Internet security applications of the Munn rings

A. V. Kelarev, J. L. Yearwood, P. Watters, X. Wu, J. H. Abawajy, L. Pan

Research output: Contribution to journalArticlepeer-review

7 Citations (Scopus)

Abstract

Effective multiple clustering systems, or clusterers, have important applications in information security. The aim of the present article is to introduce a new method of designing multiple clusterers based on the Munn rings and describe a class of optimal clusterers which can be obtained in this construction.

Original languageEnglish
Pages (from-to)162-171
Number of pages10
JournalSemigroup Forum
Volume81
Issue number1
DOIs
Publication statusPublished - 2010
Externally publishedYes

Keywords

  • Internet security applications
  • Munn rings

Fingerprint Dive into the research topics of 'Internet security applications of the Munn rings'. Together they form a unique fingerprint.

Cite this