30
1993
A Note on Ideal Tripartite Access Structures.

Michael J. Collins
IACR Cryptology ePrint Archive 2002 193

23
2002
The Ice Rink Problem.

Jared Saia , Bernard M. E. Moret , Michael J. Collins , Ling Yu
WAE 104 -111

4
1997
Nonnegative integral subset representations of integer sets

Michael J. Collins , David Kempe , Jared Saia , Maxwell Young
Information Processing Letters 101 ( 3) 129 -133

22
2007
The signature molecular descriptor. 4. Canonizing molecules using extended valence sequences.

Jean-Loup Faulon , Michael J. Collins , Robert D. Carr
Journal of Chemical Information and Computer Sciences 44 ( 2) 427 -436

72
2004
Upper bounds for parent-identifying set systems

Michael J. Collins
Designs, Codes and Cryptography 51 ( 2) 167 -173

19
2009
Improved lower bounds for the link length of rectilinear spanning paths in grids

Michael J. Collins , Bernard M.E. Moret
Information Processing Letters 68 ( 6) 317 -319

14
1998
Covering a set of points with a minimum number of turns

Michael J. Collins
computing and combinatorics conference 467 -474

1
2003
Distance-Avoiding Sequences for Extremely Low-Bandwidth Authentication

Michael J. Collins , Scott Mitchell
SETA '08 Proceedings of the 5th international conference on Sequences and Their Applications 230 -238

2008
The number of distinct subsequences of a random binary string

Michael J Collins
arXiv preprint arXiv:1310.7288

3
2013
Upper bounds for set systems with the identifiable parent property

Michael J Collins
Information Theoretic Security: Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedings 3 100 -106

1
2008
Cost Sharing in the Aspnes Inoculation Model

Michael J Collins
arXiv preprint arXiv:1102.2224

2011
Distance-Avoiding Sets for Extremely Low-Bandwidth Authentication.

Michael J Collins , Scott A Mitchell
Sandia National Lab.(SNL-NM), Albuquerque, NM (United States) ( SAND2007-4543C)

2007
Traitor-tracing on binary strings.

Michael Joseph Collins
IACR Cryptology ePrint Archive 2009 633

2009
Final report for LDRD Project 93633 : new hash function for data protection.

Timothy John Draelos , Nathan Dautenhahn , Richard Crabtree Schroeppel , Keith Michael Tolk

2009
Hybrid cryptography key management.

Timothy John Draelos , Mark Dolan Torgerson , William Douglas Neumann , Donald R. Gallup
Sandia National Laboratories

2003
Low-Bandwidth Authentication

Patrick Joseph Donnelly , Lauren McIver , Brian R. Gaines , Erik Anderson
Sandia National Laboratories

2007
Modeling attacker-defender interactions in information networks.

Michael Joseph Collins
Sandia National Laboratories

2010