Lynn Batten

From WikiProjectMed
Jump to navigation Jump to search

Lynn Margaret Batten (1948[1] – 28 July 2022[2][3]) was a Canadian-Australian mathematician[4] known for her books about finite geometry and cryptography, and for her research on the classification of malware.[5]

Education and career

Batten earned her Ph.D. at the University of Waterloo in 1977. Her dissertation was D-Partition Geometries.[6]

Formerly the Associate Dean for Academic and Industrial Research at the University of Manitoba, she moved to Deakin University, Australia in 2000,[2] where she held the Deakin Chair in Mathematics, and directed the Information Security Group.[7]

She was involved in the founding of the Australian Mathematical Sciences Institute (AMSI) from 2001.[2]

Books

  • Combinatorics of Finite Geometries. Cambridge ; New York: Cambridge University Press. 31 March 1986. ISBN 978-0-521-31857-0.[8]
  • With Albrecht Beutelspacher: The Theory of Finite Linear Spaces. Cambridge: Cambridge University Press. 9 April 2009. ISBN 978-0-521-11418-9.[9]
  • Public Key Cryptography. Hoboken, N.J: John Wiley & Sons. 22 January 2013. ISBN 978-1-118-31712-9.[10]

References

  1. ^ Birth year from ISNI authority control file, accessed 2018-11-26.
  2. ^ a b c "AMSI Remembers Professor Lynn Batten". AMSI. 5 August 2022. Retrieved 21 June 2024.
  3. ^ LYNN MARGARET BATTEN, The Age, 2 August 2022 (death notice)
  4. ^ Thomas, Jan (May 2002), Mathematical Sciences in Australia: Still Looking for a Future (PDF), Federation of Australian Scientific and Technological Societies and Australian Mathematical Society. See in particular p. 9.
  5. ^ Maslen, Geoff (17 August 2010), "Malice in wonderland: Malicious software deployed by criminals costs Australia $1 billion a year; A team from Deakin University is on the case", Sydney Morning Herald
  6. ^ MR2627081
  7. ^ "About the Author", Public Key Cryptography: Applications and Attacks, Wiley, 2013
  8. ^ Reviews of Combinatorics of Finite Geometries:
  9. ^ Reviews of The Theory of Finite Linear Spaces:
  10. ^ Review of Public Key Cryptography:

External links