Jennifer Roma Seberry (Wallis)

2010 PUBLICATIONS

    BOOKS

  1. J. Pieprzyk, T. Hardjono and J. Seberry, Teoria bezpieczenstwa systemow komputerowych Springer-Verlag, Berlin. ISBN 83-7361-678-0

    BOOK CHAPTERS

  2. Seberry J, Charnes C, Pieprzyk J and Safavi-Naini R, CryptoTopics and Applications I, in Mikhail J. Atallah and Marina Blanton, (eds), Chapter 12 in Algorithms and Theory of Computation Handbook, Special Topics and Techniques, Second Edition, CRC Press, Boca Raton, Fla, 2010, pp 12.1 - 12.32

  3. Seberry J, Charnes C, Pieprzyk J and Safavi-Naini R, CryptoTopics and Applications II, in Mikhail J. Atallah and Marina Blanton, (eds), Chapter 13 in Algorithms and Theory of Computation Handbook, Special Topics and Techniques, Second Edition, CRC Press, Boca Raton, Fla, 2010. pp 13.1 – 13.32

  4. Yi Gao, Willy Susilo, Yi Mu and Jennifer Seberry, Efficient trapdoor based client puzzle against DOS attacks, Network Security, S.Huang, D. MacCallum and D-Z. Du (eds.), 2006, 229-249..

    JOURNAL ARTICLES

  5. I.S.Kotsireas, C.Koukouvinos, J.Seberry and D.E.Simos, New classes of orthogonal designs constructed from complementary sequences with given spread, Australasian Journal of Combinatorics, 46 (2010), 67-78.

  6. I.S.Kotsireas, C.Koukouvinos and Jennifer Seberry, New weighing matrices of order 2n and weight 2n-9, J. Combin. Math. Combin. Comput., 72 (2010), 49-54.

  7. Jennifer Seberry and Marilena Mitrouli, Some remarks on Hadamard matrices, Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences, Published on line 7th July 2010 Cryptography and Communications, 2(2): 293-306 (2010) 293-306. Springer Science+Business Media, LLC 2010

  8. K. T. Arasu, Ilias S Kotsireas, Christos Koukouvinos and Jennifer Seberry, On circulant and two-circulant weighing matrices, Austral. J. Comb., 48 (2010), 43-51.

  9. I. S. Kotsireas, C. Koukouvinos, J.Seberry, New weighing matrices constructed from two circulant submatrices, Optimization Letters,, Vol 6, No 1 (2010) 211-217. published on line DOI 10.1007/s11590-010-0264-0

    REFEREED CONFERENCE PAPERS

  10. Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo, and Jennifer Seberry, On the security of NOEKEON against side channel cube attacks, Proceedings of the Information Security Practice and Experience, 6th International Conference, ISPEC 2010, Jin Kwak Robert H. Deng YoojaeWon, Guilin Wang (Eds.), Seoul, Korea, May 12-13, 2010, LNCS 6047, (2010) 45-55, Springer, Berlin. ISSN 0302-9743

  11. Lei Wang, Tianbing Xia and Jennifer Seberry, Inter-domain routing validator based spoofing defence system, Proceedings of the 2010 11*html IEEE International Conference on Intelligence and Security Informatics, ISI 2010, (Eds) Christopher C. Yang, Daniel Zeng, Ke Wang,Antonio Sanfilippo, Herbert H. Tsang, Min-Yuh Day, Uwe Glässer, Patricia L. Brantingham, and Hsinchun Chen, May 23-26, 2010 - Vancouver, BC, Canada, 153-155. IEEE Catalog Number: CFP10ITI-PRT, ISBN: 978-1-4244-6460-9

  12. Jianyong Huang, Willy Susilo and Jennifer Seberry, Differential fault analysis of LEX In Juan A Garay and Roberto de Prisco (eds), Proceedings of the Security and Cryptography for Networks 7th International Conference, SCN 2010, Juan A. Garay Roberto De Prisco (Eds.), Amalfi, Italy, September 13-15, 2010, LNCS 6280, (2010) 55-72, Springer-Verlag Berlin Heidelberg, ISSN 0302-9743
    Created 20 March 2010. Updated 18 November 2011. Please email questions or comments to j.seberry at uow.edu.au