default search action
Gordon B. Agnew
Person information
- affiliation: University of Waterloo, Canada
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2013
- [c17]Seyed Ali Ahmadzadeh, Gordon B. Agnew:
Turbo covert channel: An iterative framework for covert communication over data networks. INFOCOM 2013: 2031-2039 - 2012
- [c16]Saad S. Alaboodi, Gordon B. Agnew:
Bayesian networks for modeling failure dependency in access control models. WorldCIS 2012: 176-182 - 2011
- [c15]Seyed Ali Ahmadzadeh, Gordon B. Agnew:
Poster: a geometric approach for multicast authentication in adversarial channels. CCS 2011: 729-732 - [c14]Seyed Ali Ahmadzadeh, Gordon B. Agnew:
Behavioral Mimicry Covert Communication. SecureComm 2011: 134-153 - [c13]Seyed Ali Ahmadzadeh, Gordon B. Agnew:
Covert channels in multiple access protocols. SIGCOMM 2011: 404-405
2000 – 2009
- 2008
- [j12]Sasan Adibi, Gordon B. Agnew:
Multilayer flavoured dynamic source routing in mobile ad-hoc networks. IET Commun. 2(5): 690-707 (2008) - 2007
- [j11]Jie Lian, Kshirasagar Naik, Gordon B. Agnew:
A framework for evaluating the performance of cluster algorithms for hierarchical networks. IEEE/ACM Trans. Netw. 15(6): 1478-1489 (2007) - [j10]Jie Lian, Lei Chen, Kshirasagar Naik, Yunhao Liu, Gordon B. Agnew:
Gradient Boundary Detection for Time Series Snapshot Construction in Sensor Networks. IEEE Trans. Parallel Distributed Syst. 18(10): 1462-1475 (2007) - 2006
- [j9]Jie Lian, Kshirasagar Naik, Gordon B. Agnew, Lei Chen, M. Tamer Özsu:
BBS: An Energy Efficient Localized Routing Scheme for Query Processing in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 2(1): 23-54 (2006) - [j8]Jie Lian, Kshirasagar Naik, Gordon B. Agnew:
Data Capacity Improvement of Wireless Sensor Networks Using Non-Uniform Sensor Distribution. Int. J. Distributed Sens. Networks 2(2): 121-145 (2006) - [c12]Kiarash Narimani, Gordon B. Agnew:
Key Management and Mutual Authentication for Multiple Field Records Smart Cards. ITNG 2006: 568-569 - 2005
- [c11]Jie Lian, Lei Chen, Kshirasagar Naik, M. Tamer Özsu, Gordon B. Agnew:
Localized routing trees for query processing in sensor networks. CIKM 2005: 259-260 - 2004
- [c10]Jie Lian, Sagar Naik, Gordon B. Agnew:
Optimal solution of total routing table size for hierarchical networks. ISCC 2004: 834-839 - 2003
- [c9]Jie Lian, Gordon B. Agnew, Sagar Naik:
A variable degree based clustering algorithm for networks. ICCCN 2003: 465-470 - 2002
- [j7]Gordon B. Agnew, A. Sivanandan:
A fast method for determining the origins of documents based on LZW compression. Int. J. Digit. Libr. 3(4): 297-301 (2002) - 2001
- [c8]Oda Sans, Gordon B. Agnew:
An Efficient Multiple Merchants Payment Protocol for Secure Electronic Transactions Based on Purchase Consolidation. ISEC 2001: 1-19
1990 – 1999
- 1993
- [j6]J. Fernández-González, Gordon B. Agnew, Arturo Ribagorda:
Encryption and error correction codes for reliable file storage. Comput. Secur. 12(5): 501-510 (1993) - [j5]Gordon B. Agnew, Thomas Beth, Ronald C. Mullin, Scott A. Vanstone:
Arithmetic Operations in GF(2m). J. Cryptol. 6(1): 3-13 (1993) - [j4]Gordon B. Agnew, Ronald C. Mullin, Scott A. Vanstone:
An Implementation of Elliptic Curve Cryptosystems Over F2155. IEEE J. Sel. Areas Commun. 11(5): 804-813 (1993) - 1992
- [c7]Gordon B. Agnew, Ronald C. Mullin, Scott A. Vanstone:
On the Development of a Fast Elliptic Curve Cryptosystem. EUROCRYPT 1992: 482-487 - 1991
- [j3]Gordon B. Agnew, Ronald C. Mullin, I. M. Onyszchuk, Scott A. Vanstone:
An Implementation for a Fast Public-Key Cryptosystem. J. Cryptol. 3(2): 63-79 (1991) - 1990
- [j2]Gordon B. Agnew:
Cryptographic systems using redundancy. IEEE Trans. Inf. Theory 36(1): 31-39 (1990)
1980 – 1989
- 1989
- [c6]Gordon B. Agnew, Ronald C. Mullin, Scott A. Vanstone:
A Fast Elliptic Curve Cryptosystem. EUROCRYPT 1989: 706-708 - 1988
- [c5]Gordon B. Agnew, Ronald C. Mullin, Scott A. Vanstone:
An Interactive Data Exchange Protocol Based on Discrete Exponentiation. EUROCRYPT 1988: 159-166 - [c4]Gordon B. Agnew, Ronald C. Mullin, Scott A. Vanstone:
Fast Exponentiation in GF(2n). EUROCRYPT 1988: 251-255 - 1987
- [c3]Gordon B. Agnew:
Random Sources for Cryptographic Systems. EUROCRYPT 1987: 77-81 - 1986
- [i1]Gordon B. Agnew:
Another Look at Redundancy in Cryptographic Systems. EUROCRYPT 1986: 29 - 1985
- [c2]Gordon B. Agnew:
Modelling of Encryption Techniques for Secrecy and Privacy in Multi-User Networks. EUROCRYPT 1985: 221-230 - 1984
- [j1]Gordon B. Agnew, Jon W. Mark:
Performance Modeling for Communication Networks at a Switching Node. IEEE Trans. Commun. 32(8): 902-910 (1984) - [c1]Gordon B. Agnew:
Secrecy and Privacy in a Local Area Network Environment. EUROCRYPT 1984: 349-363
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint