List of Publications

 

      Refereed Journals

29.  D. Bissessar and C. Adams, Construction and Implementation of a Privacy-Preserving Identity-Based Encryption Architecture, Journal of Information Security, vol. 14, no. 4, October 2023, pp. 304-329.  (Available at https://doi.org/10.4236/jis.2023.144018)

28.  C. Adams, Improving User Privacy in Identity-Based Encryption Environments, Cryptography (special issue on Applied Cryptography, Network Security, and Privacy Protection), vol. 6, issue 4, article 55, 9 November 2022, 15 pp.  (Available at https://www.mdpi.com/2410-387X/6/4/55)

27.  C. Adams, Security Analysis of a Privacy-Preserving Identity-Based Encryption Architecture, Journal of Information Security (special issue on Cryptography and Network Security), vol. 13, no. 4, October 2022, pp. 323-336.  (Available at https://www.scirp.org/journal/paperinformation.aspx?paperid=120354)

26.  J. Fan, F. Willems, J. Zahed, J. Gray, S. Mister, M. Ounsworth, and C. Adams, Impact of Post-Quantum Hybrid Certificates on PKI, Common Libraries, and Protocols, International Journal of Security and Networks, Inderscience Publishers, vol. 16, no. 3, 2021, pp. 200 - 211.  (Available at https://www.inderscienceonline.com/doi/pdf/10.1504/IJSN.2021.117887)

25.  C. Adams, Y. Dai, C. DesOrmeaux, S. McAvoy, N. Nguyen, and F. Trindade, Strengthening Enforcement in a Comprehensive Architecture for Privacy Enforcement at Internet Websites, Frontiers in Computer Science – Computer and Network Security, 04 February 2020, 9 pp.  (Available at https://doi.org/10.3389/fcomp.2020.00002, with supplementary material (i.e., Appendices) available at https://www.frontiersin.org/articles/10.3389/fcomp.2020.00002/full#supplementary-material).

24.  C. Adams, A privacy-preserving Blockchain with fine-grained access control, Security and Privacy, vol.3, issue 2, John Wiley & Sons, March/April 2020 (first published online 15 November 2019), 10 pp.  (Available at https://onlinelibrary.wiley.com/doi/full/10.1002/spy2.97).

23.  C. Adams, A. Tambay, D. Bissessar, R. Brien, J. Fan, M. Hezaveh, and J. Zahed, Using Machine Learning to Detect APTs on a User Workstation, International Journal of Sensor Networks and Data Communications, vol. 8, issue 3, 16 October 2019, 8 pp.  (Available at https://www.hilarispublisher.com/open-access/using-machine-learning-to-detect-apts-on-a-user-workstation.pdf).

22.  M. Hezaveh and C. Adams, A Practical PIR-based Scheme for Discovering Nearby Places for Smartphone Applications, Advances in Science, Technology and Engineering Systems Journal, vol. 4, no. 1, 2019, pp. 27-39.  (Available at https://www.astesj.com/publications/ASTESJ_040104.pdf)

21.  J. Fan and C. Adams, Using Malleable Signatures to Allow Multi-Show Capability in Digital Credentials, International Journal of Sensor Networks and Data Communications, vol. 7, iss. 4, 2018, 6pp.  (Available at https://www.omicsonline.org/open-access/using-malleable-signatures-to-allow-multishow-capability-in-digital-credentials-2090-4886-1000160.pdf)

20.  B. Carrara and C. Adams, Out-of-Band Covert Channels – A Survey, ACM Computing Surveys, Vol. 49, Issue 2, November 2016, 36pp.

19.  H. Ghafghazi, A. El Mougy, H. T. Mouftah, C. Adams, Location-Aware Authorization Scheme for Emergency Response, IEEE Access, vol. 4, 2016, pp. 4590-4608.

18.  A. Noman and C. Adams, Providing a Data Location Assurance Service for Cloud Storage Environments, Journal of Mobile Multimedia, vol. 8, issue 4, 2013, pp. 265-286.

17.  D. Knox and C. Adams, Digital Credentials with Privacy-Preserving Delegation, Security and Communication Networks, vol. 4, no. 8, August 2011, pp.825-838.

16.  C. Adams, Achieving Non-Transferability in Credential Systems Using Hidden Biometrics, Security and Communication Networks, vol. 4, no. 2, February 2011, pp. 195–206.

15.  C. Adams and M. Rodrigues, Dealing with Non-Policy-Conformant Requests in Credential Systems, International Society for Advanced Science and Technology (ISAST) Transactions on Computers and Intelligent Systems, no. 2, vol. 1, 2009, pp.53-57.

14.  H. Tao and C. Adams, Pass-Go:  A Proposal to Improve the Usability of Graphical Passwords, International Journal of Network Security, vol. 7, no. 2, 2008, pp. 273-292.

13.  C. Adams, A Classification for Privacy Techniques, University of Ottawa Law & Technology Journal, special issue on anonymity, privacy, and identity, vol. 3, Issue 1, 2006, pp. 35-52 (available at http://www.uoltj.ca/articles/vol3.1/2006.3.1.uoltj.Adams.35-52.pdf).

12. C. Adams, Designing Against a Class of Algebraic Attacks on Symmetric Block Ciphers, Journal of Applicable Algebra in Engineering, Communication and Computing, vol. 17, no. 1, April 2006, pp.17-27.

11.  D. Nali, C. Adams, and A. Miri, Hierarchical Time-Based Information Release (extended version of ISC '05 paper below), International Journal of Information Security (IJIS), special issue on selected papers from ISC ’05, vol. 5, no. 2, April 2006, pp. 92-104.  [Only 5 papers were selected for inclusion in this journal from 38 conference papers, which were accepted from 271 submissions.]

10.  D. Nali, C. Adams, and A. Miri, Using Threshold Attribute-Based Encryption for Practical Biometric-Based Access Control, International Journal of Network Security, vol. 1, no. 3, November, 2005, pp. 173-182.

 9.  D. Nali, A. Miri, C. Adams, Traffic Filtering and Routing in Partially Hidden Networks, International Journal of Network Security, vol. 2, no. 2, March, 2006, pp. 91-104.

 8.  C. Adams, Building Secure Web-Based Environments:  Understanding Research Interrelationships through a Construction Metaphor, IEEE Security & Privacy, vol. 3, no. 1, January/February 2005, pp. 74-77.

 7.  C. Adams, Constructing Symmetric Ciphers Using the CAST Design Procedure, Designs, Codes and Cryptography, vol. 12, no. 3, November, 1997, pp. 283-316  (See also Selected Areas in Cryptography, E. Kranakis and P. Van Oorschot, eds., Kluwer Academic Publishers,  1997, pp. 71-104.)

 6.  A. Youssef, S. Tavares, S. Mister, and C. Adams, On the Linear Approximation of Injective S-Boxes, IEE Electronics Letters, vol. 31, no. 25, 1995, pp. 2168-2169.

 5.  C. Adams and S. Tavares, Generating Bent Sequences, Discrete Applied Mathematics, vol. 39, 1992, pp. 155-159.

 4.  C. Adams, On Immunity Against Biham and Shamir’s ‘Differential Cryptanalysis’, Information Processing Letters, vol. 41, February 14, 1992, pp. 77-80.

 3.  C. Adams and S. Tavares, The Structured Design of Cryptographically Good S-Boxes, Journal of Cryptology, vol. 3, 1990, pp. 27-41.

 2.  C. Adams and S. Tavares, Generating and Counting Binary Bent Sequences, IEEE Transactions on Information Theory, vol. 36, no. 5, September, 1990, pp. 1170-1173.

 1.  C. Adams and H. Meijer, Security-Related Comments Regarding McEliece’s Public-Key Cryptosystem, IEEE Transactions on Information Theory, vol. 35, no. 2, March, 1989, pp. 454-455.

 

      Refereed Conference Proceedings

74.  F. Willems and C. Adams, GhostBuy: An All Steps Anonymous Purchase Platform (ASAPP) based on Separation of Data, 20th International Conference on Privacy, Security and Trust (PST 2023), Copenhagen, Denmark, 21-23 August 2023, pp. 1-12 (available at https://ieeexplore.ieee.org/document/10320162).

73.  S. Wang, C. Adams, and A. Broadbent, Password Authentication Schemes on a Quantum Computer, IEEE International Conference on Quantum Computing and Engineering (QCE21), October 17-22, 2021, 5pp. (see also http://arxiv.org/abs/2201.12512).

72.  J. Liu, B. Kantarci, and C. Adams, Machine Learning-Driven Intrusion Detection for Contiki-NG-Based IoT Networks Exposed to NSL-KDD Dataset, 2nd ACM Workshop on Wireless Security and Machine Learning (WiseML), Online conference, July 13, 2020, pp. 23-44; available at https://wisec2020.ins.jku.at/proceedings-wiseml/wiseml20-48.pdf.

71.  T. Bardini-Idalino, L. Moura, and C. Adams, Modification-Tolerant Signature Schemes:  Location and Correction, 20th International Conference on Cryptology in India – Indocrypt 2019, Springer LNCS 11898, Hyderabad, India, December 15-18, 2019, pp. 23-44.

70.   D. Bissessar, M. Hezaveh, F. Alshammari, and C. Adams, Mobile Travel Credentials, 11th International Symposium on Foundations and Practice of Security (FPS 2018), Montreal, Quebec, Canada, November 13-15, 2018, pp. 46-58.

69.   M. Hezaveh and C. Adams, A PIR Scheme to Improve the Computation Cost on the Client Side of Smartphone Applications, 30th Annual IEEE Canadian Conference on Electrical and Computer Engineering (CCECE 2018), Quebec City, Canada, May 13 – 16, 2018, 4 pp.

68.   M. Hezaveh and C. Adams, Privacy Preserving Discovery of Nearby Friends, 7th International MCETECH Conference on e-Technologies, Ottawa, Canada, May 17 – 19, 2017, pp. 41-55 (published as the eBook E-Technologies:  Embracing the Internet of Things; available at http://www.springer.com/gp/book/9783319590400).

67.   M. Hezaveh and C. Adams, An Efficient Solution to the Socialist Millionaires’ Problem, 30th Annual IEEE Canadian Conference on Electrical and Computer Engineering (CCECE 2017), Windsor, Canada, April 30 – May 3, 2017, 4 pp.

66.  B. Carrara and C. Adams,  Covert Channels Revisited – A Survey, Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, Vigo, Spain, ACM New York, June 20-22, 2016, 12 pp.

65.  B. Carrara and C. Adams, Estimating the Steganographic Capacity of Band-Limited Channels, Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, Vancouver, Canada, IEEE Press, May 15-18, 2016, 5 pp.

64.   H. Ghafghazi, A. El Mougy, H. Mouftah, and C. Adams, Secure Data Storage Structure and Privacy-Preserving Mobile Search Scheme for Public Safety Networks, Proceedings of the IEEE Wireless Communications and Networking Conference, Doha, Qatar, April 3-6, 2016, pp. 1-7.

63.   B. Carrara and C. Adams, On Characterizing and Measuring Out-of-Band Covert Channels, Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, Portland, Oregon, USA, ACM New York,  June 17-19, 2015, pp. 43-54.

61.  W. Wen, B. Vaidya, D. Makrakis, and C. Adams, Decentralized CRT-Based Efficient Verifiable (n,t,n) Multi-Secret Sharing Schemes, 7th International Symposium on Foundations and Practice of Security, Montreal, LNCS, Springer, November 3-5, 2014, 10 pp.

61.  B. Carrara and C. Adams, On Acoustic Covert Channels Between Air-Gapped Systems, 7th International Symposium on Foundations and Practice of Security, Montreal, LNCS, Springer,  November 3-5, 2014, 16 pp.

60.   H. Ghafghazi, A. El Mougy, H. T. Mouftah, and C. Adams, Classification of Technological Privacy Techniques for LTE-based Public Safety Networks, 10th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (ACM QoSWinet 2014), Montreal, Canada,  ACM, September 21, 2014, 10 pp.

59.  D. Bissessar, C. Adams, and D. Liu, Using Biometric Key Commitments to Prevent Unauthorized Lending of Cryptographic Credentials, Proceedings of the 12th Annual Conference on Privacy, Security and Trust (PST 2014), Toronto, Canada, July 23-24, 2014.

58.  C. Adams and G.-V. Jourdan, Digital Signatures for Mobile Users, Proceedings of the 27th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE 2014), Toronto, Canada, May 4-7, 2014, 5 pp.

57.   F. Dankar, R. Brien, C. Adams, J. Corbo, and S. Matwin, Secure Multi-Party Linear Regression, 7th International Workshop on Privacy and Anonymity in the Information Society (PAIS 2014), 9 pp.

56.   A. Noman, C. Adams, Data Location Assurance Service for Cloud Computing Environments, Proceedings of the 10th Annual Conference on Privacy, Security and Trust (PST 2012), Paris, France, July 16-18, 2012, pp. 225-228.

55.   M. Olurin, C. Adams, and L. Logrippo, Platform for Privacy Preferences: Description, Current Status, and Future Directions, Proceedings of the 10th Annual Conference on Privacy, Security and Trust (PST 2012), Paris, France, July 16-18, 2012, pp. 217-220.

54.  M. Rahman, M. Masud, C. Adams, H. Mouftah, and A. Inomata, Session-wise Private Data Exchange in eHealth Peer-to-Peer Database Management Systems, Proceedings of IEEE Intelligence and Security Informatics (ISI 2011), Beijing, China, July 10-12, 2011, pp. 204-206.

53.  A. Noman, M. Rahman and C. Adams, Improving Security and Usability of Low Cost RFID  Tags, Proceedings of the 9th Annual Conference on Privacy, Security and Trust (PST 2011), Montreal, Quebec, Canada, July 19-21, 2011, paper #82 (8 pp.).

52.  M. Rahman, M. Masud, C. Adams, K. El-Khatib, H. Mouftah, and E. Okamoto, Cryptographic Security Models for eHealth P2P Database Management Systems, Proceedings of the 9th Annual Conference on Privacy, Security and Trust (PST 2011), Montreal, Quebec, Canada, July 19-21, 2011, paper #43 (10 pp.).

51.  A. Javadtalab, L. Abbadi, M. Omidyeganeh, C. Adams, S. Shirmohammadi and A. El Saddik, Transparent Non-Intrusive Multimodal Biometric System For Video Conference Using The Fusion Of Face And Ear Recognition, Proceedings of the 9th Annual Conference on Privacy, Security and Trust (PST 2011), Montreal, Quebec, Canada, July 19-21, 2011, paper #92 (6 pp.).

  50.  B. Carrara and C. Adams, You are the Key: Generating Cryptographic Keys from Voice Biometrics, Proceedings of the 8th Annual Conference on Privacy, Security and Trust (PST 2010), Ottawa, Canada, August 17-19, 2010, pp. 213-222.

   49. B. Carrara and C. Adams, On Achieving a Digital Identity Management System with Support for Non-Transferability, Proceedings of the 8th Annual Conference on Privacy, Security and Trust (PST 2010), Ottawa, Canada, August 17-19, 2010, pp. 150-159.

   48. C. Adams, G.-V. Jourdan, J.-P. Levac, and F. Prevost, Lightweight protection against brute force login attacks on web applications, Proceedings of the 8th Annual Conference on Privacy, Security and Trust (PST 2010), Ottawa, Canada, August 17-19, 2010, pp. 181-188.

   47. A. Essex, J. Clark, U. Hengartner,  and C. Adams, Eperio: Mitigating Technical Complexity in Cryptographic Election Verification, Proceedings of the Electronic Voting Technology Workshop / Workshop on Trustworthy Elections (EVT/WOTE ’10), Washington, DC, August 9-10, 2010 (14 pp.).

   46. M. Bodis, C. Adams, and G.-V. Jourdan, Methods for Content Protection in E-Learning Systems, Proceedings of the First International Conference on e-Learning for All (LEAFA 2010), Hammamet, Tunisia, June 3-5, 2010 (24 pp.).

45.  F. Tian and C. Adams, An E-Hospital Security Architecture, Proceedings of the First International Conference on Ad Hoc Networks (ADHOCNETS 2009), Nigara Falls, Canada, September 23-25, 2009, Springer, pp. 639-651.

44.  A. Essex, J. Clark, U. Hengartner, and C. Adams, How to Print a Secret, Proceedings of the 4th Usenix Workshop on Hot Topics in Security (HotSec 2009), Montreal, Canada, August 11, 2009 (available at http://www.usenix.org/event/hotsec09/tech/).

43.  A. Essex, J. Clark, and C. Adams, Aperio:  High Integrity Elections for Developing Countries, Proceedings of the Workshop on Trustworthy Elections (WOTE), Leuven, Belgium, July 22-23, 2008 (12 pp.).

42.  K. Garson and C. Adams, Security and Privacy System Architecture for an e-Hospital Environment, 7th Symposium on Identity and Trust on the Internet (IDtrust), Gaithersburg, MD, USA, March 4-6, 2008 (9 pp.).

41.  K. Garson and C. Adams, Policy-Based Encryption in a Multi-Agent System for an e-Hospital Environment, Proceedings of the 2nd Workshop on the Practice and Theory of IT Security (PTITS), Montreal, QC, Canada, January 23, 2008, pp. 10-14.

40.  J. Clark, P. C. van Oorschot, C. Adams, Usability of Anonymous Web Browsing:  An Examination of Tor Interfaces and Deployability, Proceedings of the 3rd Symposium on Usable Privacy and Security (SOUPS), Pittsburgh, PA, USA, July 18-20, 2007, pp. 41-51.

39.  W. Qiu and C. Adams, Exploring User-to-Role Delegation in Role-Based Access Control, Proceedings of the 8th World Congress on the Management of eBusiness, Toronto, Canada, July 11-13, 2007.

38.  D. Sharp and C. Adams, An Intrusion Detection Counterattack for 4th-Generation TLB-Assisted Rootkits and Self-Hashing Attacks, Proceedings of the 6th European Conference on Information Warfare and Security, Shrivenham, UK, July 2-3, 2007.

37.  J. Clark, A. Essex, and C. Adams, On the Security of Ballot Receipts in E2E Voting Systems, Proceedings of the Workshop on Trustworthy Elections (WOTE), Ottawa, Canada, June 20-21, 2007, pp. 65-72.

36.  J. Clark, A. Essex, and C. Adams, Secure and Observable Auditing of Electronic Voting Systems using Stock Indices, Proceedings of the 20th Annual IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), Vancouver, Canada, April 22-26, 2007.

35.  D. Shapiro, V. Thareja, and C. Adams, A Privacy-Preserving 3rd-Party Proxy for Transactions that use Digital Credentials, Proceedings of the 20th Annual IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), Vancouver, Canada, April 22-26, 2007.

34.  M. Alsaleh and C. Adams, Enhancing Consumer Privacy in the Liberty Alliance Identity Federation and Web Services Frameworks, Proceedings of the Workshop on Privacy Enhancing Technologies, Cambridge, UK, Springer, LNCS 4258, June 28-30, 2006, pp. 59-77.

33.  W. Qiu and C. Adams, A Study on Role-Based Delegation in Access Control, Proceedings of the Workshop on Practice and Theory of IT Security (PTITS), Montreal, Canada, May 17, 2006, pp. 11-15.

32.  Y. Kalyani and C. Adams, Privacy Negotiation using a Mobile Agent, Proceedings of the 19th Annual IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), Ottawa, Canada, May 7-10, 2006.

31.  X. Qing and C. Adams, XACML-Based Policy-Driven Access Control for Mobile Environments, Proceedings of the 19th Annual IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), Ottawa, Canada, May 7-10, 2006.

30.  X. Qing and C. Adams, KEAML - Key Exchange and Authentication Markup Language, Proceedings of the 19th Annual IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), Ottawa, Canada, May 7-10, 2006.

29.  D. Nali, C. Adams, and A. Miri, An Efficient and Flexible Scheme to Support Biometric-Based and Role-Based Access Control, Proceedings of the 4th International Workshop for Applied PKI (IWAP), Sentosa Island, Singapore, IOS Press, Volume 128, September 21-23, 2005, pp. 139-154.

28.  D. Nali, C. Adams, and A. Miri, Time-Based Release of Confidential Information in Hierarchical Settings, Proceedings of the 8th Information Security Conference (ISC), Sentosa Island, Singapore, Springer, LNCS 3650, September 20-23, 2005, pp. 29-43.

27.  J. Shi, G. v. Bochmann, and C. Adams, Dealing with Recommendations in a Statistical Trust Model, Proceedings of the Workshop on Trust in Agent Societies (held in conjunction with the 4th International Joint Conference on Autonomous Agents and Multi Agent Systems (AAMAS)), Utrecht, The Netherlands, July 25, 2005.

26.  R. Qing and C. Adams, A Comparison of Compression Techniques for XML-Based Security Policies in Mobile Computing Environments, Proceedings of the Workshop on New Challenges for Access Control (NCAC), April 27, 2005, pp.209-232.

25.  G. Bochmann, E. Zhang, C. Adams, and J. Chandler, A Security Framework Combining Access Control and Trust Management for Mobile E-Commerce Applications, Proceedings of the Workshop on New Challenges for Access Control (NCAC), April 27, 2005, pp.441-461.

24.  D. Nali, C. Adams, and A. Miri, Threshold Semi-Anonymous Authorization of e-Transactions, Proceedings of the Workshop on the Practice and Theory of Access Control Technologies (WPTACT), Montreal, Canada, January 19, 2005, pp. 23-27.

23.  D. Nali, A. Miri, and C. Adams, Efficient Revocation of Dynamic Security Privileges in Hierarchically Structured Communities, Proceedings of the 2nd Annual Conference on Privacy, Security and Trust (PST 2004), Fredericton, New Brunswick, Canada, October 13-15, 2004, pp. 219-223.

22.  D. Nali, C. Adams, and A. Miri, Using Mediated Identity-Based Cryptography to Support Role-Based Access Control, Proceedings of the 7th Information Security Conference (ISC '04), Palo Alto, CA, USA, Springer, LNCS 3225, September 27-29, 2004, pp. 245-256.

21.  C. Adams, G. Kramer, S. Mister, and R. Zuccherato, On the Security of Key Derivation Functions, Proceedings of the 7th Information Security Conference (ISC '04), Palo Alto, CA, USA, Springer, LNCS 3225, September 27-29, 2004, pp. 134-145.

20.  J. Shi, G. Bochmann, and C. Adams, A Trust Model with Statistical Foundation, 18th International Federation for Information Processing (IFIP) World Computer Congress TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), IFIP vol. 173/2005, Springer, Toulouse, France, August 22-27, 2004, pp. 145-158.

19.  C. Adams and M. Just, PKI:  Ten Years Later, 3rd Annual PKI R&D Workshop, National Institute of Standards and Technology (NIST), Gaithersburg, MD, USA, April 12-14, 2004.

18.  C. Adams, P. Madsen, and R. Griffin, Two-Domain Authorization Models, Canadian Information Technology Security Symposium, Ottawa, Canada, May 12-15, 2003

17.  C. Adams and S. Boeyen, UDDI and WSDL Extensions for Web Services:  A Security Framework, Proceedings of the ACM Workshop on XML Security, Fairfax, VA, November 22, 2002.

16.  P. Madsen and C. Adams, An Authentication Framework for Web Services, Canadian Information Technology Security Symposium, Ottawa, Canada, May 15-17, 2002.

15.  C. Adams and R. Zuccherato, A Global PMI for Electronic Content Distribution, Selected Areas in Cryptography (SAC ’00) Proceedings, LNCS 2012, Springer, 2001, pp. 158-168.

14.  C. Adams, H.M. Heys, S.E. Tavares, and M. Wiener, An Analysis of the CAST-256 Cipher, Proceedings of IEEE Canadian Conference on Electrical and Computer Engineering CCECE '99, Edmonton, Alberta, May, 1999.

13.  S. Harris and C. Adams, Key-Dependent S-Box Manipulations, Selected Areas in Cryptography (SAC ’98) Proceedings, LNCS 1556, Springer, 1999, pp. 15-26.

12.  C. Adams, DES-80, Workshop Record of the Workshop on Selected Areas in Cryptography  (SAC ’97), Ottawa, Canada, August 11-12, 1997, pp. 160-171.

11.  C. Adams and S. Lloyd, Profiles and Protocols for the Internet Public-Key Infrastructure, Proceedings of the Sixth IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems, October 29-31, 1997, Tunis, Tunisia, pp. 220-224.

10.  C. Adams and M. Wiener, The SHADE Cipher:  An Efficient Hash-Function-Based Feistel Network, Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, St. John’s NF, Canada, May 25-28, 1997, pp. 338-342.

 9.  S. Mister and C. Adams, Practical S-Box Design, Workshop Record of the Workshop on Selected Areas in Cryptography  (SAC ’96), 1996, pp. 61-76.

 8.  C. Adams, IDUP and SPKM: Developing Public-Key-Based APIs and Mechanisms for Communication Security Services, Proceedings of the Symposium on Network and Distributed Systems Security, San Diego, California, January, 1996.

 7.  C. Adams, Designing DES-Like Ciphers with Guaranteed Resistance to Differential and Linear Attacks, Workshop Record of the Workshop on Selected Areas in Cryptography (SAC ’95), Ottawa, Canada, May 18-19, 1995, pp. 133-144.

 6.  C. Adams, Simple and Effective Key Scheduling for Symmetric Ciphers, Workshop Record of the Workshop on Selected Areas in Cryptography   (SAC ’94), 1994, pp. 129-133.

 5.  C. Adams and S. Tavares, Designing S-Boxes for Ciphers Resistant to Differential Cryptanalysis, Proceedings of the 3rd Symposium on the State and Progress of Research in Cryptography, Rome, Italy, 1993, pp. 181-190.

 4.  C. Adams, H. Meijer, and S. Tavares, Breaking and Strengthening a Multiplication-Permutation Encryption Network, Proceedings of the 15th Biennial Symposium on Communications, Kingston, Canada, June 3-6, 1990, pp. 104-107.

 3.  C. Adams and S. Tavares, Good S-Boxes are Easy to Find, Advances in Cryptology, Proceedings of CRYPTO ’88, Springer-Verlag, Berlin, 1990, pp. 612-615.

 2.  S. Tavares and C. Adams, Statistical Testing of Cryptographic Systems, Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, Vancouver, Canada, November 4-5, 1988, pp. 105-108.

 1.  C. Adams and H. Meijer, Security-Related Comments Regarding McEliece’s Public-Key Cryptosystem, Advances in Cryptology:  Proceedings of CRYPTO ’87, Springer-Verlag, Berlin, 1988, pp. 224-228.

     

      Other Publications

8.     F. Willems, M. Raahemi, P. Buddhitha, C. Adams, and T. Tran, On the Security and Privacy of Interac e-Transfers, 12 December 2019, 47 pp.  (Available at https://arxiv.org/abs/1910.01587v2)

7.    C. Adams, Have Money, Will Travel:  A Brief Survey of the Mobile Payments Landscape, technical report (112 pp.) produced for the Office of the Privacy Commissioner of Canada (summarizing work undertaken while I was on a research sabbatical there from January – June, 2013).  The full report is available at the OPC website:  https://www.priv.gc.ca/en/opc-actions-and-decisions/research/explore-privacy-research/2013/mp_201306/ 

6.    C. Adams and V. Piñero, Addendum:  A Brief Note on Privacy from a Technological Perspective, Canadian Journal of Criminology and Criminal Justice, vol. 50, issue 8, June 2008.

5.    D. Nali, C. Adams, and A. Miri, Hierarchical Identity-Based Signcryption with Public Ciphertext Authenticity and Forward Security, Presented at the Western European Workshop on Research in Cryptology (WEWoRC), Leuven-Heverlee, Belgium, July 5-7, 2005.

4.    P. Madsen and C. Adams, Privacy and XML, Part 2, Article published in online magazine XML.com, May 1, 2002.  (Available at http://www.xml.com/pub/a/2002/05/01/privacy.html)

3.    P. Madsen and C. Adams, Privacy and XML, Part 1, Article published in online magazine XML.com, April 17, 2002. (Available at http://www.xml.com/pub/a/2002/04/17/privacy.html)

2.    E. Simon, P. Madsen, and C. Adams, An Introduction to XML Digital Signatures, Article published in online magazine XML.com, August 8, 2001.    (Available at http://www.xml.com/pub/a/2001/08/08/xmldsig.html)

1.    C. Adams and R. Zuccherato, A General, Flexible Approach to Certificate Revocation, June, 1998.  (Available at http://www.entrust.com/resources/pdf/certrev.pdf) 

;