The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jennifer Seberry: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Mirka Miller, Jennifer Seberry
    Relative Compromise of Statistical Databases. [Citation Graph (1, 0)][DBLP]
    Australian Computer Journal, 1989, v:21, n:2, pp:56-61 [Journal]
  2. Thomas Hardjono, Jennifer Seberry
    Replicating the Kuperee authentication server for increased security and reliability. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:14-26 [Conf]
  3. Marc Gysin, Jennifer Seberry
    Generalised Cycling Attacks on RSA and Strong RSA Primes. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:149-163 [Conf]
  4. Jeffrey Horton, Jennifer Seberry
    Covert Distributed Computing Using Java Through Web Spoofing. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:48-57 [Conf]
  5. Jeffrey Horton, Jennifer Seberry
    Companion Viruses and the Macintosh: Threats and Countermeasures. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:202-212 [Conf]
  6. Chengxin Qu, Jennifer Seberry, Josef Pieprzyk
    On the Symmetric Property of Homogeneous Boolean Functions. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:26-35 [Conf]
  7. David Soldera, Jennifer Seberry, Chengxin Qu
    The Analysis of Zheng-Seberry Scheme. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:159-168 [Conf]
  8. Dibyendu Chakrabarti, Jennifer Seberry
    Combinatorial Structures for Design of Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:365-374 [Conf]
  9. Thomas Hardjono, Jennifer Seberry
    Information Security in Mobile Databases. [Citation Graph (0, 0)][DBLP]
    Australasian Database Conference, 1995, pp:0-0 [Conf]
  10. Lawrence Brown, Matthew Kwan, Josef Pieprzyk, Jennifer Seberry
    Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:36-50 [Conf]
  11. Lawrence Brown, Josef Pieprzyk, Jennifer Seberry
    LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:229-236 [Conf]
  12. Lawrence Brown, Jennifer Seberry
    Key Scheduling In Des Type Cryptosystems. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:221-228 [Conf]
  13. Martin Anthony, Keith M. Martin, Jennifer Seberry, Peter R. Wild
    Some Remarks on Authentication Systems. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:122-139 [Conf]
  14. Mike Burmester, Yvo Desmedt, Jennifer Seberry
    Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically). [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:380-391 [Conf]
  15. Yvo Desmedt, Jennifer Seberry
    Practical Proven Secure Authentication with Arbitration. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:27-32 [Conf]
  16. Jennifer Seberry, Xian-Mo Zhang
    Highly Nonlinear 0-1 Balanced Boolean Functions Satisfying Strict Avalanche Criterion. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:145-155 [Conf]
  17. Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
    Structures of Cryptographic Functions with Strong Avalanche Characteristics (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:119-132 [Conf]
  18. Yuliang Zheng, Josef Pieprzyk, Jennifer Seberry
    HAVAL - A One-Way Hashing Algorithm with Variable Length of Output. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:83-104 [Conf]
  19. Christos Kravvaritis, M. Mitrouli, Jennifer Seberry
    Counting Techniques Specifying the Existence of Submatrices in Weighing Matrices. [Citation Graph (0, 0)][DBLP]
    CASC, 2005, pp:294-305 [Conf]
  20. Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
    Systematic Generation of Cryptographically Robust S-Boxes. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:171-182 [Conf]
  21. Ralph Gyoery, Jennifer Seberry
    Electronic Funds Transfer Point of Sale in Australia. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:347-377 [Conf]
  22. Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
    Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:49-60 [Conf]
  23. Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
    Pitfalls in Designing Substitution Boxes (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:383-396 [Conf]
  24. Yuliang Zheng, Jennifer Seberry
    Practical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1992, pp:292-304 [Conf]
  25. Willy Susilo, Jianyong Huang, Jennifer Seberry
    On Using Fast Exponentiation Algorithm in PDAs (or: How Secure is the Discrete Logarithm Problem Assumption in PDAs?). [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:668-674 [Conf]
  26. Jing Wu, Jennifer Seberry, Tianbing Xia
    Secure IP Multicast for DMS. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:163-167 [Conf]
  27. Jing Wu, Tianbing Xia, Jennifer Seberry
    Construction of Highly Non-Linear Cubic Homogeneous Boolean Functions on GF2n+1(2). [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:241-247 [Conf]
  28. Tianbing Xia, Jennifer Seberry, Jing Wu
    Boolean Functions with Good Properties. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:294-299 [Conf]
  29. Thomas Hardjono, Jennifer Seberry
    Authentication via Multi-Service Tickets in the Kuperee Server. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1994, pp:143-160 [Conf]
  30. Azad Jiwa, Jennifer Seberry, Yuliang Zheng
    Beacon Based Authentication. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1994, pp:125-141 [Conf]
  31. Jianyong Huang, Jennifer Seberry, Willy Susilo, Martin W. Bunder
    Security Analysis of Michael: The IEEE 802.11i Message Integrity Code. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:423-432 [Conf]
  32. Jing Wu, Yi Mu, Jennifer Seberry, Chun Ruan
    Access Policy Sheet for Access Control in Fine-Grained XML. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:1273-1282 [Conf]
  33. Lawrence Brown, Jennifer Seberry
    On the Design of Permutation P in DES Type Cryptosystems. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:696-705 [Conf]
  34. David S. P. Khoo, Gregory J. Bird, Jennifer Seberry
    Encryption Exponent 3 and the Security of RSA. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:55- [Conf]
  35. Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
    On Constructions and Nonlinearity of Correlation Immune Functions (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1993, pp:181-199 [Conf]
  36. Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
    Relationships Among Nonlinear Criteria (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:376-388 [Conf]
  37. Beomsik Song, Jennifer Seberry
    Further Observations on the Structure of the AES Algorithm. [Citation Graph (0, 0)][DBLP]
    FSE, 2003, pp:223-234 [Conf]
  38. Beomsik Song, Jennifer Seberry
    Consistent Differential Patterns of Rijndael. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:149-163 [Conf]
  39. Beomsik Song, Huaxiong Wang, Jennifer Seberry
    A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:18-31 [Conf]
  40. Jing Wu, Jennifer Seberry, Yi Mu, Chun Ruan
    Delegatable Access Control for Fine-Grained XML. [Citation Graph (0, 0)][DBLP]
    ICPADS (2), 2005, pp:270-274 [Conf]
  41. Xiang Li, Jennifer Seberry
    Forensic Computing. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:18-35 [Conf]
  42. Jaroslaw Pastuszak, Josef Pieprzyk, Jennifer Seberry
    Codes Identifying Bad Signature in Batches. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:143-154 [Conf]
  43. Le Chung Tran, Tadeusz A. Wysocki, Jennifer Seberry, Alfred Mertins
    A Generalized Algorithm for the Generation of Correlated Rayleigh Fading Envelopes in Radio Channels. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2005, pp:- [Conf]
  44. Yibing Kong, Jennifer Seberry, Janusz R. Getta, Ping Yu
    A Cryptographic Solution for General Access Control. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:461-473 [Conf]
  45. Yvo Desmedt, Mike Burmester, Jennifer Seberry
    Equitability in Retroactive Data Confiscation versus Proactive Key Escrow. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:277-286 [Conf]
  46. Jaroslaw Pastuszak, Dariusz Michatek, Josef Pieprzyk, Jennifer Seberry
    Identification of Bad Signatures in Batches. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:28-45 [Conf]
  47. Yibing Kong, Janusz R. Getta, Ping Yu, Jennifer Seberry
    A Generalized Policy Support System and Its Hierarchy Semantics. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:136-145 [Conf]
  48. Thomas Hardjono, Yuliang Zheng, Jennifer Seberry
    Kuperee: An Approach to Authentication using Public Keys. [Citation Graph (0, 0)][DBLP]
    ULPAA, 1994, pp:65-76 [Conf]
  49. Thomas Hardjono, Jennifer Seberry
    Search Key Substitution in the Encipherment of B-Trees. [Citation Graph (0, 5)][DBLP]
    VLDB, 1990, pp:50-58 [Conf]
  50. Le Chung Tran, Tadeusz A. Wysocki, Jennifer Seberry, Alfred Mertins
    A Generalized Algorithm for the Generation of Correlated Rayleigh Fading Envelopes. [Citation Graph (0, 0)][DBLP]
    WOWMOM, 2005, pp:213-218 [Conf]
  51. Jianyong Huang, Jennifer Seberry, Willy Susilo
    On the Internal Structure of Alpha-MAC. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:271-285 [Conf]
  52. Christos Koukouvinos, E. Lappas, M. Mitrouli, Jennifer Seberry
    On the Complete Pivoting Conjecture for Hadamard Matrices of Small Orders. [Citation Graph (0, 0)][DBLP]
    Journal of Research and Practice in Information Technology, 2001, v:33, n:4, pp:298-309 [Journal]
  53. Stelios Georgiou, Christos Koukouvinos, Jennifer Seberry
    On Full Orthogonal Designs in Order 56. [Citation Graph (0, 0)][DBLP]
    Ars Comb., 2002, v:65, n:, pp:- [Journal]
  54. Stelios Georgiou, Christos Koukouvinos, Jennifer Seberry
    Some results on self-orthogonal and self-dual codes. [Citation Graph (0, 0)][DBLP]
    Ars Comb., 2003, v:68, n:, pp:- [Journal]
  55. Stelios Georgiou, Christos Koukouvinos, Jennifer Seberry
    Generalized orthogonal designs. [Citation Graph (0, 0)][DBLP]
    Ars Comb., 2004, v:71, n:, pp:- [Journal]
  56. Christos Koukouvinos, Jennifer Seberry
    Orthogonal Designs of Kharaghani Type: II. [Citation Graph (0, 0)][DBLP]
    Ars Comb., 2004, v:72, n:, pp:- [Journal]
  57. Christos Koukouvinos, Jennifer Seberry
    New orthogonal designs and sequences with two and three variables in order 28. [Citation Graph (0, 0)][DBLP]
    Ars Comb., 1999, v:54, n:, pp:- [Journal]
  58. Christos Koukouvinos, Jennifer Seberry
    Orthogonal Designs of Kharaghani Type: I. [Citation Graph (0, 0)][DBLP]
    Ars Comb., 2003, v:67, n:, pp:- [Journal]
  59. Willy Susilo, Reihaneh Safavi-Naini, Marc Gysin, Jennifer Seberry
    A New and Efficient Fail-stop Signature Scheme. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2000, v:43, n:5, pp:430-437 [Journal]
  60. Yuliang Zheng, Thomas Hardjono, Jennifer Seberry
    Reusing Shares in Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1994, v:37, n:3, pp:199-205 [Journal]
  61. Jeremy E. Dawson, Jennifer Seberry, David B. Skillicorn
    The directed packing numbers DD (t, v, v), t>=;4. [Citation Graph (0, 0)][DBLP]
    Combinatorica, 1984, v:4, n:2, pp:121-130 [Journal]
  62. Thomas Hardjono, Jennifer Seberry
    Applications of smartcards for anonymous and verifiable databases. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1995, v:14, n:5, pp:465-472 [Journal]
  63. Thomas Hardjono, Yuliang Zheng, Jennifer Seberry
    Database authentication revisited. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1994, v:13, n:7, pp:573-580 [Journal]
  64. Chengxin Qu, Jennifer Seberry, Josef Pieprzyk
    Homogeneous bent functions. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2000, v:102, n:1-2, pp:133-139 [Journal]
  65. Tianbing Xia, Jennifer Seberry, Josef Pieprzyk, Chris Charnes
    Homogeneous bent functions of degree n in 2n variables do not exist for nge3. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2004, v:142, n:1-3, pp:127-132 [Journal]
  66. Mingyuan Xia, Tianbing Xia, Jennifer Seberry, Jing Wu
    An infinite family of Goethals-Seidel arrays. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2005, v:145, n:3, pp:498-504 [Journal]
  67. Christos Koukouvinos, Stratis Kounias, Jennifer Seberry, C. H. Yang, Y. Yang
    On Sequences with Zero Autocorrelation. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1994, v:4, n:4, pp:327-340 [Journal]
  68. Christos Koukouvinos, M. Mitrouli, Jennifer Seberry
    Values of Minors of (1, -1) Incidence Matrices of SBIBDs and Their Application to the Growth Problem. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2001, v:23, n:3, pp:267-282 [Journal]
  69. Mingyuan Xia, Tianbing Xia, Jennifer Seberry
    A New Method for Constructing Williamson Matrices. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:35, n:2, pp:191-209 [Journal]
  70. Roderick J. Fletcher, Christos Koukouvinos, Jennifer Seberry
    New skew-Hadamard matrices of order 4cdot59 and new D-optimal designs of order 2cdot59. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 2004, v:286, n:3, pp:251-253 [Journal]
  71. Ilias S. Kotsireas, Christos Koukouvinos, Jennifer Seberry
    Hadamard ideals and Hadamard matrices with two circulant cores. [Citation Graph (0, 0)][DBLP]
    Eur. J. Comb., 2006, v:27, n:5, pp:658-668 [Journal]
  72. Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
    Nonlinearity and Propagation Characteristics of Balanced Boolean Functions [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1995, v:119, n:1, pp:1-13 [Journal]
  73. Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
    Improving the Strict Avalanche Characteristics of Cryptographic Functions. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1994, v:50, n:1, pp:37-41 [Journal]
  74. Azad Jiwa, Thomas Hardjono, Jennifer Seberry
    Beacons for Authentication in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1996, v:4, n:1, pp:81-96 [Journal]
  75. Robert Craigen, Jennifer Seberry, Xian-Mo Zhang
    Product of Four Hadamard Matrices. [Citation Graph (0, 0)][DBLP]
    J. Comb. Theory, Ser. A, 1992, v:59, n:2, pp:318-320 [Journal]
  76. Warwick de Launey, Jennifer Seberry
    The Strong Kronecker Product. [Citation Graph (0, 0)][DBLP]
    J. Comb. Theory, Ser. A, 1994, v:66, n:2, pp:192-213 [Journal]
  77. R. Razen, Jennifer Seberry, K. Wehrhahn
    Ordered Partitions and Codes Generated by Circulant Matrices. [Citation Graph (0, 0)][DBLP]
    J. Comb. Theory, Ser. A, 1979, v:27, n:3, pp:333-341 [Journal]
  78. Jennifer Seberry, David B. Skillicorn
    All Directed BIBDs with k = 3 Exist. [Citation Graph (0, 0)][DBLP]
    J. Comb. Theory, Ser. A, 1980, v:29, n:2, pp:244-248 [Journal]
  79. John H. Loxton, David S. P. Khoo, Gregory J. Bird, Jennifer Seberry
    A Cubic RSA Code Equivalent to Factorization. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1992, v:5, n:2, pp:139-150 [Journal]
  80. Yuliang Zheng, Jennifer Seberry
    Immunizing Public Key Cryptosystems Against Chosen Ciphertext Attacks. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:715-724 [Journal]
  81. Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
    The Relationship Between Propagation Characteristics and Nonlinearity of Cryptographic Functions. [Citation Graph (0, 0)][DBLP]
    J. UCS, 1995, v:1, n:2, pp:136-150 [Journal]
  82. Claude Carlet, Jennifer Seberry, Xian-Mo Zhang
    Comments on 'Generating and counting binary Bent sequences'. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:2, pp:600-0 [Journal]
  83. Joseph Hammer, Jennifer Seberry
    Higher dimensional orthogonal designs and applications. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1981, v:27, n:6, pp:772-779 [Journal]
  84. Reihaneh Safavi-Naini, Jennifer Seberry
    Error-correcting codes for authentication and subliminal channels. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1991, v:37, n:1, pp:13-17 [Journal]
  85. Jennifer Seberry, Beata J. Wysocki, Tadeusz A. Wysocki
    Williamson-Hadamard spreading sequences for DS-CDMA applications. [Citation Graph (0, 0)][DBLP]
    Wireless Communications and Mobile Computing, 2003, v:3, n:5, pp:597-607 [Journal]
  86. Wei Wu, Yi Mu, Willy Susilo, Jennifer Seberry, Xinyi Huang
    Identity-Based Proxy Signature from Pairings. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:22-31 [Conf]
  87. Christos Koukouvinos, Stratis Kounias, Jennifer Seberry
    Supplementary difference sets and optimal designs. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 1991, v:88, n:1, pp:49-58 [Journal]
  88. Christos Koukouvinos, Jennifer Seberry
    Hadamard matrices of order =8 (mod 16) with maximal excess. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 1991, v:92, n:1-3, pp:173-176 [Journal]
  89. Brendan D. McKay, Jennifer Seberry, Scott A. Vanstone
    Ralph Gordon Stanton. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 1991, v:92, n:1-3, pp:1-8 [Journal]

  90. On the Security of NOEKEON against Side Channel Cube Attacks. [Citation Graph (, )][DBLP]


  91. A Five-Round Algebraic Property of the Advanced Encryption Standard. [Citation Graph (, )][DBLP]


  92. Differential Fault Analysis of LEX. [Citation Graph (, )][DBLP]


  93. A Simple Orthogonal Space-Time-Polarization Block Code. [Citation Graph (, )][DBLP]


  94. Key Predistribution Schemes Using Block Designs in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


Search in 0.007secs, Finished in 0.011secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002