dblp.uni-trier.dewww.uni-trier.de

Carlisle M. Adams

Carlisle Adams

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
52EEKathryn Garson, Carlisle Adams: Security and privacy system architecture for an e-hospital environment. IDtrust 2008: 122-130
2007
51 Carlisle M. Adams, Ali Miri, Michael J. Wiener: Selected Areas in Cryptography, 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers Springer 2007
50EEJeremy Clark, Paul C. van Oorschot, Carlisle Adams: Usability of anonymous web browsing: an examination of Tor interfaces and deployability. SOUPS 2007: 41-51
2006
49EEYogesh Kalyani, Carlisle Adams: Privacy Negotiation using a Mobile Agent. CCECE 2006: 628-633
48EEXuebing Qing, Carlisle Adams: KEAML - Key Exchange and Authentication Markup Language. CCECE 2006: 634-638
47EEXuebing Qing, Carlisle Adams: XACML-Based Policy-Driven Access Control for Mobile Environments. CCECE 2006: 643-646
46EEMansour Alsaleh, Carlisle Adams: Enhancing Consumer Privacy in the Liberty Alliance Identity Federation and Web Services Frameworks. Privacy Enhancing Technologies 2006: 59-77
45EECarlisle M. Adams: Designing against a class of algebraic attacks on symmetric block ciphers. Appl. Algebra Eng. Commun. Comput. 17(1): 17-27 (2006)
44EEDeholo Nali, Carlisle M. Adams, Ali Miri: Hierarchical time-based information release. Int. J. Inf. Sec. 5(2): 92-104 (2006)
2005
43EEDeholo Nali, Carlisle M. Adams, Ali Miri: Time-Based Release of Confidential Information in Hierarchical Settings. ISC 2005: 29-43
42EECarlisle Adams: Attributes management. Encyclopedia of Cryptography and Security 2005
41EECarlisle Adams: Authorization Policy. Encyclopedia of Cryptography and Security 2005
40EECarlisle Adams: Authorization architecture. Encyclopedia of Cryptography and Security 2005
39EECarlisle Adams: Authorizations management. Encyclopedia of Cryptography and Security 2005
38EECarlisle Adams: Certificate Management. Encyclopedia of Cryptography and Security 2005
37EECarlisle Adams: Certificate Revocation. Encyclopedia of Cryptography and Security 2005
36EECarlisle Adams: Certificate. Encyclopedia of Cryptography and Security 2005
35EECarlisle Adams: Certification Authority. Encyclopedia of Cryptography and Security 2005
34EECarlisle Adams: Dictionary Attack (II). Encyclopedia of Cryptography and Security 2005
33EECarlisle Adams: Entitlements Management. Encyclopedia of Cryptography and Security 2005
32EECarlisle Adams: Identification. Encyclopedia of Cryptography and Security 2005
31EECarlisle Adams: Impersonation Attack. Encyclopedia of Cryptography and Security 2005
30EECarlisle Adams: Kerberos Authentication Protocol. Encyclopedia of Cryptography and Security 2005
29EECarlisle Adams: Master Key. Encyclopedia of Cryptography and Security 2005
28EECarlisle Adams: One-Time Password. Encyclopedia of Cryptography and Security 2005
27EECarlisle Adams: Personal Identification Number (PIN). Encyclopedia of Cryptography and Security 2005
26EECarlisle Adams: Privacy. Encyclopedia of Cryptography and Security 2005
25EECarlisle Adams: Privilege Management. Encyclopedia of Cryptography and Security 2005
24EECarlisle Adams: Replay Attack. Encyclopedia of Cryptography and Security 2005
23EECarlisle Adams: Response. Encyclopedia of Cryptography and Security 2005
22EECarlisle Adams: Rights Management. Encyclopedia of Cryptography and Security 2005
21EECarlisle Adams: Salt. Encyclopedia of Cryptography and Security 2005
20EECarlisle Adams: Trusted Third Party. Encyclopedia of Cryptography and Security 2005
19EECarlisle Adams: User Authentication. Encyclopedia of Cryptography and Security 2005
18EECarlisle M. Adams: Building Secure Web-Based Environments: Understanding Research Interrelationships through a Construction Metaphor. IEEE Security & Privacy 3(1): 74-77 (2005)
2004
17EEJianqiang Shi, Gregor von Bochmann, Carlisle M. Adams: A Trust Model with Statistical Foundation. Formal Aspects in Security and Trust 2004: 145-158
16EECarlisle M. Adams, Guenther Kramer, Serge Mister, Robert J. Zuccherato: On The Security of Key Derivation Functions. ISC 2004: 134-145
15EEDeholo Nali, Carlisle M. Adams, Ali Miri: Using Mediated Identity-Based Cryptography to Support Role-Based Access Control. ISC 2004: 245-256
14EEDeholo Nali, Ali Miri, Carlisle M. Adams: Efficient Revocation of Dynamic Security Privileges in Hierarchically Structured Communities. PST 2004: 219-223
2002
13EECarlisle Adams, Sharon Boeyen: UDDI and WSDL extensions for Web service: a security framework. XML Security 2002: 30-35
2000
12 Howard M. Heys, Carlisle M. Adams: Selected Areas in Cryptography, 6th Annual International Workshop, SAC'99, Kingston, Ontario, Canada, August 9-10, 1999, Proceedings Springer 2000
11EECarlisle M. Adams, Mike Burmester, Yvo Desmedt, Michael K. Reiter, Philip Zimmermann: Which PKI (public key infrastructure) is the right one? (panel session). ACM Conference on Computer and Communications Security 2000: 98-101
10EECarlisle M. Adams, Robert J. Zuccherato: A Global PMI for Electronic Content Distribution. Selected Areas in Cryptography 2000: 158-168
1998
9EESandy Harris, Carlisle M. Adams: Key-Dependent S-Box Manipulations. Selected Areas in Cryptography 1998: 15-26
1997
8 Carlisle M. Adams: Constructing Symmetric Ciphers Using the CAST Design Procedure. Des. Codes Cryptography 12(3): 283-316 (1997)
1992
7EECarlisle M. Adams, Stafford E. Tavares: Generating Bent Sequences. Discrete Applied Mathematics 39(2): 155-159 (1992)
6 Carlisle M. Adams: On Immunity Against Biham and Shamir's ``Differential Cryptanalysis''. Inf. Process. Lett. 41(2): 77-80 (1992)
1990
5 Carlisle M. Adams, Stafford E. Tavares: Generating and counting binary bent sequences. IEEE Transactions on Information Theory 36(5): 1170- (1990)
4 Carlisle M. Adams, Stafford E. Tavares: The Structured Design of Cryptographically Good S-Boxes. J. Cryptology 3(1): 27-41 (1990)
1989
3EECarlisle M. Adams, Stafford E. Tavares: Good S-Boxes Are Easy To Find. CRYPTO 1989: 612-615
2 Carlisle M. Adams, Henk Meijer: Security-related comments regarding McEliece's public-key cryptosystem. IEEE Transactions on Information Theory 35(2): 454-455 (1989)
1987
1EECarlisle M. Adams, Henk Meijer: Security-Related Comments Regarding McEliece's Public-Key Cryptosystem. CRYPTO 1987: 224-228

Coauthor Index

1Mansour Alsaleh [46]
2Gregor von Bochmann [17]
3Sharon Boeyen [13]
4Mike Burmester [11]
5Jeremy Clark [50]
6Yvo Desmedt [11]
7Kathryn Garson [52]
8Sandy Harris [9]
9Howard M. Heys [12]
10Yogesh Kalyani [49]
11Guenther Kramer [16]
12Henk Meijer [1] [2]
13Ali Miri [14] [15] [43] [44] [51]
14Serge Mister [16]
15Deholo Nali [14] [15] [43] [44]
16Paul C. van Oorschot [50]
17Xuebing Qing [47] [48]
18Michael K. Reiter [11]
19Jianqiang Shi [17]
20Stafford E. Tavares [3] [4] [5] [7]
21Michael J. Wiener [51]
22Philip Zimmermann [11]
23Robert J. Zuccherato [10] [16]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)