Search the dblp DataBase
Jennifer Seberry :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Mirka Miller , Jennifer Seberry Relative Compromise of Statistical Databases. [Citation Graph (1, 0)][DBLP ] Australian Computer Journal, 1989, v:21, n:2, pp:56-61 [Journal ] Thomas Hardjono , Jennifer Seberry Replicating the Kuperee authentication server for increased security and reliability. [Citation Graph (0, 0)][DBLP ] ACISP, 1996, pp:14-26 [Conf ] Marc Gysin , Jennifer Seberry Generalised Cycling Attacks on RSA and Strong RSA Primes. [Citation Graph (0, 0)][DBLP ] ACISP, 1999, pp:149-163 [Conf ] Jeffrey Horton , Jennifer Seberry Covert Distributed Computing Using Java Through Web Spoofing. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:48-57 [Conf ] Jeffrey Horton , Jennifer Seberry Companion Viruses and the Macintosh: Threats and Countermeasures. [Citation Graph (0, 0)][DBLP ] ACISP, 1999, pp:202-212 [Conf ] Chengxin Qu , Jennifer Seberry , Josef Pieprzyk On the Symmetric Property of Homogeneous Boolean Functions. [Citation Graph (0, 0)][DBLP ] ACISP, 1999, pp:26-35 [Conf ] David Soldera , Jennifer Seberry , Chengxin Qu The Analysis of Zheng-Seberry Scheme. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:159-168 [Conf ] Dibyendu Chakrabarti , Jennifer Seberry Combinatorial Structures for Design of Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ACNS, 2006, pp:365-374 [Conf ] Thomas Hardjono , Jennifer Seberry Information Security in Mobile Databases. [Citation Graph (0, 0)][DBLP ] Australasian Database Conference, 1995, pp:0-0 [Conf ] Lawrence Brown , Matthew Kwan , Josef Pieprzyk , Jennifer Seberry Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:36-50 [Conf ] Lawrence Brown , Josef Pieprzyk , Jennifer Seberry LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:229-236 [Conf ] Lawrence Brown , Jennifer Seberry Key Scheduling In Des Type Cryptosystems. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:221-228 [Conf ] Martin Anthony , Keith M. Martin , Jennifer Seberry , Peter R. Wild Some Remarks on Authentication Systems. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:122-139 [Conf ] Mike Burmester , Yvo Desmedt , Jennifer Seberry Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically). [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:380-391 [Conf ] Yvo Desmedt , Jennifer Seberry Practical Proven Secure Authentication with Arbitration. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1992, pp:27-32 [Conf ] Jennifer Seberry , Xian-Mo Zhang Highly Nonlinear 0-1 Balanced Boolean Functions Satisfying Strict Avalanche Criterion. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1992, pp:145-155 [Conf ] Jennifer Seberry , Xian-Mo Zhang , Yuliang Zheng Structures of Cryptographic Functions with Strong Avalanche Characteristics (Extended Abstract). [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1994, pp:119-132 [Conf ] Yuliang Zheng , Josef Pieprzyk , Jennifer Seberry HAVAL - A One-Way Hashing Algorithm with Variable Length of Output. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1992, pp:83-104 [Conf ] Christos Kravvaritis , M. Mitrouli , Jennifer Seberry Counting Techniques Specifying the Existence of Submatrices in Weighing Matrices. [Citation Graph (0, 0)][DBLP ] CASC, 2005, pp:294-305 [Conf ] Jennifer Seberry , Xian-Mo Zhang , Yuliang Zheng Systematic Generation of Cryptographically Robust S-Boxes. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1993, pp:171-182 [Conf ] Ralph Gyoery , Jennifer Seberry Electronic Funds Transfer Point of Sale in Australia. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:347-377 [Conf ] Jennifer Seberry , Xian-Mo Zhang , Yuliang Zheng Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:49-60 [Conf ] Jennifer Seberry , Xian-Mo Zhang , Yuliang Zheng Pitfalls in Designing Substitution Boxes (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:383-396 [Conf ] Yuliang Zheng , Jennifer Seberry Practical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1992, pp:292-304 [Conf ] Willy Susilo , Jianyong Huang , Jennifer Seberry On Using Fast Exponentiation Algorithm in PDAs (or: How Secure is the Discrete Logarithm Problem Assumption in PDAs?). [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:668-674 [Conf ] Jing Wu , Jennifer Seberry , Tianbing Xia Secure IP Multicast for DMS. [Citation Graph (0, 0)][DBLP ] Security and Management, 2004, pp:163-167 [Conf ] Jing Wu , Tianbing Xia , Jennifer Seberry Construction of Highly Non-Linear Cubic Homogeneous Boolean Functions on GF2n+1 (2). [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:241-247 [Conf ] Tianbing Xia , Jennifer Seberry , Jing Wu Boolean Functions with Good Properties. [Citation Graph (0, 0)][DBLP ] Security and Management, 2004, pp:294-299 [Conf ] Thomas Hardjono , Jennifer Seberry Authentication via Multi-Service Tickets in the Kuperee Server. [Citation Graph (0, 0)][DBLP ] ESORICS, 1994, pp:143-160 [Conf ] Azad Jiwa , Jennifer Seberry , Yuliang Zheng Beacon Based Authentication. [Citation Graph (0, 0)][DBLP ] ESORICS, 1994, pp:125-141 [Conf ] Jianyong Huang , Jennifer Seberry , Willy Susilo , Martin W. Bunder Security Analysis of Michael: The IEEE 802.11i Message Integrity Code. [Citation Graph (0, 0)][DBLP ] EUC Workshops, 2005, pp:423-432 [Conf ] Jing Wu , Yi Mu , Jennifer Seberry , Chun Ruan Access Policy Sheet for Access Control in Fine-Grained XML. [Citation Graph (0, 0)][DBLP ] EUC Workshops, 2005, pp:1273-1282 [Conf ] Lawrence Brown , Jennifer Seberry On the Design of Permutation P in DES Type Cryptosystems. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:696-705 [Conf ] David S. P. Khoo , Gregory J. Bird , Jennifer Seberry Encryption Exponent 3 and the Security of RSA. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:55- [Conf ] Jennifer Seberry , Xian-Mo Zhang , Yuliang Zheng On Constructions and Nonlinearity of Correlation Immune Functions (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1993, pp:181-199 [Conf ] Jennifer Seberry , Xian-Mo Zhang , Yuliang Zheng Relationships Among Nonlinear Criteria (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:376-388 [Conf ] Beomsik Song , Jennifer Seberry Further Observations on the Structure of the AES Algorithm. [Citation Graph (0, 0)][DBLP ] FSE, 2003, pp:223-234 [Conf ] Beomsik Song , Jennifer Seberry Consistent Differential Patterns of Rijndael. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:149-163 [Conf ] Beomsik Song , Huaxiong Wang , Jennifer Seberry A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances. [Citation Graph (0, 0)][DBLP ] ICISC, 2001, pp:18-31 [Conf ] Jing Wu , Jennifer Seberry , Yi Mu , Chun Ruan Delegatable Access Control for Fine-Grained XML. [Citation Graph (0, 0)][DBLP ] ICPADS (2), 2005, pp:270-274 [Conf ] Xiang Li , Jennifer Seberry Forensic Computing. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2003, pp:18-35 [Conf ] Jaroslaw Pastuszak , Josef Pieprzyk , Jennifer Seberry Codes Identifying Bad Signature in Batches. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2000, pp:143-154 [Conf ] Le Chung Tran , Tadeusz A. Wysocki , Jennifer Seberry , Alfred Mertins A Generalized Algorithm for the Generation of Correlated Rayleigh Fading Envelopes in Radio Channels. [Citation Graph (0, 0)][DBLP ] IPDPS, 2005, pp:- [Conf ] Yibing Kong , Jennifer Seberry , Janusz R. Getta , Ping Yu A Cryptographic Solution for General Access Control. [Citation Graph (0, 0)][DBLP ] ISC, 2005, pp:461-473 [Conf ] Yvo Desmedt , Mike Burmester , Jennifer Seberry Equitability in Retroactive Data Confiscation versus Proactive Key Escrow. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:277-286 [Conf ] Jaroslaw Pastuszak , Dariusz Michatek , Josef Pieprzyk , Jennifer Seberry Identification of Bad Signatures in Batches. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:28-45 [Conf ] Yibing Kong , Janusz R. Getta , Ping Yu , Jennifer Seberry A Generalized Policy Support System and Its Hierarchy Semantics. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:136-145 [Conf ] Thomas Hardjono , Yuliang Zheng , Jennifer Seberry Kuperee: An Approach to Authentication using Public Keys. [Citation Graph (0, 0)][DBLP ] ULPAA, 1994, pp:65-76 [Conf ] Thomas Hardjono , Jennifer Seberry Search Key Substitution in the Encipherment of B-Trees. [Citation Graph (0, 5)][DBLP ] VLDB, 1990, pp:50-58 [Conf ] Le Chung Tran , Tadeusz A. Wysocki , Jennifer Seberry , Alfred Mertins A Generalized Algorithm for the Generation of Correlated Rayleigh Fading Envelopes. [Citation Graph (0, 0)][DBLP ] WOWMOM, 2005, pp:213-218 [Conf ] Jianyong Huang , Jennifer Seberry , Willy Susilo On the Internal Structure of Alpha-MAC. [Citation Graph (0, 0)][DBLP ] VIETCRYPT, 2006, pp:271-285 [Conf ] Christos Koukouvinos , E. Lappas , M. Mitrouli , Jennifer Seberry On the Complete Pivoting Conjecture for Hadamard Matrices of Small Orders. [Citation Graph (0, 0)][DBLP ] Journal of Research and Practice in Information Technology, 2001, v:33, n:4, pp:298-309 [Journal ] Stelios Georgiou , Christos Koukouvinos , Jennifer Seberry On Full Orthogonal Designs in Order 56. [Citation Graph (0, 0)][DBLP ] Ars Comb., 2002, v:65, n:, pp:- [Journal ] Stelios Georgiou , Christos Koukouvinos , Jennifer Seberry Some results on self-orthogonal and self-dual codes. [Citation Graph (0, 0)][DBLP ] Ars Comb., 2003, v:68, n:, pp:- [Journal ] Stelios Georgiou , Christos Koukouvinos , Jennifer Seberry Generalized orthogonal designs. [Citation Graph (0, 0)][DBLP ] Ars Comb., 2004, v:71, n:, pp:- [Journal ] Christos Koukouvinos , Jennifer Seberry Orthogonal Designs of Kharaghani Type: II. [Citation Graph (0, 0)][DBLP ] Ars Comb., 2004, v:72, n:, pp:- [Journal ] Christos Koukouvinos , Jennifer Seberry New orthogonal designs and sequences with two and three variables in order 28. [Citation Graph (0, 0)][DBLP ] Ars Comb., 1999, v:54, n:, pp:- [Journal ] Christos Koukouvinos , Jennifer Seberry Orthogonal Designs of Kharaghani Type: I. [Citation Graph (0, 0)][DBLP ] Ars Comb., 2003, v:67, n:, pp:- [Journal ] Willy Susilo , Reihaneh Safavi-Naini , Marc Gysin , Jennifer Seberry A New and Efficient Fail-stop Signature Scheme. [Citation Graph (0, 0)][DBLP ] Comput. J., 2000, v:43, n:5, pp:430-437 [Journal ] Yuliang Zheng , Thomas Hardjono , Jennifer Seberry Reusing Shares in Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP ] Comput. J., 1994, v:37, n:3, pp:199-205 [Journal ] Jeremy E. Dawson , Jennifer Seberry , David B. Skillicorn The directed packing numbers DD (t, v, v), t>=;4. [Citation Graph (0, 0)][DBLP ] Combinatorica, 1984, v:4, n:2, pp:121-130 [Journal ] Thomas Hardjono , Jennifer Seberry Applications of smartcards for anonymous and verifiable databases. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1995, v:14, n:5, pp:465-472 [Journal ] Thomas Hardjono , Yuliang Zheng , Jennifer Seberry Database authentication revisited. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1994, v:13, n:7, pp:573-580 [Journal ] Chengxin Qu , Jennifer Seberry , Josef Pieprzyk Homogeneous bent functions. [Citation Graph (0, 0)][DBLP ] Discrete Applied Mathematics, 2000, v:102, n:1-2, pp:133-139 [Journal ] Tianbing Xia , Jennifer Seberry , Josef Pieprzyk , Chris Charnes Homogeneous bent functions of degree n in 2n variables do not exist for n ge3. [Citation Graph (0, 0)][DBLP ] Discrete Applied Mathematics, 2004, v:142, n:1-3, pp:127-132 [Journal ] Mingyuan Xia , Tianbing Xia , Jennifer Seberry , Jing Wu An infinite family of Goethals-Seidel arrays. [Citation Graph (0, 0)][DBLP ] Discrete Applied Mathematics, 2005, v:145, n:3, pp:498-504 [Journal ] Christos Koukouvinos , Stratis Kounias , Jennifer Seberry , C. H. Yang , Y. Yang On Sequences with Zero Autocorrelation. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 1994, v:4, n:4, pp:327-340 [Journal ] Christos Koukouvinos , M. Mitrouli , Jennifer Seberry Values of Minors of (1, -1) Incidence Matrices of SBIBDs and Their Application to the Growth Problem. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2001, v:23, n:3, pp:267-282 [Journal ] Mingyuan Xia , Tianbing Xia , Jennifer Seberry A New Method for Constructing Williamson Matrices. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2005, v:35, n:2, pp:191-209 [Journal ] Roderick J. Fletcher , Christos Koukouvinos , Jennifer Seberry New skew-Hadamard matrices of order 4cdot59 and new D-optimal designs of order 2cdot59. [Citation Graph (0, 0)][DBLP ] Discrete Mathematics, 2004, v:286, n:3, pp:251-253 [Journal ] Ilias S. Kotsireas , Christos Koukouvinos , Jennifer Seberry Hadamard ideals and Hadamard matrices with two circulant cores. [Citation Graph (0, 0)][DBLP ] Eur. J. Comb., 2006, v:27, n:5, pp:658-668 [Journal ] Jennifer Seberry , Xian-Mo Zhang , Yuliang Zheng Nonlinearity and Propagation Characteristics of Balanced Boolean Functions [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1995, v:119, n:1, pp:1-13 [Journal ] Jennifer Seberry , Xian-Mo Zhang , Yuliang Zheng Improving the Strict Avalanche Characteristics of Cryptographic Functions. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1994, v:50, n:1, pp:37-41 [Journal ] Azad Jiwa , Thomas Hardjono , Jennifer Seberry Beacons for Authentication in Distributed Systems. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1996, v:4, n:1, pp:81-96 [Journal ] Robert Craigen , Jennifer Seberry , Xian-Mo Zhang Product of Four Hadamard Matrices. [Citation Graph (0, 0)][DBLP ] J. Comb. Theory, Ser. A, 1992, v:59, n:2, pp:318-320 [Journal ] Warwick de Launey , Jennifer Seberry The Strong Kronecker Product. [Citation Graph (0, 0)][DBLP ] J. Comb. Theory, Ser. A, 1994, v:66, n:2, pp:192-213 [Journal ] R. Razen , Jennifer Seberry , K. Wehrhahn Ordered Partitions and Codes Generated by Circulant Matrices. [Citation Graph (0, 0)][DBLP ] J. Comb. Theory, Ser. A, 1979, v:27, n:3, pp:333-341 [Journal ] Jennifer Seberry , David B. Skillicorn All Directed BIBDs with k = 3 Exist. [Citation Graph (0, 0)][DBLP ] J. Comb. Theory, Ser. A, 1980, v:29, n:2, pp:244-248 [Journal ] John H. Loxton , David S. P. Khoo , Gregory J. Bird , Jennifer Seberry A Cubic RSA Code Equivalent to Factorization. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1992, v:5, n:2, pp:139-150 [Journal ] Yuliang Zheng , Jennifer Seberry Immunizing Public Key Cryptosystems Against Chosen Ciphertext Attacks. [Citation Graph (0, 0)][DBLP ] IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:715-724 [Journal ] Jennifer Seberry , Xian-Mo Zhang , Yuliang Zheng The Relationship Between Propagation Characteristics and Nonlinearity of Cryptographic Functions. [Citation Graph (0, 0)][DBLP ] J. UCS, 1995, v:1, n:2, pp:136-150 [Journal ] Claude Carlet , Jennifer Seberry , Xian-Mo Zhang Comments on 'Generating and counting binary Bent sequences'. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1994, v:40, n:2, pp:600-0 [Journal ] Joseph Hammer , Jennifer Seberry Higher dimensional orthogonal designs and applications. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1981, v:27, n:6, pp:772-779 [Journal ] Reihaneh Safavi-Naini , Jennifer Seberry Error-correcting codes for authentication and subliminal channels. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1991, v:37, n:1, pp:13-17 [Journal ] Jennifer Seberry , Beata J. Wysocki , Tadeusz A. Wysocki Williamson-Hadamard spreading sequences for DS-CDMA applications. [Citation Graph (0, 0)][DBLP ] Wireless Communications and Mobile Computing, 2003, v:3, n:5, pp:597-607 [Journal ] Wei Wu , Yi Mu , Willy Susilo , Jennifer Seberry , Xinyi Huang Identity-Based Proxy Signature from Pairings. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:22-31 [Conf ] Christos Koukouvinos , Stratis Kounias , Jennifer Seberry Supplementary difference sets and optimal designs. [Citation Graph (0, 0)][DBLP ] Discrete Mathematics, 1991, v:88, n:1, pp:49-58 [Journal ] Christos Koukouvinos , Jennifer Seberry Hadamard matrices of order =8 (mod 16) with maximal excess. [Citation Graph (0, 0)][DBLP ] Discrete Mathematics, 1991, v:92, n:1-3, pp:173-176 [Journal ] Brendan D. McKay , Jennifer Seberry , Scott A. Vanstone Ralph Gordon Stanton. [Citation Graph (0, 0)][DBLP ] Discrete Mathematics, 1991, v:92, n:1-3, pp:1-8 [Journal ] On the Security of NOEKEON against Side Channel Cube Attacks. [Citation Graph (, )][DBLP ] A Five-Round Algebraic Property of the Advanced Encryption Standard. [Citation Graph (, )][DBLP ] Differential Fault Analysis of LEX. [Citation Graph (, )][DBLP ] A Simple Orthogonal Space-Time-Polarization Block Code. [Citation Graph (, )][DBLP ] Key Predistribution Schemes Using Block Designs in Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Search in 0.068secs, Finished in 0.074secs