The SCEAS System
Navigation Menu

Search the dblp DataBase


Matthew Henricksen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Matthew Henricksen, Ed Dawson
    Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:52-63 [Conf]
  2. Lauren May, Matthew Henricksen, William Millan, Gary Carter, Ed Dawson
    Strengthening the Key Schedule of the AES. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:226-240 [Conf]
  3. Jason Reid, Ian Cheong, Matthew Henricksen, Jason Smith
    A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:403-415 [Conf]
  4. Ming Yao, Matthew Henricksen, Greg Maitland, Ernest Foo, Ed Dawson
    A Mobile Agent System Providing Offer Privacy. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:301-312 [Conf]
  5. Leonie Ruth Simpson, Matthew Henricksen
    Improved Cryptanalysis of MAG. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:64-75 [Conf]
  6. Matthew Henricksen, Ming Yao, Ernest Foo
    An Implementation of the Yao Forward Integrity Protocol for Mobile Agents. [Citation Graph (0, 0)][DBLP]
    Cryptographic Algorithms and their Uses, 2004, pp:110-124 [Conf]
  7. Ming Yao, Kun Peng, Matthew Henricksen, Ernest Foo, Ed Dawson
    Using Recoverable Key Commitment to Defend Against Truncation Attacks in Mobile Agents. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2004, pp:164-173 [Conf]
  8. Kevin Chen, Matthew Henricksen, William Millan, Joanne Fuller, Leonie Ruth Simpson, Ed Dawson, Hoon Jae Lee, Sang-Jae Moon
    Dragon: A Fast Word Based Stream Cipher. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:33-50 [Conf]
  9. Kevin Chen, Leonie Ruth Simpson, Matthew Henricksen, William Millan, Ed Dawson
    A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:418-431 [Conf]
  10. Matthew Henricksen, Ed Dawson
    Rekeying Issues in the MUGI Stream Cipher. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:175-188 [Conf]
  11. Ming Yao, Matthew Henricksen, Ernest Foo, Ed Dawson
    Offer Privacy in Mobile Agents Using Conditionally Anonymous Digital Signatures. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2004, pp:132-141 [Conf]
  12. Sultan Al-Hinai, Ed Dawson, Matthew Henricksen, Leonie Ruth Simpson
    On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:11-28 [Conf]

  13. Improved Cryptanalysis of the Common Scrambling Algorithm Stream Cipher. [Citation Graph (, )][DBLP]

  14. Securing Grid Data Using Mandatory Access Controls. [Citation Graph (, )][DBLP]

  15. Bit-Pattern Based Integral Attack. [Citation Graph (, )][DBLP]

  16. Tiny Dragon - An Encryption Algorithm for Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  17. Cryptanalysis of the CRUSH Hash Function. [Citation Graph (, )][DBLP]

  18. Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.002secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002