|
Search the dblp DataBase
Matthew Henricksen:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Matthew Henricksen, Ed Dawson
Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond. [Citation Graph (0, 0)][DBLP] ACISP, 2006, pp:52-63 [Conf]
- Lauren May, Matthew Henricksen, William Millan, Gary Carter, Ed Dawson
Strengthening the Key Schedule of the AES. [Citation Graph (0, 0)][DBLP] ACISP, 2002, pp:226-240 [Conf]
- Jason Reid, Ian Cheong, Matthew Henricksen, Jason Smith
A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems. [Citation Graph (0, 0)][DBLP] ACISP, 2003, pp:403-415 [Conf]
- Ming Yao, Matthew Henricksen, Greg Maitland, Ernest Foo, Ed Dawson
A Mobile Agent System Providing Offer Privacy. [Citation Graph (0, 0)][DBLP] ACISP, 2004, pp:301-312 [Conf]
- Leonie Ruth Simpson, Matthew Henricksen
Improved Cryptanalysis of MAG. [Citation Graph (0, 0)][DBLP] ACISP, 2006, pp:64-75 [Conf]
- Matthew Henricksen, Ming Yao, Ernest Foo
An Implementation of the Yao Forward Integrity Protocol for Mobile Agents. [Citation Graph (0, 0)][DBLP] Cryptographic Algorithms and their Uses, 2004, pp:110-124 [Conf]
- Ming Yao, Kun Peng, Matthew Henricksen, Ernest Foo, Ed Dawson
Using Recoverable Key Commitment to Defend Against Truncation Attacks in Mobile Agents. [Citation Graph (0, 0)][DBLP] EC-Web, 2004, pp:164-173 [Conf]
- Kevin Chen, Matthew Henricksen, William Millan, Joanne Fuller, Leonie Ruth Simpson, Ed Dawson, Hoon Jae Lee, Sang-Jae Moon
Dragon: A Fast Word Based Stream Cipher. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:33-50 [Conf]
- Kevin Chen, Leonie Ruth Simpson, Matthew Henricksen, William Millan, Ed Dawson
A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:418-431 [Conf]
- Matthew Henricksen, Ed Dawson
Rekeying Issues in the MUGI Stream Cipher. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2005, pp:175-188 [Conf]
- Ming Yao, Matthew Henricksen, Ernest Foo, Ed Dawson
Offer Privacy in Mobile Agents Using Conditionally Anonymous Digital Signatures. [Citation Graph (0, 0)][DBLP] TrustBus, 2004, pp:132-141 [Conf]
- Sultan Al-Hinai, Ed Dawson, Matthew Henricksen, Leonie Ruth Simpson
On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks. [Citation Graph (0, 0)][DBLP] ACISP, 2007, pp:11-28 [Conf]
Improved Cryptanalysis of the Common Scrambling Algorithm Stream Cipher. [Citation Graph (, )][DBLP]
Securing Grid Data Using Mandatory Access Controls. [Citation Graph (, )][DBLP]
Bit-Pattern Based Integral Attack. [Citation Graph (, )][DBLP]
Tiny Dragon - An Encryption Algorithm for Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Cryptanalysis of the CRUSH Hash Function. [Citation Graph (, )][DBLP]
Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|