Books Authored

1.     C. Adams, Introduction to Privacy Enhancing Technologies:  A Classification-Based Approach to Understanding PETs (Springer 2021), 337pp.

2.      C. Adams and S. Lloyd, Understanding PKI:  Concepts, Standards, and Deployment Considerations, 2nd Edition (Addison-Wesley, 2003), 322 pp.  [Korean edition:  INFOBOOK (Pearson Education), 2003]

3.      C. Adams and S. Lloyd, Understanding Public-Key Infrastructure:  Concepts, Standards, and Deployment Considerations (Macmillan Technical Publishing, 1999), 296 pp.  [Japanese edition:  Pearson Education Japan, 2000; Chinese edition:  Macmillan Technical Publishing (PPTPH), 2000; Polish edition:  Macmillan Technical Pub. (Wydawnictwo Robomatic), 2001]

 

Books Edited

1.     G.-V. Jourdan, L. Mounier, C. Adams, F. Sedes, and J. Garcia-Alfaro (Eds.), Revised Selected Papers of the 15th International Symposium on Foundations and Practice of Security – FPS 2022, Lecture Notes in Computer Science (LNCS) 13877, Springer Nature Switzerland AG, 2023.

2.     C. Adams, J. Camenisch (Eds.), Revised Selected Papers of the 24th International Conference on Selected Areas in Cryptography – SAC 2017, Lecture Notes in Computer Science (LNCS) 10719, Springer International Publishing AG, 2018.

3.     C. Adams, A. Miri, and M. Wiener (Eds.),  Proceedings of the 14th Annual International Workshop on Selected Areas in Cryptography – SAC ’07, LNCS 4876, Springer, 2007, 407 pp.

4.     H. Heys and C. Adams (Eds.), Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography – SAC ’99, LNCS 1758, Springer, 2000, 241 pp.

 

Chapters in Books

1.     Associate Editor and Technical Contributor to Encyclopedia of Cryptography, Security, and Privacy, 3rd Edition, P. Samarati, M. Yung, and S. Jajodia (Editors-in-Chief), Springer, 2022.  (Areas of responsibility were Key Management (public and private), Identification, and Security Standards.  Authored or co-authored 29 articles and had editorial responsibility for an additional 2 articles.)

2.     H. Ghafghazi, H. Mouftah, C. Adams, and A. El Mougy, “Security and Privacy in LTE-Based Public Safety Network”, in Wireless Public Safety Networks, Vol. 2, D. Camara and N. Nikaein (Eds.), Wiley-ISTE Public Safety Networks series, Elsevier, 2016, pp. 317-364.

3.     D. Bissessar, C. Adams, and A. Stoianov, “Privacy, Security and Convenience: Biometric Encryption for Smartphone-Based Electronic Travel Documents”, in Recent Advances in Computational Intelligence in Defense and Security, R. Abielmona, R. Falcon, N. Zincir-Heywood, and H. Abbass (Eds.), Springer, Studies in Computational Intelligence, Volume 621, 2016, pp. 339-366.

4.     Member of Board of Advisors and Technical Contributor to Encyclopedia of Cryptography and Security, 2nd Edition, H. van Tilborg and S. Jajodia (Editors-in-Chief), Springer, 2012.  (Areas of responsibility were Key Management (public and private), Identification, and Security Standards.  Authored 10 articles and 6 definitions and had editorial responsibility for an additional 15 articles.)

5.      A. Essex, J. Clark, and C. Adams, “Aperio:  High Integrity Elections for Developing Countries”, in Towards Trustworthy Elections:  New Directions in Electronic Voting, D. Chaum, et al. (Eds.), IAVOSS/Springer-Verlag, Berlin Heidelberg, 2010, pp. 388-401.  [This is a revised and extended version of the WOTE 2008 paper.]

6.      J. Clark, P. Gauvin, and C. Adams, “Exit Node Repudiation for Anonymity Networks”, in On the Identity Trail:  Privacy, Anonymity and Identity in a Networked Society, I. Kerr, V. Steeves, and C. Lucock (Eds.), Oxford University Press, 2009, pp. 399-416.

7.      J. Chandler, K. el-Khatib, M. Benyoucef, G. v. Bochmann, and C. Adams, “Legal Challenges of Online Reputation Systems”, in Trust in E-Services:  Technologies, Practices and Challenges, R. Song, Ed., Idea Group Publishing, 2007, pp. 84-111.

8.      C. Adams and K. Barbieri, “Privacy Enforcement in E-Services Environments”, in Privacy Protection for E-Services, G. Yee, Ed., Idea Group Publishing, 2006, pp. 172-202.

9.      Member of Board of Advisors and Technical Contributor to Encyclopedia of Cryptography and Security, H. van Tilborg (Editor-in-Chief), Springer, 2005.  (Areas of responsibility were Key Management (public and private), Identification, Authorization, Privacy, and Security Standards.  Authored 6 articles and 17 definitions and had editorial responsibility for an additional 14 articles.)

10.    Appendix 3A, “Bent Functions”, and Section 4.5, “CAST-128”, in W. Stallings, Cryptography and Network Security:  Principles and Practice, 2nd edition, (Prentice Hall, 1999), pp 91-92 and 120-124

 

Theses

A Formal and Practical Design Procedure for Substitution-Permutation Network Cryptosystems, Ph.D. thesis, Department of Electrical Engineering, Queen’s University, Kingston, Ontario, Canada, 1990.

Examination and Analysis of McEliece’s Public-Key Cryptosystem, M.Sc. thesis, Department of Computing and Information Science, Queen’s University, Kingston, Ontario, Canada, 1985.