Carlisle Adams
#57,119
Most Influential Person Now
Cryptographer
Carlisle Adams's AcademicInfluence.com Rankings
Carlisle Adamsmathematics Degrees
Mathematics
#6902
World Rank
#9475
Historical Rank
Measure Theory
#2547
World Rank
#3055
Historical Rank
Download Badge
Computer Science Mathematics
Why Is Carlisle Adams Influential?
(Suggest an Edit or Addition)According to Wikipedia, Carlisle M. Adams is a Canadian cryptographer and computer security researcher. Formerly senior cryptographer at Entrust, he is currently a professor at the University of Ottawa. His notable work includes the design of the block ciphers CAST-128 and CAST-256, whose S-boxes are based on the non-linear properties of bent functions. He also helped organize the first Selected Areas in Cryptography workshop in 1994. He is also the security advisor of the Ottawa-based electronic signature company Signority.
Carlisle Adams's Published Works
Published Works
- X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP (1999) (1032)
- Internet X.509 Public Key Infrastructure Certificate Management Protocols (1999) (330)
- Understanding PKI: Concepts, Standards, and Deployment Considerations (1999) (311)
- Pass-Go: A Proposal to Improve the Usability of Graphical Passwords (2008) (268)
- Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) (2001) (256)
- The structured design of cryptographically good s-boxes (1990) (164)
- Smart sustainable cities roadmap: Readiness for transformation towards urban sustainability (2018) (137)
- Constructing Symmetric Ciphers Using the CAST Design Procedure (1997) (124)
- The CAST-128 Encryption Algorithm (1997) (120)
- Internet X.509 Public Key Infrastructure Certificate Management Protocol (CMP) (2005) (110)
- Good S-Boxes Are Easy To Find (1989) (107)
- A Conceptual Multidimensional Model for Assessing Smart Sustainable Cities (2016) (93)
- Generating and counting binary bent sequences (1990) (85)
- Usability of anonymous web browsing: an examination of Tor interfaces and deployability (2007) (82)
- The CAST-256 Encryption Algorithm (1999) (82)
- Security-related comments regarding McEliece's public-key cryptosystem (1987) (80)
- The Simple Public-Key GSS-API Mechanism (SPKM) (1996) (62)
- A Trust Model with Statistical Foundation (2004) (61)
- Internet X.509 Certificate Request Message Format (1999) (58)
- Short-range wireless technologies with mobile payments systems (2004) (54)
- DESIGNING S-BOXES FOR CIPHERS RESISTANT TO DIFFERENTIAL CRYPTANALYSIS ( Extended (1993) (49)
- On Immunity Against Biham and Shamir's "Differential Cryptanalysis" (1992) (49)
- On Acoustic Covert Channels Between Air-Gapped Systems (2014) (48)
- Internet X.509 Public Key Infrastructure Data Validation and Certification Server Protocols (2001) (44)
- UDDI and WSDL extensions for Web service: a security framework (2002) (43)
- Using Threshold Attribute-based Encryption for Practical Biometric-based Access Control (2005) (43)
- Managing crowdsourcing assignments (2011) (42)
- User Acceptance of Mobile Payments: A Theoretical Model for Mobile Payments (2005) (40)
- Enhancing Consumer Privacy in the Liberty Alliance Identity Federation and Web Services Frameworks (2006) (38)
- Machine learning-driven intrusion detection for Contiki-NG-based IoT networks exposed to NSL-KDD dataset (2020) (37)
- PAVING THE WAY TO SMART SUSTAINABLE CITIES: TRANSFORMATION MODELS AND CHALLENGES (2016) (36)
- Security and privacy system architecture for an e-hospital environment (2008) (36)
- Internet Public Key Infrastructure (1995) (35)
- Dangers inherent in the use of techniques: identifying framing influences (2003) (29)
- Sustainable Refugee Migration: A Rethink towards a Positive Capability Approach (2016) (28)
- Out-of-Band Covert Channels—A Survey (2016) (28)
- Lightweight protection against brute force login attacks on Web applications (2010) (28)
- A formal and practical design procedure for substitution-permutation network cryptosystems (1992) (28)
- The Use of Bent Sequences to Achieve Higher-Order Strict Avalanche Criterion in S-Box Design (1990) (26)
- Platform for privacy preferences (P3P): Current status and future directions (2012) (24)
- On The Security of Key Derivation Functions (2004) (24)
- A General, Flexible Approach to Certificate Revocation (1998) (24)
- A Survey and Taxonomy Aimed at the Detection and Measurement of Covert Channels (2016) (23)
- Replay Attack (2005) (23)
- Modelling corporate wireless security and privacy (2005) (23)
- Managing mobile provision for community healthcare support: issues and challenges (2006) (22)
- Will B2C e-commerce developed in one cultural environment be suitable for another culture: a cross-cultural study between amazon.co.uk (UK) and dangdang.com (China) (2005) (22)
- Eperio: Mitigating Technical Complexity in Cryptographic Election Verification (2010) (22)
- Information Security Management System (2014) (21)
- Independent Data Unit Protection Generic Security Service Application Program Interface (IDUP-GSS-API) (1998) (20)
- Secure and Observable Auditing of Electronic Voting Systems using Stock Indices (2007) (18)
- Privacy Enforcement in E-Services Environments (2006) (18)
- You are the key: Generating cryptographic keys from voice biometrics (2010) (17)
- Using Mediated Identity-Based Cryptography to Support Role-Based Access Control (2004) (17)
- Diffie-Hellman Key Exchange (2011) (17)
- An analysis of the CAST-256 cipher (1999) (17)
- The past, present and future of social networking and outsourcing: impact on theory and practice (2010) (17)
- How to print a secret (2009) (16)
- Iso/iec 27001 (2011) (16)
- Linear approximation of injective s-boxes (1995) (16)
- Online Certificate Status Protocol, version 2 (2001) (16)
- Evolution of Electronic and Mobile Business and Services: Government Support for E/M-Payment Systems (2010) (15)
- On the Security of Ballot Receipts in E 2 E Voting Systems (2007) (15)
- Using Elliptic Curve Diffie-Hellman in the SPKM GSS-API (1999) (15)
- Achieving non-transferability in credential systems using hidden biometrics (2011) (15)
- A Classification for Privacy Techniques (2007) (15)
- M-health review: joining up healthcare in a wireless world (2012) (14)
- Dealing with Recommendations in a Statistical Trust Model (2005) (14)
- Social Inclusion and the Shifting Role of Technology: Is Age the New Gender in Mobile Access? (2006) (14)
- Aperio: High Integrity Elections for Developing Countries (2010) (13)
- Which PKI (public key infrastructure) is the right one? (panel session) (2000) (13)
- DLAS: Data Location Assurance Service for cloud computing environments (2012) (13)
- Legal Challenges of Online Reputation Systems (2007) (12)
- Development of ultra-low impedance Through-wafer Micro-vias (2004) (12)
- Digital Citizen Participation within Schools in the United Kingdom and Indonesia: An Actor-Network Theory (ANT) Perspective (2016) (12)
- Cryptographic security models for eHealth P2P database management systems network (2011) (12)
- Location-Aware Authorization Scheme for Emergency Response (2016) (12)
- User Authentication (2005) (12)
- Improving security and usability of low cost RFID tags (2011) (11)
- Trusted Third Party (2011) (11)
- XACML-Based Policy-Driven Access Control for Mobile Environments (2006) (11)
- Mature Discipline : Trends , Themes , Philosophies , Methodologies , and Methods (2016) (11)
- Key-Dependent S-Box Manipulations (1998) (11)
- Transparent non-intrusive multimodal biometric system for video conference using the fusion of face and ear recognition (2011) (10)
- The Anatomy of Smartness of Smart Sustainable Cities: An Inclusive Approach (2017) (10)
- The Teacher Assisting and Subject Adaptive Material (TASAM) System: An Arabic Adaptive learning Environment (2010) (9)
- On Characterizing and Measuring Out-of-Band Covert Channels (2015) (9)
- Using biometric key commitments to prevent unauthorized lending of cryptographic credentials (2014) (9)
- Designing against a class of algebraic attacks on symmetric block ciphers (2006) (8)
- The Rise of Complementary Currencies and Corporafinance: E-commerce Driven Competition in the Financial Sector (2010) (8)
- Impersonation Attack (2005) (8)
- Adoption of Learning Management Systems in Saudi Higher Education Context: Study at King Fahd University of Petroleum and Minerals & Dammam Community College (2016) (8)
- Master Key (2005) (8)
- Providing A Data Location Assurance Service for Cloud Storage Environments (2012) (8)
- Smart Sustainable Cities: A New Perspective on Transformation, Roadmap and Framework Concepts (2016) (8)
- Patrons of disaster: The role of political patronage in flood response in the Solomon Islands (2019) (8)
- Mobile Commerce Adoption: A Novel Buyer-User-Service Payer Metric (2009) (8)
- Classification of technological privacy techniques for LTE-based public safety networks (2014) (7)
- Session-wise private data exchange in eHealth peer-to-peer database management systems (2011) (7)
- Time-Based Release of Confidential Information in Hierarchical Settings (2005) (7)
- Consumers' Attitudes Toward Mobile Commerce: A Model to Capture the Cultural and Environment Influences (2010) (7)
- Incorporating Heuristics in a Swarm Intelligence Framework for Inferring Gene Regulatory Networks from Gene Expression Time Series (2008) (7)
- Selected Areas in Cryptography – SAC 2017 (2017) (7)
- Efficient Revocation of Dynamic Security Privileges in Hierarchically Structured Communities (2004) (7)
- The Need for Policies to Overcome eGov Implementation Challenges (2014) (7)
- Secure Multi-Party linear Regression (2014) (7)
- Theory of change for the transformation towards smart sustainable cities (2017) (6)
- Selected Areas in Cryptography, 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers (2007) (6)
- Digital signatures for mobile users (2014) (6)
- The role of ICT education and trainings in poverty reduction and economic empowerment: a case study of Jigawa state government ICT4D intervention (2018) (6)
- Convergence of terrestrial and satellite mobile communication systems: an operator's perspective (2009) (6)
- Evaluation processes: Lessons from Bateson’s second order learning (2003) (6)
- Profiles and protocols for the Internet Public-Key Infrastructure (1997) (6)
- Transforming Government through e-Participation: challenges for e-Democracy. (2012) (6)
- Privacy, Security and Convenience: Biometric Encryption for Smartphone-Based Electronic Travel Documents (2016) (5)
- A study of the reliability and validity of the felder-soloman index of learning styles in arabic (2009) (5)
- A novel framework of e-participation (2014) (5)
- On achieving a digital identity management system with support for non-transferability (2010) (5)
- An efficient solution to the socialist millionaires' problem (2017) (5)
- Stakeholders Engagement in Smart Sustainable Cities: A Proposed Model (2017) (5)
- Assessing smartness of smart sustainable cities: A comparative analysis (2017) (5)
- A Tool for Exploring Technological Evolution and Impact within Organisations (2009) (5)
- The Information Revolution, Information Systems and the 6th Kondratieff Cycle (2010) (5)
- Community Networks for Addressing Affordability of ICT Access in African Rural Areas: A Case Study of Zenzeleni, Makhosi (2018) (5)
- The SHADE cipher: an efficient hash-function-based Feistel network (1997) (5)
- Impact of EU data protection laws on cloud-computing:capturing cloud-computing challenges and fault lines (2015) (5)
- Generating Bent Sequences (1992) (5)
- Secure Hajj Permission Based on Identifiable Pilgrim’s Information (2015) (5)
- A base of knowledge, mobile, and web 2.0 technologies for connected e-government (2014) (5)
- Corporate and social transformation of money and banking: breaking the serfdom (2011) (4)
- Designing Against the 'Overdefined System of Equations' Attack (2004) (4)
- Social Networking and Extending Social Capacity (2011) (4)
- Modification Tolerant Signature Schemes: Location and Correction (2019) (4)
- Internet Public Key Infrastructure Real Time Certificate Status Protocol - RCSP (1998) (4)
- An empirical study of factos influencing e-commerce customers' awareness in Jordan (2016) (4)
- Delegated Path Validation (2000) (4)
- Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography (1999) (4)
- Hardware-based DLAS: Achieving geo-location guarantees for cloud data using TPM and Provable Data Possession (2014) (4)
- Privacy Negotiation using a Mobile Agent (2006) (4)
- Introduction to Privacy Enhancing Technologies: A Classification-Based Approach to Understanding PETs (2021) (3)
- Personal Identification Number (PIN) (2005) (3)
- Secure data storage structure and privacy-preserving mobile search scheme for public safety networks (2016) (3)
- Cellular Network Security (2011) (3)
- Using mixed methods for addressing researcher’s safety in a conflict area: an innovative use of mixed methods research in Zimbabwe (2011) (3)
- Connected service delivery framework:towards interoperable government (2014) (3)
- Mobile Information System, Health Work and Community Health Workers in Less Developed Countries (2007) (3)
- Supporting structures for evolving systems development: a case study (2005) (3)
- Conceptual Framework of eService delivery system in Developing Countries with a high level of Instability (2016) (3)
- In-Depth Analysis of the Arabic Version of the Felder-Silverman Index of Learning Styles (2015) (3)
- Certificate (2021) (3)
- KEAML - Key Exchange and Authentication Markup Language (2006) (3)
- Crowdsourcing innovation: a proposal for a brokering architecture focused in the innovation needs of SMEs (2012) (3)
- Remote Attestation (2011) (3)
- Exoinformation Space Audits: An Information Richness View of Privacy and Security Obligations (2007) (3)
- Mobile Supported Patient Care: The Dichotomy of National and Local Needs (2007) (3)
- Token (2021) (3)
- Conceptual Modeling (2012) (3)
- Selected areas in cryptography : 6th Annual International Workshop, SAC '99, Kingston, Ontario, Canada, August 9-10, 1999 : proceedings (1999) (3)
- A privacy‐preserving Blockchain with fine‐grained access control (2019) (3)
- TCP SYN Flooding (2004) (3)
- A Global PMI for Electronic Content Distribution (2000) (2)
- Dictionary Attack (2011) (2)
- Privacy Preserving Discovery of Nearby-Friends (2017) (2)
- Internet X.509 Public Key Infrastructure Certificate Management Message Formats (1998) (2)
- Pair-wise Cryptographic Models for Secure Data Exchange in P2P Database Management Systems (2010) (2)
- Delegated Path Discovery with OCSP (2000) (2)
- A Privacy-Preserving 3rd-Party Proxy for Transactions that Use Digital Credentials (2007) (2)
- Hierarchical time-based information release (2006) (2)
- Selected Areas in Cryptography (2001) (2)
- Certificate Management (2005) (2)
- IDUP and SPKM: developing public-key-based APIs and mechanisms for communication security services (1996) (2)
- Decentralized Trust Management (2011) (2)
- Dictionary Attack (II) (2005) (2)
- Rights Management (2005) (2)
- Alternatives to the global financial sector: local complementary currencies, LETS and Time backed currencies (2011) (2)
- Towards autonomic marketing (2012) (2)
- Mobile Support for Community Healthcare (2004) (2)
- Trust Challenges in a High Performance Cloud Computing Project (2014) (2)
- Privacy Challenges for Location Aware Technologies (2005) (2)
- Autonomic Systems, Coping Strategies adn Dream Functions (2007) (2)
- Certificate Revocation (2005) (2)
- A Case Study on Data Protection and Security Decisions in Cloud HPC (2015) (2)
- Decentralized CRT-Based Efficient Verifiable (n, t, n) Multi-secret Sharing Scheme (2014) (1)
- Mobile Travel Credentials (2018) (1)
- Authorization architecture (2005) (1)
- A PIR Scheme to Improve the Computation Cost on the Client-Side of Smartphone Applications (2018) (1)
- PEM-Based IDUP Mechanism (PIM) (1996) (1)
- Korea : selected issues (1996) (1)
- Is eDemocracy The Democracy , Or an Illusion of Participation ? (2012) (1)
- Strengthening Enforcement in a Comprehensive Architecture for Privacy Enforcement at Internet Websites (2020) (1)
- Temporal stakeholder analysis of future technologies: exploring the impact of the IoV (2015) (1)
- Internet Public Key Infrastructure Part V: Time Stamp Protocols (1997) (1)
- Digital credentials with privacy-preserving delegation (2011) (1)
- Kerberos Authentication Protocol (2005) (1)
- Information Integrity (2011) (1)
- Macro Analysis of Techniques to Deal with Uncertainty in Information Systems Development: Mapping Representational Framing Influences (2002) (1)
- The Emergence of Non-Banks: E-Commerce Driven Competition in the Financial Sector (2011) (1)
- Public Service Integration in Jordan (2015) (1)
- Using Malleable Signatures to Allow Multi-Show Capability in Digital Credentials (2018) (1)
- Security Analysis of a Privacy-Preserving Identity-Based Encryption Architecture (2022) (1)
- Privilege Management (2005) (1)
- Public-Key Authenticated Encryption (2011) (1)
- Mobile support for community healthcare: A Janus view (2004) (1)
- Diagnostic Techniques and Procedures for Cross-Cultural Adaptation of Arabic Version Instrument (2011) (1)
- Use of the CAST-128 Encryption Algorithm in CMS (2000) (1)
- APPLYING LEARNING STYLES TO ARABIC SPEAKING GROUPS (2010) (1)
- Mobile Telephony in Healthcare (2007) (1)
- Software-Based Attestation (2011) (1)
- Alternative Certificate Formats for the Public-Key Infrastructure Using X.509 (PKIX) Certificate Management Protocols (2005) (1)
- Spread Spectrum Encryption Architecture SSEA: A New Encryption Architecture for Post Quantum Computing - Design and Analysis. (2013) (1)
- Estimating the steganographic capacity of band-limited channels (2016) (1)
- Crowdsharing, crowdmapping and crowdsensing: the power of the sharing crowd for disaster preparedness and response (2018) (0)
- Subgroup Cryptosystems (2011) (0)
- Credential Verification (2011) (0)
- A Complementary and Competitive Monetary System for the Future (2011) (0)
- Convergence singularities: As man becomes machine and machine becomes man (2011) (0)
- The internet: help or hindrance in patient care? (2005) (0)
- PKCS #7-Based IDUP Mechanism (p7im) (1996) (0)
- Authorizations management (2005) (0)
- Limiting Exposure by Hiding the Identity (2021) (0)
- Impact of post-quantum hybrid certificates on PKI, common libraries, and protocols (2021) (0)
- Reflection on Development Techniques Using the Psychology Literature: Over Two Decades of Bias and Conceptual Blocks (2004) (0)
- Traffic Filtering and Routing in Partially-Hidden Networks (2006) (0)
- The Evolution of Mobile Business and Services: Government Support of M-Payment Systems (2010) (0)
- Using the Privacy Tree in Practice (2021) (0)
- Impact of EU Data Protection Laws on Cloud Computing (2019) (0)
- Speaker Biometrics (2009) (0)
- Security and Privacy in LTE-based Public Safety Network (2016) (0)
- Authorization Policy (2005) (0)
- Identification (2021) (0)
- Ascendant Corporate Monies: Electronic Money in an Electronic World (2011) (0)
- Actor-Network Theory (ANT) for Indonesia e-Government implementation (2020) (0)
- SOCIAL NETWORKING AND EXTENDING SOCIAL CAPACITY Research-in-Progress (2011) (0)
- An E-Hospital Security Architecture (2009) (0)
- The Path Forward (2021) (0)
- Des-80 * 2. Introduction (2007) (0)
- A Collection of Tools: The Privacy Tree (2021) (0)
- A Practical PIR-based Scheme for Discovering Nearby Places for Smartphone Applications (2019) (0)
- Challenges for Creativity and Innovation in Mobile and Transient Virtual Environments (2007) (0)
- On the security and privacy of Interac e-Transfers (2019) (0)
- Simulation as a Service - A Case Study of Provisioning Scientific Simulation Software via a Cloud Service (2015) (0)
- Symmetric enciphering method and system for enciphering data (1994) (0)
- Community Participation and NGO Responses to the April 2014 Floods in Solomon Islands (2016) (0)
- The Privacy Minefield (2021) (0)
- Limiting Exposure by Hiding the Identity-Action Pair (2021) (0)
- Speaker Identification and Verification (SIV) (2011) (0)
- Cryptographic Protocol (2011) (0)
- Building Secure Web-Based Environments: Understanding Research Interrelationships through a Construction Metaphor (2005) (0)
- Source Material (2021) (0)
- Private Key Cryptosystem (2006) (0)
- Limiting Disclosure by Hiding the Identity-Attribute Pair (2021) (0)
- ECEG 2015 - Proceedings of the 15th European Conference on e-Government (2015) (0)
- Limiting Disclosure by Hiding the Attribute (2021) (0)
- PRIVACYNEGOTIATIONUSINGA MOBILE AGENT (2006) (0)
- The Keys of Cryptography 18 UP GRADE (0)
- The Future: Competition from the Technology Arena (2011) (0)
- Runtime Analysis (2011) (0)
- Entitlements Management (2005) (0)
- Attributes management (2005) (0)
- One-Time Password (2005) (0)
- An Efficient and Flexible Scheme to Support Biometric-Based and Role-Based Access Control (2005) (0)
- Improving User Privacy in Identity-Based Encryption Environments (2022) (0)
- Password authentication schemes on a quantum computer (2021) (0)
- Using HTTP as a Transport Protocol for CMP (1999) (0)
- The Move towards a M3/MB Business Model (2010) (0)
- THE SHADE CIPHER (1997) (0)
- MQ or Multivariate Quadratic Public-Key Cryptosystem (MQPKC) (2011) (0)
- Limiting Exposure by Hiding the Action (2021) (0)
- ICT Affordability and Coping With Disaster: Coping With Disaster (2018) (0)
- Certification Authority (2005) (0)
- Limiting Disclosure by Hiding the Identity (2021) (0)
- Changing Payment Systems (2011) (0)
- Connected Public Service Delivery – User Experience Approach (2014) (0)
- Addendum: A Brief Note on Privacy from a Technological Perspective (2008) (0)
- Salt (2018) (0)
- Is eDemocracy the true democracy, or an illusion of participation? (2010) (0)
- Identity Proof (2011) (0)
- Intersections of Community Responses and Humanitarian Interventions in the Aftermath of the 2014 Floods in Solomon Islands (2020) (0)
- One Time Password, from a Key Management Perspective (2011) (0)
This paper list is powered by the following services:
Other Resources About Carlisle Adams
What Schools Are Affiliated With Carlisle Adams?
Carlisle Adams is affiliated with the following schools: