dblp.uni-trier.dewww.uni-trier.de

Jennifer Seberry

Jennifer Seberry Wallis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
104 Yi Mu, Willy Susilo, Jennifer Seberry: Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings Springer 2008
103EEJianyong Huang, Jennifer Seberry, Willy Susilo: A Five-Round Algebraic Property of the Advanced Encryption Standard. ISC 2008: 316-330
102EEJennifer Seberry, Ken Finlayson, Sarah Spence Adams, Tadeusz A. Wysocki, Tianbing Xia, Beata J. Wysocki: The Theory of Quaternion Orthogonal Designs. IEEE Transactions on Signal Processing 56(1): 256-265 (2008)
2007
101EEWei Wu, Yi Mu, Willy Susilo, Jennifer Seberry, Xinyi Huang: Identity-Based Proxy Signature from Pairings. ATC 2007: 22-31
100EEBeata J. Wysocki, Tadeusz A. Wysocki, Jennifer Seberry, Sarah Spence Adams, Hamid Sharif: A Simple Orthogonal Space-Time-Polarization Block Code. VTC Fall 2007: 754-757
2006
99EEDibyendu Chakrabarti, Jennifer Seberry: Combinatorial Structures for Design of Wireless Sensor Networks. ACNS 2006: 365-374
98EEJianyong Huang, Jennifer Seberry, Willy Susilo: On the Internal Structure of Alpha-MAC. VIETCRYPT 2006: 271-285
97EEIlias S. Kotsireas, Christos Koukouvinos, Jennifer Seberry: Hadamard ideals and Hadamard matrices with two circulant cores. Eur. J. Comb. 27(5): 658-668 (2006)
2005
96EEChristos Kravvaritis, M. Mitrouli, Jennifer Seberry: Counting Techniques Specifying the Existence of Submatrices in Weighing Matrices. CASC 2005: 294-305
95EEJing Wu, Yi Mu, Jennifer Seberry, Chun Ruan: Access Policy Sheet for Access Control in Fine-Grained XML. EUC Workshops 2005: 1273-1282
94EEJianyong Huang, Jennifer Seberry, Willy Susilo, Martin W. Bunder: Security Analysis of Michael: The IEEE 802.11i Message Integrity Code. EUC Workshops 2005: 423-432
93EEJing Wu, Jennifer Seberry, Yi Mu, Chun Ruan: Delegatable Access Control for Fine-Grained XML. ICPADS (2) 2005: 270-274
92EELe Chung Tran, Tadeusz A. Wysocki, Jennifer Seberry, Alfred Mertins: A Generalized Algorithm for the Generation of Correlated Rayleigh Fading Envelopes in Radio Channels. IPDPS 2005
91EEYibing Kong, Jennifer Seberry, Janusz R. Getta, Ping Yu: A Cryptographic Solution for General Access Control. ISC 2005: 461-473
90EELe Chung Tran, Tadeusz A. Wysocki, Jennifer Seberry, Alfred Mertins: A Generalized Algorithm for the Generation of Correlated Rayleigh Fading Envelopes. WOWMOM 2005: 213-218
89EEMingyuan Xia, Tianbing Xia, Jennifer Seberry: A New Method for Constructing Williamson Matrices. Des. Codes Cryptography 35(2): 191-209 (2005)
88EEMingyuan Xia, Tianbing Xia, Jennifer Seberry, Jing Wu: An infinite family of Goethals-Seidel arrays. Discrete Applied Mathematics 145(3): 498-504 (2005)
2004
87 Jing Wu, Jennifer Seberry, Tianbing Xia: Secure IP Multicast for DMS. Security and Management 2004: 163-167
86 Tianbing Xia, Jennifer Seberry, Jing Wu: Boolean Functions with Good Properties. Security and Management 2004: 294-299
85 Yibing Kong, Janusz R. Getta, Ping Yu, Jennifer Seberry: A Generalized Policy Support System and Its Hierarchy Semantics. WOSIS 2004: 136-145
84 Stelios Georgiou, Christos Koukouvinos, Jennifer Seberry: Generalized orthogonal designs. Ars Comb. 71: (2004)
83 Christos Koukouvinos, Jennifer Seberry: Orthogonal Designs of Kharaghani Type: II. Ars Comb. 72: (2004)
82EETianbing Xia, Jennifer Seberry, Josef Pieprzyk, Chris Charnes: Homogeneous bent functions of degree n in 2n variables do not exist for nge3. Discrete Applied Mathematics 142(1-3): 127-132 (2004)
81EERoderick J. Fletcher, Christos Koukouvinos, Jennifer Seberry: New skew-Hadamard matrices of order 4cdot59 and new D-optimal designs of order 2cdot59. Discrete Mathematics 286(3): 251-253 (2004)
2003
80 Reihaneh Safavi-Naini, Jennifer Seberry: Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings Springer 2003
79EEBeomsik Song, Jennifer Seberry: Further Observations on the Structure of the AES Algorithm. FSE 2003: 223-234
78EEXiang Li, Jennifer Seberry: Forensic Computing. INDOCRYPT 2003: 18-35
77 Jing Wu, Tianbing Xia, Jennifer Seberry: Construction of Highly Non-Linear Cubic Homogeneous Boolean Functions on GF2n+1(2). Security and Management 2003: 241-247
76 Willy Susilo, Jianyong Huang, Jennifer Seberry: On Using Fast Exponentiation Algorithm in PDAs (or: How Secure is the Discrete Logarithm Problem Assumption in PDAs?). Security and Management 2003: 668-674
75 Christos Koukouvinos, Jennifer Seberry: Orthogonal Designs of Kharaghani Type: I. Ars Comb. 67: (2003)
74 Stelios Georgiou, Christos Koukouvinos, Jennifer Seberry: Some results on self-orthogonal and self-dual codes. Ars Comb. 68: (2003)
73EERita SahaRay, Jennifer Seberry: Critical Sets in Orthogonal Arrays. Electronic Notes in Discrete Mathematics 15: 160 (2003)
72EEYejing Wang, Jennifer Seberry, Reihaneh Safavi-Naini, Ryoh Fuji-Hara: A Note on the Exposure Property of SBIBD. Electronic Notes in Discrete Mathematics 15: 225-227 (2003)
71EEJennifer Seberry, Beata J. Wysocki, Tadeusz A. Wysocki: Williamson-Hadamard spreading sequences for DS-CDMA applications. Wireless Communications and Mobile Computing 3(5): 597-607 (2003)
2002
70 Lynn Margaret Batten, Jennifer Seberry: Information Security and Privacy, 7th Australian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings Springer 2002
69EEDavid Soldera, Jennifer Seberry, Chengxin Qu: The Analysis of Zheng-Seberry Scheme. ACISP 2002: 159-168
68EEBeomsik Song, Jennifer Seberry: Consistent Differential Patterns of Rijndael. ICISC 2002: 149-163
67 Stelios Georgiou, Christos Koukouvinos, Jennifer Seberry: On Full Orthogonal Designs in Order 56. Ars Comb. 65: (2002)
2001
66EEBeomsik Song, Huaxiong Wang, Jennifer Seberry: A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances. ICISC 2001: 18-31
65EEYvo Desmedt, Mike Burmester, Jennifer Seberry: Equitability in Retroactive Data Confiscation versus Proactive Key Escrow. Public Key Cryptography 2001: 277-286
64 Christos Koukouvinos, M. Mitrouli, Jennifer Seberry: Values of Minors of (1, -1) Incidence Matrices of SBIBDs and Their Application to the Growth Problem. Des. Codes Cryptography 23(3): 267-282 (2001)
63 Christos Koukouvinos, E. Lappas, M. Mitrouli, Jennifer Seberry: On the Complete Pivoting Conjecture for Hadamard Matrices of Small Orders. Journal of Research and Practice in Information Technology 33(4): 298-309 (2001)
2000
62 Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry: Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings Springer 2000
61EEJaroslaw Pastuszak, Josef Pieprzyk, Jennifer Seberry: Codes Identifying Bad Signature in Batches. INDOCRYPT 2000: 143-154
60 Jaroslaw Pastuszak, Dariusz Michatek, Josef Pieprzyk, Jennifer Seberry: Identification of Bad Signatures in Batches. Public Key Cryptography 2000: 28-45
59EEWilly Susilo, Reihaneh Safavi-Naini, Marc Gysin, Jennifer Seberry: A New and Efficient Fail-stop Signature Scheme. Comput. J. 43(5): 430-437 (2000)
58 Chengxin Qu, Jennifer Seberry, Josef Pieprzyk: Homogeneous bent functions. Discrete Applied Mathematics 102(1-2): 133-139 (2000)
1999
57 Josef Pieprzyk, Reihaneh Safavi-Naini, Jennifer Seberry: Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings Springer 1999
56EEMarc Gysin, Jennifer Seberry: Generalised Cycling Attacks on RSA and Strong RSA Primes. ACISP 1999: 149-163
55EEJeffrey Horton, Jennifer Seberry: Companion Viruses and the Macintosh: Threats and Countermeasures. ACISP 1999: 202-212
54EEChengxin Qu, Jennifer Seberry, Josef Pieprzyk: On the Symmetric Property of Homogeneous Boolean Functions. ACISP 1999: 26-35
53 Christos Koukouvinos, Jennifer Seberry: New orthogonal designs and sequences with two and three variables in order 28. Ars Comb. 54: (1999)
1998
52EEJeffrey Horton, Jennifer Seberry: Covert Distributed Computing Using Java Through Web Spoofing. ACISP 1998: 48-57
51EEMike Burmester, Yvo Desmedt, Jennifer Seberry: Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically). ASIACRYPT 1998: 380-391
1996
50 Josef Pieprzyk, Jennifer Seberry: Information Security and Privacy, First Australasian Conference, ACISP'96, Wollongong, NSW, Australia, June 24-26, 1996, Proceedings Springer 1996
49 Thomas Hardjono, Jennifer Seberry: Replicating the Kuperee authentication server for increased security and reliability. ACISP 1996: 14-26
48 Azad Jiwa, Thomas Hardjono, Jennifer Seberry: Beacons for Authentication in Distributed Systems. Journal of Computer Security 4(1): 81-96 (1996)
1995
47 Thomas Hardjono, Jennifer Seberry: Information Security in Mobile Databases. Australasian Database Conference 1995: 0-
46EEThomas Hardjono, Jennifer Seberry: Applications of smartcards for anonymous and verifiable databases. Computers & Security 14(5): 465-472 (1995)
45 Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng: Nonlinearity and Propagation Characteristics of Balanced Boolean Functions Inf. Comput. 119(1): 1-13 (1995)
44EEJennifer Seberry, Xian-Mo Zhang, Yuliang Zheng: The Relationship Between Propagation Characteristics and Nonlinearity of Cryptographic Functions. J. UCS 1(2): 136-150 (1995)
1994
43 Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng: Structures of Cryptographic Functions with Strong Avalanche Characteristics (Extended Abstract). ASIACRYPT 1994: 119-132
42EEJennifer Seberry, Xian-Mo Zhang, Yuliang Zheng: Pitfalls in Designing Substitution Boxes (Extended Abstract). CRYPTO 1994: 383-396
41EEAzad Jiwa, Jennifer Seberry, Yuliang Zheng: Beacon Based Authentication. ESORICS 1994: 125-141
40EEThomas Hardjono, Jennifer Seberry: Authentication via Multi-Service Tickets in the Kuperee Server. ESORICS 1994: 143-160
39EEJennifer Seberry, Xian-Mo Zhang, Yuliang Zheng: Relationships Among Nonlinear Criteria (Extended Abstract). EUROCRYPT 1994: 376-388
38 Thomas Hardjono, Yuliang Zheng, Jennifer Seberry: Kuperee: An Approach to Authentication using Public Keys. ULPAA 1994: 65-76
37 Yuliang Zheng, Thomas Hardjono, Jennifer Seberry: Reusing Shares in Secret Sharing Schemes. Comput. J. 37(3): 199-205 (1994)
36EEThomas Hardjono, Yuliang Zheng, Jennifer Seberry: Database authentication revisited. Computers & Security 13(7): 573-580 (1994)
35 Christos Koukouvinos, Stratis Kounias, Jennifer Seberry, C. H. Yang, Y. Yang: On Sequences with Zero Autocorrelation. Des. Codes Cryptography 4(4): 327-340 (1994)
34 Claude Carlet, Jennifer Seberry, Xian-Mo Zhang: Comments on 'Generating and counting binary Bent sequences'. IEEE Transactions on Information Theory 40(2): 600- (1994)
33 Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng: Improving the Strict Avalanche Characteristics of Cryptographic Functions. Inf. Process. Lett. 50(1): 37-41 (1994)
32 Warwick de Launey, Jennifer Seberry: The Strong Kronecker Product. J. Comb. Theory, Ser. A 66(2): 192-213 (1994)
1993
31 Jennifer Seberry, Yuliang Zheng: Advances in Cryptology - AUSCRYPT '92, Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992, Proceedings Springer 1993
30EEJennifer Seberry, Xian-Mo Zhang, Yuliang Zheng: Systematic Generation of Cryptographically Robust S-Boxes. ACM Conference on Computer and Communications Security 1993: 171-182
29EEJennifer Seberry, Xian-Mo Zhang, Yuliang Zheng: Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics (Extended Abstract). CRYPTO 1993: 49-60
28EEJennifer Seberry, Xian-Mo Zhang, Yuliang Zheng: On Constructions and Nonlinearity of Correlation Immune Functions (Extended Abstract). EUROCRYPT 1993: 181-199
27 Yuliang Zheng, Jennifer Seberry: Immunizing Public Key Cryptosystems Against Chosen Ciphertext Attacks. IEEE Journal on Selected Areas in Communications 11(5): 715-724 (1993)
1992
26 Jennifer Seberry, Xian-Mo Zhang: Highly Nonlinear 0-1 Balanced Boolean Functions Satisfying Strict Avalanche Criterion. AUSCRYPT 1992: 145-155
25 Yvo Desmedt, Jennifer Seberry: Practical Proven Secure Authentication with Arbitration. AUSCRYPT 1992: 27-32
24 Yuliang Zheng, Josef Pieprzyk, Jennifer Seberry: HAVAL - A One-Way Hashing Algorithm with Variable Length of Output. AUSCRYPT 1992: 83-104
23EEYuliang Zheng, Jennifer Seberry: Practical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks (Extended Abstract). CRYPTO 1992: 292-304
22 Robert Craigen, Jennifer Seberry, Xian-Mo Zhang: Product of Four Hadamard Matrices. J. Comb. Theory, Ser. A 59(2): 318-320 (1992)
21 John H. Loxton, David S. P. Khoo, Gregory J. Bird, Jennifer Seberry: A Cubic RSA Code Equivalent to Factorization. J. Cryptology 5(2): 139-150 (1992)
1991
20 Lawrence Brown, Matthew Kwan, Josef Pieprzyk, Jennifer Seberry: Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI. ASIACRYPT 1991: 36-50
19EEChristos Koukouvinos, Stratis Kounias, Jennifer Seberry: Supplementary difference sets and optimal designs. Discrete Mathematics 88(1): 49-58 (1991)
18 Brendan D. McKay, Jennifer Seberry, Scott A. Vanstone: Ralph Gordon Stanton. Discrete Mathematics 92(1-3): 1-8 (1991)
17EEChristos Koukouvinos, Jennifer Seberry: Hadamard matrices of order =8 (mod 16) with maximal excess. Discrete Mathematics 92(1-3): 173-176 (1991)
16 Reihaneh Safavi-Naini, Jennifer Seberry: Error-correcting codes for authentication and subliminal channels. IEEE Transactions on Information Theory 37(1): 13-17 (1991)
1990
15 Jennifer Seberry, Josef Pieprzyk: Advances in Cryptology - AUSCRYPT '90, International Conference on Cryptology, Sydney, Australia, January 8-11, 1990, Proceedings Springer 1990
14 Martin Anthony, Keith M. Martin, Jennifer Seberry, Peter R. Wild: Some Remarks on Authentication Systems. AUSCRYPT 1990: 122-139
13 Lawrence Brown, Jennifer Seberry: Key Scheduling In Des Type Cryptosystems. AUSCRYPT 1990: 221-228
12 Lawrence Brown, Josef Pieprzyk, Jennifer Seberry: LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications. AUSCRYPT 1990: 229-236
11EEThomas Hardjono, Jennifer Seberry: Search Key Substitution in the Encipherment of B-Trees. VLDB 1990: 50-58
1989
10EELawrence Brown, Jennifer Seberry: On the Design of Permutation P in DES Type Cryptosystems. EUROCRYPT 1989: 696-705
9 Mirka Miller, Jennifer Seberry: Relative Compromise of Statistical Databases. Australian Computer Journal 21(2): 56-61 (1989)
1986
8EERalph Gyoery, Jennifer Seberry: Electronic Funds Transfer Point of Sale in Australia. CRYPTO 1986: 347-377
7 David S. P. Khoo, Gregory J. Bird, Jennifer Seberry: Encryption Exponent 3 and the Security of RSA. EUROCRYPT 1986: 55
1984
6 Jeremy E. Dawson, Jennifer Seberry, David B. Skillicorn: The directed packing numbers DD (t, v, v), t>=;4. Combinatorica 4(2): 121-130 (1984)
1981
5 Joseph Hammer, Jennifer Seberry: Higher dimensional orthogonal designs and applications. IEEE Transactions on Information Theory 27(6): 772-779 (1981)
1980
4 Jennifer Seberry, David B. Skillicorn: All Directed BIBDs with k = 3 Exist. J. Comb. Theory, Ser. A 29(2): 244-248 (1980)
1979
3 R. Razen, Jennifer Seberry, K. Wehrhahn: Ordered Partitions and Codes Generated by Circulant Matrices. J. Comb. Theory, Ser. A 27(3): 333-341 (1979)
1976
2 Jennifer Seberry Wallis: On the Existence of Hadamard Matrices. J. Comb. Theory, Ser. A 21(2): 188-195 (1976)
1975
1 Jennifer Seberry Wallis: On Hadamard Matrices. J. Comb. Theory, Ser. A 18(2): 149-164 (1975)

Coauthor Index

1Sarah Spence Adams [100] [102]
2Martin Anthony [14]
3Lynn Margaret Batten [70]
4Gregory J. Bird [7] [21]
5Lawrence Brown [10] [12] [13] [20]
6Martin W. Bunder [94]
7Mike Burmester [51] [65]
8Claude Carlet [34]
9Dibyendu Chakrabarti [99]
10Chris Charnes [82]
11Robert Craigen [22]
12Jeremy E. Dawson [6]
13Yvo Desmedt [25] [51] [65]
14Ken Finlayson [102]
15Roderick J. Fletcher [81]
16Ryoh Fuji-Hara [72]
17Stelios Georgiou [67] [74] [84]
18Janusz R. Getta [85] [91]
19Ralph Gyoery [8]
20Marc Gysin [56] [59]
21Joseph Hammer [5]
22Thomas Hardjono [11] [36] [37] [38] [40] [46] [47] [48] [49]
23Jeffrey Horton [52] [55]
24Jianyong Huang [76] [94] [98] [103]
25Xinyi Huang [101]
26Azad Jiwa [41] [48]
27David S. P. Khoo [7] [21]
28Yibing Kong [85] [91]
29Ilias S. Kotsireas [97]
30Christos Koukouvinos [17] [19] [35] [53] [63] [64] [67] [74] [75] [81] [83] [84] [97]
31Stratis Kounias [19] [35]
32Christos Kravvaritis [96]
33Matthew Kwan [20]
34E. Lappas [63]
35Warwick de Launey [32]
36Xiang Li [78]
37John H. Loxton [21]
38Keith M. Martin [14]
39Brendan D. McKay [18]
40Alfred Mertins [90] [92]
41Dariusz Michatek [60]
42Mirka Miller [9]
43M. Mitrouli [63] [64] [96]
44Yi Mu [93] [95] [101] [104]
45Eiji Okamoto [62]
46Jaroslaw Pastuszak [60] [61]
47Josef Pieprzyk [12] [15] [20] [24] [50] [54] [57] [58] [60] [61] [62] [82]
48Chengxin Qu (Cheng Xin Qu) [54] [58] [69]
49R. Razen [3]
50Chun Ruan [93] [95]
51Reihaneh Safavi-Naini [16] [57] [59] [72] [80]
52Rita SahaRay [73]
53Hamid Sharif [100]
54David B. Skillicorn [4] [6]
55David Soldera [69]
56Beomsik Song [66] [68] [79]
57Willy Susilo [59] [76] [94] [98] [101] [103] [104]
58Le Chung Tran [90] [92]
59Scott A. Vanstone [18]
60Huaxiong Wang [66]
61Yejing Wang [72]
62K. Wehrhahn [3]
63Peter R. Wild [14]
64Jing Wu [77] [86] [87] [88] [93] [95]
65Wei Wu [101]
66Beata J. Wysocki [71] [100] [102]
67Tadeusz A. Wysocki [71] [90] [92] [100] [102]
68Mingyuan Xia [88] [89]
69Tianbing Xia [77] [82] [86] [87] [88] [89] [102]
70C. H. Yang [35]
71Y. Yang [35]
72Ping Yu [85] [91]
73Xian-Mo Zhang [22] [26] [28] [29] [30] [33] [34] [39] [42] [43] [44] [45]
74Yuliang Zheng [23] [24] [27] [28] [29] [30] [31] [33] [36] [37] [38] [39] [41] [42] [43] [44] [45]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)