List of Publications

 

      Refereed Journals

18.  M. Rahman, M. Masud, C. Adams, H. Mouftah, Privacy Preserving Secure Data Exchange in Peer-to-Peer Database Management Systems in eHealth Perspective, Security and Communication Networks (to appear).

17.  D. Knox and C. Adams, Digital Credentials with Privacy-Preserving Delegation, Security and Communication Networks, vol. 4, no. 8, August 2011, pp.825-838.

16.  C. Adams, Achieving Non-Transferability in Credential Systems Using Hidden Biometrics, Security and Communication Networks, vol. 4, no. 2, February 2011, pp. 195–206.

15.  C. Adams and M. Rodrigues, Dealing with Non-Policy-Conformant Requests in Credential Systems, International Society for Advanced Science and Technology (ISAST) Transactions on Computers and Intelligent Systems, no. 2, vol. 1, 2009, pp.53-57.

14.  H. Tao and C. Adams, Pass-Go:  A Proposal to Improve the Usability of Graphical Passwords, International Journal of Network Security, vol. 7, no. 2, 2008, pp. 273-292.

13.  C. Adams, A Classification for Privacy Techniques, University of Ottawa Law & Technology Journal, special issue on anonymity, privacy, and identity, vol. 3, Issue 1, 2006, pp. 35-52 (available at http://www.uoltj.ca/articles/vol3.1/2006.3.1.uoltj.Adams.35-52.pdf).

12. C. Adams, Designing Against a Class of Algebraic Attacks on Symmetric Block Ciphers, Journal of Applicable Algebra in Engineering, Communication and Computing, vol. 17, no. 1, April 2006, pp.17-27.

11.  D. Nali, C. Adams, and A. Miri, Hierarchical Time-Based Information Release (extended version of ISC '05 paper below), International Journal of Information Security (IJIS), special issue on selected papers from ISC ’05, vol. 5, no. 2, April 2006, pp. 92-104.  [Only 5 papers were selected for inclusion in this journal from 38 conference papers, which were accepted from 271 submissions.]

10.  D. Nali, C. Adams, and A. Miri, Using Threshold Attribute-Based Encryption for Practical Biometric-Based Access Control, International Journal of Network Security, vol. 1, no. 3, November, 2005, pp. 173-182.

 9.  D. Nali, A. Miri, C. Adams, Traffic Filtering and Routing in Partially Hidden Networks, International Journal of Network Security, vol. 2, no. 2, March, 2006, pp. 91-104.

 8.  C. Adams, Building Secure Web-Based Environments:  Understanding Research Interrelationships through a Construction Metaphor, IEEE Security & Privacy, vol. 3, no. 1, January/February 2005, pp. 74-77.

 7.  C. Adams, Constructing Symmetric Ciphers Using the CAST Design Procedure, Designs, Codes and Cryptography, vol. 12, no. 3, November, 1997, pp. 283-316  (See also Selected Areas in Cryptography, E. Kranakis and P. Van Oorschot, eds., Kluwer Academic Publishers,  1997, pp. 71-104.)

 6.  A. Youssef, S. Tavares, S. Mister, and C. Adams, On the Linear Approximation of Injective S-Boxes, IEE Electronics Letters, vol. 31, no. 25, 1995, pp. 2168-2169.

 5.  C. Adams and S. Tavares, Generating Bent Sequences, Discrete Applied Mathematics, vol. 39, 1992, pp. 155-159.

 4.  C. Adams, On Immunity Against Biham and Shamir’s ‘Differential Cryptanalysis’, Information Processing Letters, vol. 41, February 14, 1992, pp. 77-80.

 3.  C. Adams and S. Tavares, The Structured Design of Cryptographically Good S-Boxes, Journal of Cryptology, vol. 3, 1990, pp. 27-41.

 2.  C. Adams and S. Tavares, Generating and Counting Binary Bent Sequences, IEEE Transactions on Information Theory, vol. 36, no. 5, September, 1990, pp. 1170-1173.

 1.  C. Adams and H. Meijer, Security-Related Comments Regarding McEliece’s Public-Key Cryptosystem, IEEE Transactions on Information Theory, vol. 35, no. 2, March, 1989, pp. 454-455.

 

      Refereed Conference Proceedings

54.  M. Rahman, M. Masud, C. Adams, H. Mouftah, and A. Inomata, Session-wise Private Data Exchange in eHealth Peer-to-Peer Database Management Systems, Proceedings of IEEE Intelligence and Security Informatics (ISI 2011), Beijing, China, July 10-12, 2011 (to appear).

53.  A. Noman, M. Rahman and C. Adams, Improving Security and Usability of Low Cost RFID  Tags, Proceedings of the 9th Annual Conference on Privacy, Security and Trust (PST 2011), Montreal, Quebec, Canada, July 19-21, 2011 (to appear).

52.  M. Rahman, M. Masud, C. Adams, K. El-Khatib, H. Mouftah, and E. Okamoto, Cryptographic Security Models for eHealth P2P Database Management Systems, Proceedings of the 9th Annual Conference on Privacy, Security and Trust (PST 2011), Montreal, Quebec, Canada, July 19-21, 2011 (to appear).

51.  A. Javadtalab, L. Abbadi, M. Omidyeganeh, C. Adams, S. Shirmohammadi and A. El Saddik, Transparent Non-Intrusive Multimodal Biometric System For Video Conference Using The Fusion Of Face And Ear Recognition, Proceedings of the 9th Annual Conference on Privacy, Security and Trust (PST 2011), Montreal, Quebec, Canada, July 19-21, 2011 (to appear).

  50.  B. Carrara and C. Adams, You are the Key: Generating Cryptographic Keys from Voice Biometrics, Proceedings of the 8th Annual Conference on Privacy, Security and Trust (PST 2010), Ottawa, Canada, August 17-19, 2010, pp. 213-222.

   49. B. Carrara and C. Adams, On Achieving a Digital Identity Management System with Support for Non-Transferability, Proceedings of the 8th Annual Conference on Privacy, Security and Trust (PST 2010), Ottawa, Canada, August 17-19, 2010, pp. 150-159.

   48. C. Adams, G.-V. Jourdan, J.-P. Levac, and F. Prevost, Lightweight protection against brute force login attacks on web applications, Proceedings of the 8th Annual Conference on Privacy, Security and Trust (PST 2010), Ottawa, Canada, August 17-19, 2010, pp. 181-188.

   47. A. Essex, J. Clark, U. Hengartner,  and C. Adams, Eperio: Mitigating Technical Complexity in Cryptographic Election Verification, Proceedings of the Electronic Voting Technology Workshop / Workshop on Trustworthy Elections (EVT/WOTE ’10), Washington, DC, August 9-10, 2010 (14 pp.).

   46. M. Bodis, C. Adams, and G.-V. Jourdan, Methods for Content Protection in E-Learning Systems, Proceedings of the First International Conference on e-Learning for All (LEAFA 2010), Hammamet, Tunisia, June 3-5, 2010 (24 pp.).

45.  F. Tian and C. Adams, An E-Hospital Security Architecture, Proceedings of the First International Conference on Ad Hoc Networks (ADHOCNETS 2009), Nigara Falls, Canada, September 23-25, 2009, Springer, pp. 639-651.

44.  A. Essex, J. Clark, U. Hengartner, and C. Adams, How to Print a Secret, Proceedings of the 4th Usenix Workshop on Hot Topics in Security (HotSec 2009), Montreal, Canada, August 11, 2009 (available at http://www.usenix.org/event/hotsec09/tech/).

43.  A. Essex, J. Clark, and C. Adams, Aperio:  High Integrity Elections for Developing Countries, Proceedings of the Workshop on Trustworthy Elections (WOTE), Leuven, Belgium, July 22-23, 2008 (12 pp.).

42.  K. Garson and C. Adams, Security and Privacy System Architecture for an e-Hospital Environment, 7th Symposium on Identity and Trust on the Internet (IDtrust), Gaithersburg, MD, USA, March 4-6, 2008 (9 pp.).

41.  K. Garson and C. Adams, Policy-Based Encryption in a Multi-Agent System for an e-Hospital Environment, Proceedings of the 2nd Workshop on the Practice and Theory of IT Security (PTITS), Montreal, QC, Canada, January 23, 2008, pp. 10-14.

40.  J. Clark, P. C. van Oorschot, C. Adams, Usability of Anonymous Web Browsing:  An Examination of Tor Interfaces and Deployability, Proceedings of the 3rd Symposium on Usable Privacy and Security (SOUPS), Pittsburgh, PA, USA, July 18-20, 2007, pp. 41-51.

39.  W. Qiu and C. Adams, Exploring User-to-Role Delegation in Role-Based Access Control, Proceedings of the 8th World Congress on the Management of eBusiness, Toronto, Canada, July 11-13, 2007.

38.  D. Sharp and C. Adams, An Intrusion Detection Counterattack for 4th-Generation TLB-Assisted Rootkits and Self-Hashing Attacks, Proceedings of the 6th European Conference on Information Warfare and Security, Shrivenham, UK, July 2-3, 2007.

37.  J. Clark, A. Essex, and C. Adams, On the Security of Ballot Receipts in E2E Voting Systems, Proceedings of the Workshop on Trustworthy Elections (WOTE), Ottawa, Canada, June 20-21, 2007, pp. 65-72.

36.  J. Clark, A. Essex, and C. Adams, Secure and Observable Auditing of Electronic Voting Systems using Stock Indices, Proceedings of the 20th Annual IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), Vancouver, Canada, April 22-26, 2007.

35.  D. Shapiro, V. Thareja, and C. Adams, A Privacy-Preserving 3rd-Party Proxy for Transactions that use Digital Credentials, Proceedings of the 20th Annual IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), Vancouver, Canada, April 22-26, 2007.

34.  M. Alsaleh and C. Adams, Enhancing Consumer Privacy in the Liberty Alliance Identity Federation and Web Services Frameworks, Proceedings of the Workshop on Privacy Enhancing Technologies, Cambridge, UK, Springer, LNCS 4258, June 28-30, 2006, pp. 59-77.

33.  W. Qiu and C. Adams, A Study on Role-Based Delegation in Access Control, Proceedings of the Workshop on Practice and Theory of IT Security (PTITS), Montreal, Canada, May 17, 2006, pp. 11-15.

32.  Y. Kalyani and C. Adams, Privacy Negotiation using a Mobile Agent, Proceedings of the 19th Annual IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), Ottawa, Canada, May 7-10, 2006.

31.  X. Qing and C. Adams, XACML-Based Policy-Driven Access Control for Mobile Environments, Proceedings of the 19th Annual IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), Ottawa, Canada, May 7-10, 2006.

30.  X. Qing and C. Adams, KEAML - Key Exchange and Authentication Markup Language, Proceedings of the 19th Annual IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), Ottawa, Canada, May 7-10, 2006.

29.  D. Nali, C. Adams, and A. Miri, An Efficient and Flexible Scheme to Support Biometric-Based and Role-Based Access Control, Proceedings of the 4th International Workshop for Applied PKI (IWAP), Sentosa Island, Singapore, IOS Press, Volume 128, September 21-23, 2005, pp. 139-154.

28.  D. Nali, C. Adams, and A. Miri, Time-Based Release of Confidential Information in Hierarchical Settings, Proceedings of the 8th Information Security Conference (ISC), Sentosa Island, Singapore, Springer, LNCS 3650, September 20-23, 2005, pp. 29-43.

27.  J. Shi, G. v. Bochmann, and C. Adams, Dealing with Recommendations in a Statistical Trust Model, Proceedings of the Workshop on Trust in Agent Societies (held in conjunction with the 4th International Joint Conference on Autonomous Agents and Multi Agent Systems (AAMAS)), Utrecht, The Netherlands, July 25, 2005.

26.  R. Qing and C. Adams, A Comparison of Compression Techniques for XML-Based Security Policies in Mobile Computing Environments, Proceedings of the Workshop on New Challenges for Access Control (NCAC), April 27, 2005, pp.209-232.

25.  G. Bochmann, E. Zhang, C. Adams, and J. Chandler, A Security Framework Combining Access Control and Trust Management for Mobile E-Commerce Applications, Proceedings of the Workshop on New Challenges for Access Control (NCAC), April 27, 2005, pp.441-461.

24.  D. Nali, C. Adams, and A. Miri, Threshold Semi-Anonymous Authorization of e-Transactions, Proceedings of the Workshop on the Practice and Theory of Access Control Technologies (WPTACT), Montreal, Canada, January 19, 2005, pp. 23-27.

23.  D. Nali, A. Miri, and C. Adams, Efficient Revocation of Dynamic Security Privileges in Hierarchically Structured Communities, Proceedings of the 2nd Annual Conference on Privacy, Security and Trust (PST 2004), Fredericton, New Brunswick, Canada, October 13-15, 2004, pp. 219-223.

22.  D. Nali, C. Adams, and A. Miri, Using Mediated Identity-Based Cryptography to Support Role-Based Access Control, Proceedings of the 7th Information Security Conference (ISC '04), Palo Alto, CA, USA, Springer, LNCS 3225, September 27-29, 2004, pp. 245-256.

21.  C. Adams, G. Kramer, S. Mister, and R. Zuccherato, On the Security of Key Derivation Functions, Proceedings of the 7th Information Security Conference (ISC '04), Palo Alto, CA, USA, Springer, LNCS 3225, September 27-29, 2004, pp. 134-145.

20.  J. Shi, G. Bochmann, and C. Adams, A Trust Model with Statistical Foundation, 18th International Federation for Information Processing (IFIP) World Computer Congress TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), IFIP vol. 173/2005, Springer, Toulouse, France, August 22-27, 2004, pp. 145-158.

19.  C. Adams and M. Just, PKI:  Ten Years Later, 3rd Annual PKI R&D Workshop, National Institute of Standards and Technology (NIST), Gaithersburg, MD, USA, April 12-14, 2004.

18.  C. Adams, P. Madsen, and R. Griffin, Two-Domain Authorization Models, Canadian Information Technology Security Symposium, Ottawa, Canada, May 12-15, 2003

17.  C. Adams and S. Boeyen, UDDI and WSDL Extensions for Web Services:  A Security Framework, Proceedings of the ACM Workshop on XML Security, Fairfax, VA, November 22, 2002.

16.  P. Madsen and C. Adams, An Authentication Framework for Web Services, Canadian Information Technology Security Symposium, Ottawa, Canada, May 15-17, 2002.

15.  C. Adams and R. Zuccherato, A Global PMI for Electronic Content Distribution, Selected Areas in Cryptography (SAC ’00) Proceedings, LNCS 2012, Springer, 2001, pp. 158-168.

14.  C. Adams, H.M. Heys, S.E. Tavares, and M. Wiener, An Analysis of the CAST-256 Cipher, Proceedings of IEEE Canadian Conference on Electrical and Computer Engineering CCECE '99, Edmonton, Alberta, May, 1999.

13.  S. Harris and C. Adams, Key-Dependent S-Box Manipulations, Selected Areas in Cryptography (SAC ’98) Proceedings, LNCS 1556, Springer, 1999, pp. 15-26.

12.  C. Adams, DES-80, Workshop Record of the Workshop on Selected Areas in Cryptography  (SAC ’97), Ottawa, Canada, August 11-12, 1997, pp. 160-171.

11.  C. Adams and S. Lloyd, Profiles and Protocols for the Internet Public-Key Infrastructure, Proceedings of the Sixth IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems, October 29-31, 1997, Tunis, Tunisia, pp. 220-224.

10.  C. Adams and M. Wiener, The SHADE Cipher:  An Efficient Hash-Function-Based Feistel Network, Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, St. John’s NF, Canada, May 25-28, 1997, pp. 338-342.

 9.  S. Mister and C. Adams, Practical S-Box Design, Workshop Record of the Workshop on Selected Areas in Cryptography  (SAC ’96), 1996, pp. 61-76.

 8.  C. Adams, IDUP and SPKM: Developing Public-Key-Based APIs and Mechanisms for Communication Security Services, Proceedings of the Symposium on Network and Distributed Systems Security, San Diego, California, January, 1996.

 7.  C. Adams, Designing DES-Like Ciphers with Guaranteed Resistance to Differential and Linear Attacks, Workshop Record of the Workshop on Selected Areas in Cryptography (SAC ’95), Ottawa, Canada, May 18-19, 1995, pp. 133-144.

 6.  C. Adams, Simple and Effective Key Scheduling for Symmetric Ciphers, Workshop Record of the Workshop on Selected Areas in Cryptography   (SAC ’94), 1994, pp. 129-133.

 5.  C. Adams and S. Tavares, Designing S-Boxes for Ciphers Resistant to Differential Cryptanalysis, Proceedings of the 3rd Symposium on the State and Progress of Research in Cryptography, Rome, Italy, 1993, pp. 181-190.

 4.  C. Adams, H. Meijer, and S. Tavares, Breaking and Strengthening a Multiplication-Permutation Encryption Network, Proceedings of the 15th Biennial Symposium on Communications, Kingston, Canada, June 3-6, 1990, pp. 104-107.

 3.  C. Adams and S. Tavares, Good S-Boxes are Easy to Find, Advances in Cryptology, Proceedings of CRYPTO ’88, Springer-Verlag, Berlin, 1990, pp. 612-615.

 2.  S. Tavares and C. Adams, Statistical Testing of Cryptographic Systems, Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, Vancouver, Canada, November 4-5, 1988, pp. 105-108.

 1.  C. Adams and H. Meijer, Security-Related Comments Regarding McEliece’s Public-Key Cryptosystem, Advances in Cryptology:  Proceedings of CRYPTO ’87, Springer-Verlag, Berlin, 1988, pp. 224-228.

     

      Other Publications

6.    C. Adams and V. Piñero, Addendum:  A Brief Note on Privacy from a Technological Perspective, Canadian Journal of Criminology and Criminal Justice, vol. 50, issue 8, June 2008.

5.    D. Nali, C. Adams, and A. Miri, Hierarchical Identity-Based Signcryption with Public Ciphertext Authenticity and Forward Security, Presented at the Western European Workshop on Research in Cryptology (WEWoRC), Leuven-Heverlee, Belgium, July 5-7, 2005.

4.    P. Madsen and C. Adams, Privacy and XML, Part 2, Article published in online magazine XML.com, May 1, 2002.  (Available at http://www.xml.com/pub/a/2002/05/01/privacy.html)

3.    P. Madsen and C. Adams, Privacy and XML, Part 1, Article published in online magazine XML.com, April 17, 2002. (Available at http://www.xml.com/pub/a/2002/04/17/privacy.html)

2.    E. Simon, P. Madsen, and C. Adams, An Introduction to XML Digital Signatures, Article published in online magazine XML.com, August 8, 2001.    (Available at http://www.xml.com/pub/a/2001/08/08/xmldsig.html)

1.    C. Adams and R. Zuccherato, A General, Flexible Approach to Certificate Revocation, June, 1998.  (Available at http://www.entrust.com/resources/pdf/certrev.pdf) 

;