Jennifer Roma Seberry (Wallis)

PUBLICATIONS

Year Quick Links

1969 1970,

1971, 1972, 1973, 1974, 1975, 1976, 1977, 1978, 1979, 1980,

1981, 1982, 1983, 1984, 1985, 1986, 1987, 1988, 1989, 1990,

1991, 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000,

2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010,

2011, 2012, 2013, 2014,

    1969

  1. Jennifer Seberry Wallis, Hadamard Matrices, La Trobe University, Melbourne, (1969), 90 pages.

  2. Jennifer Seberry Wallis, A class of Hadamard matrices, J. Combinatorial Theory, 6, (1969), 40-44.

  3. Jennifer Seberry Wallis, A note on a class of Hadamard matrices, J.Combinatorial Theory, 6, (1969), 222-223.

  4. W.D.Wallis and Jennifer Seberry Wallis, Equivalence of Hadamard matrices, Israel J. Math., 7, (1969), 122-128.

  5. Jennifer Seberry Wallis, Two new block designs, J. Combinatorial Theory, 7, (1969), 369-370.

    1970

  6. Jennifer Seberry Wallis, Hadamard designs, Bull. Austral. Math. Soc., 2, (1970), 45-54.

  7. Jennifer Seberry Wallis, (v, k, lambda)-configurations and Hadamard matrices, J. Austral. Math. Soc., 11, (1970), 297-309.

  8. Jennifer Seberry Wallis, A resume of some recent results on (v, k, lambda) graphs, Hadamard matrices and block designs, Combinatorial Structures and their Application, Gordon and Breach, New York, (1970), 463-466.

    1971

    Return to Year Index.

  9. Jennifer Seberry Wallis, Combinatorial Matrices, La Trobe University, Melbourne, (1971), 172 pages.

  10. Jennifer Seberry Wallis, Some (1, -1) matrices, J. Combinatorial Theory, Ser. B., 10, (1971), 1-11.

  11. Jennifer Seberry Wallis, A skew-Hadamard matrix of order 92, Bull. Austral. Math. Soc., 5, (1971), 203-204.

  12. Jennifer Seberry Wallis, Amicable Hadamard matrices, J. Combinatorial Theory, Ser. A., 11, (1971), 296-298.

  13. Jennifer Seberry Wallis, Integer matrices satisfying generalized incidence equations, Bull. Austral. Math. Soc., 4, (1971), 51-56.

  14. Jennifer Seberry Wallis, Some results on configurations, J. Austral. Math. Soc., 12, (1971), 378-384.

  15. Jennifer Seberry Wallis, Combinatorial matrices, Bull. Austral. Math. Soc., 5, (1971), 285-286.

    1972

    Return to Year Index.

  16. W.D. Wallis, Anne Penfold Street and Jennifer Seberry Wallis, Combinatorics : Room Squares, Sum-free Sets, Hadamard Matrices, 292, Lecture Notes in Mathematics, Springer--Verlag, Berlin--Heidelberg--New York, (1972), 508 pages.

  17. Jennifer Seberry Wallis and W.D.Wallis, Proceedings of the First Australian Conference on Combinatorial Mathematics, TUNRA, Newcastle, Australia, 1972.

  18. Jennifer Seberry Wallis, On integer matrices obeying certain matrix equations, J. Combinatorial Theory, Ser. A., 12, (1972), 112-118.

  19. Joan Cooper and Jennifer Seberry Wallis, A construction for Hadamard arrays, Bull. Austral. Math. Soc., 7, (1972), 269-278.

  20. Jennifer Seberry Wallis and Albert Leon Whiteman, Some classes of Hadamard matrices with constant diagonal, Bull. Austral. Math. Soc., 7, (1972), 233-249.

  21. Jennifer Seberry Wallis, On supplementary difference sets, Aequationes Math., 8, (1972), 242-257.

  22. David C. Hunt and Jennifer Seberry Wallis, Cyclotomy, Hadamard arrays and supplementary difference sets, Proceedings of the Second Manitoba Conference on Numerical Mathematics. Congressus Numerantium, 7, (1972), 351-381.

  23. Jennifer Seberry Wallis, Orthogonal (0,1,-1) matrices, Proceedings of First Australian Conference on Combinatorial Mathematics, TUNRA, Newcastle, (1972), 61-84.

    1973

    Return to Year Index.

  24. Jennifer Seberry Wallis, Kronecker products and BIBDS, J. Combinatorial Theory, Ser. A., 14, (1973), 248-252.

  25. Jennifer Seberry Wallis, Some matrices of Williamson type, Utilitas Math., 4, (1973), 147-154.

  26. Jennifer Seberry Wallis, A note on amicable Hadamard matrices, Utilitas Mathematica, 3, (1973), 119-125.

  27. Jennifer Seberry Wallis, A note on BIBDS, J. Austral. Math. Soc., 16, (1973), 257-261.

  28. Jennifer Seberry Wallis, Complex Hadamard matrices, Linear and Multilinear Algebra, 1, (1973), 257-272.

  29. Jennifer Seberry Wallis, Hadamard matrices of order 28m, 36m, and 44m, J. Combinatorial Theory, Ser. A., 15, (1973), 323-328.

  30. Jennifer Seberry Wallis, Some remarks on supplementary difference sets, Colloquia Mathematica Societatis Janos Bolyai , 10, (1973), 1503-1526.

  31. Jennifer Seberry Wallis, Recent advances in the construction of Hadamard matrices, Proceedings of the Fourth Southeastern Conference on Combinatorics, Graph Theory and Computing, Congressus Numerantium, 8, (1973), 53-89.

  32. Jane di Paola, Jennifer Seberry Wallis and W. D. Wallis, A list of balanced incomplete block designs for r < 30, Proceedings of the Fourth Southeastern Conference on Combinatorics, Graph Theory and Computing, Congressus Numerantium, 8, (1973), 249-258.

  33. Jennifer Seberry Wallis, Families of codes from orthogonal (0,1,-1)-matrices, Proceedings of the Third Manitoba Conference on Numerical Mathematics, Congressus Numerantium, 9, (1973), 419-426.

    1974

    Return to Year Index.

  34. A.V. Geramita, N.J. Pullman and Jennifer Seberry Wallis, Families of weighing matrices, Bull. Aust. Math. Soc., 10, (1974), 119-122.

  35. Jennifer Seberry Wallis, A note on supplementary difference sets, Aequationes Math., 10, (1974), 46-49.

  36. Anthony V. Geramita and Jennifer Seberry Wallis, Orthogonal designs III: Weighing matrices, Utilitas Math., 6, (1974), 209-236.

  37. Jennifer Seberry Wallis, Williamson matrices of even order, Combinatorial Mathematics: Proceedings of the Second Australian Conference, (D.A. Holton, (Ed.)), Lecture Notes in Mathematics, 403, Springer-Verlag, Berlin-Heidelberg-New York, (1974), 132-142.

  38. Anthony V. Geramita and Jennifer Seberry Wallis, A survey of orthogonal designs, Proceedings of the Fourth Manitoba Conference on Numerical Mathematics, Congressus Numerantium, 12, (1974), 121-168.

    1975

    Return to Year Index.

  39. Jennifer Seberry Wallis, On Hadamard matrices, J. Combinatorial Theory, Ser. A., 18, (1975), 149-164.

  40. Jennifer Seberry Wallis, Construction of amicable orthogonal designs, Bull. Austral. Math. Soc., 12, (1975), 179-182.

  41. Jennifer Seberry Wallis and A.L. Whiteman, Some results on weighing matrices, Bull. Austral. Math. Soc., 12, (1975), 433-447.

  42. Anthony V. Geramita and Jennifer Seberry Wallis, Orthogonal designs IV: Existence questions, J. Combinatorial Theory, Ser. A., 19, (1975), 66-83.

  43. Anthony V. Geramita and Jennifer Seberry Wallis, Orthogonal designs: II, Aequationes Math., 13, (1975), 299-313.

  44. Jennifer Seberry Wallis, Construction of Williamson type matrices, Linear and Multilinear Algebra, 3, (1975), 197-207.

  45. Anthony V. Geramita, Joan Murphy Geramita and Jennifer Seberry Wallis, Orthogonal designs, Linear and Multilinear Algebra, 3, (1975/76), 281-306.

  46. Richard B. Lakein and Jennifer Seberry Wallis, On the matrices used to construct Baumert-Hall arrays, Combinatorics: III, Lecture Notes in Mathematics, 452, Springer--Verlag, Berlin--Heidelberg--New York, (1975), 156-170.

  47. Peter Eades, Peter J. Robinson, Jennifer Seberry Wallis and Ian S. Williams, An algorithm for orthogonal designs, Proc. Fifth Manitoba Conf. on Numerical Math., Congressus Numerantium, 15, (1975), 279-292.

    1976

    Return to Year Index.

  48. Jennifer Seberry Wallis, Orthogonal designs V: Orders divisible by eight, Utilitas Math., 9, (1976), 263-281.

  49. Joan Cooper and Jennifer Seberry Wallis, Using cyclotomy to construct orthogonal designs, J. Austral. Math. Soc., Ser. A, 22, (1976), 119-127.

  50. D.J. Newman and Jennifer Seberry Wallis, Reduction of angular momentum expressions by matrix arithmetic, J. Physics A, 9, (1976), 2021-2033.

  51. Jennifer Seberry Wallis, On the existence of Hadamard matrices, J. Combinatorial Th. (Ser. A), 21, (1976), 188-195.

  52. Joan Cooper and Jennifer Seberry Wallis, A note on orthogonal designs of order eighty, Ars Combinatoria, 1, (1976), 267-274.

  53. J. R. Giles and Jennifer Seberry Wallis, George Szekeres, J. Austral. Math Soc., Ser A, 21, (1976), 385-392.

  54. Anthony V. Geramita and Jennifer Seberry Wallis, Some new constructions for orthogonal designs, Combinatorial Mathematics IV, Lecture Notes in Mathematics, 560, Springer--Verlag, Berlin--Heidelberg--New York, (1976), 46-54.

  55. Elizabeth J. Morgan, Anne Penfold Street and Jennifer Seberry Wallis, Designs from cyclotomy, Combinatorial Mathematics IV, Lecture Notes in Mathematics, 560, Springer--Verlag, Berlin--Heidelberg--New York, (1976), 158-176.

  56. Peter Eades and Jennifer Seberry Wallis, An infinite family of skew weighing matrices, Combinatorial Mathematics IV, Lecture Notes in Mathematics, 560, Springer--Verlag, Berlin--Heidelberg--New York, (1976), 27-40.

  57. Peter J. Robinson and Jennifer Seberry, A note on using sequences to construct orthogonal designs, Colloq. Math. Janos Bolyai, 18, (1976), 911-932.

  58. Peter Eades and Jennifer Seberry, Some asymptotic results for orthogonal designs : II, Proceedings of International Conference on ``Problemes Combinatoires et Theorie des Graphes'', Orsay, France. Editions du CNRS, Paris, (1976), 119-122.

    1977

    Return to Year Index.

  59. Larry B. Cummings and Jennifer Seberry Wallis, An algorithm for the permanent of a circulant matrix, Bull. Canada. Math. Soc., 20, (1977), 67-70.

  60. Peter J. Robinson and Jennifer Seberry Wallis, Orthogonal Designs in powers of two, Ars. Combinatoria, 4, (1977), 43-57.

  61. Peter Eades, Nicholas Wormald and Jennifer Seberry Wallis, A note on asymptotic existence results for orthogonal designs, Combinatorial Mathematics V: Australian Conf. on Combinatorial Mathematics, Melbourne, 1976, 622, in Lecture Notes in Mathematics, Springer--Verlag, Berlin--Heidelberg--New York, (1977), 76-90.

    1978

    Return to Year Index.

  62. D.A.Holton and Jennifer Seberry (Eds), Combinatorial Mathematics: Proceedings of the International Conference, Canberra, 1977, 686, Lecture Notes in Mathematics, Springer--Verlag, Berlin--Heidelberg--New York, (1978), ix, 353 pages.

  63. J. Hammer, R. Levingston and Jennifer Seberry, A remark on the excess of Hadamard matrices and orthogonal designs, Ars Combinatoria, 5, (1978), 237-254.

  64. Peter J. Robinson and Jennifer Seberry, On the structure and existence of some amicable orthogonal designs, J. Austral. Math. Soc. Ser A, 25, (1978), 118-128.

  65. Jennifer Seberry, A class of group divisible designs, Ars Combinatoria, 6, (1978), 151-152.

  66. Jennifer Seberry, On skew Hadamard matrices, Ars. Combinatoria, 6, (1978), 255-276.

  67. Jennifer Seberry, A computer listing of Hadamard matrices, Combinatorial Mathematics: Proceedings of the International Conference, Canberra, August, 1977, 686, in Lecture Notes in Mathematics, Springer--Verlag, Berlin--Heidelberg--New York, (1978), 275-281.

  68. K. Wehrhahn and Jennifer Seberry, A class of codes generated by circulant weighing matrices, Combinatorial Mathematics: Proceedings of the international Conference, Canberra, August, 1977, 686, in Lecture Notes in Mathematics, Springer--Verlag, Berlin--Heidelberg--New York, (1978), 282-289.

  69. H.C. Kirton and Jennifer Seberry, Generation of a frequency square orthogonal to a 10 x 10 Latin square, Combinatorial Mathematics: Proceedings of the International Conference, Canberra, August, 1977, 686, in Lecture Notes in Mathematics, Springer--Verlag, Berlin--Heidelberg--New York, (1978), 193-198.

    1979

    Return to Year Index.

  70. A.V.Geramita and Jennifer Seberry, Orthogonal Designs: Quadratic forms and Hadamard matrices, Marcel Dekker, New York - Basel, (1979), viii, 460 pages.

  71. Evi Nemeth, Michael Shu and Jennifer Seberry, On the distribution of permanents of cyclic (0,1) matrices, Utilitas Math., 16, (1979), 171-182.

  72. Jennifer Seberry, A note on orthogonal Graeco-Latin designs, Ars. Combinatoria, 8, (1979), 85-94.

  73. R. Razen, Jennifer Seberry and K. Wehrhahn, Ordered partitions and codes generated by circulant matrices, J. Combinatorial Theory, Ser. A, 3, (1979), 333-341.

  74. Jennifer Seberry, Some remarks on generalized Hadamard matrices and theorems of Rajkundlia on SBIBDs, Combinatorial Mathematics VI, Lecture Notes in Vol 748 (1979) 154-164.

  75. J. Hammer and Jennifer Seberry, Higher dimensional orthogonal designs and Hadamard matrices II, Proceedings of the Nineth Manitoba Conference on Numerical Mathematics, Congressus Numerantium, 27, (1979), 23-29.

  76. Jennifer Seberry, Women in mathematics in Australia, A.W.M Newsletter, 9(3), May-June, (1979), 5-7.

    1980

    Return to Year Index.

  77. Jennifer Seberry and A.L. Whiteman, Complex weighing matrices and orthogonal designs, Ars. Combinatoria, 9, (1980), 149-162.

  78. Jennifer Seberry, Some remarks on amicable orthogonal designs, Annals of Discrete Mathematics, 6, (1980), 289-291.

  79. Jennifer Seberry, An infinite family of skew-weighing matrices, Ars. Combinatoria, 10, (1980), 323-329.

  80. Jennifer Seberry and David Skillicorn, All directed BIBDs with k = 3 exist, J. Combinatorial Theory (Ser. A), 29, (1980), 244-248.

  81. Jennifer Seberry, A construction for generalized Hadamard matrices, J. Statistical Inference and Planning, 4, (1980), 365-368.

  82. Jennifer Seberry, Example A - A construction for generalized Hadamard matrices

  83. Jennifer Seberry, Example B - A construction for generalized Hadamard matrices

  84. Jennifer Seberry, Some infinite families of Hadamard matrices, J. Austral. Math. Soc. Ser. A, 29, (1980), 235-242.

  85. Deborah J. Street and Jennifer Seberry, All DBIBDs with block size four exist, Utilitas Math., 18, (1980), 27-34.

  86. Jennifer Seberry, Higher dimensional orthogonal designs and Hadamard matrices, Combinatorics VII, Lecture Notes in Mathematics, 829, Springer--Verlag, Berlin--Heidelberg--New York, (1980), 220-223.

    1981

    Return to Year Index.

  87. J. Hammer and Jennifer Seberry, Higher dimensional orthogonal designs and applications, IEEE Transactions on Information Theory, Vol. IT-27, 6, (1981), 772-779.

  88. J. Hammer and Jennifer Seberry, Security coding of transmittable information, Patent Application.

  89. J. Hammer and Jennifer Seberry, Higher dimensional orthogonal designs and Hadamard matrices, Congressus Numerantium, 31, (1981), 95-108.

    1982

    Return to Year Index.

  90. Clement Lam and Jennifer Seberry, On orthogonal matrices with constant diagonal, J. Linear Algebra and Applications, 46, (1982), 117-129.

  91. Jennifer Seberry, The skew-weighing matrix conjecture, University of Indore Research J. Science, 7, (1982), 1-7.

  92. Jennifer Seberry, Some families of partially balanced incomplete block designs, Combinatorics IX, 952, Lecture Notes in Mathematics, Springer--Verlag, Berlin--Heidelberg--New York, (1982), 378-386.

  93. Jennifer Seberry, The impact of recent government policy on housing in the inner city of Sydney, 1982.

    1983

    Return to Year Index.

  94. Peter Eades, Cheryl Praeger and Jennifer Seberry, Some remarks on the permanents of cyclic (0,1) matrices, Utilitas Math., 23, (1983), 145-159.

  95. Jennifer Seberry and A.L. Whiteman, A new construction for conference matrices, Ars. Combinatoria, 16, (1983), 119-127.

  96. Jennifer Seberry, The use (and abuse) of power in the pre-selection of Peter Baldwin for the Federal seat of Sydney, 1983.

    1984

    Return to Year Index.

  97. Jennifer Seberry, Regular group divisible designs and Bhaskar Rao designs with block size three, J. Statistical Planning and Inference, 10, (1984), 69-82.

  98. Clement Lam and Jennifer Seberry, Generalized Bhaskar Rao designs, J. Statistical Planning and Inference, 10, (1984), 83-95.

  99. J.E.Dawson, Jennifer Seberry and D.B.Skillicorn, The directed packing numbers DD(t,v,v),t > 4, Combinatorica, 4, (1984), 121-130.

  100. Conrad Mackenzie and Jennifer Seberry, Maximal ternary codes and Plotkin's bound, Ars. Combinatoria, 17A, (1984), 251-270.

  101. Warwick de Launey and Jennifer Seberry, Generalized Bhaskar Rao designs with block size four, Congressus Numerantium, 41, (1984), 229-294.

  102. Warwick de Launey and Jennifer Seberry, On Bhaskar Rao designs of block size four, Combinatorics and Applications, Proceedings of the Seminar on Combinatorics and its Applications in honour of Professor S.S.Shrikhande, (K.S.Vijayan and N.M.Singhi, (Eds.)), Indian Statistical Institute, Calcutta, (1984), 311-316.

    1985

    Return to Year Index.

  103. Jennifer Seberry, Generalized Bhaskar Rao designs with block size three, J. Statistical Planning and Inference, 11, (1985), 373-380.

  104. W. de Launey, D.G. Sarvate and Jennifer Seberry, Generalized Bhaskar Rao designs of block size three over the group Z4, Ars Combinatoria, 19A, (1985), 273-286.

  105. Jennifer Seberry, A subliminal channel in codes for authentication without secrecy, Ars Combinatoria, 19A, (1985), 337-42.

    1986

    Return to Year Index.

  106. D.G.Sarvate and Jennifer Seberry, Encryption methods based on combinatorial designs Ars Combinatoria, 21A, (1986), 237-246.

  107. Jennifer Seberry, A new construction for Williamson-type matrices, Graphs and Combinatorics, 2, (1986), 81-87.

  108. Terry C. Jones and Jennifer Seberry, Authentication without secrecy, Ars Combinatoria, 21A, (1986), 115-122.

  109. H. C. Chan, C.A.Rodger and Jennifer Seberry, On inequivalent weighing matrices, Ars Combinatoria, 21A, (1986), 299-333.

    1987

    Return to Year Index.

  110. Jennifer Seberry, Generalized Hadamard matrices and colourable designs in the construction of regular GDDS with two and three association classes, J.Statistical Planning and Inf., 15, (1987), 237-246.

  111. C.A.Rodger, D.G. Sarvate and Jennifer Seberry, Coloured designs, new group divisible designs and pairwise balanced designs, J. Statistical Planning and Inf., 15, (1987), 379-389.

  112. Jennifer Seberry, Hadamard matrices of order 2tpq: I, Ars Combinatoria, 23B, (1987), 195-213.

  113. J.Hammer, D. G. Sarvate, Jennifer Seberry, A note on orthogonal designs, Ars Combinatoria, 24, (1987), 93-100.

  114. Jennifer Seberry, Constructing Hadamard matrices via orthogonal designs, Congressus Numerantium, 57, (1987), 299-302.

  115. Ralph Gyoery and Jennifer Seberry, EFTPOS in Australia, Crypto 86, Springer Verlag, Lecture Notes in Computer Science, 263, (1987), 347-377.

  116. Jennifer Seberry, A construction for orthogonal designs with three variables, Combinatorial Design Theory, (C.J. Colbourne and R.A. Mathon, (Eds.)), North Holland, (1987) 437-440.

  117. Jennifer Seberry, (1987), Public Key Cryptography, Secure Data Communications Workshop, Digest of Papers, IEEE, Melbourne, 1-17.

  118. Jennifer Seberry, Vanstone's construction applied to Bhaskar Rao designs, Congressus Numerantium, 59, (1987), 265-274.

    1988

    Return to Year Index.

  119. Luke O'Connor and Jennifer Seberry, The Cryptographic Significance of the Knapsack Problem, Aegean Park Press, Laguna Hills, CA, (1988), viii, 178 pages.

  120. Jennifer Seberry and Josef Pieprzyk, Cryptography: An Introduction to Computer Security, Prentice Hall, Sydney and Englewood-Cliffs, (1988), viii, 375 pages.

  121. Jennifer Seberry and A.L. Whiteman, New Hadamard matrices and conference matrices obtained via Mathon's construction, Graphs and Combinatorics, 4, (1988), 355-377.

  122. Conrad MacKenzie and Jennifer Seberry, Maximal q-ary codes and Plotkin's bound, Ars Combinatoria, 26B, (1988), 37-50.

  123. William D Palmer and Jennifer Seberry, Bhaskar Rao designs over small groups, Ars Combinatoria, 26A, (1988), 125-148.

  124. D.G.Sarvate and Jennifer Seberry, On weighing matrices with square weights, Optimization, Design of Experiments and Graph Theory, (M. N. Gopalan and G. A. Patwardhan, (Eds.)), Indian Institute of Technology, (1988), Powai, Bombay, 71-76.

  125. Brett A Jenkins, C. Koukouvinos, S. Kounias, Jennifer Seberry, Ralph Seberry, Some results on the excesses of Hadamard matrices, JCMCC, 4, (1988), 155-188.

    1989

    Return to Year Index.

  126. Mirka Miller and Jennifer Seberry, Relative compromise of statistical databases, ACSC12 and J. Australian Computer Society, 21, (1989) 56-62.

  127. Jennifer Seberry, SBIBD(4k2, 2k2 k, k2 k) and Hadamard matrices of order 4k2 with maximal excess are equivalent, Graphs and Combinatorics, 5, (1989), 373-383.

  128. Christos Koukouvinos, Stratis Kounias, and Jennifer Seberry, Further Hadamard matrices with maximal excess and new SBIBD(4k2, 2k2 ; k, k2 ; k), Utilitas Math., 36, (1989), 135-150.

  129. Gavin Cohen, David Rubie, Christos Koukouvinos, Stratis Kounias, Jennifer Seberry and Mieko Yamada, A survey of base sequences, disjoint complementary sequences and OD(4t; t, t, t, t), JCMCC, 5, (1989), 69-104.

  130. Michael Newberry and Jennifer Seberry, User unique identification, in Proceedings of ACSC-12, University of Wollongong, (1989), 163-172.

  131. Thomas Hardjono and Jennifer Seberry, A multilevel encryption scheme for database security, in Proceedings of ACSC-12,University of Wollongong, (1989), 209-218.

  132. Mike Newberry and Jennifer Seberry, Experience of using a type signature password system for user authentication in a heavily used computing environment, Computer Security in the Information Age, (W. J. Caelli, (Ed.)), IFIP/SEC'88 -5th World Computer Security Conference, Elsevier Science Publishers B. V., North Holland, (1989), 303-307.

  133. Reihaneh Safavi-Naini and Jennifer Seberry, Pseudo random sequence generators and structured noise, in Number Theory and Cryptography, (J. H. Loxton, (Ed.)),given at workshop on Number Theory and Cryptography in Communications, Macquarie University, Sydney, 29-30 June, 1989, Lecture Series of the London Mathematical Society.

  134. Jennifer Seberry, Cryptographic techniques, Security. Data Communication Workshop, Digest of Papers, IEEE, Melbourne, September, 1989.

  135. Jennifer Seberry, SBIBD(4k2, 2k2 ; k, k2 ; k) and Hadamard matrices of order 4k2 with maximal excess are equivalent, Proceedings of the Symposium on Hadamard matrices, Tokyo Woman's University, (Koichi Yamamoto, (Ed.)), February, (1989), 19-29. (Some papers in Japanese. Title of Proceedings in Japanese.)

  136. Jennifer Seberry and Mieko Yamada, Products of Hadamard, Williamson and other orthogonal matrices using M-structures, Proceedings of Combinatorics Conference, Kobe, Japan, November 1989.

  137. Telecom Report on Centre for Communication Security Research, No 1, June 1989, Unisearch Ltd, UNSW.

  138. Telecom Report on Centre for Communication Security Research, No 2, December 1989, Unisearch Ltd, UNSW.

    1990

    Return to Year Index.

  139. Thomas Hardjono and Jennifer Seberry, Towards the Cryptanalysis of Bahasa Indonesia and Bahasa Malaysia, CCSR Tutorial Series in Computer Security, 2, 1990.

  140. Jennifer Seberry and Josef Pieprzyk, Advances in Cryptology: Auscrypt'90 Proceedings of the Conference, Sydney, 1990, 453, Lecture Notes in Computer Science, Springer--Verlag, Berlin--Heidelberg--New York, 1990.

  141. Jennifer Seberry and Mieko Yamada, On the products of Hadamard, Williamson and other orthogonal matrices using M-structures, JCMCC, 7, (1990), 97-137.

  142. H. Kharaghani and Jennifer Seberry, Regular complex Hadamard matrices, Congressus Numerantium, 75, (1990), 187-201.

  143. Christos Koukouvinos, Stratis Kounias, and Jennifer Seberry, Further results on base sequences, disjoint complementary sequences, OD(4t; t, t, t, t) and the excess of Hadamard matrices, Ars Combinatoria, 30, (1990), 241-256.

  144. Lawrence Brown and Jennifer Seberry, On the design of permutation P in DES type cryptosystems, Workshop held in Houthalen, Belgium, 1989, (Jean-Jacques Quisquater and J. Vandewalle, (Eds.)), Eurocrypt'89 ? Advances in Cryptography, 434, Lecture Notes in Computer Science, Springer-Verlag, (1990), 696-705.

  145. Mirka Miller and Jennifer Seberry, Audit Expert and Statistical Database security, Databases in the 1990s, (B. Srinivasan and J. Zeleznikow, Eds.)), World Scientific, Singapore-New Jersey-London-Hong Kong, 1990.

  146. Lawrence Brown and Jennifer Seberry, Key scheduling DES type cryptosystems, (Josef Pieprzyk and Jennifer Seberry, (Eds.)), Auscrypt'90 ? Advances in Cryptography, 453, Lecture Notes in Computer Science, Springer-Verlag, (1990), 221-228.

  147. Lawrence Brown, Josef Pieprzyk and Jennifer Seberry, LOKI - A cryptographic primitive for authentication and secrecy applications, (Josef Pieprzyk and Jennifer Seberry, (Eds.)), Auscrypt'90 ? Advances in Cryptography, 453, Lecture Notes in Computer Science, Springer-Verlag, (1990), 239-236.

  148. Martin H. G. Anthony, Keith M. Martin, Jennifer Seberry, Peter Wild, Some remarks on authentication schemes, (Josef Pieprzyk and Jennifer Seberry, (Eds.)), Auscrypt'90 : Advances in Cryptography, 453, Lecture Notes in Computer Science, Springer-Verlag, (1990), 122-139.

  149. Thomas Hardjono and Jennifer Seberry, Search key substitution in the encipherment of B-trees, 16th International Conference on Very Large Data Bases, Brisbane, Australia, Morgan Kaufman, Palo Alto, 1990.

  150. Telecom Report on Centre for Communication Security Research, No 3, June 1990, Unisearch Ltd, UNSW.

  151. Telecom Report on Centre for Communication Security Research, No 4, December 1990, Unisearch Ltd, UNSW.

    1991

    Return to Year Index.

  152. Thomas Hardjono, Sing Guat Ong and Jennifer Seberry, Towards the Cryptanalysis of Mandarin/Pinyin, CCSR Tutorial Series in Computer Security, 3, 1991.

  153. Brendan D McKay, Jennifer Seberry, Scott A Vanstone, ``Ralph Gordon Stanton '', Selected Papers in Combinatorics - a Volume Dedicated to R.G. Stanton, Topics in Discrete Mathematics, {bf 2}, North Holland, New York, 1992, also in Discrete Math., 92, (1991), 1-8.

  154. Christos Koukouvinos, Stratis Kounias, and Jennifer Seberry, Supplementary difference sets and optimal designs, Discrete Math., 87, (1991), 49-58.

  155. Andrew Bowler, Kathleen Quinn, and Jennifer Seberry, Generalized Bhaskar Rao designs with elements from cyclic groups of even order, Austr. J. Comb., 3, (1991), 5-13.

  156. Reihaneh Safavi-Naini and Jennifer Seberry, Error correction codes for authentication and subliminal channels, IEEE Transactions on Information Theory, 37, (1991), 13-17.

  157. Jennifer Seberry, Existence of SBIBD(4k2, 2k2 + k, k2 + k) and Hadamard matrices with maximal excess, Austral. J. Combinatorics, 4, (1991), 87-92.

  158. Joan Cooper, Diane Donovan and Jennifer Seberry, Latin squares and critical sets of minimal size, Australasian J. Comb., 4, (1991), 113-120.

  159. Jennifer Seberry and Xian-Mo Zhang, Some orthogonal designs and complex Hadamard matrices by using two Hadamard matrices, Australasian J. Comb., 4, (1991), 93-102.

  160. Christos Koukouvinos and Jennifer Seberry, Hadamard matrices of order ? (8 mod 16) with maximal excess, Discrete Math., 92, (1991), 173-176, also appeared in Selected Papers in Combinatorics - a Volume Dedicated to R.G. Stanton, Topics in Discrete Mathematics, 2, North Holland, New York, 1992.

  161. Jennifer Seberry and Mieko Yamada, Amicable Hadamard matrices and amicable orthogonal designs, Utilitas Mathematica, 40, (1991), 179-192.

  162. Reihaneh Safavi-Naini and Jennifer Seberry, On the complexity structure of binary sequences of odd length, International Symposium on Information Theory, Budapest, Hungary, June, 1991.

  163. Lawrence Brown, Josef Pieprzyk, Reihaneh Safavi-Naini and Jennifer Seberry, A generalised testbed for analysing block and stream ciphers, IFIP, Brighton, UK, April, 1991

  164. Christos Koukouvinos and Jennifer Seberry, Addendum to further results on base sequences, disjoint complementary sequences, OD(4t; t, t, t, t) and the excess of Hadamard matrices, Twenty-Second Southeastern Conference on Combinatorics, Graph Theory and Computing, and Congressus Numerantium, 82, (1991), 97-103.

  165. L. Brown, B. Denehy, P.M.Hoff, M.Jaatsun, A. Jiwa, J. Seberry, A. Wesley, and B. Wilcott, SecureLink: Network security and authentication, Twenty First Manitoba Conference on Numerical Mathematics, 4-6th October, 1991.

  166. Telecom Report on Centre for Communication Security Research, No 5, June 1991, Unisearch Ltd, UNSW.

  167. Telecom Report on Centre for Communication Security Research, No 6, December 1991, Unisearch Ltd, UNSW.

    1992

    Return to Year Index.

  168. Jennifer Seberry, Brendan McKay and Scott Vanstone, Selected Papers in Combinatorics - a Volume Dedicated to R.G. Stanton, Topics in Discrete Mathematics, 2, North Holland, New York, 1992.

  169. Jennifer Seberry and Xian-Mo Zhang, Semi Williamson type matrices and the W(2n, n) conjecture, J. Comb. Math. and Comb. Computing, 11, (1992), 65-71.

  170. R. Craigen, Jennifer Seberry and Xian-Mo Zhang, Product of four Hadamard matrices, J. Combinatorial Th. (Ser A), 59, (1992), 318-320.

  171. Jennifer Seberry, On small defining sets for some SBIBD(4t-1, 2t-1, t-1), Bull. Inst. Comb. and Appl., 4, (1992), 58-62.

  172. John Loxton, David S.P. Khoo, Gregory J. Bird and Jennifer Seberry, A cubic RSA code equivalent to factorization, J. Cryptology, 5, (1992), 139-150.

  173. Jennifer Seberry and Christos Koukouvinos, Constructing Hadamard matrices from orthogonal designs, Austral. J. Comb., 6, (1992), 267-278.

  174. Keith M. Martin, Jennifer Seberry, Peter Wild, Resolvable designs applicable to cryptographic authentication schemes, Comb. Math. and Comb. Computing, 12, (1992), 153-160.

  175. Jennifer Seberry, On small defining sets for some SBIBD(4t-1, 2t-1, t-1), Bull. Inst. Comb. and Appl., 4, (1992), 58-62; corrigendum, Bull. Inst. Comb. and Appl., 6, (1992), 62-62.

  176. Dinesh Sarvate and Jennifer Seberry, ``Suggestions for presentation of a twenty-minute talk", Bull. Inst. Comb., 4, (1992), 90-91.

  177. Jennifer Seberry and Mieko Yamada, Hadamard matrices, Sequences, and Block Designs, Contemporary Design Theory ? A Collection of Surveys, (D. J. Stinson and J. Dinitz, Eds.)), John Wiley and Sons, (1992), 431-560.

  178. Christos Koukouvinos and Jennifer Seberry, Construction of new Hadamard matrices with maximal excess and infinitely many new SBIBD(4k2, 2k2 + k, k2 + k), Graphs, Matrices and Designs: A Festschrift for Norman J. Pullman, (by Rolf Rees, Eds.)), Vol 139, Lecture Notes in Pure and Applied Mathematics, Marcel Dekker, 1993, 255-267. (ISBN: 0-8247-8790-0).

  179. T. Hardjono, Y. Zheng and J. Seberry, A new approach to database authentication, Proceedings of the Third Australian Database Conference (Database'92), February 1993.

  180. Yuliang Zheng, Thomas Hardjono and Jennifer Seberry, How to recycle shares in secret sharing schemes, in Proceedings of the 15th Australian Computer Science Conferences (ACSC -15), Melbourne, January 1993.

    1993

    Return to Year Index.

  181. Jennifer Seberry and Yuliang Zheng, Advances in Cryptology: Auscrypt'92 Proceedings of the Conference, Gold Coast, 1993, Lecture Notes in Computer Science, 718, Springer--Verlag, Berlin--Heidelberg--New York, 1993.

  182. Jennifer Seberry and Xian-Mo Zhang, Some orthogonal matrices constructed by strong Kronecker multiplication, Austral. J. Comb., 7, (1993), 213-224.

  183. H. Kharaghani and Jennifer Seberry, The excess of complex Hadamard matrices, Graphs and Combinatorics, 9, (1993), 47-56.

  184. Dinesh Sarvate and Jennifer Seberry, Constructions of balanced ternary designs based on generalized Bhaskar Rao designs, J. Statistical Planning and Inference, 34, (1993), 423-432.

  185. Jennifer Seberry and Mieko Yamada, On the multiplication theorems of Hadamard matrices of generalized quaternion type using M-structures, JCMCC, 13, (1993), 97-106.

  186. Jennifer Seberry and Xian-mo Zhang, Regular sets of matrices and applications, Graphs and Comb, 9, (1993), 185-195.

  187. Christos Koukouvinos and Jennifer Seberry, On weighing matrices, Utilitas Math., 43, (1993), 101-127.

  188. Yuliang Zheng and Jennifer Seberry, Immunizing public key cryptosystems against chosen ciphertext attacks, IEEE J on Selected Areas in Communications, 11, (1993), 715-724.

  189. Christos Koukouvinos and Jennifer Seberry, On G-matrices, Bull. Inst. Comb. and Appl., 9, (1993), 40-44.

  190. Christos Koukouvinos and Jennifer Seberry, Some new weighing matrices using sequences with zero autocorrelation function, Austral. J. Comb. 8, (1993), 143-152.

  191. Yuliang Zheng and Jennifer Seberry, Practical approaches to attaining security against adaptively chosen ciphertext attacks, (E. F. Brickell, (Ed.)), Crypto'92 ? Advances in Cryptography, 740, Lecture Notes in Computer Science, Springer-Verlag, (1993), 292-304.

  192. Yuliang Zheng, Josef Pieprzyk and Jennifer Seberry, HAVAL - A one-way hashing algorithm with variable length output, (Jennifer Seberry and Yuliang Zheng, (Eds.)), Advances in Cryptography - Auscrypt'92, Conference held at the Gold Coast, Australia, December 1993, 718, Lecture Notes in Computer Science, Springer-Verlag, Berlin--Heidelberg--New York, (1993), 83-104.

  193. Yvo Desmedt and Jennifer Seberry, Practical proven secure authentication with arbitration, (Jennifer Seberry and Yuliang Zheng, (Eds.)) Advances in Cryptography - Auscrypt'92, Conference held at the Gold Coast, Australia, December 1993, 718, Lecture Notes in Computer Science, Springer-Verlag, Berlin--Heidelberg--New York, (1993), 27-32.

  194. Jennifer Seberry and Xian-Mo Zhang, Highly nonlinear 0-1 balanced boolean functions satisfying strict avalanche criterion, (Jennifer Seberry and Yuliang Zheng, (Eds.)), Advances in Cryptography - Auscrypt'92, Conference held at the Gold Coast, Australia, December 1993, 718, Lecture Notes in Computer Science, Springer-Verlag, Berlin--Heidelberg--New York, (1993), 145-155.

  195. L. P. Brown, M. Kwan, J. Pieprzyk and J. Seberry, Improving resistance to differential cryptanalysis and the redesign of LOKI, Advances in Cryptology - ASIACRYPT'91, (H. Imai, R. L. Rivest and T. Matsumoto, (Eds.)), 739, Lecture Notes in Computer Science, Springer-Verlag, (1993), 36-50.

  196. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, Systematic generation of cryptographically robust S-boxes, Proceedings of the First ACM Conference on Computer and Communications Security, The Association for Computing Machinery, Fairfax, VA, (1993), 171-182.

    1994

    Return to Year Index.

  197. Claude Carlet, Jennifer Seberry and Xian-Mo Zhang Comments on "Generating and Counting Binary Bent Sequences", IEEE Trans Inf Theory 40, (1994), 600-600.

  198. W. de Launey and Jennifer Seberry, The strong Kronecker product, J. Combinatorial Theory, Ser. A, 66, (1994), 192-213.

  199. Genet M'gan Edmonson, Jennifer Seberry and Malcolm Anderson, On the existence of Turyn sequences of length less than 43 , Mathematics of Computation, 62, (1994), 351-362.

  200. Marc Gysin and Jennifer Seberry, New results with near- Yang sequences, Utilitas Math., 45, (1994), 85-89.

  201. Christos Koukouvinos, Stratis Kounias, Jennifer Seberry, C. H. Yang, Joel Yang, Multiplication of sequences with zero autocorrelation, Australas J. Combin., 10, (1994), 5-15.

  202. Christos Koukouvinos, Stratis Kounias, Jennifer Seberry, C. H. Yang, Joel Yang, On sequences with zero autocorrelations, Designs, Codes and Cryptography, 4, (1994), 327-340.

  203. Thomas Kunkle and Jennifer Seberry, A few more small defining sets for SBIBD(4t-1, 2t-1, t-1), Bull. Inst. Comb. and Appl., 12, (1994), 61-64.

  204. Dinesh Sarvate and Jennifer Seberry, A note on small defining sets for some SBIBD(4t-1, 2t-1, t-1), Bull. Inst. Comb. and Appl., 10, (1994), 26-32.

  205. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, Improving the strict avalanche characteristics of cryptographic functions, Information Processing Letters, 50, (1994), 37-41.

  206. Jennifer Seberry and Xian-Mo Zhang, Constructions of bent functions from two known bent functions, Australas. J. Comb., 9, (1994), 21-35.

  207. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, Cryptographic boolean functions via group Hadamard matrices , Australas. J. Combin., 10, (1994), 131-145.

  208. Joan Cooper, Diane Donovan, Jennifer Seberry, Secret sharing schemes arising from latin squares, Bull. Inst. Comb. and Appl.,, 12, (1994), 33-43.

  209. Yuliang Zheng, Thomas Hardjono, Jennifer Seberry, Reusing Shares in Secret Sharing Schemes, Computer Journal 37 (3): 199-205 (1994)

  210. Thomas Hardjono, Yuliang Zheng and Jennifer Seberry, Database Authentication Revisited, Computer & Security, Vol. 13, No. 7, pp. 573-580, 1994.

  211. Thomas Hardjono and Jennifer Seberry, Authentication via multi-service tickets in the Kuperee server, 1994 European Symposium on Computer Security (ESORICS'94), ed. D.Gollmann, 875, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 1994, pp 143-160.

  212. Azad Jiwa, Jennifer Seberry and Yuliang Zheng, Beacon based authentication, 1994 European Symposium on Computer Security (ESORICS'94), ed. D.Gollmann, 875, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 1994, pp 125-142.

  213. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, On construction and non-linearity of correlation immune functions, ed. Tor Helleseth, Eurocrypt'93 - Advances in Cryptography, 765, Lecture Notes in Computer Science, Springer-Verlag, (1994), 181-199.

  214. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, Nonlinearity and propagation characteristics of boolean functions, ed. D.R.Stinson, Crypto'93 - Advances in Cryptography, 773, Lecture Notes in Computer Science, Springer-Verlag, Berlin, (1994), 49-60.

  215. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, Highly nonlinear balanced boolean functions and their Propagation characteristics ed. D.R.Stinson, Crypto'93 - Advances in Cryptography, 773, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 1994, 145-155.

  216. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, Pitfalls in designing substitution boxes, ed. Y. Desmedt, Crypto'94 - Advances in Cryptography, 839, Lecture Notes in Computer Science, Springer-Verlag, (1994), 383-396.

  217. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, Structures of highly nonlinear cryptographic functions, Proceedings of the 1994 International Symposium on Information Theory and its Application (ISITA'94), The Institute of Engineers, Australia, 1 (1994), 229-234.

  218. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng: How to Improve the SAC, Proceedings of the 1994 Workshop on Selected Area in Cryptography (SAC'94), Kingston, Ontario, Canada, pp.52-58, May 1994

  219. Thomas Hardjono, Yuliang Zheng and Jennifer Seberry, Anonymous verifiable databases: towards a practical solution, Tenth International Information Processing Conference -Security'94, (IFIP)-SEC'94, Curacao, Netherlands Antilles, 23-27 May 1994.

  220. Thomas Hardjono and Jennifer Seberry, Authentication via multi-service tickets in the Kuperee server, Proceedings of 1994 European Symposium on Computer Security (ESORICS'94) Brighton UK, Nov, 1994.

  221. Thomas Hardjono, Yuliang Zheng and Jennifer Seberry, Kerbie: Kerberos-type authentication using public keys, Proceedings of the ULPAA'94 International Conference on Upper Layer Protocols, Architectures and Applications, Eds. M. Medina and N. Borenstein, June, 1994, Barcelona, Spain, pp.61-72.

  222. Azad Jiwa, Jennifer Seberry and Yuliang Zheng, Network Security featuring beacon based authentication, Fifth Australasian Conference on Information Systems (ACIS'94), Melbourne, September 1994.

  223. Azad Jiwa, Jennifer Seberry and Yuliang Zheng, Beacon based authentication, Proceedings of 1994 European Symposium on Computer Security (ESORICS'94) Brighton UK, Nov, 1994.

  224. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, GAC -- the criterion for global avalanche characteristics of cryptographic functions, The Second ACM Conference on Computer and Communications Security, Fairfax, Nov, 1994.

  225. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, Relationships among nonlinearity characteristics of quadratic substitution boxes, Eurocrypto'94 - Advances in Cryptography, Conference held in Perugia, Italy, May, 1994.

  226. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, Pitfalls in designing substitution boxes, Advances in Cryptography, Conference held in Santa Barbara, USA, August, 1994.

  227. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, Structures of highly nonlinear cryptographic functions, 1994 International Symposium on Information Theory and its Applications, (ISITA'94), Sydney, Nov, 1994.

  228. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, Structures of cryptographic functions with strong avalanche characteristics, Advances in Cryptography, ASIACRYPT'94, Conference held in Wollongong, Nov 28 - Dec 1, 1994.

    1995

    Return to Year Index.

  229. Diane Donovan, Joan Cooper, D.J.Nott and Jennifer Seberry, Latin squares: critical sets and their lower bounds, Ars Combinatoria, 39, (1995), 33-48.

  230. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, Nonlinearity and Propagation Characteristics of Balanced Functions , Information and Computation, Vol. 119, No. 1 (1995), 1-13.

  231. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, The relationship between propagation characteristic and nonlinearity of cryptographic functions, Journal of Universal Computer Science, 1, No. 2 (1995), 136-150.

  232. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, GAC-The Criterion for Global Avalanche characteristics of cryptographic functions, Journal for Universal Computer Science, Vol. 1, No. 5, (1995), 316-333.

  233. Marc Gysin and Jennifer Seberry, The weighing matrices of order $4n$ and weight $4n-2$ and $2n-1$ Australasian J Comb, Vol. 12, (1995), 157-174.

  234. Thomas Hardjono and Jennifer Seberry, Applications of smartcards for anonymous and verifiable databases, Computers and Security, 14 (1995), 465-472

    1995 Refereed Conference Proceedings

  235. Thomas Hardjono and Jennifer Seberry, Information security issues in mobile computing, Information Security - the Next Decade, eds Jan H P Eloff and Sebastiaan H von Solms, Eleventh International Information Processing Conference -Security'95, (IFIP)-SEC'95, Capetown, South Africa, Chapman and Hall, London-Melbourne, (1995), 143-151.

  236. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, Structures of cryptographic functions with strong avalanche characteristics, Advances in Cryptography, ASIACRYPT'94, eds Josef Pieprzyk and Reihaneh Safavi-Naini, Vol 917, Lecture Notes in Computer Science, Springer-Verlag, (1995), 119-132.

  237. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, Relationship among Nonlinearity Criteria In Advances in Cryptography - EUROCRYPT'94, Lecture Notes in Computer Science, Vol 950, Springer-Verlag, Berlin, Heidelberg, New York, (1995), 376-388.

  238. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, On Nonlinear Resilient Functions In Advances in Cryptography - EUROCRYPTO'95, Lecture Notes in Computer Science, 921, Springer - Verlag, Berlin, Heidelbeg, New York, 1995, 274-288.

  239. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, Relating Nonlinearity to Propagation Characteristics, Proceedings of 1995 Cryptography Policy and Algorithms Conference, pp.283-297, Brisbane, July 1995.

    1995 Technical Report

  240. Jennifer Seberry and Xian-Mo Zhang, 43a Hadamard matrices, bent functions and cryptography, Technical report, University of Wollongong, 1995.

  241. Marc Gysin and Jennifer Seberry, New normal sequences of length 25, ACSC'95 - Australian Computer Science Conference, Glenelg, January, 1995.

  242. Thomas Hardjono and Jennifer Seberry, Information security in mobile databases, Sixth Australasian Database Conference, Glenelg, South Australia, February, 1995.

    1996

    Return to Year Index.

  243. Pieprzyk J and Seberry J (Eds), Advances in Cryptology ACISP'96, Vol 1172, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 1996.

  244. Seberry J and Craigen R, Orthogonal Designs, in The CRC Handbook of Combinatorial Designs, (eds Charles J Colbourn and Jeffrey H Dinitz), CRC Press, Boca Raton, Fla., (1996), 400-405.

    1996 Journal Articles

  245. Arasu K T and Seberry J, Circulant weighing matrices, Journal of Combinatorial Designs, 4 (1996), 439-447.

  246. Hardjono T and Seberry J, Security issues in mobile computing networks, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E79-A, July 1996, 1021-1026.

  247. Jiwa A, Hardjono T and Seberry J, Beacons for authentication in distributed systems, J Computer Security, 4, (1996), 81-96.

  248. Koukouvinos C, Mitrouli M, Seberry J, and Karabelas P, On sufficient conditions for some orthogonal designs and sequences with zero autocorrelation function, Australas J. Combin., 13, (1996), 197-216.

  249. Koukouvinos C, and Seberry J, New weighing matrices, Synkhya, Ser. B, 58 (1996), 221-230.

  250. Koukouvinos C and Seberry J, Necessary and sufficient conditions for some two variable orthogonal designs in order 36, Congressus Numerantium, 114 (1996), 129-140.

  251. Koukouvinos C, Mitrouli M and Seberry J, On the Smith normal form of D-optimal designs, J. Linear and Multilinear Algebra,, 247 (1996), 277-295.

  252. Gysin M and Seberry J, Multiplication of ternary complementary pairs, Australasian J Combinatorics, 14 (1996), 165-180.

  253. Mu Y, Seberry J and Zheng Y, Shared cryptographic bits via quantized quandrature phase amplitudes of light, Optics Communications, 123, (1996), 344-352.

  254. Chaudhry, G R, and Seberry, J, Minimal and Maximal Critical Sets in Room Squares, Proceedings of 7th Australasian Workshop on Combinatorial Algorithms (AWOCA'96), Magnetic Island, Australia, July 15-19, (1996), 75-86.

  255. Chaudhry G R, and Seberry J, Secret Sharing schemes based on Room squares,Proceedings of DMTCS'96, December , 1996, Auckland, New Zealand, Combinatorics, Complexity and Logic, Springer-Verlag Singapore 1996, 158-167.

  256. Hardjono T and Seberry J, Replicating the Kuperee authentication server for increased security and reliability, ACISP'96, LNCS 1172, Springer-Verlag, Berlin, 1996 14-26.

  257. Hardjono T and Seberry J, Design and security issues in strongbox systems for the internet, Proceedings of the 1996 International Conference on Cryptology and Information Security, Kaohsiung, Taiwan, 19-21 December, 1996, 99-103.

  258. Hardjono T and Seberry J, Strong boxes for electronic commerce, Proceedings of the 1996 USENIX Workshop on Electronic Commerce. Oakland, California, USA, November, 1996, 135-145.

    1997

    Return to Year Index.

  259. Chaudhry G R and Seberry J, Minimal Critical Set of a Room Square of order 7, Bull. Inst. of Combin. and its Applications 20(1997), 90.

  260. Gysin M and Seberry J, On 4-NPAF(1,2w) sequences,Bull. Inst. of Combin. and its Applications 20(1997), 6-12.

  261. Golomb S, Harris T and Seberry J, "Albert Leon Whiteman (1915-1995)", Notices of the American Mathematical Society, 44, 2 (1997) 217-219.

  262. Hossein G, Pieprzyk J, Chaudhry G and Seberry J, How to prevent cheating in Pinch's scheme, Electronics letters, 33, 17 (1997) pp. 1453-54.

  263. Christos Koukouvinos and Jennifer Seberry, Weighing matrices and their applications, JSPI, 62 (1997) 91-101.

  264. Koukouvinos C, Mitrouli M and Seberry J, On the Smith normal form of weighing matrices, Bulletin Inst. Comb. and Applic., 19 (1997) 57-69.

  265. Seberry J , Firewalls: Defending information technology, Security Australia, 17(2) 1997, 28-29 and 38.

  266. Koukouvinos C, Seberry J, Whiteman A.L., Xia Ming-yuan, Optimal designs, supplementary difference sets and multipliers, JSPI, 62 (1997) 81-90.

  267. Horton J and Seberry J, Computer Viruses: an Introduction, Proceedings of the Twentieth Australasian Computer Science Conference (ACSC'97), Feb. 1997, - Aust. Computer Science Communications, Vol. 19, No. 1 (ed. M. Patel), (1997), 122-131.

  268. Hardjono T and Seberry J. Secure Access to Electronic Strongboxes in Electronic Commerce Proc. of 2nd International Small Systems Security Conference (IFIP WG 11.2), Copenhagen, Denmark, May 1997, pp. 1-13.

  269. Peddada S V M Raju, Seberry J and Chaudhry G R, Near Critical Sets in Latin Squares with Maximum Numbers of Subsquares, International Conference on Combinatorics, Information Theory and Statistics , University of Southern Maine, Portland, Maine, USA, July 18-20, 1997.

    1998

    Return to Year Index.

  270. Seberry J, Charnes C, Pieprzyk J and Safavi-Naini R, Crypto and Applications I, in The CRC Handbook of Algorithms and Theory of Computation, ed Mikhail J Atallah, CRC Press, Boca Raton, Fla, 1999, 40.1--40.30.

  271. Seberry J, Charnes C, Pieprzyk J and Safavi-Naini R, Crypto and Applications II, in The CRC Handbook of Algorithms and Theory of Computation, ed Mikhail J Atallah, CRC Press, Boca Raton, Fla, 1999, 41.1--41.30.

  272. Arasu K T and Seberry J, On circulant weighing matrices, Australas. Journal of Combinatorics, 17, (1998), 21-37.

  273. Chaudhry G and Seberry, Jennifer On the (10,5,$\lambda$)-family of Bhaskar Rao designs, Bull. Inst. Comb. and Its Applications, 23, (1998), 83-87.

  274. Ghulam Chaudhry, Hossein Ghodosi and Jennifer Seberry, Perfect secret sharing schemes from Room squares, JCMCC, 28, (1998), 55-61.

  275. Gysin M and Seberry J, On new families of supplementary difference sets over rings with short orbits, JCMCC, 28, (1998), 161-186.

  276. Marc Gysin and Jennifer Seberry, An experimental search and new combinatorial designs via a generalisation of cyclotomy, JCMCC, 27, (1998), 143-160.

  277. Koukouvinos C, Mitrouli M and Seberry J, Some necessary and sufficient conditions for two variable orthogonal designs in order 44, JCMCC, 28, (1998), 267-287.

  278. Jennifer Seberry, On Bose's method of mixed differences and Bhaskar Rao designs, J. Statist. Plan. and Inf., 73, (1998), 215-224. Presented at R. C. Bose Memorial Conference on Statistical Design and Related Combinatorics, Colorado Springs, 7-11 June, 1995.

  279. Dinesh Sarvate and Jennifer Seberry, Group divisible designs, GBRDSDS and generalized weighing matrices, Utilitas Math., 54, (1998), 157-174.

  280. Jennifer Seberry, Infinite families of generalized Bhaskar Rao designs, Special Issue of JCISS in honor of Professor J.N. Srivastava, Journal of Combinatorics, Information and Statistics, 23, Nos 1-4, (1998), 455-464.

  281. Horton J and Seberry J, "Covert distributed computing using Java through Web spoofing"; is © Springer-Verlag. Information Security and Privacy, ACISP '98., Lecture Notes in Computer Science, Vol 1438, (1998), 48-57. Please see the Springer-Verlag LNCS series Homepage for more information.

  282. Burmester M, Desmedt Y and Seberry J, "Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically)" is © Springer-Verlag. eds K. Ohta and D. Pei, ASIACRYPT '98., LNCS, Vol, 1514, (1998), 380--391. Please see the Springer-Verlag LNCS series Homepage for more information.

  283. C. Koukouvinos, M. Mitrouli and Jennifer Seberry, Numerical algorithms for the computation of the Smith normal form of integral matrices, Congressus Num,, 133 (1998), 127-162.

    1999

    Return to Year Index.

  284. Pieprzyk J, Safavi-Naini R, and Seberry J (Eds), Advances in Cryptology ACISP'99, Vol 1587, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 1999. " is © Springer-Verlag. Please see the Springer-Verlag LNCS series Homepage for more information. ISSN 0302-9743, ISBN 3-540-65756-8

  285. Jennifer Seberry and Dinesh Sarvate, On $F$-squares and their critical sets, Australasian J Combin., 19, (1999), 209-230. ISSN1034-4942.

  286. L F Fitina, Jennifer Seberry and Ghulam R Chaudhry, Back circulant Latin squares and the influence of a set, Australasian J Combin., 20, (1999), 163-180. ISSN1034-4942.

  287. Christos Koukouvinos and Jennifer Seberry, New weighing matrices constructed using two sequences with zero autocorrelation function - a review, J. Stat. Planning and Inf., 81 (1999), 153-182. ISSN 0378-3758/99.

  288. Jeffrey Horton and Jennifer Seberry, When the necessary conditions are not sufficient: sequences with zero autocorrelation function, Bull ICA,, 27, (1999), 51-61. ISSN 1183-1278.

  289. Jeffrey Horton and Jennifer Seberry, Companion viruses and the Macintosh: threats and countermeasures, is © Springer-Verlag. Information Security and Privacy, ACISP '99., ACISP99, Lecture Notes In Computer Science, Vol 1587, Springer-Verlag, Berlin-Heidelberg-New York, 1999, 202-212. Please see the Springer-Verlag LNCS series Homepage for more information. ISSN 0302-9743, ISBN 3-540-65756-8.

  290. Marc Gysin and Jennifer Seberry, Generalised cycling attacks on RSA and strong RSA primes, Information Security and Privacy, ACISP '99., ACISP99, Lecture Notes In Computer Science, Vol 1587, Springer-Verlag, Berlin-Heidelberg-New York, 1999, 149-163. is © Springer-Verlag. Please see the Springer-Verlag LNCS series Homepage for more information. ISSN 0302-9743, ISBN 3-540-65756-8

  291. Chengxin Qu, Jennifer Seberry and Josef Pieprzyk, On the symmetric property of homogeneous boolean functions, Information Security and Privacy, ACISP '99., ACISP, Lecture Notes In Computer Science, Vol 1587, Springer-Verlag, Berlin-Heidelberg-New York, 1999, 26-35. is Springer-Verlag. Please see the Springer-Verlag LNCS series Homepage for more information. ISSN 0302-9743, ISBN 3-540-65756-8

    2000

    Return to Year Index.

  292. Josef Pieprzyk, Eiji Okamoto and Jennifer Seberry, (Eds), Information Security, ISW'2000, Lecture Notes in Computer Science, Vol. 1975, Springer-Verlag, Berlin, 2000. is © Springer-Verlag. Please see the Springer-Verlag LNCS series Homepage for more information. ISSN 0302 9743 ISBN 3 540 41416 9

  293. C. Koukouvinos, M. Mitrouli and Jennifer Seberry, Growth in Gaussian elimination for weighing matrices $W(n,n-1)$, Linear and Multilinear Algebra, 306 (2000), 189-202.

  294. Ghulam Chaudhry and Jennifer Seberry, On the influence of entries in critical sets of Room squares, Bull ICA, 28 (2000), 67-74. ISSN 1183-1278.

  295. C. Koukouvinos and Jennifer Seberry,New orthogonal designs and sequences with two and three variables in order 28, Ars Combinatoria, 54, (2000), 97-108. ISSN 0381 7032.

  296. C. Koukouvinos, M. Mitrouli and Jennifer Seberry, Bounds on the maximum determinant for $(1,-1)$ matrices. Bull. ICA, 29, (2000), 39-48. ISSN 1183-1278.

  297. Jennifer Seberry and Anne Penfold Street, Strongbox secured secret sharing schemes, Utilitas Mathematica, 57, (2000), 147--163. ISSN 0315 3681.

  298. Chengxin Qu, Jennifer Seberry and Josef Pieprzyk, Homogeneous bent functions, Discrete Applied Mathematics , Volume 102, Numbers 1-2, (2000) 133-139. ISSN 0166-218X.

  299. S. Georgiou, C. Koukouvinos, M. Mitrouli and Jennifer Seberry, Necessary and sufficient conditions for two variable orthogonal designs in order 44: Addendum, JCMCC,, 34 (2000), 59-64.

  300. Lakoa Fitina and Jennifer Seberry, On the spectrum of an F-square, Australas. J. Comb. 22 (2000) 81-90.

  301. Tianbing Xia, Jennifer Seberry, Josef Pieprzyk, Construction of cubic homogeneous Boolean bent functions, Australas. J. Comb. 22 (2000) 233-246.

  302. W. Susilo, R. Safavi-Naini, M. Gysin, and J. Seberry, An almost optimal fail-stop signature scheme, The Computer Journal, 43, 5, (2000), 430-437.

  303. Jarosaw Pastuszak, Dariusz Michaek, Josef Pieprzyk, Jennifer Seberry, Identification of bad signatures in batches, Workshop on Practice and Theory in Public Key Cryptosystems, PKC2000,, Melbourne, Victoria, Australia. Lecture Notes in Computer Science, Vol. 1751, H. Imai and Y. Zheng (Eds), Springer-Verlag, Berlin, 2000, pp. 28--45 " is © Springer-Verlag. Please see the Springer-Verlag LNCS series Homepage for more information. ISSN 0302 9743 ISBN 3 540 66967 1

  304. Chengxin Qu, Jennifer Seberry and Josef Pieprzyk, Relationships between boolean functions and symmetric groups, International Computer Symposium 2000, ISC2000, Chiayi, Taiwan, December 2000, 1-7.

  305. Jaroslaw Pastuszak, Dariusz Michalek, Josef Pieprzyk, Jennifer Seberry, Codes identifying bad signatures in batches, INDOCRYPT'2000, Lecture Notes in Computer Science, Vol. 1977, B. Roy and C Ding, Springer-Verlag, Berlin, 2000, 143-154. " is © Springer-Verlag. Please see the Springer-Verlag LNCS series Homepage for more information. ISSN 0302 9743 ISBN 3 540 41452 5

  306. S Georgiou, C Koukouvinos and Jennifer Seberry, On amicable sequences and orthogonal designs, 23rd Australasian Conference on Combinatorial Mathematics and Combinatorial Computing, Christchurch, NZ, 4-7 December 2000.

    2001

    Return to Year Index.

  307. Roderick J Fletcher and Jennifer Seberry, New D-optimal designs of order 110, AJC 23 (2001) 49-52.

  308. Roderick J Fletcher, Marc Gysin and Jennifer Seberry, Application of the discrete Fourier transform to the search for generalised Legendre pairs and Hadamard matrices, AJC 23 (2001) 75-86.

  309. Marc Gysin and Jennifer Seberry, On ternary complementary pairs, 197-209. AJC 23 (2001) 153-170.

  310. Marc Gysin and Jennifer Seberry, On infinite families of sequences with one and two valued autocorrelation and two valued crosscorrelation function, AJC 23 (2001) 197-209.

  311. S. Georgiou, C. Koukouvinos and Jennifer Seberry, On circulant best matrices and their applications, Linear and Multilinear Algebra, 48 (2001), 263-274.

  312. C. Koukouvinos, M. Mitrouli and Jennifer Seberry, Values of minors of $(1,-1)$ incidence matrices of SBIBDs and their application to the growth problem, Designs, Codes, Cryptography, 23 (2001), 267-281.

  313. C. Koukouvinos, M. Mitrouli and Jennifer Seberry, Values of minors of an infinite family of $D$-optimal designs and their application to the growth problem, SIAM Journal on Matrix Analysis and Applications. 23, No. 1, (2001), 1-14.

  314. C. Koukouvinos, M. Mitrouli and Jennifer Seberry, An algorithm to find formulae and values of minors for Hadamard matrices, Linear Algebra and its Applications, 330 (2001), 129-147.

  315. Christos Koukouvinos and Jennifer Seberry, Infinite families of orthogonal designs : I, Bull. ICA, 33 (2001) 35-41. ISSN 1183-1278.

  316. Christos Koukouvinos and Jennifer Seberry, Short amicable sets and Kharaghani type orthogonal designs, Bull. Austral. Math. Soc. , 64 (2001) 495-504.

  317. C. Koukouvinos, E. Lappas, M. Mitrouli and Jennifer Seberry, On the complete pivoting conjecture for Hadamard matrices of small orders, Journal of Research and Practice in Information Technology , Vol 33, (2001) 294-296.

  318. S. Georgiou, C. Koukouvinos, M. Mitrouli and Jennifer Seberry, A new algorithm for computer searches for orthogonal designs, JCMCC, 39 (2001), 49-63.

  319. M Burmester, Y Desmedt and Jennifer Seberry, Equitability in retroactive key confiscation versus proactive key escrow, PKC'2001, ed. Kwangjo Kim, Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC2001 Cheju Is, Korea, February, 2001, Vol 1992, Lecture Notes in "Computer Science, Springer-Verlag, Berlin, 2001, 277-286." is © Springer-Verlag. Please see the Springer-Verlag LNCS series Homepage for more information. ISSN ISBN

  320. Beomsik Song, Huaxiong Wang and Jennifer Seberry, A new cryptanalysis method using the distribution characteristics of substitution distance, Information Security and Cryptology-ICISC'2001, 6-7 December 2001, Seoul,Korea, 2001. "Lecture Notes in Computer Science, Vol 2288, Springer-Verlag, Berlin, 2001, 277-286" is © Springer-Verlag. Please see the Springer-Verlag LNCS series Homepage for more information. ISSN ISBN 3-540-43319-8.

    2002

    Return to Year Index.

  321. Lynn Batten and Jennifer Seberry, (Eds), Australasian Conference on Information Security and Privacy, ACISP'02, Lecture Notes in Computer Science, Vol. 2384, Springer-Verlag, Berlin, 2002. is © Springer-Verlag. Please see the Springer-Verlag LNCS series Homepage for more information. ISSN 0302-9743 ISBN 3-540-43861-0

  322. J.R.Seberry, B.J.Wysocki, and T.A.Wysocki, On a use of Golay sequences for asynchronous DS CDMA applications, in T.A.Wysocki, M.Darnell and B.Honary, Advanced Digital Signal Processing for Communication Systems, Kluwer Academic Publishers, Boston/Dordrecht/London, 2002, pp.182-196.

  323. David Soldera, Jennifer Seberry and Chengxin Qu, The analysis of the Zheng-Seberry algorithm, in Australasian Conference on Information Security and Privacy, ACISP'02, Lynn Batten and Jennifer Seberry, (Eds), Lecture Notes in Computer Science, Vol. 2384, Springer-Verlag, Berlin, 2002. 159-168. is © Springer-Verlag. Please see the Springer-Verlag LNCS series Homepage for more information.

  324. S. Georgiou, C. Koukouvinos and Jennifer Seberry, Hadamard matrices, orthogonal designs and construction algorithms, Designs 2002: Further Combinatorial and Constructive Design Theory, ed. W.D.Wallis, Kluwer Academic Publishers, Norwell, Massachusetts, 2002, 133-205.

  325. C. Koukouvinos, M. Mitrouli and Jennifer Seberry, An infinite family of Hadamard matrices with fourth last pivot $\frac{n}{2}$, Linear and Multilinear Algebra, 50, (2002), 167-173.

  326. Christos Koukouvinos and Jennifer Seberry, Orthogonal designs constructed from circulant weighing matrices, International Journal of Applied Mathematics, 8 (2002), 255-265.

  327. S. Georgiou, Christos Koukouvinos and Jennifer Seberry, Short amicable sets, International Journal of Applied Mathematics, 9 (2002), 161-187.

  328. Jeffrey Horton, Christos Koukouvinos and Jennifer Seberry, A search for Hadamard matrices constructed from Williamson matrices, Bull. ICA, 35, (2002), 75-88. ISSN 1183-1278.

  329. S. Georgiou, C. Koukouvinos, M. Mitrouli and Jennifer Seberry, Necessary and sufficient conditions for three and four variable orthogonal designs in order 36, JSPI, 106 (2002), 329-352.

  330. Ghulam R Chaudhry, Malcolm Greig and Jennifer Seberry, On the ($v,5, \lambda$)-family of Bhaskar Rao designs, JSPI, 106 (2002), 303-327.

  331. S. Georgiou, C. Koukouvinos and Jennifer Seberry, On full orthogonal designs in order 56, Ars Combin. 65 (2002), 79-89.

  332. L. F. Fitina and Jennifer Seberry On the spectrum of F-squares , AJC. 22 (2002), 81-89.

  333. J. Seberry, B.J.Wysocki and T.A.Wysocki, Golay sequences for DS CDMA Applications, DSPCS'02, (Sixth International Symposium on DSP for Communications Systems), Manly, 28-31 January, 2002, TITR, Wollongong, 103-108. ISBN 0 86418 791 2

  334. J. Seberry, B.J.Wysocki and T.A.Wysocki, Some Good Orthogonal Bipolar Spreading Sequences of Lengths 12 and 20, RADIOELEKTRONIKA 2002, 12th International Scientific Conference, May 14 to 16, 2002, Bratislava, Slovak Republic, RADIOELEKTRONIKA 2002 Electronic Conference Preceedings, Department of Radio and Electronics, FEI SUT Bratislava, ISBN 80 227 1700 2

    2003

    Return to Year Index.

  335. J. Pieprzyk, T. Hardjono and J. Seberry, Fundamentals of Computer Security, Springer-Verlag, Berlin, 2003. Please see the Springer Computer Security and Cryptology Books homepage for more information ISBN 3-540-43101-2

  336. Rei Safavi-Naini and Jennifer Seberry, (Eds), Australasian Conference on Information Security and Privacy, ACISP'03, Lecture Notes in Computer Science, Vol. 2727, Springer-Verlag, Berlin, 2003. is © Springer-Verlag. Please see the Springer-Verlag LNCS series Homepage for more information. ISSN 0302-9743 ISBN 3-540-40515-1

  337. Beomsik Song and Jennifer Seberry, Further observations on the structure of the AES algorithm, FSE, Lecture Notes in Computer Science, ed Thomas Johansson, Vol. , Springer-Verlag, Berlin, 2003, p223-233. is © Springer-Verlag. Please see the Springer-Verlag LNCS series Homepage for more information. ISSN 0302-9743 ISBN 3-540-20449-0.

  338. J. Wu, T. Xia and J. Seberry, Construction of Highly non-linear cubic homogeneous Boolean functions on GF(2)^{2n+1}, Proceedings of the International Conference on Security and Management (SAM'03), Vol. I (2003), pp. 241-247.

  339. Xiang Li and Jennifer Seberry, Forensic Computing, INDOCRYPT'03, Lecture Notes in Computer Science, Vol. 2904, Springer-Verlag, Berlin, 2003, pp 18-35. is © Springer-Verlag. Please see the Springer-Verlag LNCS series Homepage for more information.

  340. C. Koukouvinos, M. Mitrouli and Jennifer Seberry, Values of minors of an infinite family of $D$-optimal designs and their application to the growth problem: II, SIAM Journal on Matrix Analysis and Applications. 24 (2003), 715-727.

  341. Tianbing Xia, Mingyuan Xia and Jennifer Seberry, Regular Hadamard matrix, maximum excess and SBIBD, AJC, 27(2003), 263-275.

  342. H. Evangelaras, C. Koukouvinos and Jennifer Seberry, Applications of Hadamard matrices Journal of Telecommunications and Information Technology, 2 (2003), 2-10.

  343. Chris Charnes and Jennifer Seberry, Weighing matrices and self-orthogonal quaternary codes, JCMCC, 44 (2003) 85-95.

  344. S. Georgiou, C. Koukouvinos and Jennifer Seberry, On full orthogonal designs in order 72, JCMCC, 44 (2003), 11-21.

  345. Christos Koukouvinos and Jennifer Seberry, Orthogonal designs of Kharaghani type: I, Ars Combinatoria., 67 (2003), 89-96.

  346. S. Georgiou, C. Koukouvinos and Jennifer Seberry, Some results on Kharaghani type orthogonal designs, Utilitas Mathematica, 63 (2003), 43-52.

  347. C. Koukouvinos, E. Lappas, M. Mitrouli and Jennifer Seberry, An algorithm to find formulae and values of minors for Hadamard matrices: II Linear Algebra and Applications, 371 (2003), 111-124.

  348. Jennifer Seberry, T. Xia, C. Koukouvinos and M. Mitrouli, The maximal determinant and subdeterminants of $\pm 1$ matrices, LAA, 373 (2003), 297-310.

  349. S. Georgiou, C. Koukouvinos and Jennifer Seberry, Some results on self-orthogonal and self-dual codes, Ars Combinatoria , 68 (2003), 97-104.

  350. Jennifer Seberry, Beata J. Wysocki and Tadeusz A. Wysocki Williamson-Hadamard Spreading Sequences for DS-CDMA Applications, Special Issue on "Coding and Its Applications in CDMA Wireless Systems", Journal of Wireless Communications and Mobile Computing. 3 (2003), 597-607.

  351. Gennian Ge, Malcolm Greig and Jennifer Seberry, Generalized Bhaskar Rao designs with block size 4 signed over elementary abelian groups, JCMCC, 46 (2003), 3-45.

  352. R. SahaRay and J. Seberry, Critical sets in orthogonal arrays, Electronic Notes in Discrete Mathematics, 15 (2003).

  353. Y. Wang, J. Seberry, R. Safavi-Naini and R. Fuji-Hara, A note on the exposure property of SBIBD, Electronic Notes in Discrete Mathematics, 15 (2003).

  354. Y. Wang, J.Seberry, B.J.Wysocki, T.A.Wysocki, W.Susilo, T.Xia, Y.Zhao, and L.C.Tran, Combinatorial constructions of 3-Secure and 4-secure codes,, DSPCS'03/WITSP'03, Coolangatta, Gold Coast, 8-11 December 2003, pp. 549-552

  355. Jianyong Huang, Jennifer Seberry and Willy Susilo, Secure Computations on Handheld devices with the help of an untrusted server, 7th World Multiconference on Systemics, Cybernetics and Informatics (SCI 2003) eds. N. Callaos, M. Morgenstern, J Zhang, O Castillo, E E Doberkat, Conference held Orlando, USA, July 27-30, 2003, International Institute of Informatics and Systemics, pp507-512. ISBN 980-6560-01-9.

  356. Jianyong Huang, Jennifer Seberry and Willy Susilo, Design and implementation of personal firewalls for handheld devices,, 7th World Multiconference on Systemics, Cybernetics and Informatics (SCI 2003) eds. N. Callaos, M. Morgenstern, J Zhang, O Castillo, E E Doberkat, Conference held Orlando, USA, July 27-30, 2003, International Institute of Informatics and Systemics, pp 458-463. ISBN 980-6560-01-9.

  357. Jianyong Huang, Jennifer Seberry and Willy Susilo, On using fast exponentiation algorithm in PDA (or: How secure is the discrete logarithm problem on PDA?), The 2003 International Conference on Security and management (SAM'03), 2003 eds. H R Arabnia, Youngsong Mun, Selim Aissi, Conference held Las Vegas, USA, June 23-26, 2003, CSREA Press, pp 668-674. ISBN 1-932415-18-1.

  358. R Ang, J Seberry, B J Wysocki, T A Wysocki, Application of nega-cyclic matrices to generate spreading sequences, ISCTA'2003, Ambleside, UK, July 2003.

  359. Yibing Kong, Janusz R Getta, Ping Yu and Jennifer Seberry, Privacy control for personal information databases, In Proceedings of the 7th National Science and Engineering Conference, Held in Chonburi, Thailand, 2003, 97-102.

    2004

    Return to Year Index.

  360. J. Seberry, L. C. Tran, Y. Wang, B. J. Wysocki, T. A. Wysocki, T. Xia and Y. Zhao, New complex orthogonal space-time block codes of order eight, in T. A. Wysocki, B. Honary, and B. J. Wysocki (Eds.): Signal Processing for Telecommunications and Multimedia, Series : Multimedia Systems and Applications , vol. 27, pp.173-182, Springer, New York, 2004. is © Springer-Verlag. Please see the Springer-Verlag LNCS series Homepage for more information.

  361. Christos Koukouvinos and Jennifer Seberry, Orthogonal designs of Kharaghani type; II, Ars Combinatoria, 72, (2004) 23-32.

  362. Chung Le Tran, Jennifer Seberry, Yejing Wang, Beata J Wysocki, Tad A Wysocki, Tianbing Xia and Ying Zhao, Two new complex orthogonal space-time block codes for 8 transmit antennas, Electronics Letters, 55, (2004) 55-56.

  363. S. Georgiou, C. Koukouvinos and Jennifer Seberry, Generalized orthogonal designs, Ars Combinatoria, 71 (2004) 33-48.

  364. Tianbing Xia, Jennifer Seberry, Josef Pieprzyk, Chris Charnes, Homogeneous bent functions of degree $n$ in $2n$ variables do not exist for $n > 3$, Discrete Applied Mathematics, 142 (2004) 127-132.

  365. Greg Gamble, Barbara M Maenhaut, Jennifer Seberry, and Anne Penfold Street, Further results on stongbox secured secret sharing schemes, Util. Math. , 66 (2004) 187-215.

  366. Ken Finlayson and Jennifer Seberry, Orthogonal designs from negacyclic matrices, AJC, 30 (2004) 319-330.

  367. Roderick J Fletcher, Christos Koukouvinos and Jennifer Seberry, New skew-Hadamard matrices of order $4\cdot 59$ and new $D$-optimal designs of order $2\cdot 59$, Discrete Math, 286 (2004) 251-253.

  368. Jennifer Seberry, Chung Le Tran, Yejing Wang, Beata J Wysocki, Tadeusz A Wysocki and Ying Zhao, Orthogonal spreading sequences constructed using Hall's difference set, Proc. Symposium on Trends in Communications (SympoTIC'04), including the Joint IST Workshop on Mobile Future and Central Europe and Japan Joint Workshop on Sequence Design and its Application Wireless Network (ISBN 0-7803-8556-X), pp. 82--85, Oct. 2004.

  369. L. C. Tran, T. A. Wysocki, J. Seberry and A. Mertins, On Multi-modulation Schemes to Increase the Rate of Space-Time Block Codes, Proc. 12th European Signal Processing Conference EUSIPCO 2004, ISBN No. 3-200-00165-8, vol. 3, pp. 1841-1844, Sept. 2004.

  370. L. C. Tran, T. A. Wysocki, J. Seberry and A. Mertins, The Effect of Imperfect Carrier Recovery on the Performance of the Diversity Antenna Selection Technique in Wireless Channels Utilizing DSTM, Proc. Int. Conf. Infor. Technol.: Research and Education ITRE 2004, vol. 1, pp. 15-18, 28 June - 1 July 2004.

  371. L. C. Tran, T. A. Wysocki, J. Seberry and A. Mertins, Multi-modulation Schemes to Increase the Rate of Space-Time Block Codes in Rayleigh Fading Channels, Proc. Int. Conf. Infor. Technol.: Research and Education ITRE 2004, vol. 1, pp. 19-23, 28 June - 1 July 2004.

  372. Chung Le Tran, Jennifer Seberry, Beata J Wysocki, Tad A Wysocki, Tianbing Xia, Yejing Wang and Ying Zhao, Complex orthogonal sequences from amicable Hadamard matrices, IEEE VTC'2004-Spring, Milan, Italy, May 2004. CDROM. also Proc. IEEE Veh. Technol. Conf. VTC2004-Spring, vol. 1, pp. 1490--1493, May 2004.

  373. Jianyong Huang, Willy Susilo and Jennifer Seberry, Observations on the Message Integrity Code in IEEE802.11 Wireless LANs The 3rd Workshop on the Internet, Telecommunications and Signal Processing (WITSP'04), Adelaide, Australia, 20-22 December 2004, CD-ROM, pp. 328 - 332, 2004.

  374. Yibing Kong, Jennifer Seberry, Janusz R Getta and Ping Yu, Using hierarchical encryption to protect database privacy, In Proceedings of the 15th Australasian Workshop on Combinatorial Algorithms, Balina, Austalia, 2004, 260-269.

  375. Yibing Kong, Jennifer Seberry, Janusz R Getta and Ping Yu, A generalized policy support system and its hierarcy semantics, In Proceedings of the 2nd International Workshop on Security in Information Systems, held in Porto, Portugal, INSTICC Press, 2004, 136-145.

    2005

    Return to Year Index.

  376. C Kravvartis, M Mitrouli and Jennifer Seberry, Counting techniques specifying the existence of submatrices of weighing matrices, in Computer Algebra in Scientific Computing, Lecture Notes in Computer Science 3718, Springer Verlag, Berlin, 2005, pp294-3305. is © Springer-Verlag. Please see the Springer-Verlag LNCS series Homepage for more information.

  377. C Kravvartis, M Mitrouli and Jennifer Seberry On the growth problem for skew and symmetric conference matrices, Linear Algebra and its Applications, 403 (2005), 183-206.

  378. C. Koukouvinos, M. Mitrouli and Jennifer Seberry, Values of minors of some infinite families of matrices constructed from supplementary difference sets and their application to the growth problem, Linear Algebra and its Applications,, 406 (2005), 218-234.

  379. Jennifer Seberry, Sarah A Spence and Tadeusz A Wysocki, A construction technique for generalized complex orthogonal designs and applications to wireless communications, Linear Alg. and Applic., 405 (2005), 163-176.

  380. W.H.Holtzmann, H. Kharaghani, Jennifer Seberry and B. Tayfeh-Rezaie, On orthogonal designs in order 48, JSPI, 128 (2005), 311-325.

  381. Mingyuan Xia, Tianbing Xia and Jennifer Seberry, An infinite family of Goethals-Seidel arrays, Discrete Applied Mathematics, 145 (2005), 498-504.

  382. Mingyuan Xia, Tianbing Xia and Jennifer Seberry, A new method for constructing Williamson matrices, Designs, Codes and Cryptography, 35 (2005), 191-209.

  383. Yejing Wang, Jennifer Seberry, Beata J. Wysocki, Tadeusz A. Wysocki, Le Chung Tran, Ying Zhao An exposure property of block designs, AJC, 33 (2005), 147-156.

  384. Rita SahaRay, Avishek Adhikari and Jennifer Seberry, Critical sets in orthogonal arrays with 7 and 9 levels, Australas. J. Combin., 33 (2005), 109-123.

  385. Rita SahaRay, Avishek Adhikari and Jennifer Seberry, Critical sets for a pair of mutually orthogonal latin squares of odd order greater than 9, JCMCC 55 (2005), 171-185.

  386. Tianbing Xia, Mingyuan Xia, Jennifer Seberry, Guoxin Zuo, A new method for constructing $T$-matrices, AJC, 32 (2005), 61-78.

  387. Jennifer Seberry, Beata J Wysocki and Tadeusz A Wysocki, Some applications of Hadamard matrices, Metrika, 62 (2005), 221-239.

  388. Le Tran Chung, Tadeusz A Wysocki, Alfred Mertins and Jennifer Seberry, A generalized algorithm for the generation of correlated Rayleigh fading envelopes in radio channels, EURASIP J on Wireless Communications and Networking, 5 (2005), 801-815.

  389. Eli Biham and Jennifer Seberry, PY (Roo): A new fast stream cipher using rolling arrays, EUROCRYPT'05 Rump Session, Aarhus, Denmark, 24th May 2005.

  390. Eli Biham, Jianyong Huang, Jennifer Seberry and Willy Susilo, Key testing attacks on MAC functions, EUROCRYPT'05 Rump Session, Aarhus, Denmark, 24th May 2005.

  391. Eli Biham and Jennifer Seberry, PY (Roo): A fast and secure stream cipher using rolling arrays, SKEW 2005 (Symmetric Key Encryption Workshop), Aarhus, Denmark, 26-27 May 2005.

  392. Ken Finlayson, Jennifer Seberry, Tadeusz Wysocki and Tianbing Xia, Orthogonal designs with quaternion elements, ISCTA'05, Proceedings of 8th International Symposium on Communication Theory and Applications, Ambleside, UK, 17-22 July 2005, HW Communications, (2005), 270-272. ISBN 0-85316-2441.

  393. Jing Wu, Jennifer Seberry, Yi Mu, Chun Ruan, Delegatable access control for fine-grained XML, Proceedings of 11th International Conference on Parallel and Diistributed Systems Workshops, Fukuoka, Japan, July 20-22, 2005, IEEE Commputer Soc, Washington, (2005), 270-274. ISBN 0-7695-2281-5, ISSN 1521-9097.

  394. Jing Wu, Yi Mu, Jennifer Seberry, and Chun Ruan, Access policy sheet for access control for fine-grained XML, In The First IFIP Workshop on Trusted and Autonomic Ubiquitous and Embedded Systems (TAUES 2005), Nagasaki, Japan, 6-9 December 2005, Lecture Notes in Computer Science 3813, Springer Verlag, pp1273-1282. is © Springer-Verlag. Please see the Springer-Verlag LNCS series Homepage for more information.

  395. Chung Le Tran, Tadeusz A Wysocki, Jennifer Seberry, Alfred Mertins, and Sarah A Spence, Generalized Williamson and Wallis-Whiteman Constructions for Improved Square Order-8 CO STBCs, 16th International Symposium on Personal Indoor and Mobile Radio Communications, IEEE PIMRC 2005, Berlin, Germany, September 11-15, 2005

  396. Le Tran Chung, Tadeusz A Wysocki, Alfred Mertins and Jennifer Seberry, A generalized algorithm for the generation of correlated Rayleigh fading envelopes in radio channels, IEEE Workshop on Algorithms for Wireless, Mobile, Ad Hoc and Sensor Networks, WMAN 05, Colorado, USA, 4-8 Apr. 2005.

  397. Le Tran Chung, Tadeusz A Wysocki, Alfred Mertins and Jennifer Seberry, A generalized algorithm for the generation of correlated Rayleigh fading envelopes, IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (IEEE WOWMOM), June 13-16, 2005, Taormina, Italy

  398. Yibing Kong, Jennifer Seberry, Janusz R. Getta and Ping Yu, A cryptographic solution for general access control, In Proceedings of the 8th Information Security Conference (ISC 2005), Singapore, September 20-23, 2005, Lecture Notes in Computer Science 3650 Springer 2005, 461-473. ISBN 3-540-29001-X is © Springer-Verlag. Please see the Springer-Verlag LNCS series Homepage for more information.

  399. Yibing Kong, Jennifer Seberry, Janusz R. Getta and Ping Yu, Using digital tickets to protect personal privacy, In Proceedings of the First International Conference on Global Security, ICG Press, London, UK, 2005, 71-78.

  400. Jianyong Huang, Jennifer Seberry, Willy Susilo and Martin Bunder, Security Analysis of Michael: the IEEE 802.11i message integrity code, The Second International Symposium on Ubiquitous Intelligence and Smart Worlds (UISW2005) Lecture Notes in Computer Science 3823, Springer-Verlag, pp. 423-432, 2005. ISBN 3-540-30803-2.

    2006

    Return to Year Index.

  401. Le Tran Chung, Tadeusz A Wysocki, Alfred Mertins and Jennifer Seberry, Complex Orthogonal Space-Time Processing in Wireless Communications Springer-Verlag, Norwell, USA, 2006. ISBN 0387292918, 978 0387292915, EISBN 0387295445.

  402. Ilias S Kotsireas, Christos Koukouvinos and Jennifer Seberry, Hadamard ideals and Hadamard matrices with two circulant cores, European J Comin., 27, 5 (2006) 658-668.

  403. Ilias S Kotsireas, Christos Koukouvinos and Jennifer Seberry, Hadamard ideals and Hadamard matrices with circulant core, JCMCC, 57 (2006) 47-63.

  404. Tianbing Xia, Jennifer Seberry and Mingyuan Xia, New construction of regular Hadamard matrices, WSEAS Trans Math,, 5, (2006) 1068-1073.

  405. Tianbing Xia, Mingyuan Xia, Jennifer Seberry and Jing Wu, Hadamard matrices constructed from circulant and negacyclic matrices, AJC,, 34 (2006) 105-116. Copyright Australasian Journal of Combinatorics, http://ajc.math.auckland.ac.nz.

  406. Ying Zhao, Yejing Wang and Jennifer Seberry, On amicable orthogonal designs of order 8, AJC, 34 (2006) 321-329. Copyright Australasian Journal of Combinatorics, http://ajc.math.auckland.ac.nz.

  407. Ying Zhao, Jennifer Seberry, Tianbing Xia, Yejing Wang, Beata J Wysocki, Tadeusz A Wysocki and Le Chung Tran, On amicable orthogonal designs of order 8 for complex space-time block codes, AJC, 34 (2006) 137-144. Copyright Australasian Journal of Combinatorics, http://ajc.math.auckland.ac.nz.

  408. Russell Ang, Jennifer Seberry and Tadeusz Wysocki, Inequivalence of nega-cyclic $\pm 1$ matrices, JCMCC 56 (2006), 17-32.

  409. Ken Finlayson, Moon-ho Lee, Jennifer Seberry and Mieko Yamada, Jacket matrices constructed from Hadamard matrices and generalized Hadamard, AJC, 35 (2006) 83-87. Copyright Australasian Journal of Combinatorics, http://ajc.math.auckland.ac.nz.

  410. Suwanna Yamsiri, Jennifer Seberry and Willy Susilo, A study and testbed for the Australian Standard AS7799 compliance and management, Journal of Information Assurance and Security (JIAS), 1 (2006) 1-9.

  411. Le Tran Chung, Tadeusz A Wysocki, Alfred Mertins and Jennifer Seberry, Transmitter diversity antenna selection techniques for wireless channels utilizing differential space-time block codes, Journal on Telecommunications and Information Technology 2 (2006) 79-96.

  412. Jing Wu, Jennifer Seberry and Yi Mu, Temporal authorizations scheme for XML document, WSEAS Conf on Data Networks and Computers,, Bucharest, Romania, 16-17 Oct, (2006) 150-155. ISSN: 0302-9743, Springer, Berlin/Heidelberg.

  413. Lakoa Fitina, Kenneth G Russell and Jennifer Seberry, A Minimal Critical Set of a Class of Youden Squares, Utilitas Mathematica, 69 (2006), 103-108.

  414. Dibendyu Chakrabarti and Jennifer Seberry, Combinatorial structures for design of wireless sensor networks, ACNS06,, Singapore, 6-9 June, 2006. Lecture Notes in Computer Science 3989, Springer Verlag, pp 365-374. " is © Springer-Verlag. Please see the Springer-Verlag LNCS series Homepage for more information. ISSN 0302-9743,ISBN-10 3-540-34703-8, ISBN-13 978-3-540-34703-3.

  415. Mary Barrett, Karin Garrety and Jennifer Seberry, ICT professionals' perceptions of responsibility for breaches of computer security, ANZAM'06, Aust and NZ Academy of Management, Yeppoon, Qld, June 2006.

  416. Jianyong Huang, Jennifer Seberry and Willy Susilo, On the Internal Structure of ALPHA-MAC, Vietcrypt'06, (2006):271-285.

  417. Beata J. Wysocki, Tadeusz A. Wysocki and Jennifer Seberry, Modeling dual polarization wireless fading channels using quaternions, Mobile Future, 2006 and the Symposium on Trends in Communications. SympoTIC '06. Joint IST Workshop. 24-27 June 2006, p68-71. ISBN: 1-4244-0368-5

  418. Ying Zhao, Jennifer Seberry, Beata J. Wysocki, Tadeusz A. Wysocki, Complex orthogonal spreading sequences using mutually orthogonal complementary sets, International Conference on Microwaves, Radar & Wireless Communications, 2006. MIKON 22-24 May 2006, Krakow, 622 - 625. ISBN: 978-83-906662-8-0

  419. Jennifer Seberry, PY: A secure cryptographic stream ciphers, ICE-EM RNSA 2006 WORKSHOP: Recent Advances in Stream Ciphers and Hash Functions, Brisbane, Qld, June 28-30, 2006.

    2007

    Return to Year Index.

  420. Tianbing Xia, Mingyuan Xia and Jennifer Seberry, Some new results of regular Hadamard matrices and SBIBD II, AJC, 37 (2007) 117-125.

  421. Gennian Ge, Malcolm Greig, Jennifer Seberry and Ralph Seberry, Generalized Bhaskar Rao designs with block size 3 over finite abelian groups, Graphs and Combinatorics, 23 (2007) 271-290.

  422. Jing Wu, Jennifer Seberry and Yi Mu, Temporal authorization scheme for XML document,WSEAS Trans on Computers, 6 (2007) 262-267. ISSN: 1109-2750

  423. Lakoa Fitina, Kenneth Russell and Jennifer Seberry, The power and influence in some Youden squares and secret sharing, Utilitas Math. 73 (2007), 143-157.

  424. Sarah Spence Adams, Jennifer Seberry, Nathaniel Karst, Jonathon Pollack and Tadeusz A. Wysocki, Quaternion orthogonal designs from complex companion designs, LAA, (accepted 5 Sep 2007, published online 5 Nov 2007.)

  425. Christos Kravvaritis, Marilena Mitrouli and Jennifer Seberry, On the pivot structure for the weighiing matrix $W(12,11)$, J. Linear and Multilinear Algebra, 55 (2007) 471-490.

  426. Wei Wu, Yi Mu, Willy Susilo, Jennifer Seberry and Xinyi Huang, Identity-based Proxy Signature from Pairings, ATC, 2007:22-31.

  427. Sarah Spence Adams, Jennifer Seberry, Hamid Sharif, Beata J Wysocki and Tadeusz A Wysocki, A simple orthogonal space-time-polarization block code, IEEE VTC2007-Fall in Baltimore, (2007) 754-757.

  428. Wysocki, T., Wysocki, B. & Seberry, J. R. (2007). Space-Time-Polarization Block Codes from Quaternionic Orthogonal Designs. 9th International Symposium on Communications Theory and Applications UK: ISCTA'07.

    2008

    Return to Year Index.

  429. Yi Mu, Willy Susilo and Jennifer Seberry, eds Information Security and Privacy, Lecture Notes in Computer Science 5107, Springer Verlag, Berlin, 2008. " is &co]py; Springer-Verlag. Please see the Springer-Verlag LNCS series Homepage for more information. ISSN 0302-9743, ISBN 3-540-69971-6, ISBN 978-3-540-69971-2

  430. Sarah Spence Adams, Jennifer Seberry, Nathaniel Karst, Jonathon Pollack and Tadeusz A. Wysocki, Quaternion orthogonal designs from complex companion designs, LAA, 428 (2008), 1056-1071.

  431. Ilias S Kotsireas, Christos Koukouvinos and Jennifer Seberry, New orthogonal designs from weighing matrices, Aust J Comb, 40 (2008) 99-104. Copyright Australasian Journal of Combinatorics, http://ajc.math.auckland.ac.nz.

  432. Jennifer Seberry, Ken Finlayson, Sarah Spence Adams, Beata Wysocki, Tadeusz Wysocki and Tianbing Xia, The theory of quaternion orthogonal designs, IEEE Transactions on Signal Processing, 56 1 (2008), 256-265.

  433. Jianyong Huang, Willy Susilo and Jennifer Seberry, A five-round algebraic property of the Advanced Encryption Standard, In Tzong-Chen Wu, Chin-Laung Lei, Vincent Rijimen and Der-Tsai Lee (eds), Information Security Conference, 2008 (ISC 2008), Taipeh, Taiwan, September 15-18, 2008. Lecture Notes in Computer Science, Springer-Verlag, Berlin/Heidelberg, Volume 5222, 2008, p 316-330. ISBN 78-3-540-85884-3, ISSN 0302-9743 (Print) 1611-3349 (Online).

    2009

    Return to Year Index.

  434. Ying Zhao, Jennifer Seberry, Tianbing Xia, Beata J. Wysocki, Tadeusz A. Wysocki, Constructions of amicable orthogonal designs of order 8, Australasian Journal of Combinatorics, 44 (2009), 19-35.

  435. Jianyong Huang, Jennifer Seberry and Willy Susilo, A five-round algebraic property of AES and its application to the ALPHA-MAC, Int. J. Applied Cryptography, Vol. 1, No. 4, (2009) 264-289.

  436. I.Kotsireas, C.Koukouvinos and J. Seberry, Weighing matrices and string sorting, Annals of Combinatorics, 13 (2009), 305-313.

  437. L. C. Tran, T. A. Wysocki, J. Seberry, A. Mertins, and S. A. Spence Novel constructions of improved square complex orthogonal designs for eight transmit antennas, IEEE Trans on Inf Theory. 55, (2009), 4439 - 4448.

  438. Sushmita Ruj, Jennifer Seberry and Bimal Roy, Key predistribution schemes using Block designs in wireless sensor networks, The Second International Workshop on Adaption in Wireless Sensor Networks (AWSN09), CSE 2 (2009) 873-878.

    2010

    Return to Year Index.

  439. J. Pieprzyk, T. Hardjono and J. Seberry, Teoria bezpieczenstwa systemow komputerowych Springer-Verlag, Berlin. ISBN 83-7361-678-0

  440. Seberry J, Charnes C, Pieprzyk J and Safavi-Naini R, CryptoTopics and Applications I, in Mikhail J. Atallah and Marina Blanton, (eds), Chapter 12 in Algorithms and Theory of Computation Handbook, Special Topics and Techniques, Second Edition, CRC Press, Boca Raton, Fla, 2010, pp 12.1 - 12.32

  441. Seberry J, Charnes C, Pieprzyk J and Safavi-Naini R, CryptoTopics and Applications II, in Mikhail J. Atallah and Marina Blanton, (eds), Chapter 13 in Algorithms and Theory of Computation Handbook, Special Topics and Techniques, Second Edition, CRC Press, Boca Raton, Fla, 2010. pp 13.1 --13.32

  442. Yi Gao, Willy Susilo, Yi Mu and Jennifer Seberry, Efficient trapdoor based client puzzle against DOS attacks, Network Security, S.Huang, D. MacCallum and D-Z. Du (eds.), 2006, 229-249..

  443. I.S.Kotsireas, C.Koukouvinos, J.Seberry and D.E.Simos, New classes of orthogonal designs constructed from complementary sequences with given spread, Australasian Journal of Combinatorics, 46 (2010), 67-78.

  444. I.S.Kotsireas, C.Koukouvinos and Jennifer Seberry, New weighing matrices of order 2n and weight 2n-9, J. Combin. Math. Combin. Comput., 72 (2010), 49-54.

  445. Jennifer Seberry and Marilena Mitrouli, Some remarks on Hadamard matrices, Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences, Published on line 7th July 2010 Cryptography and Communications, 2(2): 293-306 (2010) 293-306. Springer Science+Business Media, LLC 2010

  446. K. T. Arasu, Ilias S Kotsireas, Christos Koukouvinos and Jennifer Seberry, On circulant and two-circulant weighing matrices, Austral. J. Comb., 48 (2010), 43-51.

  447. I. S. Kotsireas, C. Koukouvinos and J.Seberry, New weighing matrices constructed from two circulant submatrices, Optimization Letters,, Vol 6, No 1 (2010), 211-217. published on line 26 November 2010, DOI 10.1007/s11590-010-0264-0

  448. Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo, and Jennifer Seberry, On the security of NOEKEON against side channel cube attacks, Proceedings of the Information Security Practice and Experience, 6th International Conference, ISPEC 2010, Jin Kwak Robert H. Deng YoojaeWon, Guilin Wang (Eds.), Seoul, Korea, May 12-13, 2010, LNCS 6047, (2010) 45-55, Springer, Berlin. ISSN 0302-9743

  449. Lei Wang, Tianbing Xia and Jennifer Seberry, Inter-domain routing validator based spoofing defence system, Proceedings of the 2010 11 IEEE International Conference on Intelligence and Security Informatics, ISI 2010, (Eds) Christopher C. Yang, Daniel Zeng, Ke Wang,Antonio Sanfilippo, Herbert H. Tsang, Min-Yuh Day, Uwe Glasser, Patricia L. Brantingham, and Hsinchun Chen, May 23-26, 2010 - Vancouver, BC, Canada, 153-155. IEEE Catalog Number: CFP10ITI-PRT, ISBN: 978-1-4244-6460-9

  450. Jianyong Huang, Willy Susilo and Jennifer Seberry, Differential fault analysis of LEX In Juan A Garay and Roberto de Prisco (eds), Proceedings of the Security and Cryptography for Networks 7th International Conference, SCN 2010, Juan A. Garay Roberto De Prisco (Eds.), Amalfi, Italy, September 13-15, 2010, LNCS 6280, (2010) 55-72, Springer-Verlag Berlin Heidelberg, ISSN 0302-9743

    2011

    Return to Year Index.

  451. Sarah Spence Adams and Jennifer Seberry, The amicable-Kronecker construction of quaternion orthogonal designs, Australasian J Combinatorics, 50 (2011), 243-258.

  452. Jennifer Seberry, Vinh Buu To and Dong Tonien, A new generic digital signature algorithm, Groups-Complexity-Cryptography, 3 (2), pp 221-237

  453. Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo, and Jennifer Seberry, Extended cubes: Enhancing the cube attack by extracting low-degree non-linear equations, Proceedings of 6th ACM Symposium on Information, Computer and Communications Security ? ASIACCS 2011 (2011), 296-305.

  454. Jianyong Huang, Willy Susilo, and Jennifer Seberry, Repeated differential properties of the AES-128 and AES-256 key schedules , In Huaimin Wang, Stephen R Tate and Yang Xiang (eds), The 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2011), Changsha, China, November 18-18, 2011

    2012

    Return to Year Index.

  455. Willy Susilo, Yi Mu and Jennifer Seberry, editors: Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012, Springer, Lecture Notes in Computer Science, vol 7372, 2012.

  456. Anna Karapiperi, Marilena Mitrouli, Michael G Neubauer and Jennifer Seberry, An eigenvalue approach to evaluating minors for weighing matrices W(n,n-1) with zeros on the diagonal, Linear Algebra and Applications 436, 7, (2012), 2054 - 2066.

  457. I. S. Kotsireas, C. Koukouvinos, J.Seberry, New weighing matrices constructed from two circulant submatrices, Optimization Letters,, Vol 6, No 1 (2012) 211-217. published on line DOI 10.1007/s11590-010-0264-0

  458. Chun Li and Jennifer Seberry, Crystal sets, Australasian J Combinatorics, 52 (2012) 89-110.

  459. Jennifer Seberry and Dong Tonien, MOLS vs Superimposed Codes, Discrete Math and Applic (DMAA), Vol: 04 Iss: 3 (2012) pp12500. DOI:10.1142/S179383091250022X

  460. Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo and Jennifer Seberry, Fault Analysis of the KATAN Family of Block Ciphers The 8th International Conference on Information Security Practice and Experience (ISPEC 2012), Lecture Notes in Computer Science 7232, Springer-Verlag, pp. 319 - 336, 2012

    2013

    Return to Year Index.

  461. Jennifer Seberry, The Impact of Number Theory and Computer-Aided Mathematics on Solving the Hadamard Matrix Conjecture, in Borwein, Shparlinski, Zudilin, (Eds) Number Theory and Related Fields, Springer Proceedings in Mathematics & Statistics, Springer-New York, Vol 43 (2013) 313-320. doi=10.1007/978-1-4614-6642-0_16

  462. Tianbing Xia, Jennifer Seberry and Mingyuan Xia, Some new constructions for orthogonal designs, Australasian J Combinatorics, 55 (2013), pp 121-130

  463. Jennifer Seberry, Strongly amicable Hadamard matrices and amicable orthogonal designs, Australasian J Combinatorics, 55 (2013) , pp 5-13

  464. Tim Wellsmore, Yi Mu, Jennifer Seberry, Fuchun Guo, Efficient authentication and integrity protection for the border gateway protocol, International Journal of Security and Networks (IJSN), accepted 2 Oct 2013.

  465. Gene Awyzio and Jennifer Seberry, Fast operations for certain two alphabet circulant matrices, July, 2013, Las Vegas.

  466. Jennifer Seberry, , New families of amicable Hadamard matrices, J Statistical Theory and Practice, in memory of Jagdish N Srivastava, Volume 7, Issue 4, October 2013, pages 650-657.

  467. 2014

    Return to Year Index.

  468. Jongkil Kim, Willy Susilo, Man Ho Au and Jennifer Seberry, Efficient semi-static secure broadcast encryption scheme, LNCS,, Vol 8365, Springer Verlag, Berlin, 2014. Please see the Springer-Verlag LNCS series Homepage for more information. Is to be published in: Pairing 2013 Proceedings, LNCS 8365 , Springer, ISBN 978-3-319-04872-7, Due: February 14, 2014

    2015

    Return to Year Index.

    2016

    Return to Year Index.

    2017

  469. Jennifer Seberry and N. A. Balonin, Two infinite families of symmetric Hadamard matrices, Australasian J Comb. to the unforgettable Mirka Miller, Return to Year Index.

    2014

    Return to Year Index.

  470. Jongkil Kim, Willy Susilo, Man Ho Au and Jennifer Seberry, Efficient semi-static secure broadcast encryption scheme, LNCS, Vol 2738, Springer Verlag, Berlin, 2014. Please see the Springer-Verlag LNCS series Homepage for more information. ISSN 0302, ISBN 3-540, ISBN 978-3-540

  471. N. A. Balonin and Jennifer Seberry, A review and new symmetric conference matrices. Informatsionno-upravliaiushchie sistemy, [Information and Control Systems], (71) no. 4, (2014), p2--7.

  472. N. A. Balonin and Jennifer Seberry, Remarks on extremal and maximum determinant matrices with moduli of real entries $\leq 1$. Informatsionno-upravliaiushchie sistemy, [Information and Control Systems], (71) no. 5, (2014), p2--4.

  473. N. A. Balonin and Jennifer Seberry, Two level Cretan Matrices constructed via Singer difference sets, Informatsionno-upravliaiushchie sistemy, [Information and Control Systems], (72) no. 6, (2014), pp 2--5.

  474. Jennifer Seberry, Yi Mu, Fuchun Guo and Tim Wellsmore, Efficient authentication and integrity protection for the border gateway protocol, Int. J. of Security and Networks, Vol.9, No.4, (2014) pp.234--243

    2015

    Return to Year Index.

  475. Jongkil Kim, Willy Susilo, Man Ho Au and Jennifer Seberry, Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext, IEEE Transactions on Information Forensics & Security, (10) No. 3, (2015), pp 679-693.

  476. N. A. Balonin, Jennifer Seberry, and M. B. Sergeev, Three-Level Cretan Matrices of Order 37, Informatsionno-upravliaiushchie sistemy [Information and Control Systems], No. 2 (74) 2015, pp.2-3.

  477. I. S.Kotsireas, Jennifer Seberry and Y. S. Suharini, (2015). Inner product vectors for skew-Hadamard matrices. Springer Proceedings in Mathematics and Statistics: Algebraic Design Theory and Hadamard Matrices, 2015, 171-187. Switzerland: Springer. RIS:103910

  478. Gene Awyzio and Jennifer Seberry, On good matrices and skew Hadamard matrices, Springer Proceedings in Mathematics and Statistics: Algebraic Design Theory and Hadamard Matrices, 2015, 13-28. Switzerland: Springer.

  479. N. A. Balonin, Jennifer Seberry, and M. B. Sergeev, Three Level Cretan Matrices Constructed Via Conference Matrices, Informatsionno-upravliaiushchie sistemy [Information and Control Systems], No. 2 (74) 2015, pp. 4-6.

  480. N. A. Balonin and Jennifer Seberry, Two-level Cretan Matrices constructed using SBIBD, Special Matrices, 3 (2015)...... DOI: 10.1515/spma-2015-0017. (http://www.degruyter.com/view/j/spma)

    Articles on arXiv.org

    Return to Year Index.

  481. N. A. Balonin and Jennifer Seberry, Two-level Cretan Matrices Constructed using SBIBD, arXiv:1502.01082 Comments: 16 pages, 3 figures, 1 table. arXiv admin note: text overlap with arXiv:1501.07012 Subjects: Combinatorics (math.CO)

  482. N. A. Balonin and Jennifer Seberry, Equivalence of the Existence of Hadamard Matrices and Cretan(4t-1,2)-Mersenne Matrices, arXiv:1501.07012, Comments: 9 pages, 1 Figure Subjects: Combinatorics (math.CO)

    2015

    Return to Year Index.

  483. N. A. Balonin, Jennifer Seberry, and M. B. Sergeev, Three Level Cretan Matrices Constructed Via Conference Matrices, Informatsionno-upravliaiushchie sistemy [Information and Control Systems], No. 2 (74) 2015, pp. 4-6.

  484. N. A. Balonin and Jennifer Seberry, Two-level Cretan Matrices constructed using SBIBD, Special Matrices, 3 (2015)...... DOI: 10.1515/spma-2015-0017. (http://www.degruyter.com/view/j/spma)

  485. Andrei Kelarev, Jennifer Seberry, Leanne Rylands, Xun Yi, Combinatorial algorithms and methods for security of statistical databases related to the work of Mirka Miller 20 July 2017, IWOCA 2017

  486. Mingyuan Xia, Tianbing Xia, Jennifer Seberry: Construction of T-matrices of order 6m+1, <\a> Far East Journal of Mathematical Sciences (FJMS), 101, 8 (2017) 1731-1749

    Updated 4 October 2017. j.seberry at uow.edu.au