The SCEAS System
| |||||||

## Search the dblp DataBase
Lynn Margaret Batten:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Sultan Al-Hinai, Lynn Margaret Batten, Bernard D. Colbert, Kenneth Koon-Ho Wong
**Algebraic Attacks on Clock-Controlled Stream Ciphers.**[Citation Graph (0, 0)][DBLP] ACISP, 2006, pp:1-16 [Conf] - Matthew J. Warren, Lynn Margaret Batten
**Security Management: An Information Systems Setting.**[Citation Graph (0, 0)][DBLP] ACISP, 2002, pp:257-270 [Conf] - Lei Pan, Lynn Margaret Batten
**Reproducibility of Digital Evidence in Forensic Investigations.**[Citation Graph (0, 0)][DBLP] DFRWS, 2005, pp:- [Conf] - Kieran F. Lim, Gleb Beliakov, Lynn Margaret Batten
**A New Method for Locating the Global Optimum: Application of the Cutting Angle Method to Molecular Structure Prediction.**[Citation Graph (0, 0)][DBLP] International Conference on Computational Science, 2003, pp:1040-1049 [Conf] - Lynn Margaret Batten
**Algebraic Attacks Over GF(q).**[Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:84-91 [Conf] - Kenneth Koon-Ho Wong, Bernard D. Colbert, Lynn Margaret Batten, Sultan Al-Hinai
**Algebraic Attacks on Clock-Controlled Cascade Ciphers.**[Citation Graph (0, 0)][DBLP] INDOCRYPT, 2006, pp:32-47 [Conf] - Yvo Desmedt, Reihaneh Safavi-Naini, Huaxiong Wang, Lynn Margaret Batten, Chris Charnes, Josef Pieprzyk
**Broadcast anti-jamming systems.**[Citation Graph (0, 0)][DBLP] Computer Networks, 2001, v:35, n:2-3, pp:223-236 [Journal] - Lynn Margaret Batten, Kris Coolsaet, Anne Penfold Street
**Blocking Sets in (v, {2, 4}, 1)-Designs.**[Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1997, v:10, n:3, pp:309-314 [Journal] - Lynn Margaret Batten, Jeremy M. Dover
**Some Sets of Type in Cubic Order Planes.**[Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1999, v:16, n:3, pp:211-213 [Journal] - Lynn Margaret Batten, Sharad S. Sane
**Permutations with a distinct difference property.**[Citation Graph (0, 0)][DBLP] Discrete Mathematics, 2003, v:261, n:1-3, pp:59-67 [Journal] - Lynn Margaret Batten
**Embedding pseudo-complements of quadrics in**[Citation Graph (0, 0)][DBLP]*PG*(*n*,*q*),*n*geq 3,*q*geq 2. J. Comb. Theory, Ser. A, 1988, v:49, n:2, pp:338-348 [Journal] - Lynn Margaret Batten, Jeremy M. Dover
**Blocking Semiovals of Type (1, m+1, n+1).**[Citation Graph (0, 0)][DBLP] SIAM J. Discrete Math., 2001, v:14, n:4, pp:446-457 [Journal] - Lynn Margaret Batten, Michelle Davidson, Leo Storme
**An analysis of Chen's construction of minimum-distance five codes.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2000, v:46, n:2, pp:505-511 [Journal] - Lynn Margaret Batten
**Embedding the complement of a minimal blocking set in a projective plane.**[Citation Graph (0, 0)][DBLP] Discrete Mathematics, 1984, v:52, n:1, pp:1-5 [Journal] - Lynn Margaret Batten
**Rank functions of closure spaces of finite rank.**[Citation Graph (0, 0)][DBLP] Discrete Mathematics, 1984, v:49, n:2, pp:113-116 [Journal] - Lynn Margaret Batten
**Minimally projectively embeddable Steiner systems.**[Citation Graph (0, 0)][DBLP] Discrete Mathematics, 1989, v:77, n:1-3, pp:21-27 [Journal] - Lynn Margaret Batten
**An extension of Wagner's theorem.**[Citation Graph (0, 0)][DBLP] Discrete Mathematics, 1991, v:92, n:1-3, pp:21-23 [Journal] - Lynn Margaret Batten
**The nonexistence of finite linear spaces with v=n**[Citation Graph (0, 0)][DBLP]^{2}points and b=n^{2}+n+2 lines. Discrete Mathematics, 1993, v:115, n:1-3, pp:11-15 [Journal] - Lynn Margaret Batten
**A characterization of finite linear spaces on v points, n**[Citation Graph (0, 0)][DBLP]^{2}<=v<(n+1)^{2}, andb=n^{2}+n+3 lines, n>=10. Discrete Mathematics, 1993, v:118, n:1-3, pp:1-9 [Journal] **Mutually Clock-Controlled Feedback Shift Registers Provide Resistance to Algebraic Attacks.**[Citation Graph (, )][DBLP]**Lightweight Authentication for Recovery in Wireless Sensor Networks.**[Citation Graph (, )][DBLP]**Monitoring Employees' Emails without Violating Their Privacy Right.**[Citation Graph (, )][DBLP]**A Lower Bound on Effective Performance Testing for Digital Forensic Tools.**[Citation Graph (, )][DBLP]**A Trusted Approach to E-Commerce.**[Citation Graph (, )][DBLP]**A Privacy Preserving E-Payment Scheme.**[Citation Graph (, )][DBLP]**Designing Information Systems Which Manage or Avoid Privacy Incidents.**[Citation Graph (, )][DBLP]**Robust Correctness Testing for Digital Forensic Tools.**[Citation Graph (, )][DBLP]**Fast Recovery from Node Compromise in Wireless Sensor Networks.**[Citation Graph (, )][DBLP]**Robust performance testing for digital forensic tools.**[Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.005secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |