QUT ePrints

Browse By Person: Henricksen, Matthew

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | Date
Number of items: 22.

Book Chapter

Dawson, Ed, Henricksen, Matthew, & Simpson, Leonie (2008) The Dragon stream cipher: Design, analysis and implementation issues. In Robshaw, M & OBillet, O (Eds.) New Stream Cipher Designs: The eSTREAM Finalists. Springer, Germany, Heidelberg, pp. 20-38.

Journal Article

Dawson, Ed, Henricksen, Matthew, Raddum, Havard, & Z'Aba, Muhammad (2008) Bit-pattern based integral attack. Fast Software Encryption (LNCS), 5086, pp. 363-381.
Number of citations in Scopus 14
Number of citations in Web of Science® 14

Chen, Kevin, Henricksen, Matthew P., Millan, William L., Fuller, Joanne, Simpson, Leonie, Dawson, Edward, et al. (2005) Dragon: A Fast Word Based Stream Cipher. Lecture Notes in Computer Science : Information Security and Cryptology (ICISC 2004), 3506, pp. 33-50.
Number of full-text downloads 140
Number of citations in Scopus 3

Conference Paper

Z'aba, Muhammad Reza, Raddum, Havard, Simpson, Leonie, Dawson, Ed, Henricksen, Matt, & Wong, Kenneth (2009) Algebraic Analysis of LEX. In Brankovic, Ljiljana & Susilo, Willy (Eds.) Australasian Information Security Conference (AISC2009), 20-23 January 2009, Wellington, New Zealand.
Number of full-text downloads 138

Simpson, Leonie R., Henricksen, Matthew, & Yap, Wun-She (2009) Improved cryptanalysis of the Common Scrambling Algorithm Stream Cipher. In Proceedings of the 14th Australasian Conference on Information Security and Privacy, 1-3 July 2009, Brisbane, Australia.
Number of full-text downloads 2,950
Number of citations in Scopus 2

Al-Hinai, Sultan Z., Dawson, Edward P., Henricksen, Matt, & Simpson, Leonie R. (2007) On the security of the LILI family of stream ciphers against algebraic attacks. In Pieprzyk, Josef, Ghodosi, Hossein, & Dawson, Edward P. (Eds.) 12th Australasian Conference, ACISP 2007: Information Security and Privacy, July 2-4, 2007, Townsville, Australia.
Number of full-text downloads 220
Number of citations in Scopus 5
Number of citations in Web of Science® 5

Henricksen, Matthew P. W., Caelli, William J., & Croll, Peter R. (2007) Securing grid data using mandatory access controls. In Brankovic, L., Coddington, P., & Roddick, J. (Eds.) ACSW Frontiers 2007, Australian Computer Society, Ballarat, Australia, pp. 25-32.
Number of full-text downloads 267

Croll, Peter R., Henricksen, Matthew P., Caelli, William J., & Liu, Vicky (2007) Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records. In Kuhn, Klaus A., Warren, James R., & Leong, Tze-Yun (Eds.) MEDINFO 2007: the 12th World Congress on Health (Medical) Informatics – Building Sustainable Health Systems, 20-24 August 2007, Brisbane, Australia.
Number of full-text downloads 93

Dawson, Edward & Henricksen, Matthew (2006) Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond. In Batten, L & Safavi-Naini, R (Eds.) Information Security and Privacy (LNCS 4058), 3 - 5 July 2006, Australia, Victoria, Melbourne.
Number of full-text downloads 64

Henricksen, Matthew & Simpson, Leonie (2006) Improved Cryptanalysis of MAG. In Batten, L & Safavi-Naini, R (Eds.) Information Security and Privacy (LNCS 4058), 3 - 5 July 2006, Australia, Victoria, Melbourne.
Number of citations in Web of Science® 1

Dawson, Edward & Henricksen, Matthew (2006) Rekeying Issues in the MUGI Stream Cipher. In Preneel, P & Tavares, S (Eds.) Selected Areas in Cryptography (LNCS 3897), 11 - 12 August 2005, Canada, Ontario, Kingston.
Number of full-text downloads 111
Number of citations in Scopus 3
Number of citations in Web of Science® 2

Chen, Kevin, Simpson, Leonie R., Henricksen, Matthew, & Millan, William L. (2004) A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher. In Lim, Jong In & Lee, Dong Hoon (Eds.) Information Security and Cryptology - ICISC 2003. Sixth International Conference ., November, Seoul, Korea.

Foo, Ernest, Henricksen, Matthew, & Yao, Minna (2004) An Implementation of the Yao Forward Integrity Protocol for Mobile Agents. In Dawson, E & Klemm, W (Eds.) Cryptographic Algorithms and Their Uses, 5-6 July 2004, Gold Coast, Queensland.

Dawson, Edward, Foo, Ernest, Henricksen, Matthew, Maitland, Gregory, & Yao, Minna (2004) A Mobile Agent System Providing Offer Privacy. In Wang, , Pieprzyk, , & Varadharajan, (Eds.) Information Security and Privacy - ACISP 2004 (LNCS 3108), 13-15 July 2004, Sydney, New South Wales.
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Dawson, Edward, Foo, Ernest, Henricksen, Matthew, & Yao, Minna (2004) A New Security Architecture for Protecting the Dynamic Component of Mobile Agents. In Mohammadian, (Ed.) International Conference on Intelligent Agents, Web Technologies and Internet Commerce (IAWTIC 2004), 12 - 14 July 2004, Gold Coast, Australia.

Dawson, Edward, Foo, Ernest, Henricksen, Matthew, & Yao, Minna (2004) Offer Privacy in Mobile Agents Using Conditionally Anonymous Digital Signatures. In Katsikas, Sokratis, Lopez, Javier, & Pernul, Gunther (Eds.) Trust and Privacy in Digital Business. First International Conference, TrustBus 2004, 30 August - 1 September 2004, Zaragoza, Spain.
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Dawson, Edward, Foo, Ernest, Henricksen, Matthew, Peng, Kun, & Yao, Minna (2004) Using Recoverable Key Commitment to Defend Against Truncation Attacks in Mobile Agents. In Bauknecht, Kurt, Bichler, Martin, & Proll, Birgit (Eds.) E-Commerce and Web Technologies - EC-Web 2004. Fifth International Conference Proceedings., 31 August - 3 September 2004, Zaragoza, Spain.
Number of citations in Scopus 1
Number of citations in Web of Science® 3

Reid, Jason F., Cheong, Ian, Henricksen, Matthew P., & Smith, Jason (2003) A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems. In Safavi-Naini, Rei & Seberry, Jennifer (Eds.) 8th Australasian Conference on Information Security and Privacy (ACISP 2003), July 9-11, 2003, Wollongong.
Number of full-text downloads 433
Number of citations in Scopus 5
Number of citations in Web of Science® 4

Caelli, William, Chen, Kevin, Dawson, Edward, Henricksen, Matthew, Lopez, Javier, Okamoto, Eiji, et al. (2002) Online Public Key Infrastructure. In Gonzalez, S & Martinez, C (Eds.) VII Spanish Meeting on Cryptology and Information Security (VII RECSI), 5-7 September, 2002, Asturias, Spain.

Carter, Gary, Dawson, Edward, Henricksen, Matthew, May, Lauren, & Millan, William (2002) Strengthening the Key Schedule of the AES. In Batten, & Seberry, (Eds.) Information Security and Privacy (ACISP 02), 3-5 July, 2002, Melbourne.
Number of citations in Web of Science® 6

Conference Item

Liu, Vicky, Caelli, William J., May, Lauren J., Croll, Peter R., & Henricksen, Matthew P. (2007) Current Approaches to Secure Health Information Systems are Not Sustainable: an Analysis. In Medinfo 2007, 20- 24 Aug 2007, Brisbane, Australia.
Number of full-text downloads 132

QUT Thesis

Henricksen, Matthew (2005) Design, Implementation and Cryptanalysis of Modern Symmetric Ciphers. PhD thesis, Queensland University of Technology.
Number of full-text downloads 3,600

This list was generated on Fri Dec 19 15:57:34 2014 AEST.