| 2008 |
| 52 | EE | Kathryn Garson,
Carlisle Adams:
Security and privacy system architecture for an e-hospital environment.
IDtrust 2008: 122-130 |
| 2007 |
| 51 | | Carlisle M. Adams,
Ali Miri,
Michael J. Wiener:
Selected Areas in Cryptography, 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers
Springer 2007 |
| 50 | EE | Jeremy Clark,
Paul C. van Oorschot,
Carlisle Adams:
Usability of anonymous web browsing: an examination of Tor interfaces and deployability.
SOUPS 2007: 41-51 |
| 2006 |
| 49 | EE | Yogesh Kalyani,
Carlisle Adams:
Privacy Negotiation using a Mobile Agent.
CCECE 2006: 628-633 |
| 48 | EE | Xuebing Qing,
Carlisle Adams:
KEAML - Key Exchange and Authentication Markup Language.
CCECE 2006: 634-638 |
| 47 | EE | Xuebing Qing,
Carlisle Adams:
XACML-Based Policy-Driven Access Control for Mobile Environments.
CCECE 2006: 643-646 |
| 46 | EE | Mansour Alsaleh,
Carlisle Adams:
Enhancing Consumer Privacy in the Liberty Alliance Identity Federation and Web Services Frameworks.
Privacy Enhancing Technologies 2006: 59-77 |
| 45 | EE | Carlisle M. Adams:
Designing against a class of algebraic attacks on symmetric block ciphers.
Appl. Algebra Eng. Commun. Comput. 17(1): 17-27 (2006) |
| 44 | EE | Deholo Nali,
Carlisle M. Adams,
Ali Miri:
Hierarchical time-based information release.
Int. J. Inf. Sec. 5(2): 92-104 (2006) |
| 2005 |
| 43 | EE | Deholo Nali,
Carlisle M. Adams,
Ali Miri:
Time-Based Release of Confidential Information in Hierarchical Settings.
ISC 2005: 29-43 |
| 42 | EE | Carlisle Adams:
Attributes management.
Encyclopedia of Cryptography and Security 2005 |
| 41 | EE | Carlisle Adams:
Authorization Policy.
Encyclopedia of Cryptography and Security 2005 |
| 40 | EE | Carlisle Adams:
Authorization architecture.
Encyclopedia of Cryptography and Security 2005 |
| 39 | EE | Carlisle Adams:
Authorizations management.
Encyclopedia of Cryptography and Security 2005 |
| 38 | EE | Carlisle Adams:
Certificate Management.
Encyclopedia of Cryptography and Security 2005 |
| 37 | EE | Carlisle Adams:
Certificate Revocation.
Encyclopedia of Cryptography and Security 2005 |
| 36 | EE | Carlisle Adams:
Certificate.
Encyclopedia of Cryptography and Security 2005 |
| 35 | EE | Carlisle Adams:
Certification Authority.
Encyclopedia of Cryptography and Security 2005 |
| 34 | EE | Carlisle Adams:
Dictionary Attack (II).
Encyclopedia of Cryptography and Security 2005 |
| 33 | EE | Carlisle Adams:
Entitlements Management.
Encyclopedia of Cryptography and Security 2005 |
| 32 | EE | Carlisle Adams:
Identification.
Encyclopedia of Cryptography and Security 2005 |
| 31 | EE | Carlisle Adams:
Impersonation Attack.
Encyclopedia of Cryptography and Security 2005 |
| 30 | EE | Carlisle Adams:
Kerberos Authentication Protocol.
Encyclopedia of Cryptography and Security 2005 |
| 29 | EE | Carlisle Adams:
Master Key.
Encyclopedia of Cryptography and Security 2005 |
| 28 | EE | Carlisle Adams:
One-Time Password.
Encyclopedia of Cryptography and Security 2005 |
| 27 | EE | Carlisle Adams:
Personal Identification Number (PIN).
Encyclopedia of Cryptography and Security 2005 |
| 26 | EE | Carlisle Adams:
Privacy.
Encyclopedia of Cryptography and Security 2005 |
| 25 | EE | Carlisle Adams:
Privilege Management.
Encyclopedia of Cryptography and Security 2005 |
| 24 | EE | Carlisle Adams:
Replay Attack.
Encyclopedia of Cryptography and Security 2005 |
| 23 | EE | Carlisle Adams:
Response.
Encyclopedia of Cryptography and Security 2005 |
| 22 | EE | Carlisle Adams:
Rights Management.
Encyclopedia of Cryptography and Security 2005 |
| 21 | EE | Carlisle Adams:
Salt.
Encyclopedia of Cryptography and Security 2005 |
| 20 | EE | Carlisle Adams:
Trusted Third Party.
Encyclopedia of Cryptography and Security 2005 |
| 19 | EE | Carlisle Adams:
User Authentication.
Encyclopedia of Cryptography and Security 2005 |
| 18 | EE | Carlisle M. Adams:
Building Secure Web-Based Environments: Understanding Research Interrelationships through a Construction Metaphor.
IEEE Security & Privacy 3(1): 74-77 (2005) |
| 2004 |
| 17 | EE | Jianqiang Shi,
Gregor von Bochmann,
Carlisle M. Adams:
A Trust Model with Statistical Foundation.
Formal Aspects in Security and Trust 2004: 145-158 |
| 16 | EE | Carlisle M. Adams,
Guenther Kramer,
Serge Mister,
Robert J. Zuccherato:
On The Security of Key Derivation Functions.
ISC 2004: 134-145 |
| 15 | EE | Deholo Nali,
Carlisle M. Adams,
Ali Miri:
Using Mediated Identity-Based Cryptography to Support Role-Based Access Control.
ISC 2004: 245-256 |
| 14 | EE | Deholo Nali,
Ali Miri,
Carlisle M. Adams:
Efficient Revocation of Dynamic Security Privileges in Hierarchically Structured Communities.
PST 2004: 219-223 |
| 2002 |
| 13 | EE | Carlisle Adams,
Sharon Boeyen:
UDDI and WSDL extensions for Web service: a security framework.
XML Security 2002: 30-35 |
| 2000 |
| 12 | | Howard M. Heys,
Carlisle M. Adams:
Selected Areas in Cryptography, 6th Annual International Workshop, SAC'99, Kingston, Ontario, Canada, August 9-10, 1999, Proceedings
Springer 2000 |
| 11 | EE | Carlisle M. Adams,
Mike Burmester,
Yvo Desmedt,
Michael K. Reiter,
Philip Zimmermann:
Which PKI (public key infrastructure) is the right one? (panel session).
ACM Conference on Computer and Communications Security 2000: 98-101 |
| 10 | EE | Carlisle M. Adams,
Robert J. Zuccherato:
A Global PMI for Electronic Content Distribution.
Selected Areas in Cryptography 2000: 158-168 |
| 1998 |
| 9 | EE | Sandy Harris,
Carlisle M. Adams:
Key-Dependent S-Box Manipulations.
Selected Areas in Cryptography 1998: 15-26 |
| 1997 |
| 8 | | Carlisle M. Adams:
Constructing Symmetric Ciphers Using the CAST Design Procedure.
Des. Codes Cryptography 12(3): 283-316 (1997) |
| 1992 |
| 7 | EE | Carlisle M. Adams,
Stafford E. Tavares:
Generating Bent Sequences.
Discrete Applied Mathematics 39(2): 155-159 (1992) |
| 6 | | Carlisle M. Adams:
On Immunity Against Biham and Shamir's ``Differential Cryptanalysis''.
Inf. Process. Lett. 41(2): 77-80 (1992) |
| 1990 |
| 5 | | Carlisle M. Adams,
Stafford E. Tavares:
Generating and counting binary bent sequences.
IEEE Transactions on Information Theory 36(5): 1170- (1990) |
| 4 | | Carlisle M. Adams,
Stafford E. Tavares:
The Structured Design of Cryptographically Good S-Boxes.
J. Cryptology 3(1): 27-41 (1990) |
| 1989 |
| 3 | EE | Carlisle M. Adams,
Stafford E. Tavares:
Good S-Boxes Are Easy To Find.
CRYPTO 1989: 612-615 |
| 2 | | Carlisle M. Adams,
Henk Meijer:
Security-related comments regarding McEliece's public-key cryptosystem.
IEEE Transactions on Information Theory 35(2): 454-455 (1989) |
| 1987 |
| 1 | EE | Carlisle M. Adams,
Henk Meijer:
Security-Related Comments Regarding McEliece's Public-Key Cryptosystem.
CRYPTO 1987: 224-228 |