X. 509 Internet public key infrastructure online certificate status protocol-OCSP M Myers, R Ankney, A Malpani, S Galperin, C Adams | 1202 | 1999 |
Understanding PKI: concepts, standards, and deployment considerations C Adams, S Lloyd Addison-Wesley Professional, 2003 | 703 | 2003 |
Internet X. 509 public key infrastructure certificate management protocol (CMP) C Adams, S Farrell, T Kause, T Mononen | 654 | 2005 |
Understanding public-key infrastructure: concepts, standards, and deployment considerations C Adams, S Lloyd Sams Publishing, 1999 | 634 | 1999 |
Internet X. 509 public key infrastructure time-stamp protocol (TSP) C Adams, P Cain, D Pinkas, R Zuccherato | 468 | 2001 |
X. 509 internet public key infrastructure online certificate status protocol-OCSP S Santesson, M Myers, R Ankney, A Malpani, S Galperin, C Adams | 370 | 2013 |
Pass-go: A proposal to improve the usability of graphical passwords. H Tao, C Adams Int. J. Netw. Secur. 7 (2), 273-292, 2008 | 319 | 2008 |
Multi-factor biometric authenticating device and method C Adams, MJ Wiener US Patent 6,363,485, 2002 | 307 | 2002 |
The structured design of cryptographically good S-boxes C Adams, S Tavares Journal of cryptology 3 (1), 27-41, 1990 | 303 | 1990 |
Constructing symmetric ciphers using the CAST design procedure CM Adams Designs, Codes and cryptography 12 (3), 283-316, 1997 | 212 | 1997 |
The CAST-128 encryption algorithm C Adams | 198 | 1997 |
The CAST-256 encryption algorithm C Adams, J Gilchrist | 146 | 1999 |
Internet X. 509 Public Key Infrastructure data validation and certification server protocols C Adams, P Sylvester, M Zolotarev, R Zuccherato | 141* | 2001 |
Good S-boxes are easy to find C Adams, S Tavares Advances in Cryptology—CRYPTO’89 Proceedings 9, 612-615, 1990 | 140 | 1990 |
Generating and counting binary bent sequences CM Adams, SE Tavares IEEE Transactions on Information Theory 36 (5), 1170-1173, 1990 | 139 | 1990 |
Security-related comments regarding McEliece’s public-key cryptosystem CM Adams, H Meijer Advances in Cryptology—CRYPTO’87: Proceedings 7, 224-228, 1988 | 132 | 1988 |
公开密钥基础设施: 概念, 标准和实施 亚当斯, 劳埃德, 冯登国 人民邮电出版社, 2001 | 131 | 2001 |
Practical S-box design S Mister, C Adams Workshop on Selected Areas in Cryptography, SAC 96, 61-76, 1996 | 119 | 1996 |
Machine learning-driven intrusion detection for Contiki-NG-based IoT networks exposed to NSL-KDD dataset J Liu, B Kantarci, C Adams Proceedings of the 2nd ACM workshop on wireless security and machine …, 2020 | 116 | 2020 |
Usability of anonymous web browsing: an examination of tor interfaces and deployability J Clark, PC Van Oorschot, C Adams Proceedings of the 3rd symposium on Usable privacy and security, 41-51, 2007 | 114 | 2007 |