The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Carlisle M. Adams: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Carlisle M. Adams, Mike Burmester, Yvo Desmedt, Michael K. Reiter, Philip Zimmermann
    Which PKI (public key infrastructure) is the right one? (panel session). [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:98-101 [Conf]
  2. Carlisle M. Adams, Henk Meijer
    Security-Related Comments Regarding McEliece's Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:224-228 [Conf]
  3. Carlisle M. Adams, Stafford E. Tavares
    Good S-Boxes Are Easy To Find. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:612-615 [Conf]
  4. Jianqiang Shi, Gregor von Bochmann, Carlisle M. Adams
    A Trust Model with Statistical Foundation. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2004, pp:145-158 [Conf]
  5. Carlisle M. Adams, Guenther Kramer, Serge Mister, Robert J. Zuccherato
    On The Security of Key Derivation Functions. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:134-145 [Conf]
  6. Deholo Nali, Carlisle M. Adams, Ali Miri
    Using Mediated Identity-Based Cryptography to Support Role-Based Access Control. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:245-256 [Conf]
  7. Deholo Nali, Carlisle M. Adams, Ali Miri
    Time-Based Release of Confidential Information in Hierarchical Settings. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:29-43 [Conf]
  8. Deholo Nali, Ali Miri, Carlisle M. Adams
    Efficient Revocation of Dynamic Security Privileges in Hierarchically Structured Communities. [Citation Graph (0, 0)][DBLP]
    PST, 2004, pp:219-223 [Conf]
  9. Carlisle M. Adams, Robert J. Zuccherato
    A Global PMI for Electronic Content Distribution. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:158-168 [Conf]
  10. Sandy Harris, Carlisle M. Adams
    Key-Dependent S-Box Manipulations. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:15-26 [Conf]
  11. Carlisle M. Adams
    Designing against a class of algebraic attacks on symmetric block ciphers. [Citation Graph (0, 0)][DBLP]
    Appl. Algebra Eng. Commun. Comput., 2006, v:17, n:1, pp:17-27 [Journal]
  12. Carlisle M. Adams, Stafford E. Tavares
    Generating Bent Sequences. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 1992, v:39, n:2, pp:155-159 [Journal]
  13. Carlisle M. Adams
    Constructing Symmetric Ciphers Using the CAST Design Procedure. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1997, v:12, n:3, pp:283-316 [Journal]
  14. Carlisle M. Adams
    Building Secure Web-Based Environments: Understanding Research Interrelationships through a Construction Metaphor. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:1, pp:74-77 [Journal]
  15. Deholo Nali, Carlisle M. Adams, Ali Miri
    Hierarchical time-based information release. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2006, v:5, n:2, pp:92-104 [Journal]
  16. Carlisle M. Adams
    On Immunity Against Biham and Shamir's ``Differential Cryptanalysis''. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1992, v:41, n:2, pp:77-80 [Journal]
  17. Carlisle M. Adams, Stafford E. Tavares
    The Structured Design of Cryptographically Good S-Boxes. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1990, v:3, n:1, pp:27-41 [Journal]
  18. Carlisle M. Adams, Henk Meijer
    Security-related comments regarding McEliece's public-key cryptosystem. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1989, v:35, n:2, pp:454-455 [Journal]
  19. Carlisle M. Adams, Stafford E. Tavares
    Generating and counting binary bent sequences. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1990, v:36, n:5, pp:1170-0 [Journal]

Search in 0.013secs, Finished in 0.015secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002