Carlisle M. Adams
Orcid: 0000-0002-7335-9968Affiliations:
- University of Ottawa, Canada
According to our database1,
Carlisle M. Adams
authored at least 129 papers
between 1989 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on id.loc.gov
On csauthors.net:
Bibliography
2023
GhostBuy : An All-Steps Anonymous Purchase Platform (ASAPP) based on Separation of Data.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
2022
2021
Int. J. Secur. Networks, 2021
Proceedings of the IEEE International Conference on Quantum Computing and Engineering, 2021
Introduction to Privacy Enhancing Technologies - A Classification-Based Approach to Understanding PETs
Springer, ISBN: 978-3-030-81042-9, 2021
2020
Strengthening Enforcement in a Comprehensive Architecture for Privacy Enforcement at Internet Websites.
Frontiers Comput. Sci., 2020
Machine learning-driven intrusion detection for Contiki-NG-based IoT networks exposed to NSL-KDD dataset.
Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning, 2020
2019
Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019
2018
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018
A PIR Scheme to Improve the Computation Cost on the Client-Side of Smartphone Applications.
Proceedings of the 2018 IEEE Canadian Conference on Electrical & Computer Engineering, 2018
2017
Proceedings of the E-Technologies: Embracing the Internet of Things, 2017
Proceedings of the 30th IEEE Canadian Conference on Electrical and Computer Engineering, 2017
2016
Privacy, Security and Convenience: Biometric Encryption for Smartphone-Based Electronic Travel Documents.
Proceedings of the Recent Advances in Computational Intelligence in Defense and Security, 2016
Secure data storage structure and privacy-preserving mobile search scheme for public safety networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016
Proceedings of the 2016 IEEE Canadian Conference on Electrical and Computer Engineering, 2016
2015
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015
2014
Using biometric key commitments to prevent unauthorized lending of cryptographic credentials.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Classification of technological privacy techniques for LTE-based public safety networks.
Proceedings of the Q2SWinet'14, 2014
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014
Proceedings of the Workshops of the EDBT/ICDT 2014 Joint Conference (EDBT/ICDT 2014), 2014
Proceedings of the IEEE 27th Canadian Conference on Electrical and Computer Engineering, 2014
2013
RFC, June, 2013
J. Mobile Multimedia, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Secur. Commun. Networks, 2011
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011
Transparent non-intrusive multimodal biometric system for video conference using the fusion of face and ear recognition.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011
Session-wise private data exchange in eHealth peer-to-peer database management systems.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011
2010
Pair-wise Cryptographic Models for Secure Data Exchange in P2P Database Management Systems.
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010
Proceedings of the 2010 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2010
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010
On achieving a digital identity management system with support for non-transferability.
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010
2009
Proceedings of the Ad Hoc Networks, First International Conference, 2009
2008
Int. J. Netw. Secur., 2008
Proceedings of the IDtrust 2008, 2008
2007
Usability of anonymous web browsing: an examination of Tor interfaces and deployability.
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007
2006
Int. J. Netw. Secur., 2006
Appl. Algebra Eng. Commun. Comput., 2006
Enhancing Consumer Privacy in the Liberty Alliance Identity Federation and Web Services Frameworks.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006
2005
Alternative Certificate Formats for the Public-Key Infrastructure Using X.509 (PKIX) Certificate Management Protocols.
RFC, October, 2005
RFC, September, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Using Threshold Attribute-based Encryption for Practical Biometric-based Access Control.
Int. J. Netw. Secur., 2005
Building Secure Web-Based Environments: Understanding Research Interrelationships through a Construction Metaphor.
IEEE Secur. Priv., 2005
An Efficient and Flexible Scheme to Support Biometric-Based and Role-Based Access Control.
Proceedings of the Applied Public Key Infrastructure, 2005
Proceedings of the Information Security, 8th International Conference, 2005
2004
IACR Cryptol. ePrint Arch., 2004
Efficient Revocation of Dynamic Security Privileges in Hierarchically Structured Communities.
Proceedings of the Second Annual Conference on Privacy, 2004
Proceedings of the Information Security, 7th International Conference, 2004
Proceedings of the Information Security, 7th International Conference, 2004
Proceedings of the Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), 2004
2002
Proceedings of the 2002 ACM Workshop on XML Security, Fairfax, VA, USA, November 22, 2002, 2002
2001
RFC, August, 2001
Internet X.509 Public Key Infrastructure Data Validation and Certification Server Protocols.
RFC, February, 2001
2000
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000
Proceedings of the CCS 2000, 2000
1999
RFC, June, 1999
RFC, March, 1999
1998
Independent Data Unit Protection Generic Security Service Application Program Interface (IDUP-GSS-API).
RFC, December, 1998
Proceedings of the Selected Areas in Cryptography '98, 1998
1997
Des. Codes Cryptogr., 1997
Proceedings of the 6th IEEE Workshop on Future Trends of Distributed Computer Systems (FTDCS '97), 1997
1996
IDUP and SPKM: Developing Public-Key-Based APIs and Mechanisms for Communication Security Services.
Proceedings of the 1996 Symposium on Network and Distributed System Security, 1996
1992
Inf. Process. Lett., 1992
1990
1989
IEEE Trans. Inf. Theory, 1989