin J. Combin. Math. Combin. Comput 14 (65-77), 366, 1993 | 85 | 1993 |
| A combinatorial interpretation of ramp schemes WA Jackson, KM Martin Australasian Journal of Combinatorics 14, 51-60, 1996 | 71 | 1996 |
| Bounds and techniques for efficient redistribution of secret shares to new access structures KM Martin, R Safavi-Naini, H Wang The Computer Journal 42 (8), 638-649, 1999 | 63 | 1999 |
| Discrete structures in the theory of secret sharing KM Martin Ph. D. Thesis, University of London, 1991 | 63 | 1991 |
| Ideal secret sharing schemes with multiple secrets WA Jackson, KM Martin, CM O'keefe Journal of Cryptology 9 (4), 233-250, 1996 | 61 | 1996 |
| A survey of subscription privacy on the 5G radio interface-the past, present and future H Khan, KM Martin Journal of Information Security and Applications 53, 102537, 2020 | 60 | 2020 |