The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Lynn Margaret Batten: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Sultan Al-Hinai, Lynn Margaret Batten, Bernard D. Colbert, Kenneth Koon-Ho Wong
    Algebraic Attacks on Clock-Controlled Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:1-16 [Conf]
  2. Matthew J. Warren, Lynn Margaret Batten
    Security Management: An Information Systems Setting. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:257-270 [Conf]
  3. Lei Pan, Lynn Margaret Batten
    Reproducibility of Digital Evidence in Forensic Investigations. [Citation Graph (0, 0)][DBLP]
    DFRWS, 2005, pp:- [Conf]
  4. Kieran F. Lim, Gleb Beliakov, Lynn Margaret Batten
    A New Method for Locating the Global Optimum: Application of the Cutting Angle Method to Molecular Structure Prediction. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science, 2003, pp:1040-1049 [Conf]
  5. Lynn Margaret Batten
    Algebraic Attacks Over GF(q). [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:84-91 [Conf]
  6. Kenneth Koon-Ho Wong, Bernard D. Colbert, Lynn Margaret Batten, Sultan Al-Hinai
    Algebraic Attacks on Clock-Controlled Cascade Ciphers. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:32-47 [Conf]
  7. Yvo Desmedt, Reihaneh Safavi-Naini, Huaxiong Wang, Lynn Margaret Batten, Chris Charnes, Josef Pieprzyk
    Broadcast anti-jamming systems. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2001, v:35, n:2-3, pp:223-236 [Journal]
  8. Lynn Margaret Batten, Kris Coolsaet, Anne Penfold Street
    Blocking Sets in (v, {2, 4}, 1)-Designs. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1997, v:10, n:3, pp:309-314 [Journal]
  9. Lynn Margaret Batten, Jeremy M. Dover
    Some Sets of Type in Cubic Order Planes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1999, v:16, n:3, pp:211-213 [Journal]
  10. Lynn Margaret Batten, Sharad S. Sane
    Permutations with a distinct difference property. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 2003, v:261, n:1-3, pp:59-67 [Journal]
  11. Lynn Margaret Batten
    Embedding pseudo-complements of quadrics in PG(n, q), n geq 3, q geq 2. [Citation Graph (0, 0)][DBLP]
    J. Comb. Theory, Ser. A, 1988, v:49, n:2, pp:338-348 [Journal]
  12. Lynn Margaret Batten, Jeremy M. Dover
    Blocking Semiovals of Type (1, m+1, n+1). [Citation Graph (0, 0)][DBLP]
    SIAM J. Discrete Math., 2001, v:14, n:4, pp:446-457 [Journal]
  13. Lynn Margaret Batten, Michelle Davidson, Leo Storme
    An analysis of Chen's construction of minimum-distance five codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2000, v:46, n:2, pp:505-511 [Journal]
  14. Lynn Margaret Batten
    Embedding the complement of a minimal blocking set in a projective plane. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 1984, v:52, n:1, pp:1-5 [Journal]
  15. Lynn Margaret Batten
    Rank functions of closure spaces of finite rank. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 1984, v:49, n:2, pp:113-116 [Journal]
  16. Lynn Margaret Batten
    Minimally projectively embeddable Steiner systems. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 1989, v:77, n:1-3, pp:21-27 [Journal]
  17. Lynn Margaret Batten
    An extension of Wagner's theorem. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 1991, v:92, n:1-3, pp:21-23 [Journal]
  18. Lynn Margaret Batten
    The nonexistence of finite linear spaces with v=n2 points and b=n2+n+2 lines. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 1993, v:115, n:1-3, pp:11-15 [Journal]
  19. Lynn Margaret Batten
    A characterization of finite linear spaces on v points, n2<=v<(n+1)2, andb=n2+n+3 lines, n>=10. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 1993, v:118, n:1-3, pp:1-9 [Journal]

  20. Mutually Clock-Controlled Feedback Shift Registers Provide Resistance to Algebraic Attacks. [Citation Graph (, )][DBLP]


  21. Lightweight Authentication for Recovery in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  22. Monitoring Employees' Emails without Violating Their Privacy Right. [Citation Graph (, )][DBLP]


  23. A Lower Bound on Effective Performance Testing for Digital Forensic Tools. [Citation Graph (, )][DBLP]


  24. A Trusted Approach to E-Commerce. [Citation Graph (, )][DBLP]


  25. A Privacy Preserving E-Payment Scheme. [Citation Graph (, )][DBLP]


  26. Designing Information Systems Which Manage or Avoid Privacy Incidents. [Citation Graph (, )][DBLP]


  27. Robust Correctness Testing for Digital Forensic Tools. [Citation Graph (, )][DBLP]


  28. Fast Recovery from Node Compromise in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  29. Robust performance testing for digital forensic tools. [Citation Graph (, )][DBLP]


Search in 0.033secs, Finished in 0.034secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002