Jennifer Roma Seberry (Wallis)
Research Students
Honours Students - Principal Supervisor
- 1971, Joan Lavender, University of Newcastle.
- 1973, Dr Nicholas Wormald, Supplementary Difference Sets, Australian National University.
- 1977, Alan Kinnersley, A Feasibility Study for Long Running Programs, University of Sydney.
- 1977, Dr David Skillicorn, The Existence Problem for Perfect Codes, University of Sydney.
- 1978, Dr Bohdan Smetaniuk, Latin Squares, University of Sydney.
- 1980, Dr Janet Wiles, Error Correction Codes and Cryptography, University of Sydney.
- 1982, Dr Conrad MacKenzie, Modern Cryptographic Techniques and Communication Protocols, University of Sydney.
- 1982, Dr Warwick de Launey, Some Problems in Combinatorics -Shapes, University of Sydney.
- 1984, T Mark Ellison, A Mathematical Model and Algorithm for Linguistic Reconstruction, University of Sydney.
- 1985, David S.P. Khoo, RSA and Encryption Exponent 3, University of Sydney.
- 1985, Dr Luke OConnor, The Cryptographic Significance of the Knapsack Problem, University of Sydney.
- 1985, Terry C. Jones, Secrecy and Authentication, University of Sydney.
- 1985, John Lim, Data Security Requirements for EFTPOS, University of Sydney.
- 1985, Ginny H.C.Chan, A First Step towards a Classification of Weighing Matrices, University of Sydney.
- 1985, Susy Deck, Computational Methods for Foreign Language Identification with Application to Cryptography, University of Sydney.
- 1985, Hui-eng Tchun, Towards the Cryptanalysis of Bahasa Malaysia, University of Sydney.
- 1985, Michael Coyne, An Implementation of a Public Key Cryptosystem, University of Sydney.
- 1986, Ralph Gyoery, Electronic Funds Transfer Point of Sale, University of Sydney.
- 1987, Dr Leisa Condie, Noise removal in isolated word recognition using error-correction codes, University of Sydney.
- 1987, Dr Mark James, Golay Sequences, University of Sydney.
- 1987, Hugh McGuinness, Speech Recognition using Error Correcting Codes, University of Sydney.
- 1987, Dr Mike Newberry, Footprints in the Snow: An Investigation into some aspects of User Unique Identification, University of Sydney.
- 1987, Sing Guat Ong, Towards the Cryptanalysis of Mandarin-Pinyin, University of Sydney.
- 2005, Mr Keir Dyce, Wireless network vulnerability assessment,
B.Inf.Tech(Hons), Hons I, University of Wollongong.
- 1999, Ken Findlayson, Cryptography and Elliptic Curves
, Bachelor of Computer Science
(Hons), University of Wollongong.
- 2011, Mr Vinh Buu To,,i>New DSA Related Digital Signature Algorithms, Bachelor of Computer Science, University of Wollongong.
Honours Students - Associate Supervisor
- 1986, Chris Carter, Machine Learning Experiments in Credit Assessment, University of Sydney.
- 1986, Timothy Mark Morris-Yates, An nMOS VLSI Implementation of a Data Encryption Algorithm, University of Sydney.
- 1987, Thomas Hardjono, An Environment for the Emycin Shell, University of Sydney.
- 1987, Suk Wah Kwok, The Induction and Manipulation of Decision Trees, University of Sydney.
- 1987, Gary Steele Finkelstein, The Nonlinear Property of Symmetric Cryptosystems, University of Sydney.
- 1994, Justin Lister, Intrusion Detection Systems: An Introduction to the
Detection and Prevention of Computer Abuse, Bachelor of Computer Science
(Hons), (Supervisors: R Safavi Naini/ J Seberry)
Software Engineering Projects
- 1996, J. Winterbottom, W. Stubbs, M. Danckert, P. Duran, G. Brisbane, A. Green.