Items where Subject is "Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > COMPUTATION THEORY AND MATHEMATICS (080200) > Applied Discrete Mathematics (080202)"
|Up a level|
- Subjects classification (46610)
- Australian and New Zealand Standard Research Classification (46610)
Group by: Authors/Creators | Item Type
Number of items at this level: 12.
Acar, Evrim, Camtepe, Seyit A., Krishnamoorthy, Mukkai S., & Yener, Bulent (2005) Modeling and multiway analysis of chatroom tensors. Lecture Notes in Computer Science : Intelligence and Security Informatics, 3495, pp. 256-268.
Acar, Evrim, Camtepe, Seyit A., & Yener, Bulent (2006) Collective sampling and analysis of high order tensors for chatroom communications. Lecture Notes in Computer Science : Intelligence and Security Informatics, 3975, pp. 213-224.
Boyd, Colin (2008) Applications of elliptic curve pairings in cryptography. In Dorfer, G, Eigenthaler, G, & Kautschitsch, H (Eds.) Contributions to General Algebra 18, 1-4 February 2007, Klagenfurt, Austria.
Bratanov, Dmitry & Boedecker, Gerd (2010) High-frequency global navigation satellite system’s receivers for airborne gravimetry. In Berghorn, Gregor & Rusakov, Mikhail (Eds.) Scientific Conference of Michael Lomonosov and Immanuil Kant Fellows, 16-17 April 2010, Moscow.
Costello, Craig, Lauter, Kristin, & Naehrig, Michael (2011) Attractive subfamilies of BLS curves for implementing high-security pairings. Lecture Notes in Computer Science : Progress in Cryptology - INDOCRYPT 2011, 7017, pp. 320-342.
Donovan, Diane, Lefevre, James, & Simpson, Leonie (2008) A discussion of constrained binary embeddings with applications to cryptanalysis of irregularly clocked stream ciphers. In Balakrishnan, R & Veni Madhavan, C (Eds.) Proceedings of the International Conference on Discrete Mathematics, 2006, 15-18 December, 2006, Bangalore, India.
Fuller, Joanne, Millan, William, & Dawson, Edward (2005) Multi-objective optimisation of bijective s-boxes. New Generation Computing: computing paradigms and computational intelligence, 23(3), pp. 201-218.
Millan, William (2005) New Cryptographic Applications of Boolean Function Equivalence Classes. In Boyd, C & Neito, J (Eds.) Information Security and Privacy - 10th Australasian Conference, ACISP 2005, 4-6 July 2005, Australia, Queensland, Brisbane.
Salim, Farzad, Reid, Jason F., Dulleck, Uwe, & Dawson, Edward (2013) Budget-aware role based access control. Computers & Security, 35, 37-50.
Suriadi, Suriadi, Ouyang, Chun, Smith, Jason, & Foo, Ernest (2009) Modeling and Verification of Privacy Enhancing Protocols. In Breitman, Karin & Cavalcanti, Ana (Eds.) Modeling and Verification of Privacy Enhancing Protocols, Springer Berlin / Heidelberg, Rio de Janeiro, Brazil, pp. 127-146.
Tian, Yu-Chu, Levy, David C., & Gu, Tianlong (2004) Implementing a Process Model for Real-Time Applications. In The 7th Asia-Pacific Conference on Complex Systems (Complex'2004), 6-10 December 2004, Cairns, Australia.
Wong, Kenneth Koon-Ho & Bard, Gregory V. (2010) Improved algebraic cryptanalysis of QUAD, Bivium and Trivium via graph partitioning on equation systems. In Information Security and Privacy : Proceedings of the 15th Australasian Conference, ACISP 2010, Springer, Macquarie Graduate School of Management, Sydney, pp. 19-36.