C. Adams and S. Tavares . Generating and counting binary bent sequences . ... D. Anderson , T.F Lunt , H. Javitz , A. Tamaru , and A. Valdes . Detecting unusual program behavior using the statistical component of the next - generation ...
Subjects in UNIX are defined into three broad categories: 1. owner, 2. group the owner is in, 3. universe (all other ... Also the ownership of a file can be transferred by the current owner to another user by using the chown command.
R. Inst. Lombardo Sci. e Lett., 2 (31): 1441–1446, 1898. 151 B. Schmidt. Cyclotomic integers and finite geometry. J. Am. Math. Soc., 12 (4): 929–952, 1999. 152 B. Schmidt. Williamson matrices and a conjecture of Ito's.
The Cryptographic Significance of the Knapsack Problem
75 S. Georgiou, C. Koukouvinos, and S. Stylianou. On good matrices, skew Hadamard matrices and optimal designs. Comput. Stat. ... 100 David C. Hunt and Jennifer Wallis. Cyclotomy, Hadamard arrays and supplementary difference sets.
The Seventh Australasian Conference in Information Security and Privacy (ACISP) was held in Melbourne, 3–5July, 2002. The conference was sponsored by Deakin University and iCORE, Alberta, Canada and the Australian Com- ter Society.
We note that in these BHV theorems circulant or type 1 can be replaced by negacyclic matrices. Theorem 4.16 (Turyn (220). Suppose there is a Baumert-Hall-Welch array BHW of orders constructed of sirteen circulant (or type 1) s x s ...
Covers background theories, encryption, authentication, network security, databases, minimum knowledge systems, and security in operating systems.
Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000. Proceedings Josef Pieprzyk, N. S. W.) Isw 200 (2000 Wollongong, Eiji Okamoto Jennifer Seberry. 36 R. Rosenbaum and H. Schumann ...
This volume is a collection of refereed papers presented during AUSCRYPT '90 held in Sydney, Australia, January 8-11, 1990.
This book constitutes the thoroughly refereed post-conference proceedings of the First Australiasian Conference on Information Security and Privacy, ACISP '96, held in Wollongong, NSW, Australia, in June 1996.
Advances in Cryptology--AUSCRYPT '90: International Conference on Cryptology, Sydney, Australia, January 8-11, 1990 : Proceedings
Towards the Cryptanalysis of Mandarin (Pinyin)
Towards the Cryptanalysis of Bahasa Indonesia and Malaysia
Teoria bezpieczeństwa systemów komputerowych
Goethals-Seidel Type Hadamard Matrices
Construction of Williamson Type Matrices
Orthogonal (0,1,-1) - Matrices
Complex Orthogonal Space-Time Processing in Wireless Communications incorporates orthogonal space-time processing using STBCs in MIMO wireless communication systems.
This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP 2008, held in Wollongong, Australia, in July 2008.