2008 |
52 | EE | Kathryn Garson,
Carlisle Adams:
Security and privacy system architecture for an e-hospital environment.
IDtrust 2008: 122-130 |
2007 |
51 | | Carlisle M. Adams,
Ali Miri,
Michael J. Wiener:
Selected Areas in Cryptography, 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers
Springer 2007 |
50 | EE | Jeremy Clark,
Paul C. van Oorschot,
Carlisle Adams:
Usability of anonymous web browsing: an examination of Tor interfaces and deployability.
SOUPS 2007: 41-51 |
2006 |
49 | EE | Yogesh Kalyani,
Carlisle Adams:
Privacy Negotiation using a Mobile Agent.
CCECE 2006: 628-633 |
48 | EE | Xuebing Qing,
Carlisle Adams:
KEAML - Key Exchange and Authentication Markup Language.
CCECE 2006: 634-638 |
47 | EE | Xuebing Qing,
Carlisle Adams:
XACML-Based Policy-Driven Access Control for Mobile Environments.
CCECE 2006: 643-646 |
46 | EE | Mansour Alsaleh,
Carlisle Adams:
Enhancing Consumer Privacy in the Liberty Alliance Identity Federation and Web Services Frameworks.
Privacy Enhancing Technologies 2006: 59-77 |
45 | EE | Carlisle M. Adams:
Designing against a class of algebraic attacks on symmetric block ciphers.
Appl. Algebra Eng. Commun. Comput. 17(1): 17-27 (2006) |
44 | EE | Deholo Nali,
Carlisle M. Adams,
Ali Miri:
Hierarchical time-based information release.
Int. J. Inf. Sec. 5(2): 92-104 (2006) |
2005 |
43 | EE | Deholo Nali,
Carlisle M. Adams,
Ali Miri:
Time-Based Release of Confidential Information in Hierarchical Settings.
ISC 2005: 29-43 |
42 | EE | Carlisle Adams:
Attributes management.
Encyclopedia of Cryptography and Security 2005 |
41 | EE | Carlisle Adams:
Authorization Policy.
Encyclopedia of Cryptography and Security 2005 |
40 | EE | Carlisle Adams:
Authorization architecture.
Encyclopedia of Cryptography and Security 2005 |
39 | EE | Carlisle Adams:
Authorizations management.
Encyclopedia of Cryptography and Security 2005 |
38 | EE | Carlisle Adams:
Certificate Management.
Encyclopedia of Cryptography and Security 2005 |
37 | EE | Carlisle Adams:
Certificate Revocation.
Encyclopedia of Cryptography and Security 2005 |
36 | EE | Carlisle Adams:
Certificate.
Encyclopedia of Cryptography and Security 2005 |
35 | EE | Carlisle Adams:
Certification Authority.
Encyclopedia of Cryptography and Security 2005 |
34 | EE | Carlisle Adams:
Dictionary Attack (II).
Encyclopedia of Cryptography and Security 2005 |
33 | EE | Carlisle Adams:
Entitlements Management.
Encyclopedia of Cryptography and Security 2005 |
32 | EE | Carlisle Adams:
Identification.
Encyclopedia of Cryptography and Security 2005 |
31 | EE | Carlisle Adams:
Impersonation Attack.
Encyclopedia of Cryptography and Security 2005 |
30 | EE | Carlisle Adams:
Kerberos Authentication Protocol.
Encyclopedia of Cryptography and Security 2005 |
29 | EE | Carlisle Adams:
Master Key.
Encyclopedia of Cryptography and Security 2005 |
28 | EE | Carlisle Adams:
One-Time Password.
Encyclopedia of Cryptography and Security 2005 |
27 | EE | Carlisle Adams:
Personal Identification Number (PIN).
Encyclopedia of Cryptography and Security 2005 |
26 | EE | Carlisle Adams:
Privacy.
Encyclopedia of Cryptography and Security 2005 |
25 | EE | Carlisle Adams:
Privilege Management.
Encyclopedia of Cryptography and Security 2005 |
24 | EE | Carlisle Adams:
Replay Attack.
Encyclopedia of Cryptography and Security 2005 |
23 | EE | Carlisle Adams:
Response.
Encyclopedia of Cryptography and Security 2005 |
22 | EE | Carlisle Adams:
Rights Management.
Encyclopedia of Cryptography and Security 2005 |
21 | EE | Carlisle Adams:
Salt.
Encyclopedia of Cryptography and Security 2005 |
20 | EE | Carlisle Adams:
Trusted Third Party.
Encyclopedia of Cryptography and Security 2005 |
19 | EE | Carlisle Adams:
User Authentication.
Encyclopedia of Cryptography and Security 2005 |
18 | EE | Carlisle M. Adams:
Building Secure Web-Based Environments: Understanding Research Interrelationships through a Construction Metaphor.
IEEE Security & Privacy 3(1): 74-77 (2005) |
2004 |
17 | EE | Jianqiang Shi,
Gregor von Bochmann,
Carlisle M. Adams:
A Trust Model with Statistical Foundation.
Formal Aspects in Security and Trust 2004: 145-158 |
16 | EE | Carlisle M. Adams,
Guenther Kramer,
Serge Mister,
Robert J. Zuccherato:
On The Security of Key Derivation Functions.
ISC 2004: 134-145 |
15 | EE | Deholo Nali,
Carlisle M. Adams,
Ali Miri:
Using Mediated Identity-Based Cryptography to Support Role-Based Access Control.
ISC 2004: 245-256 |
14 | EE | Deholo Nali,
Ali Miri,
Carlisle M. Adams:
Efficient Revocation of Dynamic Security Privileges in Hierarchically Structured Communities.
PST 2004: 219-223 |
2002 |
13 | EE | Carlisle Adams,
Sharon Boeyen:
UDDI and WSDL extensions for Web service: a security framework.
XML Security 2002: 30-35 |
2000 |
12 | | Howard M. Heys,
Carlisle M. Adams:
Selected Areas in Cryptography, 6th Annual International Workshop, SAC'99, Kingston, Ontario, Canada, August 9-10, 1999, Proceedings
Springer 2000 |
11 | EE | Carlisle M. Adams,
Mike Burmester,
Yvo Desmedt,
Michael K. Reiter,
Philip Zimmermann:
Which PKI (public key infrastructure) is the right one? (panel session).
ACM Conference on Computer and Communications Security 2000: 98-101 |
10 | EE | Carlisle M. Adams,
Robert J. Zuccherato:
A Global PMI for Electronic Content Distribution.
Selected Areas in Cryptography 2000: 158-168 |
1998 |
9 | EE | Sandy Harris,
Carlisle M. Adams:
Key-Dependent S-Box Manipulations.
Selected Areas in Cryptography 1998: 15-26 |
1997 |
8 | | Carlisle M. Adams:
Constructing Symmetric Ciphers Using the CAST Design Procedure.
Des. Codes Cryptography 12(3): 283-316 (1997) |
1992 |
7 | EE | Carlisle M. Adams,
Stafford E. Tavares:
Generating Bent Sequences.
Discrete Applied Mathematics 39(2): 155-159 (1992) |
6 | | Carlisle M. Adams:
On Immunity Against Biham and Shamir's ``Differential Cryptanalysis''.
Inf. Process. Lett. 41(2): 77-80 (1992) |
1990 |
5 | | Carlisle M. Adams,
Stafford E. Tavares:
Generating and counting binary bent sequences.
IEEE Transactions on Information Theory 36(5): 1170- (1990) |
4 | | Carlisle M. Adams,
Stafford E. Tavares:
The Structured Design of Cryptographically Good S-Boxes.
J. Cryptology 3(1): 27-41 (1990) |
1989 |
3 | EE | Carlisle M. Adams,
Stafford E. Tavares:
Good S-Boxes Are Easy To Find.
CRYPTO 1989: 612-615 |
2 | | Carlisle M. Adams,
Henk Meijer:
Security-related comments regarding McEliece's public-key cryptosystem.
IEEE Transactions on Information Theory 35(2): 454-455 (1989) |
1987 |
1 | EE | Carlisle M. Adams,
Henk Meijer:
Security-Related Comments Regarding McEliece's Public-Key Cryptosystem.
CRYPTO 1987: 224-228 |