


Остановите войну!
for scientists:


default search action
Jennifer Seberry
Jennifer Seberry Wallis
Person information

- affiliation: University of Wollongong, Australia
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2021
- [j104]Leanne Rylands
, Jennifer Seberry, Xun Yi, Andrei Kelarev, Joe Ryan, Yuqing Lin
:
Collusion-resistant protocols for private processing of aggregated queries in distributed databases. Distributed Parallel Databases 39(1): 97-127 (2021)
2010 – 2019
- 2019
- [j103]Andrei Kelarev
, Xun Yi, Shahriar Badsha
, Xuechao Yang
, Leanne Rylands, Jennifer Seberry:
A multistage protocol for aggregated queries in distributed cloud databases with privacy protection. Future Gener. Comput. Syst. 90: 368-380 (2019) - 2018
- [j102]Andrei Kelarev
, Joe Ryan, Leanne Rylands, Jennifer Seberry, Xun Yi:
Discrete algorithms and methods for security of statistical databases related to the work of Mirka Miller. J. Discrete Algorithms 52-53: 112-121 (2018) - 2017
- [c66]Nikolay A. Balonin, Jennifer Seberry:
A Construction for 0, 1, -1 Orthogonal Matrices Visualized. IWOCA 2017: 47-57 - [c65]Andrei Kelarev
, Jennifer Seberry, Leanne Rylands
, Xun Yi
:
Combinatorial Algorithms and Methods for Security of Statistical Databases Related to the Work of Mirka Miller. IWOCA 2017: 383-394 - 2015
- [j101]Jongkil Kim
, Willy Susilo
, Man Ho Au
, Jennifer Seberry:
Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext. IEEE Trans. Inf. Forensics Secur. 10(3): 679-693 (2015) - 2014
- [j100]Jennifer Seberry, Yi Mu, Fuchun Guo, Tim Wellsmore:
Efficient authentication and integrity protection for the border gateway protocol. Int. J. Secur. Networks 9(4): 234-243 (2014) - 2013
- [j99]Jennifer Seberry:
Strongly amicable orthogonal designs and amicable Hadamard matrices. Australas. J Comb. 55: 5-14 (2013) - [j98]Tianbing Xia, Jennifer Seberry, Ming-Yuan Xia, Shangli Zhang:
Some new constructions of orthogonal designs. Australas. J Comb. 55: 121-130 (2013) - [c64]Jongkil Kim
, Willy Susilo
, Man Ho Au
, Jennifer Seberry:
Efficient Semi-static Secure Broadcast Encryption Scheme. Pairing 2013: 62-76 - [p3]Jennifer Seberry:
The Impact of Number Theory and Computer-Aided Mathematics on Solving the Hadamard Matrix Conjecture. Number Theory and Related Fields 2013: 313-320 - 2012
- [j97]Chun Li, Jennifer Seberry:
On crystal sets. Australas. J Comb. 52: 89-110 (2012) - [j96]Jennifer Seberry, Dongvu Tonien
:
Some Constructions of Mutually Orthogonal Latin Squares and Superimposed Codes. Discret. Math. Algorithms Appl. 4(3) (2012) - [j95]Ilias S. Kotsireas, Christos Koukouvinos, Jennifer Seberry:
New weighing matrices constructed from two circulant submatrices. Optim. Lett. 6(1): 211-217 (2012) - [c63]Shekh Faisal Abdul-Latip, Reza Reyhanitabar, Willy Susilo
, Jennifer Seberry:
Fault Analysis of the KATAN Family of Block Ciphers. ISPEC 2012: 319-336 - [e9]Willy Susilo
, Yi Mu, Jennifer Seberry:
Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings. Lecture Notes in Computer Science 7372, Springer 2012, ISBN 978-3-642-31447-6 [contents] - [i3]Shekh Faisal Abdul-Latip, Reza Reyhanitabar, Willy Susilo, Jennifer Seberry:
Fault Analysis of the KATAN Family of Block Ciphers. IACR Cryptol. ePrint Arch. 2012: 30 (2012) - 2011
- [j94]Jennifer Seberry, Sarah Spence Adams:
The amicable-Kronecker construction of quaternion orthogonal designs. Australas. J Comb. 50: 243-258 (2011) - [j93]Jennifer Seberry, Vinhbuu To, Dongvu Tonien
:
A new generic digital signature algorithm. Groups Complex. Cryptol. 3(2): 221-237 (2011) - [c62]Shekh Faisal Abdul-Latip, Reza Reyhanitabar, Willy Susilo
, Jennifer Seberry:
Extended cubes: enhancing the cube attack by extracting low-degree non-linear equations. AsiaCCS 2011: 296-305 - [c61]Jianyong Huang, Willy Susilo
, Jennifer Seberry:
Repeated Differential Properties of the AES-128 and AES-256 Key Schedules. TrustCom 2011: 525-532 - 2010
- [j92]Ilias S. Kotsireas, Christos Koukouvinos, Jennifer Seberry, Dimitris E. Simos:
New classes of orthogonal designs constructed from complementary sequences with given spread. Australas. J Comb. 46: 67-78 (2010) - [j91]K. T. Arasu, Ilias S. Kotsireas, Christos Koukouvinos, Jennifer Seberry:
On circulant and two-circulant weighing matrices. Australas. J Comb. 48: 43-52 (2010) - [j90]Jennifer Seberry, Marilena Mitrouli:
Some remarks on Hadamard matrices. Cryptogr. Commun. 2(2): 293-306 (2010) - [c60]Lei Wang
, Tianbing Xia
, Jennifer Seberry:
Inter-Domain Routing Validator Based Spoofing Defence System. ISI 2010: 153-155 - [c59]Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo
, Jennifer Seberry:
On the Security of NOEKEON against Side Channel Cube Attacks. ISPEC 2010: 45-55 - [c58]Jianyong Huang, Willy Susilo
, Jennifer Seberry:
Differential Fault Analysis of LEX. SCN 2010: 55-72
2000 – 2009
- 2009
- [j89]Ying Zhao, Jennifer Seberry, Tianbing Xia, Beata J. Wysocki, Tadeusz A. Wysocki:
Construction of amicable orthogonal design. Australas. J Comb. 44: 19-36 (2009) - [j88]Jianyong Huang, Jennifer Seberry, Willy Susilo
:
A five-round algebraic property of AES and its application to the ALPHA-MAC. Int. J. Appl. Cryptogr. 1(4): 264-289 (2009) - [j87]Le Chung Tran
, Tadeusz A. Wysocki, Jennifer Seberry, Alfred Mertins, Sarah Spence Adams:
Novel constructions of improved square complex orthogonal designs for eight transmit antennas. IEEE Trans. Inf. Theory 55(10): 4439-4448 (2009) - [c57]Sushmita Ruj, Jennifer Seberry, Bimal K. Roy:
Key Predistribution Schemes Using Block Designs in Wireless Sensor Networks. CSE (2) 2009: 873-878 - 2008
- [j86]Ilias S. Kotsireas, Christos Koukouvinos, Jennifer Seberry:
New orthogonal designs from weighing matrices. Australas. J Comb. 40: 99-104 (2008) - [j85]Jennifer Seberry, Kenneth Finlayson, Sarah Spence Adams, Tadeusz A. Wysocki, Tianbing Xia
, Beata J. Wysocki:
The Theory of Quaternion Orthogonal Designs. IEEE Trans. Signal Process. 56(1): 256-265 (2008) - [c56]Eli Biham, Jennifer Seberry:
A New Very Fast Stream Cipher : Tpy. AISC 2008: 5 - [c55]Jianyong Huang, Jennifer Seberry, Willy Susilo
:
A Five-Round Algebraic Property of the Advanced Encryption Standard. ISC 2008: 316-330 - [e8]Yi Mu, Willy Susilo
, Jennifer Seberry:
Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings. Lecture Notes in Computer Science 5107, Springer 2008, ISBN 978-3-540-69971-2 [contents] - 2007
- [j84]Tianbing Xia, Ming-Yuan Xia, Jennifer Seberry:
Some new results of regular Hadamard matrices and SBIBD II. Australas. J Comb. 37: 117-126 (2007) - [j83]Gennian Ge, Malcolm Greig, Jennifer Seberry, Ralph Seberry:
Generalized Bhaskar Rao Designs with Block Size 3 over Finite Abelian Groups. Graphs Comb. 23(3): 271-290 (2007) - [c54]Wei Wu, Yi Mu, Willy Susilo
, Jennifer Seberry, Xinyi Huang:
Identity-Based Proxy Signature from Pairings. ATC 2007: 22-31 - [c53]Beata J. Wysocki, Tadeusz A. Wysocki, Jennifer Seberry, Sarah Spence Adams, Hamid Sharif:
A Simple Orthogonal Space-Time-Polarization Block Code. VTC Fall 2007: 754-757 - 2006
- [j82]Tianbing Xia, Ming-Yuan Xia, Jennifer Seberry, Jing Wu:
Hadamard matrices constructed by circulant and negacyclic matrices. Australas. J Comb. 34: 105-116 (2006) - [j81]Ying Zhao, Jennifer Seberry, Tianbing Xia, Yejing Wang, Beata J. Wysocki, Tadeusz A. Wysocki, Le Chung Tran:
Amicable orthogonal designs of order 8 for complex space-time block codes. Australas. J Comb. 34: 137-144 (2006) - [j80]Ying Zhao, Yejing Wang, Jennifer Seberry:
On amicable orthogonal designs of order 8. Australas. J Comb. 34: 321-330 (2006) - [j79]Kenneth Finlayson, Moon Ho Lee, Jennifer Seberry, Mieko Yamada:
Jacket matrices constructed from Hadamard matrices and generalized Hadamard matrices. Australas. J Comb. 35: 83-88 (2006) - [j78]Ilias S. Kotsireas, Christos Koukouvinos, Jennifer Seberry:
Hadamard ideals and Hadamard matrices with two circulant cores. Eur. J. Comb. 27(5): 658-668 (2006) - [c52]Dibyendu Chakrabarti, Jennifer Seberry:
Combinatorial Structures for Design of Wireless Sensor Networks. ACNS 2006: 365-374 - [c51]Jianyong Huang, Jennifer Seberry, Willy Susilo
:
On the Internal Structure of Alpha-MAC. VIETCRYPT 2006: 271-285 - 2005
- [j77]Ming-Yuan Xia, Tianbing Xia, Jennifer Seberry, Guoxin Zuo:
A new method for constructing T-matrices. Australas. J Comb. 32: 61-78 (2005) - [j76]Rita SahaRay, Avishek Adhikari, Jennifer Seberry:
Critical sets in orthogonal arrays with 7 and 9 levels. Australas. J Comb. 33: 109-124 (2005) - [j75]Yejing Wang, Jennifer Seberry, Beata J. Wysocki, Tadeusz A. Wysocki, Le Chung Tran, Ying Zhao, Tianbing Xia:
An exposure property of block designs. Australas. J Comb. 33: 147-156 (2005) - [j74]Ming-Yuan Xia, Tianbing Xia
, Jennifer Seberry, Jing Wu:
An infinite family of Goethals-Seidel arrays. Discret. Appl. Math. 145(3): 498-504 (2005) - [j73]Ming-Yuan Xia, Tianbing Xia
, Jennifer Seberry:
A New Method for Constructing Williamson Matrices. Des. Codes Cryptogr. 35(2): 191-209 (2005) - [j72]Le Chung Tran
, Tadeusz A. Wysocki, Alfred Mertins, Jennifer Seberry:
A Generalized Algorithm for the Generation of Correlated Rayleigh Fading Envelopes in Wireless Channels. EURASIP J. Wirel. Commun. Netw. 2005(5): 801-815 (2005) - [c50]Christos Kravvaritis, Marilena Mitrouli, Jennifer Seberry:
Counting Techniques Specifying the Existence of Submatrices in Weighing Matrices. CASC 2005: 294-305 - [c49]Jianyong Huang, Jennifer Seberry, Willy Susilo
, Martin W. Bunder:
Security Analysis of Michael: The IEEE 802.11i Message Integrity Code. EUC Workshops 2005: 423-432 - [c48]Jing Wu, Yi Mu, Jennifer Seberry, Chun Ruan:
Access Policy Sheet for Access Control in Fine-Grained XML. EUC Workshops 2005: 1273-1282 - [c47]Jing Wu, Jennifer Seberry, Yi Mu, Chun Ruan:
Delegatable Access Control for Fine-Grained XML. ICPADS (2) 2005: 270-274 - [c46]Le Chung Tran
, Tadeusz A. Wysocki, Jennifer Seberry, Alfred Mertins:
A Generalized Algorithm for the Generation of Correlated Rayleigh Fading Envelopes in Radio Channels. IPDPS 2005 - [c45]Yibing Kong, Jennifer Seberry, Janusz R. Getta, Ping Yu
:
A Cryptographic Solution for General Access Control. ISC 2005: 461-473 - [c44]Le Chung Tran
, Tadeusz A. Wysocki, Jennifer Seberry, Alfred Mertins, Sarah Spence Adams:
Generalized Williamson and Wallis-Whiteman constructions for improved square order-8 CO STBCs. PIMRC 2005: 1155-1159 - [c43]Le Chung Tran
, Tadeusz A. Wysocki, Jennifer Seberry, Alfred Mertins:
A Generalized Algorithm for the Generation of Correlated Rayleigh Fading Envelopes. WOWMOM 2005: 213-218 - [i2]Eli Biham, Jennifer Seberry:
Py (Roo): A Fast and Secure Stream Cipher using Rolling Arrays. IACR Cryptol. ePrint Arch. 2005: 155 (2005) - 2004
- [j71]Kenneth Finlayson, Jennifer Seberry:
Orthogonal designs from negacyclic matrices. Australas. J Comb. 30: 319- (2004) - [j70]Stelios Georgiou, Christos Koukouvinos, Jennifer Seberry:
Generalized orthogonal designs. Ars Comb. 71 (2004) - [j69]Christos Koukouvinos, Jennifer Seberry:
Orthogonal Designs of Kharaghani Type: II. Ars Comb. 72 (2004) - [j68]Tianbing Xia
, Jennifer Seberry, Josef Pieprzyk
, Chris Charnes:
Homogeneous bent functions of degree n in 2n variables do not exist for nge3. Discret. Appl. Math. 142(1-3): 127-132 (2004) - [j67]Roderick J. Fletcher, Christos Koukouvinos, Jennifer Seberry:
New skew-Hadamard matrices of order 4cdot59 and new D-optimal designs of order 2cdot59. Discret. Math. 286(3): 251-253 (2004) - [c42]Jing Wu, Jennifer Seberry, Tianbing Xia:
Secure IP Multicast for DMS. Security and Management 2004: 163-167 - [c41]Tianbing Xia, Jennifer Seberry, Jing Wu:
Boolean Functions with Good Properties. Security and Management 2004: 294-299 - [c40]Le Chung Tran, Tadeusz A. Wysocki, Jennifer Seberry, Alfred Mertins:
On multi-modulation schemes to increase the rate of space-time block codes. EUSIPCO 2004: 1841-1844 - [c39]Yibing Kong, Janusz R. Getta, Ping Yu, Jennifer Seberry:
A Generalized Policy Support System and Its Hierarchy Semantics. WOSIS 2004: 136-145 - 2003
- [b2]Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry:
Fundamentals of computer security. Springer 2003, ISBN 978-3-540-43101-5, pp. I-XX, 1-677 - [j66]Tianbing Xia, Ming-Yuan Xia, Jennifer Seberry:
Regular Hadamard matrix, maximum excess and SBIBD. Australas. J Comb. 27: 263-276 (2003) - [j65]Christos Koukouvinos, Jennifer Seberry:
Orthogonal Designs of Kharaghani Type: I. Ars Comb. 67 (2003) - [j64]Stelios Georgiou, Christos Koukouvinos, Jennifer Seberry:
Some results on self-orthogonal and self-dual codes. Ars Comb. 68 (2003) - [j63]Rita SahaRay, Jennifer Seberry:
Critical Sets in Orthogonal Arrays. Electron. Notes Discret. Math. 15: 160 (2003) - [j62]Yejing Wang, Jennifer Seberry, Reihaneh Safavi-Naini, Ryoh Fuji-Hara:
A Note on the Exposure Property of SBIBD. Electron. Notes Discret. Math. 15: 225-227 (2003) - [j61]Christos Koukouvinos, Marilena Mitrouli, Jennifer Seberry:
Values of Minors of an Infinite Family of D-Optimal Designs and Their Application to the Growth Problem: II. SIAM J. Matrix Anal. Appl. 24(3): 715-727 (2003) - [j60]Jennifer Seberry, Beata J. Wysocki, Tadeusz A. Wysocki:
Williamson-Hadamard spreading sequences for DS-CDMA applications. Wirel. Commun. Mob. Comput. 3(5): 597-607 (2003) - [c38]Jing Wu, Tianbing Xia, Jennifer Seberry:
Construction of Highly Non-Linear Cubic Homogeneous Boolean Functions on GF2n+1(2). Security and Management 2003: 241-247 - [c37]Willy Susilo, Jianyong Huang, Jennifer Seberry:
On Using Fast Exponentiation Algorithm in PDAs (or: How Secure is the Discrete Logarithm Problem Assumption in PDAs?). Security and Management 2003: 668-674 - [c36]Beomsik Song, Jennifer Seberry:
Further Observations on the Structure of the AES Algorithm. FSE 2003: 223-234 - [c35]Xiang Li, Jennifer Seberry:
Forensic Computing. INDOCRYPT 2003: 18-35 - [e7]Reihaneh Safavi-Naini, Jennifer Seberry:
Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings. Lecture Notes in Computer Science 2727, Springer 2003, ISBN 3-540-40515-1 [contents] - 2002
- [j59]Stelios Georgiou, Christos Koukouvinos, Jennifer Seberry:
On Full Orthogonal Designs in Order 56. Ars Comb. 65 (2002) - [c34]David Soldera, Jennifer Seberry, Chengxin Qu:
The Analysis of Zheng-Seberry Scheme. ACISP 2002: 159-168 - [c33]Beomsik Song, Jennifer Seberry:
Consistent Differential Patterns of Rijndael. ICISC 2002: 149-163 - [e6]Lynn Margaret Batten, Jennifer Seberry:
Information Security and Privacy, 7th Australian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings. Lecture Notes in Computer Science 2384, Springer 2002, ISBN 3-540-43861-0 [contents] - 2001
- [j58]Christos Koukouvinos, E. Lappas, Marilena Mitrouli, Jennifer Seberry:
On the Complete Pivoting Conjecture for Hadamard Matrices of Small Orders. J. Res. Pract. Inf. Technol. 33(4): 298-309 (2001) - [j57]Roderick J. Fletcher, Jennifer Seberry:
New D-optimal designs of order 110. Australas. J Comb. 23: 49-52 (2001) - [j56]Roderick J. Fletcher, Marc Gysin, Jennifer Seberry:
Application of the discrete Fourier transform to the search for generalised Legendre pairs and Hadamard matrices. Australas. J Comb. 23: 75-86 (2001) - [j55]Marc Gysin, Jennifer Seberry:
On ternary complementary pairs. Australas. J Comb. 23: 153-170 (2001) - [j54]Marc Gysin, Jennifer Seberry:
On infinite families of sequences with one and two valued autocorrelation and two valued crosscorrelation function. Australas. J Comb. 23: 197-210 (2001) - [j53]Christos Koukouvinos, Marilena Mitrouli, Jennifer Seberry:
Values of Minors of (1, -1) Incidence Matrices of SBIBDs and Their Application to the Growth Problem. Des. Codes Cryptogr. 23(3): 267-282 (2001) - [j52]Christos Koukouvinos, Marilena Mitrouli, Jennifer Seberry:
Values of Minors of an Infinite Family of D-Optimal Designs and Their Application to the Growth Problem. SIAM J. Matrix Anal. Appl. 23(1): 1-14 (2001) - [c32]Beomsik Song, Huaxiong Wang, Jennifer Seberry:
A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances. ICISC 2001: 18-31 - [c31]Yvo Desmedt, Mike Burmester, Jennifer Seberry:
Equitability in Retroactive Data Confiscation versus Proactive Key Escrow. Public Key Cryptography 2001: 277-286 - 2000
- [j51]L. F. Fitina, Jennifer Seberry:
On the spectrum of an F-square. Australas. J Comb. 22: 81-90 (2000) - [j50]Jennifer Seberry, Tianbing Xia, Josef Pieprzyk:
Construction of cubic homogeneous boolean bent functions. Australas. J Comb. 22: 233-246 (2000) - [j49]Willy Susilo
, Reihaneh Safavi-Naini, Marc Gysin, Jennifer Seberry:
A New and Efficient Fail-stop Signature Scheme. Comput. J. 43(5): 430-437 (2000) - [j48]Chengxin Qu, Jennifer Seberry, Josef Pieprzyk
:
Homogeneous bent functions. Discret. Appl. Math. 102(1-2): 133-139 (2000) - [c30]Jaroslaw Pastuszak, Josef Pieprzyk, Jennifer Seberry:
Codes Identifying Bad Signature in Batches. INDOCRYPT 2000: 143-154 - [c29]Jaroslaw Pastuszak, Dariusz Michatek, Josef Pieprzyk, Jennifer Seberry:
Identification of Bad Signatures in Batches. Public Key Cryptography 2000: 28-45 - [e5]Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry:
Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings. Lecture Notes in Computer Science 1975, Springer 2000, ISBN 3-540-41416-9 [contents]
1990 – 1999
- 1999
- [j47]L. F. Fitina, Jennifer Seberry, Dinesh G. Sarvate:
On F-squares and their critical sets. Australas. J Comb. 19: 209-230 (1999) - [j46]L. F. Fitina, Jennifer Seberry, Ghulam Rasool Chaudhry:
Back circulant Latin squares and the influence of a set. Australas. J Comb. 20: 163-180 (1999) - [j45]Christos Koukouvinos, Jennifer Seberry:
New orthogonal designs and sequences with two and three variables in order 28. Ars Comb. 54 (1999) - [c28]Chengxin Qu, Jennifer Seberry, Josef Pieprzyk:
On the Symmetric Property of Homogeneous Boolean Functions. ACISP 1999: 26-35 - [c27]Marc Gysin, Jennifer Seberry:
Generalised Cycling Attacks on RSA and Strong RSA Primes. ACISP 1999: 149-163 - [c26]Jeffrey Horton, Jennifer Seberry:
Companion Viruses and the Macintosh: Threats and Countermeasures. ACISP 1999: 202-212 - [p2]Jennifer Seberry, Chris Charnes, Josef Pieprzyk, Reihaneh Safavi-Naini:
Crypto Topics and Applications I. Algorithms and Theory of Computation Handbook 1999 - [p1]Jennifer Seberry, Chris Charnes, Josef Pieprzyk, Reihaneh Safavi-Naini:
Crypto Topics and Applications II. Algorithms and Theory of Computation Handbook 1999 - [e4]Josef Pieprzyk, Reihaneh Safavi-Naini, Jennifer Seberry:
Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings. Lecture Notes in Computer Science 1587, Springer 1999, ISBN 3-540-65756-8 [contents] - 1998
- [j44]K. T. Arasu, Jennifer Seberry:
On circulant weighing matrices. Australas. J Comb. 17: 21-38 (1998) - [c25]Jeffrey Horton, Jennifer Seberry:
Covert Distributed Computing Using Java Through Web Spoofing. ACISP 1998: 48-57 - [c24]Mike Burmester, Yvo Desmedt, Jennifer Seberry:
Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically). ASIACRYPT 1998: 380-391 - 1996
- [j43]Christos Koukouvinos, Marilena Mitrouli, Jennifer Seberry, P. Karabelas:
On sufficient conditions for some orthogonal designs and sequences with zero autocorrelation function. Australas. J Comb. 13: 197-216 (1996) - [j42]Marc Gysin, Jennifer Seberry:
Multiplications of ternary complementary pairs. Australas. J Comb. 14: 165-180 (1996) - [j41]Azad Jiwa, Thomas Hardjono, Jennifer Seberry:
Beacons for Authentication in Distributed Systems. J. Comput. Secur. 4(1): 81-96 (1996) - [c23]Thomas Hardjono, Jennifer Seberry:
Replicating the Kuperee authentication server for increased security and reliability. ACISP 1996: 14-26 - [c22]Ghulam Rasool Chaudhry, Jennifer Seberry:
Secret Sharing Schemes Based on Room Squares. DMTCS 1996: 158-167 - [e3]