Search the dblp DataBase
Carlisle M. Adams :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Carlisle M. Adams , Mike Burmester , Yvo Desmedt , Michael K. Reiter , Philip Zimmermann Which PKI (public key infrastructure) is the right one? (panel session). [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2000, pp:98-101 [Conf ] Carlisle M. Adams , Henk Meijer Security-Related Comments Regarding McEliece's Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:224-228 [Conf ] Carlisle M. Adams , Stafford E. Tavares Good S-Boxes Are Easy To Find. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:612-615 [Conf ] Jianqiang Shi , Gregor von Bochmann , Carlisle M. Adams A Trust Model with Statistical Foundation. [Citation Graph (0, 0)][DBLP ] Formal Aspects in Security and Trust, 2004, pp:145-158 [Conf ] Carlisle M. Adams , Guenther Kramer , Serge Mister , Robert J. Zuccherato On The Security of Key Derivation Functions. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:134-145 [Conf ] Deholo Nali , Carlisle M. Adams , Ali Miri Using Mediated Identity-Based Cryptography to Support Role-Based Access Control. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:245-256 [Conf ] Deholo Nali , Carlisle M. Adams , Ali Miri Time-Based Release of Confidential Information in Hierarchical Settings. [Citation Graph (0, 0)][DBLP ] ISC, 2005, pp:29-43 [Conf ] Deholo Nali , Ali Miri , Carlisle M. Adams Efficient Revocation of Dynamic Security Privileges in Hierarchically Structured Communities. [Citation Graph (0, 0)][DBLP ] PST, 2004, pp:219-223 [Conf ] Carlisle M. Adams , Robert J. Zuccherato A Global PMI for Electronic Content Distribution. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2000, pp:158-168 [Conf ] Sandy Harris , Carlisle M. Adams Key-Dependent S-Box Manipulations. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:15-26 [Conf ] Carlisle M. Adams Designing against a class of algebraic attacks on symmetric block ciphers. [Citation Graph (0, 0)][DBLP ] Appl. Algebra Eng. Commun. Comput., 2006, v:17, n:1, pp:17-27 [Journal ] Carlisle M. Adams , Stafford E. Tavares Generating Bent Sequences. [Citation Graph (0, 0)][DBLP ] Discrete Applied Mathematics, 1992, v:39, n:2, pp:155-159 [Journal ] Carlisle M. Adams Constructing Symmetric Ciphers Using the CAST Design Procedure. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 1997, v:12, n:3, pp:283-316 [Journal ] Carlisle M. Adams Building Secure Web-Based Environments: Understanding Research Interrelationships through a Construction Metaphor. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:1, pp:74-77 [Journal ] Deholo Nali , Carlisle M. Adams , Ali Miri Hierarchical time-based information release. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2006, v:5, n:2, pp:92-104 [Journal ] Carlisle M. Adams On Immunity Against Biham and Shamir's ``Differential Cryptanalysis''. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1992, v:41, n:2, pp:77-80 [Journal ] Carlisle M. Adams , Stafford E. Tavares The Structured Design of Cryptographically Good S-Boxes. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1990, v:3, n:1, pp:27-41 [Journal ] Carlisle M. Adams , Henk Meijer Security-related comments regarding McEliece's public-key cryptosystem. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1989, v:35, n:2, pp:454-455 [Journal ] Carlisle M. Adams , Stafford E. Tavares Generating and counting binary bent sequences. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1990, v:36, n:5, pp:1170-0 [Journal ] Search in 0.003secs, Finished in 0.004secs