# Items where Subject is "Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > COMPUTATION THEORY AND MATHEMATICS (080200) > Applied Discrete Mathematics (080202)"

Up a level |

- Subjects classification (46377)
- Australian and New Zealand Standard Research Classification (46377)
- INFORMATION AND COMPUTING SCIENCES (080000) (4759)
- COMPUTATION THEORY AND MATHEMATICS (080200) (149)
**Applied Discrete Mathematics (080202)**(12)

- COMPUTATION THEORY AND MATHEMATICS (080200) (149)

- INFORMATION AND COMPUTING SCIENCES (080000) (4759)

- Australian and New Zealand Standard Research Classification (46377)

Group by: Authors/Creators | Item Type

Number of items at this level:

**12**.## A

Acar, Evrim, Camtepe, Seyit A., Krishnamoorthy, Mukkai S., & Yener, Bulent
(2005)
Modeling and multiway analysis of chatroom tensors.

*Lecture Notes in Computer Science : Intelligence and Security Informatics*,*3495*, pp. 256-268.
24

21

Acar, Evrim, Camtepe, Seyit A., & Yener, Bulent
(2006)
Collective sampling and analysis of high order tensors for chatroom communications.

*Lecture Notes in Computer Science : Intelligence and Security Informatics*,*3975*, pp. 213-224.
12

11

## B

Boyd, Colin
(2008)
Applications of elliptic curve pairings in cryptography. In
Dorfer, G, Eigenthaler, G, & Kautschitsch, H (Eds.)

*Contributions to General Algebra 18*, 1-4 February 2007, Klagenfurt, Austria.
192

Bratanov, Dmitry & Boedecker, Gerd
(2010)
High-frequency global navigation satellite system’s receivers for airborne gravimetry. In
Berghorn, Gregor & Rusakov, Mikhail (Eds.)

*Scientific Conference of Michael Lomonosov and Immanuil Kant Fellows*, 16-17 April 2010, Moscow.
28

## C

Costello, Craig, Lauter, Kristin, & Naehrig, Michael
(2011)
Attractive subfamilies of BLS curves for implementing high-security pairings.

*Lecture Notes in Computer Science : Progress in Cryptology - INDOCRYPT 2011*,*7017*, pp. 320-342.
72

8

7

## D

Donovan, Diane, Lefevre, James, & Simpson, Leonie
(2008)
A discussion of constrained binary embeddings with applications to cryptanalysis of irregularly clocked stream ciphers. In
Balakrishnan, R & Veni Madhavan, C (Eds.)

*Proceedings of the International Conference on Discrete Mathematics, 2006*, 15-18 December, 2006, Bangalore, India.## F

Fuller, Joanne, Millan, William, & Dawson, Edward
(2005)
Multi-objective optimisation of bijective s-boxes.

*New Generation Computing: computing paradigms and computational intelligence*,*23*(3), pp. 201-218.
4

2

## M

Millan, William
(2005)
New Cryptographic Applications of Boolean Function Equivalence Classes. In
Boyd, C & Neito, J (Eds.)

*Information Security and Privacy - 10th Australasian Conference, ACISP 2005*, 4-6 July 2005, Australia, Queensland, Brisbane.
1

2

## S

Salim, Farzad, Reid, Jason F., Dulleck, Uwe, & Dawson, Edward
(2013)
Budget-aware role based access control.

*Computers & Security*,*35*, 37-50.
82

1

Suriadi, Suriadi, Ouyang, Chun, Smith, Jason, & Foo, Ernest
(2009)
Modeling and Verification of Privacy Enhancing Protocols. In
Breitman, Karin & Cavalcanti, Ana (Eds.)

*Modeling and Verification of Privacy Enhancing Protocols*, Springer Berlin / Heidelberg, Rio de Janeiro, Brazil, pp. 127-146.
4

1

## T

Tian, Yu-Chu, Levy, David C., & Gu, Tianlong
(2004)
Implementing a Process Model for Real-Time Applications. In

*The 7th Asia-Pacific Conference on Complex Systems (Complex'2004)*, 6-10 December 2004, Cairns, Australia.
419

## W

Wong, Kenneth Koon-Ho & Bard, Gregory V.
(2010)
Improved algebraic cryptanalysis of QUAD, Bivium and Trivium via graph partitioning on equation systems. In

*Information Security and Privacy : Proceedings of the 15th Australasian Conference, ACISP 2010*, Springer, Macquarie Graduate School of Management, Sydney, pp. 19-36.
400