Jennifer Roma Seberry (Wallis)

    BOOKS

  1. Le Tran Chung, Tadeusz A Wysocki, Alfred Mertins and Jennifer Seberry, Complex Orthogonal Space-Time Processing in Wireless Communications Springer-Verlag, Norwell, USA, 2006. ISBN 0387292918, 978 0387292915, EISBN 0387295445.

  2. J. Pieprzyk, T. Hardjono and J. Seberry, Teoria bezpieczenstwa systemow komputerowych Springer-Verlag, Berlin. ISBN 83-7361-678-0

    REFEREED BOOK CHAPTER

  3. C Kravvartis, M Mitrouli and Jennifer Seberry, Counting techniques specifying the existence of submatrices of weighing matrices, in Computer Algebra in Scientific Computing, Lecture Notes in Computer Science 3718, Springer Verlag, Berline, 2005, pp294-3305. " is © Springer-Verlag. Please see the Springer-Verlag LNCS series Homepage for more information.

  4. Yi Gao, Willy Susilo, Yi Mu and Jennifer Seberry, Efficient trapdoor based client puzzle against DOS attacks, Network Security, in Huang, Scott C.-H.; MacCallum, David; Du, Ding-Zhu, ISBN 978-0-387-73820-8. Springer Science+Business Media, LLC, 2010, pp 229-249.

  5. Seberry J, Charnes C, Pieprzyk J and Safavi-Naini R, CryptoTopics and Applications I, in Mikhail J. Atallah and Marina Blanton, (eds), Chapter 12 in Algorithms and Theory of Computation Handbook, Special Topics and Techniques, Second Edition, CRC Press, Boca Raton, Fla, 2010, pp 12.1 - 12.32

  6. Seberry J, Charnes C, Pieprzyk J and Safavi-Naini R, CryptoTopics and Applications II, in Mikhail J. Atallah and Marina Blanton, (eds), Chapter 13 in Algorithms and Theory of Computation Handbook, Special Topics and Techniques, Second Edition, CRC Press, Boca Raton, Fla, 2010. pp 13.1 – 13.32

    EDITED BOOK

  7. Yi Mu, Willy Susilo and Jennifer Seberry, eds Information Security and Privacy, Lecture Notes in Computer Science 5107, Springer Verlag, Berlin, 2008. " is © Springer-Verlag. Please see the Springer-Verlag LNCS series Homepage for more information. ISSN 0302-9743, ISBN 3-540-69971-6, ISBN 978-3-540-69971-2

    REFEREED JOURNAL ARTICLES

    2005

  8. C Kravvartis, M Mitrouli and Jennifer Seberry On the growth problem for skew and symmetric conference matrices, Linear Algebra and its Applications, 403 (2005) 183-206.

  9. C. Koukouvinos, M. Mitrouli and Jennifer Seberry, Values of minors of some infinite families of matrices constructed from supplementary difference sets and their application to the growth problem, Linear Algebra and its Applications,, 406 (2005) 218-234.

  10. Jennifer Seberry, Sarah A Spence and Tadeusz A Wysocki, A construction technique for generalized complex orthogonal designs and applications to wireless communications, Linear Alg. and Applic., 405 (2005) 163-176.

  11. W.H.Holtzmann, H. Kharaghani, Jennifer Seberry and B. Tayfeh-Rezaie, On orthogonal designs in order 48, JSPI, 128 (2005) 311-325.

  12. Mingyuan Xia, Tianbing Xia and Jennifer Seberry, An infinite family of Goethals-Seidel arrays, Discrete Applied Mathematics, 145 (2005) 498-504.

  13. Mingyuan Xia, Tianbing Xia and Jennifer Seberry, A new method for constructing Williamson matrices, Designs, Codes and Cryptography, 35 (2005) 191-209.

  14. Yejing Wang, Jennifer Seberry, Beata J. Wysocki, Tadeusz A. Wysocki, Le Chung Tran, Ying Zhao An exposure property of block designs, AJC, 33 (2005) 147-156.

  15. Rita SahaRay, Avishek Adhikari and Jennifer Seberry, Critical sets in orthogonal arrays with 7 and 9 levels, Australas. J. Combin., 33 (2005) 109-123.

  16. Rita SahaRay, Avishek Adhikari and Jennifer Seberry, Critical sets for a pair of mutually orthogonal latin squares of odd order greater than 9, JCMCC 55 (2005), 171-185.

  17. Tianbing Xia, Mingyuan Xia, Jennifer Seberry, Guoxin Zuo, A new method for constructing $T$-matrices, AJC, 32 (2005) 61-78.

  18. Jennifer Seberry, Beata J Wysocki and Tadeusz A Wysocki, Some applications of Hadamard matrices, Metrika, 62 (2005) 221-239.

  19. Le Tran Chung, Tadeusz A Wysocki, Alfred Mertins and Jennifer Seberry, A generalized algorithm for the generation of correlated Rayleigh fading envelopes in radio channels, EURASIP J on Wireless Communications and Networking, 5 (2005) 801-815.

    2006

  20. Ilias S Kotsireas, Christos Koukouvinos and Jennifer Seberry, Hadamard ideals and Hadamard matrices with two circulant cores, European J Comin., 27, 5 (2006) 658-668.

  21. Ilias S Kotsireas, Christos Koukouvinos and Jennifer Seberry, Hadamard ideals and Hadamard matrices with circulant core, JCMCC, 57 (2006) 47-63.

  22. Tianbing Xia, Jennifer Seberry and Mingyuan Xia, New construction of regular Hadamard matrices, WSEAS Trans Math,, 5, (2006) 1068-1073.

  23. Tianbing Xia, Mingyuan Xia, Jennifer Seberry and Jing Wu, Hadamard matrices constructed from circulant and negacyclic matrices, AJC,, 34 (2006) 105-116. Copyright Australasian Journal of Combinatorics, http://ajc.math.auckland.ac.nz.

  24. Ying Zhao, Yejing Wang and Jennifer Seberry, On amicable orthogonal designs of order 8, AJC, 34 (2006) 321-329. Copyright Australasian Journal of Combinatorics, http://ajc.math.auckland.ac.nz.

  25. Ying Zhao, Jennifer Seberry, Tianbing Xia, Yejing Wang, Beata J Wysocki, Tadeusz A Wysocki and Le Chung Tran, On amicable orthogonal designs of order 8 for complex space-time block codes, AJC, 34 (2006) 137-144. Copyright Australasian Journal of Combinatorics, http://ajc.math.auckland.ac.nz.

  26. Russell Ang, Jennifer Seberry and Tadeusz Wysocki, Inequivalence of nega-cyclic $\pm 1$ matrices, JCMCC 56 (2006), 17-32.

  27. Ken Finlayson, Moon-ho Lee, Jennifer Seberry and Mieko Yamada, Jacket matrices constructed from Hadamard matrices and generalized Hadamard, AJC, 35 (2006) 83-87. Copyright Australasian Journal of Combinatorics, http://ajc.math.auckland.ac.nz.

  28. Suwanna Yamsiri, Jennifer Seberry and Willy Susilo, A study and testbed for the Australian Standard AS7799 compliance and management, Journal of Information Assurance and Security (JIAS), 1 (2006) 1-9.

  29. Le Tran Chung, Tadeusz A Wysocki, Alfred Mertins and Jennifer Seberry, Transmitter diversity antenna selection techniques for wireless channels utilizing differential space-time block codes, Journal on Telecommunications and Information Technology 2 (2006) 79-96.

  30. Jing Wu, Jennifer Seberry and Yi Mu, Temporal authorizations scheme for XML document, WSEAS Conf on Data Networks and Computers,, Bucharest, Romania, 16-17 Oct, (2006) 150-155. ISSN: 0302-9743, Springer, Berlin/Heidelberg.

    2007

  31. Tianbing Xia, Mingyuan Xia and Jennifer Seberry, Some new results of regular Hadamard matrices and SBIBD II, AJC, 37 (2007) 117-125.

  32. Gennian Ge, Malcolm Greig, Jennifer Seberry and Ralph Seberry, Generalized Bhaskar Rao designs with block size 3 over finite abelian groups, Graphs and Combinatorics, 23 (2007) 271-290.

  33. Jing Wu, Jennifer Seberry and Yi Mu, Temporal authorization scheme for XML document, WSEAS Trans on Computers, 6 (2007) 262-267. ISSN: 1109-2750

  34. Lakoa Fitina, Kenneth Russell and Jennifer Seberry, The power and influence in some Youden squares and secret sharing, Utilitas Math. 73 (2007), 143-157.73 (2007), 143-157.

  35. Sarah Spence Adams, Jennifer Seberry, Nathaniel Karst, Jonathon Pollack and Tadeusz A. Wysocki, Quaternion orthogonal designs from complex companion designs, LAA, (published online 5 Nov 2007.)

  36. Christos Kravvaritis, Marilena Mitrouli and Jennifer Seberry, On the pivot structure for the weighiing matrix $W(12,11)$, J. Linear and Multilinear Algebra, 55 (2007) 471-490.

    2008

  37. Sarah Spence Adams, Jennifer Seberry, Nathaniel Karst, Jonathon Pollack and Tadeusz A. Wysocki, Quaternion orthogonal designs from complex companion designs, LAA, 428 (2008) 1056-1071.

  38. Ilias S Kotsireas, Christos Koukouvinos and Jennifer Seberry, New orthogonal designs from weighing matrices, Aust J Comb, 40 (2008) 99-104. Copyright Australasian Journal of Combinatorics, http://ajc.math.aucklan d.ac.nz.

  39. Jennifer Seberry, Ken Finlayson, Sarah Spence Adams, Beata Wysocki, Tadeusz Wysocki and Tianbing Xia, The theory of quaternion orthogonal designs, IEEE Transactions on Signal Processing, 56 1 (2008) 256-265.

    2009

  40. Ying Zhao, Jennifer Seberry, Tianbing Xia, Beata J. Wysocki, Tadeusz A. Wysocki, Constructions of amicable orthogonal designs of order 8, Australasian Journal of Combinatorics, 44 (2009), 19-35.

  41. Jianyong Huang, Jennifer Seberry and Willy Susilo, A five-round algebraic property of AES and its application to the ALPHA-MAC, Int. J. Applied Cryptography, Vol. 1, No. 4, (2009) 264-289.

  42. I.Kotsireas, C.Koukouvinos and J. Seberry, Weighing matrices and string sorting, Annals of Combinatorics, 13 (2009), 305-313.

  43. L. C. Tran, T. A. Wysocki, J. Seberry, A. Mertins, and S. A. Spence Novel constructions of improved square complex orthogonal designs for eight transmit antennas, IEEE Trans on Inf Theory. 55, (2009), 4439 - 4448.

    2010

  44. I.S.Kotsireas, C.Koukouvinos, J.Seberry and D.E.Simos, New classes of orthogonal designs constructed from complementary sequences with given spread, Australasian Journal of Combinatorics, 46 (2010), 67-78.

  45. I.S.Kotsireas, C.Koukouvinos and Jennifer Seberry, New weighing matrices of order 2n and weight 2n-9, J. Combin. Math. Combin. Comput., 72 (2010), 49-54.

  46. Jennifer Seberry and Marilena Mitrouli, Some remarks on Hadamard matrices, Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences, Published on line 7th July 2010 Cryptography and Communications, 2(2): 293-306 (2010) 293-306. Springer Science+Business Media, LLC 2010

  47. K. T. Arasu, Ilias S Kotsireas, Christos Koukouvinos and Jennifer Seberry, On circulant and two-circulant weighing matrices, Austral. J. Comb., 48 (2010), 43-51.

    CONFERENCE PAPERS

    CONFERENCE PAPERS IN EUROCRYPT RUMP SESSION

  48. Eli Biham and Jennifer Seberry, PY (Roo): A new fast stream cipher using rolling arrays, EUROCRYPT'05 Rump Session, Aarhus, Denmark, 24th May 2005.

  49. Eli Biham, Jianyong Huang, Jennifer Seberry and Willy Susilo, Key testing attacks on MAC functions, EUROCRYPT'05 Rump Session, Aarhus, Denmark, 24th May 2005.

    CONFERENCE PAPERS IN CDROM

  50. Eli Biham and Jennifer Seberry, PY (Roo): A fast and secure stream cipher using rolling arrays, SKEW 2005 (Symmetric Key Encryption Workshop), Aarhus, Denmark, 26-27 May 2005.

    REFEREED CONFERENCE PAPERS

    2005

  51. Ken Finlayson, Jennifer Seberry, Tadeusz Wysocki and Tianbing Xia, Orthogonal designs with quaternion elements, ISCTA'05, Proceedings of 8th International Symposium on Communication Theory and Applications, Ambleside, UK, 17-22 July 2005, HW Communications, (2005) 270-272. ISBN 0-85316-2441.

  52. Jing Wu, Jennifer Seberry, Yi Mu, Chun Ruan, Delegatable access control for fine-grained XML, proceedings of 11th International Conference on Parallel and Diistributed Systems Workshops, Fukuoka, Japan, July 20-22, 2005, IEEE Commputer Soc, Washington, (2005) 270-274. ISBN 0-7695-2281-5, ISSN 1521-9097.

  53. Jing Wu, Yi Mu, Jennifer Seberry, and Chun Ruan, Access policy sheet for access control for fine-grained XML, In The First IFIP Workshop on Trusted and Autonomic Ubiquitous and Embedded Systems (TAUES 2005), Nagasaki, Japan, 6-9 December 2005, Lecture Notes in Computer Science 3813, Springer Verlag, pp1273-1282. " is © Springer-Verlag. Please see the Springer-Verlag LNCS series Homepage for more information.

  54. Chung Le Tran, Tadeusz A Wysocki, Jennifer Seberry, Alfred Mertins, and Sarah A Spence, Generalized Williamson and Wallis-Whiteman Constructions for Improved Square Order-8 CO STBCs, 16th International Symposium on Personal Indoor and Mobile Radio Communications, IEEE PIMRC 2005, Berlin, Germany, September 11-15, 2005

  55. Le Tran Chung, Tadeusz A Wysocki, Alfred Mertins and Jennifer Seberry, A generalized algorithm for the generation of correlated Rayleigh fading envelopes in radio channels, IEEE Workshop on Algorithms for Wireless, Mobile, Ad Hoc and Sensor Networks, WMAN 05, Colorado, USA, 4-8 Apr. 2005.

  56. Le Tran Chung, Tadeusz A Wysocki, Alfred Mertins and Jennifer Seberry, A generalized algorithm for the generation of correlated rayleigh fading envelopes, IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (IEEE WOWMOM), June 13-16, 2005, Taormina, Italy

  57. Yibing Kong, Jennifer Seberry, Janusz R. Getta and Ping Yu, A cryptographic solution for general access control, In Proceedings of the 8th Information Security Conference (ISC 2005), Singapore, September 20-23, 2005, Lecture Notes in Computer Science 3650 Springer 2005, 461-473. ISBN 3-540-29001-X " is © Springer-Verlag. Please see the Springer-Verlag LNCS series Homepage for more information.

  58. Yibing Kong, Jennifer Seberry, Janusz R. Getta and Ping Yu, Using digital tickets to protect personal privacy, In Proceedings of the First International Conference on Global Security, ICG Press, London, UK, 2005, 71-78.

  59. Jianyong Huang, Jennifer Seberry, Willy Susilo and Martin Bunder, Security Analysis of Michael: the IEEE 802.11i message integrity code, The Second International Symposium on Ubiquitous Intelligence and Smart Worlds (UISW2005) Lecture Notes in Computer Science 3823, Springer-Verlag, pp. 423-432, 2005. ISBN 3-540-30803-2.

    2006

  60. Dibendyu Chakrabarti and Jennifer Seberry, Combinatorial structures for design of wireless sensor networks, ACNS06,, Singapore, 6-9 June, 2006. Lecture Notes in Computer Science 3989, Springer Verlag, pp 365-374. " is © Springer-Verlag. Please see the Springer-Verlag LNCS series Homepage for more information. ISSN 0302-9743,ISBN-10 3-540-34703-8, ISBN-13 978-3-540-34703-3.

  61. Mary Barrett, Karin Garrety and Jennifer Seberry, ICT professionals' perceptions of responsibility for breaches of computer security, ANZAM'06, Aust and NZ Academy of Management, Yeppoon, Qld, June 2006.

  62. Jianyong Huang, Jennifer Seberry and Willy Susilo, On the Internal Structure of ALPHA-MAC, Vietcrypt'06, (2006):271-285.

  63. Beata J. Wysocki, Tadeusz A. Wysocki and Jennifer Seberry, Modeling dual polarization wireless fading channels using quaternions, Mobile Future, 2006 and the Symposium on Trends in Communications. SympoTIC '06. Joint IST Workshop. 24-27 June 2006, p68-71. ISBN: 1-4244-0368-5

  64. Ying Zhao, Jennifer Seberry, Beata J. Wysocki, Tadeusz A. Wysocki, Complex orthogonal spreading sequences using mutually orthogonal complementary sets, International Conference on Microwaves, Radar & Wireless Communications, 2006. MIKON 22-24 May 2006, Krakow, 622 - 625. ISBN: 978-83-906662-8-0

    2007

  65. Wei Wu, Yi Mu, Willy Susilo, Jennifer Seberry and Xinyi Huang, Identity-based Proxy Signature from Pairings, ATC, 2007:22-31.

  66. Sarah Spence Adams, Jennifer Seberry, Hamid Sharif, Beata J Wysocki and Tadeusz A Wysocki, A simple orthogonal space-time-polarization block code, IEEE VTC2007-Fall in Baltimore, (2007) 754-757.

  67. Wysocki, T., Wysocki, B. & Seberry, J. R. (2007). Space-Time-Polarization Block Codes from Quaternionic Orthogonal Designs, 9th International Symposium on Communications Theory and Applications UK: ISCTA'07.

    2008

  68. Jianyong Huang, Willy Susilo and Jennifer Seberry, A five-round algebraic property of the Advanced Encryption Standard, Information Security Conference, 2008 (ISC 2008), Taipeh, Taiwan, September 15-18, 2008. Lecture Notes in Computer Science, Springer-Verlag, Berlin/Heidelberg, Volume 5222/2008, p 316-330. ISBN 78-3-540-85884-3, ISSN 0302-9743 (Print) 1611-3349 (Online).

    2009

  69. Sushmita Ruj, Jennifer Seberry and Bimal Roy, Key predistribution schemes using Block designs in wireless sensor networks, The Second International Workshop on Adaption in Wireless Sensor Networks (AWSN09), CSE 2 (2009) 873-878.

    2010

  70. Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo, and Jennifer Seberry, On the security of NOEKEON against side channel cube attacks, Proceedings of the Information Security Practice and Experience, 6th International Conference, ISPEC 2010, Jin Kwak Robert H. Deng YoojaeWon, Guilin Wang (Eds.), Seoul, Korea, May 12-13, 2010, LNCS 6047, (2010) 45-55, Springer, Berlin. ISSN 0302-9743

  71. Lei Wang, Tianbing Xia and Jennifer Seberry, Inter-domain routing validator based spoofing defence system, Proceedings of the 2010 IEEE International Conference on Intelligence and Security Informatics, ISI 2010, (Eds) Christopher C. Yang, Daniel Zeng, Ke Wang,Antonio Sanfilippo, Herbert H. Tsang, Min-Yuh Day, Uwe Glässer, Patricia L. Brantingham, and Hsinchun Chen, May 23-26, 2010 - Vancouver, BC, Canada, 153-155. IEEE Catalog Number: CFP10ITI-PRT, ISBN: 978-1-4244-6460-9

  72. Jianyong Huang, Willy Susilo and Jennifer Seberry, Differential fault analysis of LEX Proceedings of the Security and Cryptography for Networks 7th International Conference, SCN 2010, Juan A. Garay Roberto De Prisco (Eds.), Amalfi, Italy, September 13-15, 2010, LNCS 6280, (2010) 55-72 , Springer-Verlag Berlin Heidelberg, ISSN 0302-9743

    CONFERENCE PAPERS

  73. Jennifer Seberry, PY: A secure cryptographic stream ciphers, ICE-EM RNSA 2006 WORKSHOP: Recent Advances in Stream Ciphers and Hash Functions, Brisbane, Qld, June 28-30, 2006.

    OTHER ACTIVITIES

    INVITED SPEAKER

    Jennifer Seberry, Cryptology and Computer Security, ICWES'13, Korea, 26-29 August, Seoul, Korea, 2005.

    Jennifer Seberry, Seoul National University, Hadamard matrices and their Applications:I, (work with S. Evangeleras and C. Koukouvinos),

    Hadamard matrices and their Applications:II, (work with B. Wysocki and T. Wysocki) and

    PY (Roo): A fast and secure stream cipher using rolling arrays, (work with Eli Biham), Algebra Camp, Cheon-An, Korea, 2005.

    Jennifer Seberry, National Security Research Institute, PY (Roo): A fast and secure stream cipher using rolling arrays, (work with Eli Biham), Daejon, Korea, 2005.

    Jennifer Seberry Opening Remarks: The Australia Card: Revisited, The Social Implications of Information Security Measures on Citizens and Business, University of Wollongong, 29th May 2006.

    Hadamard matrices orthogonal designs and space-time block codes for multi-antenna wireless communication, etc etc, IWHCMA'07, 18-19 June, Sevilla, Spain.

    An application of combinatorics to the new stream cipher family TPy, IWOCA, Lake Macquarie, NSW, November 2007.

    Problems with computational algorithms for Hadamard matrices, Graph intersection Problems and Related Trades, Workshop, Convenor Associate Professor Diane Donovan, Brisbane, 23-26 November 2007.

    NTU, Singapore, 14 January, 2008, "New fast family of stream ciphers:TPY", (original paper co-authored by Eli Biham).

    ASIC, Wollongong, 22-25 January, 2008. Co-chairs, Mirka Miller and Ljiljana Brankovic,

    "New fast family of stream ciphers:TPY", (original paper co-authored by Eli Biham). Combinatorics and Graph Theory, GTA'08, Dec 11-12 2008, Newcastle.

    Invited Speaker, De Brun Centre, Galway Ireland, 1-3 July, 2009. Sylvester Hadamard Matrices

    TECHNICAL NOTE

    Eli Biham and Jennifer Seberry, "The truth on TPy", Note submitted to eSTREAM comments.

    MEDIA CONTACTS

    2 May 2005, Samantha Selinger-Morris, Sydney Morning Herald.

    24 May 2005, Channel 2 Denmark, TV News, The Eurocrypt'2005 Security Conference.

    10 August 2005, Phil Black, Channel 7 News, Speed Cameras and MD5.

    28 August 2005, The ICWES'13 Conference also Computer Security. Mr Kim, Science Press, and Mr Lee, Yonhap Associated Press, Korea.

    Security of Passwords on Mobile Phones, interview with Steve Whelan, Drive Time, 2CN, Canberra.

    PROFESSIONAL COMMUNITY SERVICE


    12 August 2005, Queensland Police, MD5
    Australian Information Security Association Newsletter (AISA Inc) contains:
    "Summary Report - Perceptions of responsibility for breaches of computer security" by Professors Mary Barrett and Jennifer Seberry http://www.uow.edu.au/~jennie/BARRETT/Report.doc
    "Organisational Factors and IT Professionals' Views of Wireless Network Vulnerability Assessments" by Keir Dyce and Mary Barrett http://www.uow.edu.au/~jennie/BARRETT/Dyce_Barrett.doc
    INDOCRYPT'08, Program Committee, Chairs: Dipanwita Roy Chaudhury and Vincent Rijmen, 15-17 Dec 2008, Kharagpur, India.
    ACISP'08, General Chair, Program Committee, Chairs: Yi Mu and Willy Susilo, July 2008, Wollongong, Australia.
    IEEE 3rd International Conference on Network and System Security, Advisory Committee member, Gold Coast, Oct 2009.
    ACISP'11, Program Committee, Chairs: Melbourne, Australia.

    COMMUNITY SERVICE


    2007-2009 Treasurer, Wollongong Senior Citizens, Gipps Rd, Gwynnville, NSW.


    Created 10 June 2011. Please email questions or comments to j.seberry at uow.edu.au