Matt Henricksen
According to our database1,
Matt Henricksen
authored at least 36 papers
between 2002 and 2017.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2017
Proceedings of the Applied Cryptography and Network Security, 2017
2015
Time-Memory Trade-Off Attack on the GSM A5/1 Stream Cipher Using Commodity GPGPU - (Extended Abstract).
Proceedings of the Applied Cryptography and Network Security, 2015
2014
Inf. Process. Lett., 2014
2013
Comments on "Analysis and Improvement of a Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions".
IEEE Commun. Lett., 2013
Proceedings of the Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, 2013
Proceedings of the SECRYPT 2013, 2013
2012
Two Dragons - A Family of Fast Word-based Stream Ciphers.
Proceedings of the SECRYPT 2012, 2012
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Information Security, 14th International Conference, 2011
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011
2010
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010
2009
IET Inf. Secur., 2009
Proceedings of the Seventh Australasian Information Security Conference, 2009
Proceedings of the Advances in Computer Science, 2009
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009
2008
Proceedings of the New Stream Cipher Designs - The eSTREAM Finalists, 2008
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008
2007
Proceedings of the Selected Areas in Cryptography, 14th International Workshop, 2007
Proceedings of the MEDINFO 2007 - Proceedings of the 12th World Congress on Health (Medical) Informatics, 2007
Proceedings of the ACSW Frontiers 2007. Proceedings of the Fifth Australasian Symposium on Grid Computing and e-Research (AusGrid 2007), the Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), and the Australasian Workshop on Health Knowledge Management and Discovery (HKMD 2007). Proceedings, Ballarat, Victoria, Australia, January 30, 2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
2005
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005
2004
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004
Proceedings of the Information Security and Cryptology, 2004
Using Recoverable Key Commitment to Defend Against Truncation Attacks in Mobile Agents.
Proceedings of the E-Commerce and Web Technologies, 5th International Conference, 2004
An Implementation of the Yao Forward Integrity Protocol for Mobile Agents.
Proceedings of the Cryptographic Algorithms and their Uses, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
Proceedings of the Information Security and Cryptology, 2003
A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002