Matt Henricksen

424 total citations
7 papers, 39 citations indexed

About

Matt Henricksen is a scholar working on Artificial Intelligence, Computer Vision and Pattern Recognition and Computer Networks and Communications. According to data from OpenAlex, Matt Henricksen has authored 7 papers receiving a total of 39 indexed citations (citations by other indexed papers that have themselves been cited), including 6 papers in Artificial Intelligence, 4 papers in Computer Vision and Pattern Recognition and 2 papers in Computer Networks and Communications. Recurrent topics in Matt Henricksen's work include Cryptographic Implementations and Security (5 papers), Chaos-based Image/Signal Encryption (4 papers) and Coding theory and cryptography (4 papers). Matt Henricksen is often cited by papers focused on Cryptographic Implementations and Security (5 papers), Chaos-based Image/Signal Encryption (4 papers) and Coding theory and cryptography (4 papers). Matt Henricksen collaborates with scholars based in Singapore, Australia and Malaysia. Matt Henricksen's co-authors include Wun‐She Yap, Joseph K. Liu, Swee‐Huay Heng, Peter Croll, Jiqiang Lu, Ed Dawson, Kenneth Koon‐Ho Wong, Håvard Raddum, Leonie Simpson and Nasour Bagheri and has published in prestigious journals such as IEEE Communications Letters, Information Processing Letters and Security and Communication Networks.

In The Last Decade

Matt Henricksen

6 papers receiving 38 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Matt Henricksen Singapore 4 29 26 10 10 8 7 39
Anand Rajavat India 5 20 0.7× 17 0.7× 17 1.7× 11 1.1× 12 1.5× 27 62
Michael Richardson Canada 5 17 0.6× 28 1.1× 10 1.0× 9 0.9× 2 0.3× 10 44
Michael Clear Ireland 4 14 0.5× 15 0.6× 7 0.7× 10 1.0× 3 0.4× 6 40
Carl Reed United States 2 11 0.4× 26 1.0× 11 1.1× 5 0.5× 11 1.4× 4 42
Jim Schaad 3 18 0.6× 37 1.4× 11 1.1× 12 1.2× 4 0.5× 3 58
Michael Østergaard Pedersen Switzerland 2 25 0.9× 20 0.8× 21 2.1× 8 0.8× 2 0.3× 2 38
Gerhard de Koning Gans Netherlands 6 19 0.7× 21 0.8× 19 1.9× 8 0.8× 3 0.4× 7 42
C. Lü China 3 36 1.2× 8 0.3× 4 0.4× 12 1.2× 6 0.8× 3 50
R. Glenn United States 2 23 0.8× 48 1.8× 10 1.0× 30 3.0× 8 1.0× 2 60
Sudheesh Singanamalla United States 4 16 0.6× 17 0.7× 16 1.6× 4 0.4× 4 0.5× 8 40

Countries citing papers authored by Matt Henricksen

Since Specialization
Citations

This map shows the geographic impact of Matt Henricksen's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Matt Henricksen with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Matt Henricksen more than expected).

Fields of papers citing papers by Matt Henricksen

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Matt Henricksen. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Matt Henricksen. The network helps show where Matt Henricksen may publish in the future.

Co-authorship network of co-authors of Matt Henricksen

This figure shows the co-authorship network connecting the top 25 collaborators of Matt Henricksen. A scholar is included among the top collaborators of Matt Henricksen based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Matt Henricksen. Matt Henricksen is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

7 of 7 papers shown
1.
Yap, Wun‐She, et al.. (2013). Comments on "Analysis and Improvement of a Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions". IEEE Communications Letters. 17(8). 1521–1523. 23 indexed citations
2.
Yap, Wun‐She, et al.. (2013). Security analysis of GCM for communication. Security and Communication Networks. 7(5). 854–864. 3 indexed citations
3.
Lu, Jiqiang, Wun‐She Yap, Matt Henricksen, & Swee‐Huay Heng. (2013). Differential attack on nine rounds of the SEED block cipher. Information Processing Letters. 114(3). 116–123. 3 indexed citations
4.
Z’aba, Muhammad Reza, Håvard Raddum, Leonie Simpson, et al.. (2009). Algebraic Analysis of LEX. QUT ePrints (Queensland University of Technology). 2 indexed citations
5.
Bagheri, Nasour, et al.. (2009). Cryptanalysis of an Iterated Halving-based hash function: CRUSH. IET Information Security. 3(4). 129–138.
6.
Henricksen, Matt. (2008). Tiny Dragon - An Encryption Algorithm for Wireless Sensor Networks. 2365. 795–800. 6 indexed citations
7.
Croll, Peter, et al.. (2007). Utilizing SELinux to mandate ultra-secure access control of medical records.. PubMed. 129(Pt 1). 498–502. 2 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026