Marie Henderson

According to our database1, Marie Henderson authored at least 12 papers between 1998 and 2014.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Planning Security Services for IT Systems.
CoRR, 2014

2013
On a conjecture on planar polynomials of the form <i>X</i>(Tr<sub><i>n</i></sub>(<i>X</i>)-<i>u</i><i>X</i>).
Finite Fields Their Appl., 2013

2009
A note on constructing permutation polynomials.
Finite Fields Their Appl., 2009

2007
Planar polynomials for commutative semifields with specified nuclei.
Des. Codes Cryptogr., 2007

2002
Modelling Trust Structures for Public Key Infrastructures.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2001
Applications of Trusted Review to Information Security.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

2000
A State-Based Model for Certificate Management Systems.
Proceedings of the Public Key Cryptography, 2000

Towards Certificate Verification in a Certificate Management System.
Proceedings of the 23rd Australasian Computer Science Conference (ACSC 2000), 31 January, 2000

The PKI Specification Dilemma: A Formal Solution.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
A class of functions and their application in constructing semi-biplanes and association schemes.
Discret. Math., 1999

Formalizing certificate management systems.
Proceedings of the IEEE International Conference on Networks 1999, 1999

1998
Applications of Linearised and Sub-linearised Polynomials to Information Security.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998


  Loading...