Books Authored

1.      C. Adams and S. Lloyd, Understanding PKI:  Concepts, Standards, and Deployment Considerations, 2nd Edition (Addison-Wesley, 2003), 322 pp.  [Korean edition:  INFOBOOK (Pearson Education), 2003]

2.      C. Adams and S. Lloyd, Understanding Public-Key Infrastructure:  Concepts, Standards, and Deployment Considerations (Macmillan Technical Publishing, 1999), 296 pp.  [Japanese edition:  Pearson Education Japan, 2000; Chinese edition:  Macmillan Technical Publishing (PPTPH), 2000; Polish edition:  Macmillan Technical Pub. (Wydawnictwo Robomatic), 2001]

 

Books Edited

1.     C. Adams, A. Miri, and M. Wiener (Eds.),  Proceedings of the 14th Annual International Workshop on Selected Areas in Cryptography – SAC ’07, LNCS 4876, Springer, 2007, 407 pp.

2.     H. Heys and C. Adams (Eds.), Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography – SAC ’99, LNCS 1758, Springer, 2000, 241 pp.

 

Chapters in Books

1.      A. Essex, J. Clark, and C. Adams, “Aperio:  High Integrity Elections for Developing Countries”, in Towards Trustworthy Elections:  New Directions in Electronic Voting, D. Chaum, et al. (Eds.), IAVOSS/Springer-Verlag, Berlin Heidelberg, 2010, pp. 388-401.  [This is a revised and extended version of the WOTE 2008 paper.]

2.     J. Clark, P. Gauvin, and C. Adams, “Exit Node Repudiation for Anonymity Networks”, in On the Identity Trail:  Privacy, Anonymity and Identity in a Networked Society, I. Kerr, V. Steeves, and C. Lucock (Eds.), Oxford University Press, 2009, pp. 399-416.

3.    J. Chandler, K. el-Khatib, M. Benyoucef, G. v. Bochmann, and C. Adams, “Legal Challenges of Online Reputation Systems”, in Trust in E-Services:  Technologies, Practices and Challenges, R. Song, Ed., Idea Group Publishing, 2007, pp. 84-111.

4.     C. Adams and K. Barbieri, “Privacy Enforcement in E-Services Environments”, in Privacy Protection for E-Services, G. Yee, Ed., Idea Group Publishing, 2006, pp. 172-202.

5.     Member of Board of Advisors and Technical Contributor to Encyclopedia of Cryptography and Security, H. van Tilborg (Editor-in-Chief), Springer, 2005.  (Areas of responsibility were Key Management (public and private), Identification, Authorization, Privacy, and Security Standards.  Authored 6 articles and 17 definitions and had editorial responsibility for an additional 14 articles.)

6.      Appendix 3A, “Bent Functions”, and Section 4.5, “CAST-128”, in W. Stallings, Cryptography and Network Security:  Principles and Practice, 2nd edition, (Prentice Hall, 1999), pp 91-92 and 120-124

 

Theses

A Formal and Practical Design Procedure for Substitution-Permutation Network Cryptosystems, Ph.D. thesis, Department of Electrical Engineering, Queen’s University, Kingston, Ontario, Canada, 1990.

Examination and Analysis of McEliece’s Public-Key Cryptosystem, M.Sc. thesis, Department of Computing and Information Science, Queen’s University, Kingston, Ontario, Canada, 1985.