Kelarev, A. V., Yearwood, J. L., Watters, P., Wu, X., Abawajy, J. H. and Pan, L. 2010, Internet security applications of the Munn rings, Semigroup forum, vol. 81, no. 1, pp. 162-171, doi: 10.1007/s00233-010-9242-1.
Effective multiple clustering systems, or clusterers, have important applications in information security. The aim of the present article is to introduce a new method of designing multiple clusterers based on theMunn rings and describe a class of optimal clusterers which can be obtained in this construction.
Published online: 19 June 2010
Field of Research
080303 Computer System Security
Socio Economic Objective
970108 Expanding Knowledge in the Information and Computing Sciences
Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact email@example.com.