1. C. Adams and S. Lloyd, Understanding PKI: Concepts, Standards, and Deployment Considerations, 2nd Edition (Addison-Wesley, 2003), 322 pp. [Korean edition: INFOBOOK (Pearson Education), 2003]
2. C. Adams and S. Lloyd, Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations (Macmillan Technical Publishing, 1999), 296 pp. [Japanese edition: Pearson Education Japan, 2000; Chinese edition: Macmillan Technical Publishing (PPTPH), 2000; Polish edition: Macmillan Technical Pub. (Wydawnictwo Robomatic), 2001]
1. C. Adams, A. Miri, and M. Wiener (Eds.), Proceedings of the 14th Annual International Workshop on Selected Areas in Cryptography – SAC ’07, LNCS 4876, Springer, 2007, 407 pp.
2. H. Heys and C. Adams (Eds.), Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography – SAC ’99, LNCS 1758, Springer, 2000, 241 pp.
Chapters in Books
1. A. Essex, J. Clark, and C. Adams, “Aperio: High Integrity Elections for Developing Countries”, in Towards Trustworthy Elections: New Directions in Electronic Voting, D. Chaum, et al. (Eds.), IAVOSS/Springer-Verlag, Berlin Heidelberg, 2010, pp. 388-401. [This is a revised and extended version of the WOTE 2008 paper.]
2. J. Clark, P. Gauvin, and C. Adams, “Exit Node Repudiation for Anonymity Networks”, in On the Identity Trail: Privacy, Anonymity and Identity in a Networked Society, I. Kerr, V. Steeves, and C. Lucock (Eds.), Oxford University Press, 2009, pp. 399-416.
3. J. Chandler, K. el-Khatib, M. Benyoucef, G. v. Bochmann, and C. Adams, “Legal Challenges of Online Reputation Systems”, in Trust in E-Services: Technologies, Practices and Challenges, R. Song, Ed., Idea Group Publishing, 2007, pp. 84-111.
4. C. Adams and K. Barbieri, “Privacy Enforcement in E-Services Environments”, in Privacy Protection for E-Services, G. Yee, Ed., Idea Group Publishing, 2006, pp. 172-202.
5. Member of Board of Advisors and Technical Contributor to Encyclopedia of Cryptography and Security, H. van Tilborg (Editor-in-Chief), Springer, 2005. (Areas of responsibility were Key Management (public and private), Identification, Authorization, Privacy, and Security Standards. Authored 6 articles and 17 definitions and had editorial responsibility for an additional 14 articles.)
6. Appendix 3A, “Bent Functions”, and Section 4.5, “CAST-128”, in W. Stallings, Cryptography and Network Security: Principles and Practice, 2nd edition, (Prentice Hall, 1999), pp 91-92 and 120-124
A Formal and Practical Design Procedure for Substitution-Permutation Network Cryptosystems, Ph.D. thesis, Department of Electrical Engineering, Queen’s University, Kingston, Ontario, Canada, 1990.
Examination and Analysis of McEliece’s Public-Key Cryptosystem, M.Sc. thesis, Department of Computing and Information Science, Queen’s University, Kingston, Ontario, Canada, 1985.