en Jennifer Seberry Publications 1994 to 2004

1994-2004 REFEREED PUBLICATIONS

1994 PUBLICATIONS

1994 Journal Articles

  1. Claude Carlet, Jennifer Seberry and Xian-Mo Zhang Comments on "Generating and Counting Binary Bent Sequences", IEEE Trans Inf Theory 40, (1994), 600-600.

  2. W. de Launey and Jennifer Seberry, The strong Kronecker product, J. Combinatorial Theory, Ser. A, 66, (1994), 192-213.

  3. Genet M'gan Edmonson, Jennifer Seberry and Malcolm Anderson, On the existence of Turyn sequences of length less than 43 , Mathematics of Computation, 62, (1994), 351-362.

  4. Marc Gysin and Jennifer Seberry, New results with near- Yang sequences, Utilitas Math., 45, (1994), 85-89.

  5. Christos Koukouvinos, Stratis Kounias, Jennifer Seberry, C. H. Yang, Joel Yang, Multiplication of sequences with zero autocorrelation, Australas J. Combin., 10, (1994), 5-15.

  6. Christos Koukouvinos, Stratis Kounias, Jennifer Seberry, C. H. Yang, Joel Yang, On sequences with zero autocorrelations, Designs, Codes and Cryptography, 4, (1994), 327-340.

  7. Thomas Kunkle and Jennifer Seberry, A few more small defining sets for SBIBD(4t-1, 2t-1, t-1), Bull. Inst. Comb. and Appl., 12, (1994), 61-64.

  8. Dinesh Sarvate and Jennifer Seberry, A note on small defining sets for some SBIBD(4t-1, 2t-1, t-1), Bull. Inst. Comb. and Appl., 10, (1994), 26-32.

  9. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, Improving the strict avalanche characteristics of cryptographic functions, Information Processing Letters, 50, (1994), 37-41.

  10. Jennifer Seberry and Xian-Mo Zhang, Constructions of bent functions from two known bent functions, Australas. J. Comb., 9, (1994), 21-35.

  11. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, Cryptographic boolean functions via group Hadamard matrices , Australas. J. Combin., 10, (1994), 131-145.

  12. Joan Cooper, Diane Donovan, Jennifer Seberry, Secret sharing schemes arising from latin squares, Bull. Inst. Comb. and Appl.,, 12, (1994), 33-43.

  13. Yuliang Zheng, Thomas Hardjono, Jennifer Seberry, Reusing Shares in Secret Sharing Schemes, Computer Journal 37 (3): 199-205 (1994)

  14. Thomas Hardjono, Yuliang Zheng and Jennifer Seberry, Database Authentication Revisited, Computer & Security, Vol. 13, No. 7, pp. 573-580, 1994.

    1994 Refereed Conference Proceedings

  15. Thomas Hardjono and Jennifer Seberry, Authentication via multi-service tickets in the Kuperee server, 1994 European Symposium on Computer Security (ESORICS'94), ed. D.Gollmann, 875, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 1994, pp 143-160.

  16. Azad Jiwa, Jennifer Seberry and Yuliang Zheng, Beacon based authentication, 1994 European Symposium on Computer Security (ESORICS'94), ed. D.Gollmann, 875, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 1994, pp 125-142.

  17. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, On construction and non-linearity of correlation immune functions, ed. Tor Helleseth, Eurocrypt'93 - Advances in Cryptography, 765, Lecture Notes in Computer Science, Springer-Verlag, (1994), 181-199.

  18. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, Nonlinearity and propagation characteristics of boolean functions, ed. D.R.Stinson, Crypto'93 - Advances in Cryptography, 773, Lecture Notes in Computer Science, Springer-Verlag, Berlin, (1994), 49-60.

  19. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, Highly nonlinear balanced boolean functions and their Propagation characteristics ed. D.R.Stinson, Crypto'93 - Advances in Cryptography, 773, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 1994, 145-155.

  20. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, Pitfalls in designing substitution boxes, ed. Y. Desmedt, Crypto'94 - Advances in Cryptography, 839, Lecture Notes in Computer Science, Springer-Verlag, (1994), 383-396.

  21. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, Structures of highly nonlinear cryptographic functions, Proceedings of the 1994 International Symposium on Information Theory and its Application (ISITA'94), The Institute of Engineers, Australia, 1 (1994), 229-234.

  22. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng: How to Improve the SAC, Proceedings of the 1994 Workshop on Selected Area in Cryptography (SAC'94), Kingston, Ontario, Canada, pp.52-58, May 1994

    1994 Refereed Conference Presentations

  23. Thomas Hardjono, Yuliang Zheng and Jennifer Seberry, Anonymous verifiable databases: towards a practical solution, Tenth International Information Processing Conference -Security'94, (IFIP)-SEC'94, Curacao, Netherlands Antilles, 23-27 May 1994.

  24. Thomas Hardjono and Jennifer Seberry, Authentication via multi-service tickets in the Kuperee server, Proceedings of 1994 European Symposium on Computer Security (ESORICS'94) Brighton UK, Nov, 1994.

  25. Thomas Hardjono, Yuliang Zheng and Jennifer Seberry, Kerbie: Kerberos-type authentication using public keys, Proceedings of the ULPAA'94 International Conference on Upper Layer Protocols, Architectures and Applications, Eds. M. Medina and N. Borenstein, June, 1994, Barcelona, Spain, pp.61-72.

  26. Azad Jiwa, Jennifer Seberry and Yuliang Zheng, Network Security featuring beacon based authentication, Fifth Australasian Conference on Information Systems (ACIS'94), Melbourne, September 1994.

  27. Azad Jiwa, Jennifer Seberry and Yuliang Zheng, Beacon based authentication, Proceedings of 1994 European Symposium on Computer Security (ESORICS'94) Brighton UK, Nov, 1994.

  28. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, GAC -- the criterion for global avalanche characteristics of cryptographic functions, The Second ACM Conference on Computer and Communications Security, Fairfax, Nov, 1994.

  29. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, Relationships among nonlinearity characteristics of quadratic substitution boxes, Eurocrypto'94 - Advances in Cryptography, Conference held in Perugia, Italy, May, 1994.

  30. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, Pitfalls in designing substitution boxes, Advances in Cryptography, Conference held in Santa Barbara, USA, August, 1994.

  31. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, Structures of highly nonlinear cryptographic functions, 1994 International Symposium on Information Theory and its Applications, (ISITA'94), Sydney, Nov, 1994.

  32. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, Structures of cryptographic functions with strong avalanche characteristics, Advances in Cryptography, ASIACRYPT'94, Conference held in Wollongong, Nov 28 - Dec 1, 1994.

    1995 PUBLICATIONS

    1995 Journal Articles

  33. Diane Donovan, Joan Cooper, D.J.Nott and Jennifer Seberry, Latin squares: critical sets and their lower bounds, Ars Combinatoria, 39, (1995), 33-48.

  34. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, Nonlinearity and Propagation Characteristics of Balanced Functions , Information and Computation, Vol. 119, No. 1 (1995), 1-13.

  35. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, The relationship between propagation characteristic and nonlinearity of cryptographic functions, Journal of Universal Computer Science, 1, No. 2 (1995), 136-150.

  36. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, GAC-The Criterion for Global Avalanche characteristics of cryptographic functions, Journal for Universal Computer Science, Vol. 1, No. 5, (1995), 316-333.

  37. Marc Gysin and Jennifer Seberry, The weighing matrices of order $4n$ and weight $4n-2$ and $2n-1$ Australasian J Comb, Vol. 12, (1995), 157-174.

  38. Thomas Hardjono and Jennifer Seberry, Applications of smartcards for anonymous and verifiable databases, Computers and Security, 14 (1995), 465-472

    1995 Refereed Conference Proceedings

  39. Thomas Hardjono and Jennifer Seberry, Information security issues in mobile computing, Information Security - the Next Decade, eds Jan H P Eloff and Sebastiaan H von Solms, Eleventh International Information Processing Conference -Security'95, (IFIP)-SEC'95, Capetown, South Africa, Chapman and Hall, London-Melbourne, (1995), 143-151.

  40. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, Structures of cryptographic functions with strong avalanche characteristics, Advances in Cryptography, ASIACRYPT'94, eds Josef Pieprzyk and Reihaneh Safavi-Naini, Vol 917, Lecture Notes in Computer Science, Springer-Verlag, (1995), 119-132.

  41. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, Relationship among Nonlinearity Criteria In Advances in Cryptography - EUROCRYPT'94, Lecture Notes in Computer Science, Vol 950, Springer-Verlag, Berlin, Heidelberg, New York, (1995), 376-388.

  42. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, On Nonlinear Resilient Functions In Advances in Cryptography - EUROCRYPTO'95, Lecture Notes in Computer Science, 921, Springer - Verlag, Berlin, Heidelbeg, New York, 1995, 274-288.

  43. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng, Relating Nonlinearity to Propagation Characteristics, Proceedings of 1995 Cryptography Policy and Algorithms Conference, pp.283-297, Brisbane, July 1995.

    1995 Technical Report

  44. Jennifer Seberry and Xian-Mo Zhang, 43a Hadamard matrices, bent functions and cryptography, Technical report, University of Wollongong, 1995.

    1995 Conference Presentations

  45. Marc Gysin and Jennifer Seberry, New normal sequences of length 25, ACSC'95 - Australian Computer Science Conference, Glenelg, January, 1995.

  46. Thomas Hardjono and Jennifer Seberry, Information security in mobile databases, Sixth Australasian Database Conference, Glenelg, South Australia, February, 1995.

    1996 PUBLICATIONS

    1996 Book (Edited)

  47. Pieprzyk J and Seberry J (Eds), Advances in Cryptology ACISP'96, Vol 1172, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 1996.

    1996 Chapters In Books

  48. Seberry J and Craigen R, Orthogonal Designs, in The CRC Handbook of Combinatorial Designs, (eds Charles J Colbourn and Jeffrey H Dinitz), CRC Press, Boca Raton, Fla., (1996), 400-405.

    1996 Journal Articles

  49. Arasu K T and Seberry J, Circulant weighing matrices, Journal of Combinatorial Designs, 4 (1996), 439-447.

  50. Hardjono T and Seberry J, Security issues in mobile computing networks, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E79-A, July 1996, 1021-1026.

  51. Jiwa A, Hardjono T and Seberry J, Beacons for authentication in distributed systems, J Computer Security, 4, (1996) 81-96.

  52. Koukouvinos C, Mitrouli M, Seberry J, and Karabelas P, On sufficient conditions for some orthogonal designs and sequences with zero autocorrelation function, Australas J. Combin., 13, (1996), 197-216.

  53. Koukouvinos C, and Seberry J, New weighing matrices, Synkhya, Ser. B, 58 (1996), 221-230.

  54. Koukouvinos C and Seberry J, Necessary and sufficient conditions for some two variable orthogonal designs in order 36, Congressus Numerantium, 114 (1996), 129-140.

  55. Koukouvinos C, Mitrouli M and Seberry J, On the Smith normal form of D-optimal designs, J. Linear and Multilinear Algebra,, 247 (1996) 277-295.

  56. Gysin M and Seberry J, Multiplication of ternary complementary pairs, Australasian J Combinatorics, 14 (1996), 165-180.

  57. Mu Y, Seberry J and Zheng Y, Shared cryptographic bits via quantized quandrature phase amplitudes of light, Optics Communications, 123, (1996) 344-352.

    1996 Refereed Conference Papers

  58. Chaudhry, G R, and Seberry, J, Minimal and Maximal Critical Sets in Room Squares, Proceedings of 7th Australasian Workshop on Combinatorial Algorithms (AWOCA'96), Magnetic Island, Australia, July 15-19, (1996), 75-86.

  59. Chaudhry G R, and Seberry J, Secret Sharing schemes based on Room squares,Proceedings of DMTCS'96, December , 1996, Auckland, New Zealand, Combinatorics, Complexity and Logic, Springer-Verlag Singapore 1996, 158-167.

  60. Hardjono T and Seberry J, Replicating the Kuperee authentication server for increased security and reliability, ACISP'96, LNCS 1172, Springer-Verlag, Berlin, 1996 14-26.

  61. Hardjono T and Seberry J, Design and security issues in strongbox systems for the internet, Proceedings of the 1996 International Conference on Cryptology and Information Security, Kaohsiung, Taiwan, 19-21 December, 1996, 99-103.

  62. Hardjono T and Seberry J, Strong boxes for electronic commerce, Proceedings of the 1996 USENIX Workshop on Electronic Commerce. Oakland, California, USA, November, 1996, 135-145.

    1997 PUBLICATIONS

    1997 Journal Articles

  63. Chaudhry G R and Seberry J, Minimal Critical Set of a Room Square of order 7, Bull. Inst. of Combin. and its Applications 20(1997), 90.

  64. Gysin M and Seberry J, On 4-NPAF(1,2w) sequences,Bull. Inst. of Combin. and its Applications 20(1997), 6-12.

  65. Golomb S, Harris T and Seberry J, "Albert Leon Whiteman (1915-1995)", Notices of the American Mathematical Society, 44, 2 (1997) 217-219.

  66. Hossein G, Pieprzyk J, Chaudhry G and Seberry J, How to prevent cheating in Pinch's scheme, Electronics letters, 33, 17 (1997) pp. 1453-54.

  67. Christos Koukouvinos and Jennifer Seberry, Weighing matrices and their applications, JSPI, 62 (1997) 91-101.

  68. Koukouvinos C, Mitrouli M and Seberry J, On the Smith normal form of weighing matrices, Bulletin Inst. Comb. and Applic., 19 (1997) 57-69.

  69. Seberry J , Firewalls: Defending information technology, Security Australia, 17(2) 1997, 28-29 and 38.

  70. Koukouvinos C, Seberry J, Whiteman A.L., Xia Ming-yuan, Optimal designs, supplementary difference sets and multipliers, JSPI, 62 (1997) 81-90.

    1997 Refereed Conference Papers

  71. Horton J and Seberry J, Computer Viruses: an Introduction, Proceedings of the Twentieth Australasian Computer Science Conference (ACSC'97), Feb. 1997, - Aust. Computer Science Communications, Vol. 19, No. 1 (ed. M. Patel), (1997), 122-131.

  72. Hardjono T and Seberry J. Secure Access to Electronic Strongboxes in Electronic Commerce Proc. of 2nd International Small Systems Security Conference (IFIP WG 11.2), Copenhagen, Denmark, May 1997, pp. 1-13.

  73. Peddada S V M Raju, Seberry J and Chaudhry G R, Near Critical Sets in Latin Squares with Maximum Numbers of Subsquares, International Conference on Combinatorics, Information Theory and Statistics , University of Southern Maine, Portland, Maine, USA, July 18-20, 1997.

    1998 PUBLICATIONS

    1998 Book Chapters

  74. Seberry J, Charnes C, Pieprzyk J and Safavi-Naini R, Crypto and Applications I, in The CRC Handbook of Algorithms and Theory of Computation, ed Mikhail J Atallah, CRC Press, Boca Raton, Fla, 1999, 40.1--40.30.

  75. Seberry J, Charnes C, Pieprzyk J and Safavi-Naini R, Crypto and Applications II, in The CRC Handbook of Algorithms and Theory of Computation, ed Mikhail J Atallah, CRC Press, Boca Raton, Fla, 1999, 41.1--41.30.

    1998 Journal Articles

  76. Arasu K T and Seberry J, On circulant weighing matrices, Australas. Journal of Combinatorics, 17, (1998), 21-37.

  77. Chaudhry G and Seberry, Jennifer On the (10,5,$\lambda$)-family of Bhaskar Rao designs, Bull. Inst. Comb. and Its Applications, 23, (1998), 83-87.

  78. Ghulam Chaudhry, Hossein Ghodosi and Jennifer Seberry, Perfect secret sharing schemes from Room squares, JCMCC, 28, (1998), 55-61.

  79. Gysin M and Seberry J, On new families of supplementary difference sets over rings with short orbits, JCMCC, 28, (1998), 161-186.

  80. Marc Gysin and Jennifer Seberry, An experimental search and new combinatorial designs via a generalisation of cyclotomy, JCMCC, 27, (1998), 143-160.

  81. Koukouvinos C, Mitrouli M and Seberry J, Some necessary and sufficient conditions for two variable orthogonal designs in order 44, JCMCC, 28, (1998), 267-287.

  82. Jennifer Seberry, On Bose's method of mixed differences and Bhaskar Rao designs, J. Statist. Plan. and Inf., 73, (1998), 215-224. Presented at R. C. Bose Memorial Conference on Statistical Design and Related Combinatorics, Colorado Springs, 7-11 June, 1995.

  83. Dinesh Sarvate and Jennifer Seberry, Group divisible designs, GBRDSDS and generalized weighing matrices, Utilitas Math., 54, (1998), 157-174.

  84. Jennifer Seberry, Infinite families of generalized Bhaskar Rao designs, Special Issue of JCISS in honor of Professor J.N. Srivastava, Journal of Combinatorics, Information and Statistics, 23, Nos 1-4, (1998), 455-464.

    1998 Refereed Conference Papers

  85. Horton J and Seberry J, "Covert distributed computing using Java through Web spoofing"; is © Springer-Verlag. Information Security and Privacy, ACISP '98., Lecture Notes in Computer Science, Vol 1438, (1998), 48-57. Please see the Springer-Verlag LNCS series Homepage for more information.

  86. Burmester M, Desmedt Y and Seberry J, "Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically) " is © Springer-Verlag. eds K. Ohta and D. Pei, ASIACRYPT '98., LNCS, Vol, 1514, (1998), 380--391. Please see the Springer-Verlag LNCS series Homepage for more information.

  87. C. Koukouvinos, M. Mitrouli and Jennifer Seberry, Numerical algorithms for the computation of the Smith normal form of integral matrices, Congressus Num,, 133 (1998), 127-162.

    1999 PUBLICATIONS

    1999 Book (Edited)

  88. Pieprzyk J, Safavi-Naini R, and Seberry J (Eds), Advances in Cryptology ACISP'99, Vol 1587, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 1999. " is © Springer-Verlag. Please see the Springer-Verlag LNCS series Homepage for more information. ISSN 0302-9743, ISBN 3-540-65756-8

    Refereed Journal Articles

  89. Jennifer Seberry and Dinesh Sarvate, On $F$-squares and their critical sets, Australasian J Combin., 19, (1999), 209-230. ISSN1034-4942.

  90. L F Fitina, Jennifer Seberry and Ghulam R Chaudhry, Back circulant Latin squares and the influence of a set, Australasian J Combin., 20, (1999), 163-180. ISSN1034-4942.

  91. Christos Koukouvinos and Jennifer Seberry, New weighing matrices constructed using two sequences with zero autocorrelation function - a review, J. Stat. Planning and Inf., 81 (1999), 153-182. ISSN 0378-3758/99.

  92. Jeffrey Horton and Jennifer Seberry, When the necessary conditions are not sufficient: sequences with zero autocorrelation function, Bull ICA,, 27, (1999), 51-61. ISSN 1183-1278.

    Refereed Conference Papers

  93. Jeffrey Horton and Jennifer Seberry, Companion viruses and the Macintosh: threats and countermeasures, is © Springer-Verlag. Information Security and Privacy, ACISP '99., ACISP99, Lecture Notes In Computer Science, Vol 1587, Springer-Verlag, Berlin-Heidelberg-New York, 1999, 202-212. Please see the Springer-Verlag LNCS series Homepage for more information. ISSN 0302-9743, ISBN 3-540-65756-8.

  94. Marc Gysin and Jennifer Seberry, Generalised cycling attacks on RSA and strong RSA primes, Information Security and Privacy, ACISP '99., ACISP99, Lecture Notes In Computer Science, Vol 1587, Springer-Verlag, Berlin-Heidelberg-New York, 1999, 149-163. is © Springer-Verlag. Please see the Springer-Verlag LNCS series Homepage for more information. ISSN 0302-9743, ISBN 3-540-65756-8

  95. Chengxin Qu, Jennifer Seberry and Josef Pieprzyk, On the symmetric property of homogeneous boolean functions, Information Security and Privacy, ACISP '99., ACISP, Lecture Notes In Computer Science, Vol 1587, Springer-Verlag, Berlin-Heidelberg-New York, 1999, 26-35. is © Springer-Verlag. Please see the Springer-Verlag LNCS series Homepage for more information. ISSN 0302-9743, ISBN 3-540-65756-8

    2000 PUBLICATIONS

    Book (Edited)

  96. Josef Pieprzyk, Eiji Okamoto and Jennifer Seberry, (Eds), Information Security, ISW'2000, Lecture Notes in Computer Science, Vol. 1975, Springer-Verlag, Berlin, 2000. is © Springer-Verlag. Please see the Springer-Verlag LNCS series Homepage for more information. ISSN 0302 9743 ISBN 3 540 41416 9

    2000 Refereed Journal Articles

  97. C. Koukouvinos, M. Mitrouli and Jennifer Seberry, Growth in Gaussian elimination for weighing matrices $W(n,n-1)$, Linear and Multilinear Algebra, 306 (2000), 189-202.

  98. Ghulam Chaudhry and Jennifer Seberry, On the influence of entries in critical sets of Room squares, Bull ICA, 28 (2000), 67-74. ISSN 1183-1278.

  99. C. Koukouvinos and Jennifer Seberry,New orthogonal designs and sequences with two and three variables in order 28, Ars Combinatoria, 54, (2000), 97-108. ISSN 0381 7032.

  100. C. Koukouvinos, M. Mitrouli and Jennifer Seberry, Bounds on the maximum determinant for $(1,-1)$ matrices. Bull. ICA, 29, (2000), 39-48. ISSN 1183-1278.

  101. Jennifer Seberry and Anne Penfold Street, Strongbox secured secret sharing schemes, Utilitas Mathematica, 57, (2000), 147--163. ISSN 0315 3681.

  102. Chengxin Qu, Jennifer Seberry and Josef Pieprzyk, Homogeneous bent functions, Discrete Applied Mathematics , Volume 102, Numbers 1-2, (2000) 133-139. ISSN 0166-218X.

  103. S. Georgiou, C. Koukouvinos, M. Mitrouli and Jennifer Seberry, Necessary and sufficient conditions for two variable orthogonal designs in order 44: Addendum, JCMCC,, 34 (2000), 59-64.

  104. Lakoa Fitina and Jennifer Seberry, On the spectrum of an F-square, Australas. J. Comb. 22 (2000) 81-90.

  105. Tianbing Xia, Jennifer Seberry, Josef Pieprzyk, Construction of cubic homogeneous Boolean bent functions, Australas. J. Comb. 22 (2000) 233-246.

  106. W. Susilo, R. Safavi-Naini, M. Gysin, and J. Seberry, An almost optimal fail-stop signature scheme, The Computer Journal, 43, 5, (2000), 430-437.

    2000 Refereed Conference Papers

  107. Jarosaw Pastuszak, Dariusz Michaek, Josef Pieprzyk, Jennifer Seberry, Identification of bad signatures in batches, Workshop on Practice and Theory in Public Key Cryptosystems, PKC2000,, Melbourne, Victoria, Australia. Lecture Notes in Computer Science, Vol. 1751, H. Imai and Y. Zheng (Eds), Springer-Verlag, Berlin, 2000, pp. 28--45 " is © Springer-Verlag. Please see the Springer-Verlag LNCS series Homepage for more information. ISSN 0302 9743 ISBN 3 540 66967 1

  108. Chengxin Qu, Jennifer Seberry and Josef Pieprzyk, Relationships between boolean functions and symmetric groups, International Computer Symposium 2000, ISC2000, Chiayi, Taiwan, December 2000, 1-7.

  109. Jaroslaw Pastuszak, Dariusz Michalek, Josef Pieprzyk, Jennifer Seberry, Codes identifying bad signatures in batches, INDOCRYPT'2000, Lecture Notes in Computer Science, Vol. 1977, B. Roy and C Ding, Springer-Verlag, Berlin, 2000, 143-154. " is © Springer-Verlag. Please see the Springer-Verlag LNCS series Homepage for more information. ISSN 0302 9743 ISBN 3 540 41452 5

    2000 Conference Papers

  110. S Georgiou, C Koukouvinos and Jennifer Seberry, On amicable sequences and orthogonal designs, 23rd Australasian Conference on Combinatorial Mathematics and Combinatorial Computing, Christchurch, NZ, 4-7 December 2000.

    2001 PUBLICATIONS

    2001 Refereed Journal Articles

  111. Roderick J Fletcher and Jennifer Seberry, New D-optimal designs of order 110, AJC 23 (2001) 49-52.

  112. Roderick J Fletcher, Marc Gysin and Jennifer Seberry, Application of the discrete Fourier transform to the search for generalised Legendre pairs and Hadamard matrices, AJC 23 (2001) 75-86.

  113. Marc Gysin and Jennifer Seberry, On ternary complementary pairs, 197-209. AJC 23 (2001) 153-170.

  114. Marc Gysin and Jennifer Seberry, On infinite families of sequences with one and two valued autocorrelation and two valued crosscorrelation function, AJC 23 (2001) 197-209.

  115. S. Georgiou, C. Koukouvinos and Jennifer Seberry, On circulant best matrices and their applications, Linear and Multilinear Algebra, 48 (2001), 263-274.

  116. C. Koukouvinos, M. Mitrouli and Jennifer Seberry, Values of minors of $(1,-1)$ incidence matrices of SBIBDs and their application to the growth problem, Designs, Codes, Cryptography, 23 (2001), 267-281.

  117. C. Koukouvinos, M. Mitrouli and Jennifer Seberry, Values of minors of an infinite family of $D$-optimal designs and their application to the growth problem, SIAM Journal on Matrix Analysis and Applications. 23, No. 1, (2001), 1-14.

  118. C. Koukouvinos, M. Mitrouli and Jennifer Seberry, An algorithm to find formulae and values of minors for Hadamard matrices, Linear Algebra and its Applications, 330 (2001), 129-147.

  119. Christos Koukouvinos and Jennifer Seberry, Infinite families of orthogonal designs : I, Bull. ICA, 33 (2001) 35-41. ISSN 1183-1278.

  120. Christos Koukouvinos and Jennifer Seberry, Short amicable sets and Kharaghani type orthogonal designs, Bull. Austral. Math. Soc. , 64 (2001) 495-504.

  121. C. Koukouvinos, E. Lappas, M. Mitrouli and Jennifer Seberry, On the complete pivoting conjecture for Hadamard matrices of small orders, Journal of Research and Practice in Information Technology , Vol 33, (2001) 294-296.

  122. S. Georgiou, C. Koukouvinos, M. Mitrouli and Jennifer Seberry, A new algorithm for computer searches for orthogonal designs, JCMCC, 39 (2001), 49-63.

    2001 Refereed Conference Papers

  123. M Burmester, Y Desmedt and Jennifer Seberry, Equitability in retroactive key confiscation versus proactive key escrow, PKC'2001, ed. Kwangjo Kim, Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC2001 Cheju Is, Korea, February, 2001, Vol 1992, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 2001, 277-286. " is © Springer-Verlag. Please see the Springer-Verlag LNCS series Homepage for more information. ISSN ISBN

  124. Beomsik Song, Huaxiong Wang and Jennifer Seberry, A new cryptanalysis method using the distribution characteristics of substitution distance, Information Security and Cryptology-ICISC'2001, 6-7 December 2001, Seoul,Korea, 2001. Lecture Notes in Computer Science, Vol 2288, Springer-Verlag, Berlin, 2001, 277-286. " is © Springer-Verlag. Please see the Springer-Verlag LNCS series Homepage for more information. ISSN ISBN 3-540-43319-8.

    2002 PUBLICATIONS

    2002 Edited Book

  125. Lynn Batten and Jennifer Seberry, (Eds), Australasian Conference on Information Security and Privacy, ACISP'02, Lecture Notes in Computer Science, Vol. 2384, Springer-Verlag, Berlin, 2002. " is © Springer-Verlag. Please see the Springer-Verlag LNCS series Homepage for more information. ISSN 0302-9743 ISBN 3-540-43861-0

    2002 Refereed Book Chapter

  126. J.R.Seberry, B.J.Wysocki, and T.A.Wysocki, On a use of Golay sequences for asynchronous DS CDMA applications, in T.A.Wysocki, M.Darnell and B.Honary, Advanced Digital Signal Processing for Communication Systems, Kluwer Academic Publishers, Boston/Dordrecht/London, 2002, pp.182-196.

  127. David Soldera, Jennifer Seberry and Chengxin Qu, The analysis of the Zheng-Seberry algorithm, in Australasian Conference on Information Security and Privacy, ACISP'02, Lynn Batten and Jennifer Seberry, (Eds), Lecture Notes in Computer Science, Vol. 2384, Springer-Verlag, Berlin, 2002. 159-168. " is © Springer-Verlag. Please see the Springer-Verlag LNCS series Homepage for more information.

  128. S. Georgiou, C. Koukouvinos and Jennifer Seberry, Hadamard matrices, orthogonal designs and construction algorithms, Designs 2002: Further Combinatorial and Constructive Design Theory, ed. W.D.Wallis, Kluwer Academic Publishers, Norwell, Massachusetts, 2002, 133-205.

    2002 Refereed Journal Articles

  129. C. Koukouvinos, M. Mitrouli and Jennifer Seberry, An infinite family of Hadamard matrices with fourth last pivot $\frac{n}{2}$, Linear and Multilinear Algebra, 50, (2002), 167-173.

  130. Christos Koukouvinos and Jennifer Seberry, Orthogonal designs constructed from circulant weighing matrices, International Journal of Applied Mathematics, 8 (2002), 255-265.

  131. S. Georgiou, Christos Koukouvinos and Jennifer Seberry, Short amicable sets, International Journal of Applied Mathematics, 9 (2002), 161-187.

  132. Jeffrey Horton, Christos Koukouvinos and Jennifer Seberry, A search for Hadamard matrices constructed from Williamson matrices, Bull. ICA, 35, (2002) 75-88. ISSN 1183-1278.

  133. S. Georgiou, C. Koukouvinos, M. Mitrouli and Jennifer Seberry, Necessary and sufficient conditions for three and four variable orthogonal designs in order 36, JSPI, 106 (2002), 329-352.

  134. Ghulam R Chaudhry, Malcolm Greig and Jennifer Seberry, On the ($v,5, \lambda$)-family of Bhaskar Rao designs, JSPI, 106 (2002) 303-327.

  135. S. Georgiou, C. Koukouvinos and Jennifer Seberry, On full orthogonal designs in order 56, Ars Combin. 65 (2002), 79-89.

  136. L. F. Fitina and Jennifer Seberry On the spectrum of F-squares , AJC. 22 (2002) 81-89.

    2002 Refereed Conference Papers

  137. J. Seberry, B.J.Wysocki and T.A.Wysocki, Golay sequences for DS CDMA Applications, DSPCS'02, (Sixth International Symposium on DSP for Communications Systems), Manly, 28-31 January, 2002, TITR, Wollongong, 103-108. ISBN 0 86418 791 2

    2003 PUBLICATIONS

    Book

  138. J. Pieprzyk, T. Hardjono and J. Seberry, Fundamentals of Computer Security, Springer-Verlag, Berlin, 2003. Please see the Springer Computer Security and Cryptology Books homepage for more information ISBN 3-540-43101-2

    Edited Book

  139. Rei Safavi-Naini and Jennifer Seberry, (Eds), Australasian Conference on Information Security and Privacy, ACISP'03, Lecture Notes in Computer Science, Vol. 2727, Springer-Verlag, Berlin, 2003. " is © Springer-Verlag. Please see the Springer-Verlag LNCS series Homepage for more information. ISSN 0302-9743 ISBN 3-540-40515-1

    2003 Refereed Book Chapter

  140. Beomsik Song and Jennifer Seberry, Further observations on the structure of the AES algorithm, FSE, Lecture Notes in Computer Science, ed Thomas Johansson, Vol. , Springer-Verlag, Berlin, 2003, p223-233. " is © Springer-Verlag. Please see the Springer-Verlag LNCS series Homepage for more information. ISSN 0302-9743 ISBN 3-540-20449-0.

  141. J. Wu, T. Xia and J. Seberry, Construction of Highly non-linear cubic homogeneous Boolean functions on GF(2)^{2n+1}, Proceedings of the International Conference on Security and Management (SAM'03), Vol. I (2003), pp. 241-247.

  142. Xiang Li and Jennifer Seberry, Forensic Computing, INDOCRYPT'03, Lecture Notes in Computer Science, Vol. 2904, Springer-Verlag, Berlin, 2003, pp 18-35. " is © Springer-Verlag. Please see the Springer-Verlag LNCS series Homepage for more information.

    2003 Refereed Journal Articles

  143. C. Koukouvinos, M. Mitrouli and Jennifer Seberry, Values of minors of an infinite family of $D$-optimal designs and their application to the growth problem: II, SIAM Journal on Matrix Analysis and Applications. 24 (2003), 715-727.

  144. Tianbing Xia, Mingyuan Xia and Jennifer Seberry, Regular Hadamard matrix, maximum excess and SBIBD, AJC, 27(2003), 263-275.

  145. H. Evangelaras, C. Koukouvinos and Jennifer Seberry, Applications of Hadamard matrices Journal of Telecommunications and Information Technology, 2 (2003), 2-10.

  146. Chris Charnes and Jennifer Seberry, Weighing matrices and self-orthogonal quaternary codes, JCMCC, 44 (2003) 85-95.

  147. S. Georgiou, C. Koukouvinos and Jennifer Seberry, On full orthogonal designs in order 72, JCMCC, 44 (2003), 11-21.

  148. Christos Koukouvinos and Jennifer Seberry, Othogonal designs of Kharaghani type: I, Ars Combinatoria., 67 (2003), 89-96.

  149. S. Georgiou, C. Koukouvinos and Jennifer Seberry, Some results on Kharaghani type orthogonal designs, Utilitas Mathematica, 63 (2003), 43-52.

  150. C. Koukouvinos, E. Lappas, M. Mitrouli and Jennifer Seberry, An algorithm to find formulae and values of minors for Hadamard matrices: II Linear Algebra and Applications, 371 (2003), 111-124.

  151. Jennifer Seberry, T. Xia, C. Koukouvinos and M. Mitrouli, The maximal determinant and subdeterminants of $\pm 1$ matrices, LAA, 373 (2003), 297-310.

  152. S. Georgiou, C. Koukouvinos and Jennifer Seberry, Some results on self-orthogonal and self-dual codes, Ars Combinatoria , 68 (2003), 97-104.

  153. Jennifer Seberry, Beata J. Wysocki and Tadeusz A. Wysocki Williamson-Hadamard Spreading Sequences for DS-CDMA Applications, Special Issue on "Coding and Its Applications in CDMA Wireless Systems", Journal of Wireless Communications and Mobile Computing. 3 (2003), 597-607.

  154. Gennian Ge, Malcolm Greig and Jennifer Seberry, Generalized Bhaskar Rao designs with block size 4 signed over elementary abelian groups, JCMCC, 46 (2003), 3-45.

    2003 Conference Papers Published Electronically

  155. R. SahaRay and J. Seberry, Critical sets in orthogonal arrays, Electronic Notes in Discrete Mathematics, 15 (2003).

  156. Y. Wang, J. Seberry, R. Safavi-Naini and R. Fuji-Hara, A note on the exposure property of SBIBD, Electronic Notes in Discrete Mathematics, 15 (2003).

    2003 Refereed Conference Papers In Print

  157. Y. Wang, J.Seberry, B.J.Wysocki, T.A.Wysocki, W.Susilo, T.Xia, Y.Zhao, and L.C.Tran, Combinatorial constructions of 3-Secure and 4-secure codes,, DSPCS'03/WITSP'03, Coolangatta, Gold Coast, 8-11 December 2003, pp. 549-552

  158. Jianyong Huang, Jennifer Seberry and Willy Susilo, Secure Computations on Handheld devices with the help of an untrusted server, 7th World Multiconference on Systemics, Cybernetics and Informatics (SCI 2003) eds. N. Callaos, M. Morgenstern, J Zhang, O Castillo, E E Doberkat, Conference held Orlando, USA, July 27-30, 2003, International Institute of Informatics and Systemics, pp507-512. ISBN 980-6560-01-9.

  159. Jianyong Huang, Jennifer Seberry and Willy Susilo, Design and implementation of personal firewalls for handheld devices,, 7th World Multiconference on Systemics, Cybernetics and Informatics (SCI 2003) eds. N. Callaos, M. Morgenstern, J Zhang, O Castillo, E E Doberkat, Conference held Orlando, USA, July 27-30, 2003, International Institute of Informatics and Systemics, pp 458-463. ISBN 980-6560-01-9.

  160. Jianyong Huang, Jennifer Seberry and Willy Susilo, On using fast exponentiation algorithm in PDA (or: How secure is the discrete logarithm problem on PDA?), The 2003 International Conference on Security and management (SAM'03), 2003 eds. H R Arabnia, Youngsong Mun, Selim Aissi, Conference held Las Vegas, USA, June 23-26, 2003, CSREA Press, pp 668-674. ISBN 1-932415-18-1.

  161. R Ang, J Seberry, B J Wysocki, T A Wysocki, Application of nega-cyclic matrices to generate spreading sequences, ISCTA'2003, Ambleside, UK, July 2003.

  162. Yibing Kong, Janusz R Getta, Ping Yu and Jennifer Seberry, Privacy control for personal information databases, In Proceedings of the 7th National Science and Engineering Conference, Held in Chonburi, Thailand, 2003, 97-102.

    2004 PUBLICATIONS

    2004 Book Chapter

  163. J. Seberry, L. C. Tran, Y. Wang, B. J. Wysocki, T. A. Wysocki, T. Xia and Y. Zhao, New complex orthogonal space-time block codes of order eight, in T. A. Wysocki, B. Honary, and B. J. Wysocki (Eds.): Signal Processing for Telecommunications and Multimedia, Series : Multimedia Systems and Applications , vol. 27, pp.173-182, Springer, New York, 2004. " " is © Springer-Verlag. Please see the Springer-Verlag LNCS series Homepage for more information.

    2004 Refereed Journal Articles

  164. Christos Koukouvinos and Jennifer Seberry, Orthogonal designs of Kharaghani type; II, Ars Combinatoria, 72, (2004) 23-32.

  165. Chung Le Tran, Jennifer Seberry, Yejing Wang, Beata J Wysocki, Tad A Wysocki, Tianbing Xia and Ying Zhao, Two new complex orthogonal space-time block codes for 8 transmit antennas, Electronics Letters, 55, (2004) 55-56.

  166. S. Georgiou, C. Koukouvinos and Jennifer Seberry, Generalized orthogonal designs, Ars Combinatoria, 71 (2004) 33-48.

  167. Tianbing Xia, Jennifer Seberry, Josef Pieprzyk, Chris Charnes, Homogeneous bent functions of degree $n$ in $2n$ variables do not exist for $n > 3$, Discrete Applied Mathematics, 142 (2004) 127-132.

  168. Greg Gamble, Barbara M Maenhaut, Jennifer Seberry, and Anne Penfold Street, Further results on stongbox secured secret sharing schemes, Util. Math. , 66 (2004) 187-215.

  169. Ken Finlayson and Jennifer Seberry, Orthogonal designs from negacyclic matrices, AJC, 30 (2004) 319-330.

  170. Roderick J Fletcher, Christos Koukouvinos and Jennifer Seberry, New skew-Hadamard matrices of order $4\cdot 59$ and new $D$-optimal designs of order $2\cdot 59$, Discrete Math, 286 (2004) 251-253.

    2004 Refereed Conference Papers in Print

  171. Jennifer Seberry, Chung Le Tran, Yejing Wang, Beata J Wysocki, Tadeusz A Wysocki and Ying Zhao, Orthogonal spreading sequences constructed using Hall's difference set, Proc. Symposium on Trends in Communications (SympoTIC'04), including the Joint IST Workshop on Mobile Future and Central Europe and Japan Joint Workshop on Sequence Design and its Application Wireless Network (ISBN 0-7803-8556-X), pp. 82--85, Oct. 2004.

  172. L. C. Tran, T. A. Wysocki, J. Seberry and A. Mertins, On Multi-modulation Schemes to Increase the Rate of Space-Time Block Codes, Proc. 12th European Signal Processing Conference EUSIPCO 2004, ISBN No. 3-200-00165-8, vol. 3, pp. 1841-1844, Sept. 2004.

  173. L. C. Tran, T. A. Wysocki, J. Seberry and A. Mertins, The Effect of Imperfect Carrier Recovery on the Performance of the Diversity Antenna Selection Technique in Wireless Channels Utilizing DSTM, Proc. Int. Conf. Infor. Technol.: Research and Education ITRE 2004, vol. 1, pp. 15-18, 28 June - 1 July 2004.

  174. L. C. Tran, T. A. Wysocki, J. Seberry and A. Mertins, Multi-modulation Schemes to Increase the Rate of Space-Time Block Codes in Rayleigh Fading Channels, Proc. Int. Conf. Infor. Technol.: Research and Education ITRE 2004, vol. 1, pp. 19-23, 28 June - 1 July 2004.

  175. Chung Le Tran, Jennifer Seberry, Beata J Wysocki, Tad A Wysocki, Tianbing Xia, Yejing Wang and Ying Zhao, Complex orthogonal sequences from amicable Hadamard matrices, IEEE VTC'2004-Spring, Milan, Italy, May 2004. CDROM. also Proc. IEEE Veh. Technol. Conf. VTC2004-Spring, vol. 1, pp. 1490--1493, May 2004.

  176. Jianyong Huang, Willy Susilo and Jennifer Seberry, Observations on the Message Integrity Code in IEEE802.11 Wireless LANs The 3rd Workshop on the Internet, Telecommunications and Signal Processing (WITSP'04), Adelaide, Australia, 20-22 December 2004, CD-ROM, pp. 328 - 332, 2004.

  177. Yibing Kong, Jennifer Seberry, Janusz R Getta and Ping Yu, Using hierarchical encryption to protect database privacy, In Proceedings of the 15th Australasian Workshop on Combinatorial Algorithms, Balina, Austalia, 2004, 260-269.

  178. Yibing Kong, Jennifer Seberry, Janusz R Getta and Ping Yu, A generalized policy support system and its hierarcy semantics, In Proceedings of the 2nd International Workshop on Security in Information Systems, held in Porto, Portugal, INSTICC Press, 2004, 136-145.


    Last modified May 2010. Please email questions or comments to j.seberry@uow.edu.au