Gordon Agnew
#19,539
Most Influential Person Now
Canadian engineering professor
Gordon Agnew's AcademicInfluence.com Rankings
Gordon Agnewengineering Degrees
Engineering
#651
World Rank
#1058
Historical Rank
Civil Engineering
#511
World Rank
#620
Historical Rank
Applied Physics
#3577
World Rank
#3690
Historical Rank
Download Badge
Engineering
Gordon Agnew's Degrees
- PhD Civil Engineering University of British Columbia
- Masters Structural Engineering University of British Columbia
- Bachelors Civil Engineering University of British Columbia
Why Is Gordon Agnew Influential?
(Suggest an Edit or Addition)According to Wikipedia, Gordon B. Agnew is a Canadian engineering professor at the University of Waterloo. Agnew's primary research interests are in the fields of encryption and data security. Education Agnew earned a B.A.Sc. degree in electrical engineering from the University of Waterloo in 1978 and a Ph.D. in 1982.
Gordon Agnew's Published Works
Published Works
- Data Capacity Improvement of Wireless Sensor Networks Using Non-Uniform Sensor Distribution (2006) (309)
- An Implementation of Elliptic Curve Cryptosystems Over F2155 (1993) (259)
- An implementation for a fast public-key cryptosystem (2004) (158)
- Improved digital signature scheme based on discrete exponentiation (1990) (75)
- Arithmetic Operations in GF(2 m ). (1993) (72)
- A Framework for Evaluating the Performance of Cluster Algorithms for Hierarchical Networks (2007) (52)
- Fast Exponentiation in GF(2n) (1988) (40)
- Random Sources for Cryptographic Systems (1987) (37)
- Gradient Boundary Detection for Time Series Snapshot Construction in Sensor Networks (2007) (36)
- Modelling and Enhancing the Data Capacity of Wireless Sensor Networks (2004) (23)
- Authentication Authorization and Accounting (AAA) Schemes in WiMAX (2006) (23)
- Arithmetic operations inGF(2m) (1993) (22)
- Turbo covert channel: An iterative framework for covert communication over data networks (2013) (22)
- Multilayer flavoured dynamic source routing in mobile ad-hoc networks (2008) (14)
- Cryptographic systems using redundancy (1990) (13)
- An Interactive Data Exchange Protocol Based on Discrete Exponentiation (1988) (12)
- On the Development of a Fast Elliptic Curve Cryptosystem (1992) (12)
- On the diversity of eHealth security systems and mechanisms (2008) (12)
- A variable degree based clustering algorithm for networks (2003) (11)
- Performance Modeling for Communication Networks at a Switching Node (1984) (10)
- Secure electronic transactions: overview, capabilities, and current status (2003) (9)
- Behavioral Mimicry Covert Communication (2011) (9)
- Localized routing trees for query processing in sensor networks (2005) (7)
- Optimal solution of total routing table size for hierarchical networks (2004) (6)
- An Efficient Multiple Merchants Payment Protocol for Secure Electronic Transactions Based on Purchase Consolidation (2001) (5)
- End-to-End (E2E) Security Approach in WiMAX: A Security Technical Overview for Corporate Multimedia Applications (2008) (5)
- BBS: An Energy Efficient Localized Routing Scheme for Query Processing in Wireless Sensor Networks (2006) (5)
- Security measures for mobile ad-hoc networks (MANETs) (2008) (5)
- Key Management and Mutual Authentication for Multiple Field Records Smart Cards (2006) (5)
- Secrecy and Privacy in a Local Area Network Environment (1985) (3)
- End-to-end security comparisons between IEEE 802.16e and 3G technologies (2008) (3)
- Covert channels in multiple access protocols (2011) (2)
- Extensible authentication (EAP) protocol integrations in the next generation cellular networks (2008) (2)
- A fast method for determining the origins of documents based on LZW compression (2002) (2)
- Encryption and error correction codes for reliable file storage (1993) (2)
- Bayesian networks for modeling failure dependency in access control models (2012) (2)
- Poster: a geometric approach for multicast authentication in adversarial channels (2011) (2)
- A Novel Inference-based Approach to Evaluate Failure Interdependency in Access Control Models (2013) (1)
- Development of Fast Multiplier Structures with Cryptographic Applications (1994) (1)
- Another Look at Redundancy in Cryptographic Systems (1986) (1)
- Modelling of Encryption Techniques for Secrecy and Privacy in Multi-User Networks (1985) (1)
- A Modified Butterfly-Graph based Hash-Chaining Scheme Providing Partial Authentication (2010) (0)
- 10 Secure Electronic Transactions: Overview, Capabilities, and Current Status (2003) (0)
This paper list is powered by the following services:
Other Resources About Gordon Agnew
What Schools Are Affiliated With Gordon Agnew?
Gordon Agnew is affiliated with the following schools: