Jennifer Seberry Wallis
List of publications from the DBLP Bibliography Server - FAQ
2009 | ||
---|---|---|
106 | Sushmita Ruj, Jennifer Seberry, Bimal K. Roy: Key Predistribution Schemes Using Block Designs in Wireless Sensor Networks. CSE (2) 2009: 873-878 | |
105 | Jianyong Huang, Jennifer Seberry, Willy Susilo: A five-round algebraic property of AES and its application to the ALPHA-MAC. IJACT 1(4): 264-289 (2009) | |
2008 | ||
104 | Yi Mu, Willy Susilo, Jennifer Seberry: Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings Springer 2008 | |
103 | Jianyong Huang, Jennifer Seberry, Willy Susilo: A Five-Round Algebraic Property of the Advanced Encryption Standard. ISC 2008: 316-330 | |
102 | Jennifer Seberry, Ken Finlayson, Sarah Spence Adams, Tadeusz A. Wysocki, Tianbing Xia, Beata J. Wysocki: The Theory of Quaternion Orthogonal Designs. IEEE Transactions on Signal Processing 56(1): 256-265 (2008) | |
2007 | ||
101 | Wei Wu, Yi Mu, Willy Susilo, Jennifer Seberry, Xinyi Huang: Identity-Based Proxy Signature from Pairings. ATC 2007: 22-31 | |
100 | Beata J. Wysocki, Tadeusz A. Wysocki, Jennifer Seberry, Sarah Spence Adams, Hamid Sharif: A Simple Orthogonal Space-Time-Polarization Block Code. VTC Fall 2007: 754-757 | |
2006 | ||
99 | Dibyendu Chakrabarti, Jennifer Seberry: Combinatorial Structures for Design of Wireless Sensor Networks. ACNS 2006: 365-374 | |
98 | Jianyong Huang, Jennifer Seberry, Willy Susilo: On the Internal Structure of Alpha-MAC. VIETCRYPT 2006: 271-285 | |
97 | Ilias S. Kotsireas, Christos Koukouvinos, Jennifer Seberry: Hadamard ideals and Hadamard matrices with two circulant cores. Eur. J. Comb. 27(5): 658-668 (2006) | |
2005 | ||
96 | Christos Kravvaritis, Marilena Mitrouli, Jennifer Seberry: Counting Techniques Specifying the Existence of Submatrices in Weighing Matrices. CASC 2005: 294-305 | |
95 | Jing Wu, Yi Mu, Jennifer Seberry, Chun Ruan: Access Policy Sheet for Access Control in Fine-Grained XML. EUC Workshops 2005: 1273-1282 | |
94 | Jianyong Huang, Jennifer Seberry, Willy Susilo, Martin W. Bunder: Security Analysis of Michael: The IEEE 802.11i Message Integrity Code. EUC Workshops 2005: 423-432 | |
93 | Jing Wu, Jennifer Seberry, Yi Mu, Chun Ruan: Delegatable Access Control for Fine-Grained XML. ICPADS (2) 2005: 270-274 | |
92 | Le Chung Tran, Tadeusz A. Wysocki, Jennifer Seberry, Alfred Mertins: A Generalized Algorithm for the Generation of Correlated Rayleigh Fading Envelopes in Radio Channels. IPDPS 2005 | |
91 | Yibing Kong, Jennifer Seberry, Janusz R. Getta, Ping Yu: A Cryptographic Solution for General Access Control. ISC 2005: 461-473 | |
90 | Le Chung Tran, Tadeusz A. Wysocki, Jennifer Seberry, Alfred Mertins: A Generalized Algorithm for the Generation of Correlated Rayleigh Fading Envelopes. WOWMOM 2005: 213-218 | |
89 | Mingyuan Xia, Tianbing Xia, Jennifer Seberry: A New Method for Constructing Williamson Matrices. Des. Codes Cryptography 35(2): 191-209 (2005) | |
88 | Mingyuan Xia, Tianbing Xia, Jennifer Seberry, Jing Wu: An infinite family of Goethals-Seidel arrays. Discrete Applied Mathematics 145(3): 498-504 (2005) | |
2004 | ||
87 | Jing Wu, Jennifer Seberry, Tianbing Xia: Secure IP Multicast for DMS. Security and Management 2004: 163-167 | |
86 | Tianbing Xia, Jennifer Seberry, Jing Wu: Boolean Functions with Good Properties. Security and Management 2004: 294-299 | |
85 | Yibing Kong, Janusz R. Getta, Ping Yu, Jennifer Seberry: A Generalized Policy Support System and Its Hierarchy Semantics. WOSIS 2004: 136-145 | |
84 | Stelios Georgiou, Christos Koukouvinos, Jennifer Seberry: Generalized orthogonal designs. Ars Comb. 71: (2004) | |
83 | Christos Koukouvinos, Jennifer Seberry: Orthogonal Designs of Kharaghani Type: II. Ars Comb. 72: (2004) | |
82 | Tianbing Xia, Jennifer Seberry, Josef Pieprzyk, Chris Charnes: Homogeneous bent functions of degree n in 2n variables do not exist for nge3. Discrete Applied Mathematics 142(1-3): 127-132 (2004) | |
81 | Roderick J. Fletcher, Christos Koukouvinos, Jennifer Seberry: New skew-Hadamard matrices of order 4cdot59 and new D-optimal designs of order 2cdot59. Discrete Mathematics 286(3): 251-253 (2004) | |
2003 | ||
80 | Reihaneh Safavi-Naini, Jennifer Seberry: Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings Springer 2003 | |
79 | Beomsik Song, Jennifer Seberry: Further Observations on the Structure of the AES Algorithm. FSE 2003: 223-234 | |
78 | Xiang Li, Jennifer Seberry: Forensic Computing. INDOCRYPT 2003: 18-35 | |
77 | Jing Wu, Tianbing Xia, Jennifer Seberry: Construction of Highly Non-Linear Cubic Homogeneous Boolean Functions on GF2n+1(2). Security and Management 2003: 241-247 | |
76 | Willy Susilo, Jianyong Huang, Jennifer Seberry: On Using Fast Exponentiation Algorithm in PDAs (or: How Secure is the Discrete Logarithm Problem Assumption in PDAs?). Security and Management 2003: 668-674 | |
75 | Christos Koukouvinos, Jennifer Seberry: Orthogonal Designs of Kharaghani Type: I. Ars Comb. 67: (2003) | |
74 | Stelios Georgiou, Christos Koukouvinos, Jennifer Seberry: Some results on self-orthogonal and self-dual codes. Ars Comb. 68: (2003) | |
73 | Rita SahaRay, Jennifer Seberry: Critical Sets in Orthogonal Arrays. Electronic Notes in Discrete Mathematics 15: 160 (2003) | |
72 | Yejing Wang, Jennifer Seberry, Reihaneh Safavi-Naini, Ryoh Fuji-Hara: A Note on the Exposure Property of SBIBD. Electronic Notes in Discrete Mathematics 15: 225-227 (2003) | |
71 | Jennifer Seberry, Beata J. Wysocki, Tadeusz A. Wysocki: Williamson-Hadamard spreading sequences for DS-CDMA applications. Wireless Communications and Mobile Computing 3(5): 597-607 (2003) | |
2002 | ||
70 | Lynn Margaret Batten, Jennifer Seberry: Information Security and Privacy, 7th Australian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings Springer 2002 | |
69 | David Soldera, Jennifer Seberry, Chengxin Qu: The Analysis of Zheng-Seberry Scheme. ACISP 2002: 159-168 | |
68 | Beomsik Song, Jennifer Seberry: Consistent Differential Patterns of Rijndael. ICISC 2002: 149-163 | |
67 | Stelios Georgiou, Christos Koukouvinos, Jennifer Seberry: On Full Orthogonal Designs in Order 56. Ars Comb. 65: (2002) | |
2001 | ||
66 | Beomsik Song, Huaxiong Wang, Jennifer Seberry: A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances. ICISC 2001: 18-31 | |
65 | Yvo Desmedt, Mike Burmester, Jennifer Seberry: Equitability in Retroactive Data Confiscation versus Proactive Key Escrow. Public Key Cryptography 2001: 277-286 | |
64 | Christos Koukouvinos, Marilena Mitrouli, Jennifer Seberry: Values of Minors of (1, -1) Incidence Matrices of SBIBDs and Their Application to the Growth Problem. Des. Codes Cryptography 23(3): 267-282 (2001) | |
63 | Christos Koukouvinos, E. Lappas, Marilena Mitrouli, Jennifer Seberry: On the Complete Pivoting Conjecture for Hadamard Matrices of Small Orders. Journal of Research and Practice in Information Technology 33(4): 298-309 (2001) | |
2000 | ||
62 | Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry: Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings Springer 2000 | |
61 | Jaroslaw Pastuszak, Josef Pieprzyk, Jennifer Seberry: Codes Identifying Bad Signature in Batches. INDOCRYPT 2000: 143-154 | |
60 | Jaroslaw Pastuszak, Dariusz Michatek, Josef Pieprzyk, Jennifer Seberry: Identification of Bad Signatures in Batches. Public Key Cryptography 2000: 28-45 | |
59 | Willy Susilo, Reihaneh Safavi-Naini, Marc Gysin, Jennifer Seberry: A New and Efficient Fail-stop Signature Scheme. Comput. J. 43(5): 430-437 (2000) | |
58 | Chengxin Qu, Jennifer Seberry, Josef Pieprzyk: Homogeneous bent functions. Discrete Applied Mathematics 102(1-2): 133-139 (2000) | |
1999 | ||
57 | Josef Pieprzyk, Reihaneh Safavi-Naini, Jennifer Seberry: Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings Springer 1999 | |
56 | Marc Gysin, Jennifer Seberry: Generalised Cycling Attacks on RSA and Strong RSA Primes. ACISP 1999: 149-163 | |
55 | Jeffrey Horton, Jennifer Seberry: Companion Viruses and the Macintosh: Threats and Countermeasures. ACISP 1999: 202-212 | |
54 | Chengxin Qu, Jennifer Seberry, Josef Pieprzyk: On the Symmetric Property of Homogeneous Boolean Functions. ACISP 1999: 26-35 | |
53 | Christos Koukouvinos, Jennifer Seberry: New orthogonal designs and sequences with two and three variables in order 28. Ars Comb. 54: (1999) | |
1998 | ||
52 | Jeffrey Horton, Jennifer Seberry: Covert Distributed Computing Using Java Through Web Spoofing. ACISP 1998: 48-57 | |
51 | Mike Burmester, Yvo Desmedt, Jennifer Seberry: Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically). ASIACRYPT 1998: 380-391 | |
1996 | ||
50 | Josef Pieprzyk, Jennifer Seberry: Information Security and Privacy, First Australasian Conference, ACISP'96, Wollongong, NSW, Australia, June 24-26, 1996, Proceedings Springer 1996 | |
49 | Thomas Hardjono, Jennifer Seberry: Replicating the Kuperee authentication server for increased security and reliability. ACISP 1996: 14-26 | |
48 | Azad Jiwa, Thomas Hardjono, Jennifer Seberry: Beacons for Authentication in Distributed Systems. Journal of Computer Security 4(1): 81-96 (1996) | |
1995 | ||
47 | Thomas Hardjono, Jennifer Seberry: Information Security in Mobile Databases. Australasian Database Conference 1995: 0- | |
46 | Thomas Hardjono, Jennifer Seberry: Applications of smartcards for anonymous and verifiable databases. Computers & Security 14(5): 465-472 (1995) | |
45 | Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng: Nonlinearity and Propagation Characteristics of Balanced Boolean Functions Inf. Comput. 119(1): 1-13 (1995) | |
44 | Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng: The Relationship Between Propagation Characteristics and Nonlinearity of Cryptographic Functions. J. UCS 1(2): 136-150 (1995) | |
1994 | ||
43 | Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng: Structures of Cryptographic Functions with Strong Avalanche Characteristics (Extended Abstract). ASIACRYPT 1994: 119-132 | |
42 | Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng: Pitfalls in Designing Substitution Boxes (Extended Abstract). CRYPTO 1994: 383-396 | |
41 | Azad Jiwa, Jennifer Seberry, Yuliang Zheng: Beacon Based Authentication. ESORICS 1994: 125-141 | |
40 | Thomas Hardjono, Jennifer Seberry: Authentication via Multi-Service Tickets in the Kuperee Server. ESORICS 1994: 143-160 | |
39 | Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng: Relationships Among Nonlinear Criteria (Extended Abstract). EUROCRYPT 1994: 376-388 | |
38 | Thomas Hardjono, Yuliang Zheng, Jennifer Seberry: Kuperee: An Approach to Authentication using Public Keys. ULPAA 1994: 65-76 | |
37 | Yuliang Zheng, Thomas Hardjono, Jennifer Seberry: Reusing Shares in Secret Sharing Schemes. Comput. J. 37(3): 199-205 (1994) | |
36 | Thomas Hardjono, Yuliang Zheng, Jennifer Seberry: Database authentication revisited. Computers & Security 13(7): 573-580 (1994) | |
35 | Christos Koukouvinos, Stratis Kounias, Jennifer Seberry, C. H. Yang, Y. Yang: On Sequences with Zero Autocorrelation. Des. Codes Cryptography 4(4): 327-340 (1994) | |
34 | Claude Carlet, Jennifer Seberry, Xian-Mo Zhang: Comments on 'Generating and counting binary Bent sequences'. IEEE Transactions on Information Theory 40(2): 600- (1994) | |
33 | Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng: Improving the Strict Avalanche Characteristics of Cryptographic Functions. Inf. Process. Lett. 50(1): 37-41 (1994) | |
32 | Warwick de Launey, Jennifer Seberry: The Strong Kronecker Product. J. Comb. Theory, Ser. A 66(2): 192-213 (1994) | |
1993 | ||
31 | Jennifer Seberry, Yuliang Zheng: Advances in Cryptology - AUSCRYPT '92, Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992, Proceedings Springer 1993 | |
30 | Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng: Systematic Generation of Cryptographically Robust S-Boxes. ACM Conference on Computer and Communications Security 1993: 171-182 | |
29 | Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng: Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics (Extended Abstract). CRYPTO 1993: 49-60 | |
28 | Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng: On Constructions and Nonlinearity of Correlation Immune Functions (Extended Abstract). EUROCRYPT 1993: 181-199 | |
27 | Yuliang Zheng, Jennifer Seberry: Immunizing Public Key Cryptosystems Against Chosen Ciphertext Attacks. IEEE Journal on Selected Areas in Communications 11(5): 715-724 (1993) | |
1992 | ||
26 | Jennifer Seberry, Xian-Mo Zhang: Highly Nonlinear 0-1 Balanced Boolean Functions Satisfying Strict Avalanche Criterion. AUSCRYPT 1992: 145-155 | |
25 | Yvo Desmedt, Jennifer Seberry: Practical Proven Secure Authentication with Arbitration. AUSCRYPT 1992: 27-32 | |
24 | Yuliang Zheng, Josef Pieprzyk, Jennifer Seberry: HAVAL - A One-Way Hashing Algorithm with Variable Length of Output. AUSCRYPT 1992: 83-104 | |
23 | Yuliang Zheng, Jennifer Seberry: Practical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks (Extended Abstract). CRYPTO 1992: 292-304 | |
22 | Robert Craigen, Jennifer Seberry, Xian-Mo Zhang: Product of Four Hadamard Matrices. J. Comb. Theory, Ser. A 59(2): 318-320 (1992) | |
21 | John H. Loxton, David S. P. Khoo, Gregory J. Bird, Jennifer Seberry: A Cubic RSA Code Equivalent to Factorization. J. Cryptology 5(2): 139-150 (1992) | |
1991 | ||
20 | Lawrence Brown, Matthew Kwan, Josef Pieprzyk, Jennifer Seberry: Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI. ASIACRYPT 1991: 36-50 | |
19 | Christos Koukouvinos, Stratis Kounias, Jennifer Seberry: Supplementary difference sets and optimal designs. Discrete Mathematics 88(1): 49-58 (1991) | |
18 | Brendan D. McKay, Jennifer Seberry, Scott A. Vanstone: Ralph Gordon Stanton. Discrete Mathematics 92(1-3): 1-8 (1991) | |
17 | Christos Koukouvinos, Jennifer Seberry: Hadamard matrices of order =8 (mod 16) with maximal excess. Discrete Mathematics 92(1-3): 173-176 (1991) | |
16 | Reihaneh Safavi-Naini, Jennifer Seberry: Error-correcting codes for authentication and subliminal channels. IEEE Transactions on Information Theory 37(1): 13-17 (1991) | |
1990 | ||
15 | Jennifer Seberry, Josef Pieprzyk: Advances in Cryptology - AUSCRYPT '90, International Conference on Cryptology, Sydney, Australia, January 8-11, 1990, Proceedings Springer 1990 | |
14 | Martin Anthony, Keith M. Martin, Jennifer Seberry, Peter R. Wild: Some Remarks on Authentication Systems. AUSCRYPT 1990: 122-139 | |
13 | Lawrence Brown, Jennifer Seberry: Key Scheduling In Des Type Cryptosystems. AUSCRYPT 1990: 221-228 | |
12 | Lawrence Brown, Josef Pieprzyk, Jennifer Seberry: LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications. AUSCRYPT 1990: 229-236 | |
11 | Thomas Hardjono, Jennifer Seberry: Search Key Substitution in the Encipherment of B-Trees. VLDB 1990: 50-58 | |
1989 | ||
10 | Lawrence Brown, Jennifer Seberry: On the Design of Permutation P in DES Type Cryptosystems. EUROCRYPT 1989: 696-705 | |
9 | Mirka Miller, Jennifer Seberry: Relative Compromise of Statistical Databases. Australian Computer Journal 21(2): 56-61 (1989) | |
1986 | ||
8 | Ralph Gyoery, Jennifer Seberry: Electronic Funds Transfer Point of Sale in Australia. CRYPTO 1986: 347-377 | |
7 | David S. P. Khoo, Gregory J. Bird, Jennifer Seberry: Encryption Exponent 3 and the Security of RSA. EUROCRYPT 1986: 55 | |
1984 | ||
6 | Jeremy E. Dawson, Jennifer Seberry, David B. Skillicorn: The directed packing numbers DD (t, v, v), t>=;4. Combinatorica 4(2): 121-130 (1984) | |
1981 | ||
5 | Joseph Hammer, Jennifer Seberry: Higher dimensional orthogonal designs and applications. IEEE Transactions on Information Theory 27(6): 772-779 (1981) | |
1980 | ||
4 | Jennifer Seberry, David B. Skillicorn: All Directed BIBDs with k = 3 Exist. J. Comb. Theory, Ser. A 29(2): 244-248 (1980) | |
1979 | ||
3 | R. Razen, Jennifer Seberry, K. Wehrhahn: Ordered Partitions and Codes Generated by Circulant Matrices. J. Comb. Theory, Ser. A 27(3): 333-341 (1979) | |
1976 | ||
2 | Jennifer Seberry Wallis: On the Existence of Hadamard Matrices. J. Comb. Theory, Ser. A 21(2): 188-195 (1976) | |
1975 | ||
1 | Jennifer Seberry Wallis: On Hadamard Matrices. J. Comb. Theory, Ser. A 18(2): 149-164 (1975) |