THIS SITE

Information for

Gordon Agnew

Associate Professor

Contact InformationGordon Agnew

Phone: 519-888-4567 x33041
Location: E5 4016

Biography Summary

Gordon B. Agnew is an Associate Professor in the Electrical and Computer Engineering department at the University of Waterloo. He is also the co-founder of Ceritcom Corp, which is a subsidiary of Blackberry that protects content and devices from around the world.

Professor Agnew’s main research interests include cryptography, data security, communication security and high speed communication networks.

He has a fellowship with the Institute of Combinatorics and its Applications, where he was also inducted as a Fellow of the Canadian Academy of Engineering. In addition to his research work, Professor Agnew has written several published conference papers and journals for a variety of events and organizations.

Research Interests

  • Cryptography
  • Data Security
  • Communication Security
  • High Speed Communication Networks
  • Communication & Information Systems
  • Computer & Software Engineering

Education

  • 1982, Doctorate, PhD, University of Waterloo
  • 1978, Bachelor's, BASc, University of Waterloo

Courses

  • ECE 222 - Digital Computers
  • ECE 628 - Computer Network Security
  • ECE 409 - Cryptography and System Security

Selected/Recent Publications

  • Ahmadzadeh, Seyed Ali and Agnew, Gordon, Covert channels in multiple access protocols, ACM SIGCOMM Computer Communication Review, 41(4), 2011, 404 - 405
  • Tirta, Yuldi and Lau, Bennett and Malhotra, Nipoon and Bagchi, Saurabh and Li, Zhiyuan and Lu, Yung-Hsiang and Cao, Guohong and Kesidis, G and LaPorta, Thomas and Yao, Bin and others, Purposeful Mobility and Navigation, Sensor Network Operations, 2009, 91 - 183
  • Adibi, Sasan and Agnew, Gordon B, Security measures for mobile ad-hoc network (MANETs), Handbook of Research on Wireless Security, IGI Global Inc., ISBN, 2008, 978 - 1
  • Adibi, Sasan and Agnew, Gordon B, End-to-end security comparisons between IEEE 802.16 e and 3G technologies, Handbook of Research on Wireless Security, 2008
  • Adibi, Sasan and Agnew, Gordon B and Tofigh, Tom, End-to-End (E2E) Security Approach in WiMAX: A Security Technical Overview for Corporate Multimedia Applications, Handbook of Research on Wireless Security, 2008
  • Adibi, Sasan and Agnew, Gordon B and Tofigh, Tom, End-to-End (E2E) Security Approach in WiMAX, , 2008
  • Adibi, Sasan and Agnew, Gordon B, Extensible authentication (EAP) protocol integrations in the next generation cellular networks, , 2008
  • Adibi, Sasan and Agnew, Gordon B, Multilayer flavoured dynamic source routing in mobile ad-hoc networks, IET communications, 2(5), 2008, 690 - 707
  • Abdelzaher, T and Abel, F and Agnew, GB and Aikat, J and Akyildiz, IF and Alicherry, M and Alparslan, DN and Altman, E and Anand, V and Arifler, D and others, 2007 Index IEEE/ACM Transactions on Networking Vol. 15, IEEE/ACM TRANSACTIONS ON NETWORKING, 15(6), 2007
  • Lian, Jie and Naik, Kshirasagar and Agnew, Gordon B, A framework for evaluating the performance of cluster algorithms for hierarchical networks, IEEE/ACM Transactions on Networking, 15(6), 2007, 1478 - 1489
  • Lian, Jie and Chen, Lei and Naik, Kshirasagar and Liu, Yunhao and Agnew, Gordon B, Gradient boundary detection for time series snapshot construction in sensor networks, IEEE Transactions on Parallel and Distributed Systems, 18(10), 2007, 1462 - 1475
  • Lian, Jie and Naik, Kshirasagar and Agnew, Gordon B and Chen, Lei and Tamer Özsu, M, BBS: an energy efficient localized routing scheme for query processing in wireless sensor networks, International Journal of Distributed Sensor Networks, 2(1), 2006, 23 - 54
  • Lian, Jie and Naik, Kshirasagar and Agnew, Gordon B, Data capacity improvement of wireless sensor networks using non-uniform sensor distribution, International Journal of Distributed Sensor Networks, 2(2), 2006, 121 - 145
  • Lian, Jie and Naik, Kshirasagar and Agnew, Gordon B and Chen, Lei and Tamer Özsu, M, BBS: an energy efficient localized routing scheme for query processing in wireless sensor networks, International Journal of Distributed Sensor Networks, 2(1), 2006, 23 - 54
  • Lian, Jie and Chen, L and Naik, K and Otzu, T and Agnew, G, Modeling and enhancing the data capacity of wireless sensor networks, IEEE Monograph on Sensor Network Operations, 2, 2004, 52 - 63
  • Agnew, GB and Woo, Tim, 802.11 Wireless LAN Security, , 2003
  • Agnew, Gordon B and Sivanandan, A, A fast method for determining the origins of documents based on LZW compression, International Journal on Digital Libraries, 3(4), 2002, 297 - 301
  • Agnew, GB and Mullin, RC and Vanstone, SA, Elliptic Curve Cryptosysteml, , 1998
  • Agnew, Gordon B. and Mullin, Ronald C. and Vanstone, Scott A., An implementation of elliptic curve cryptosystems over F 2 155, IEEE Journal on Selected areas in Communications, 11(5), 1993, 804 - 813
  • Fernández-González, J and Agnew, Gordon B and Ribagorda, Arturo, Encryption and error correction codes for reliable file storage, Computers & Security, 12(5), 1993, 501 - 510
  • Agnew, Gordon B. and Beth, Thomas and Mullin, Ronald C. and Vanstone, Scott A., Arithmetic operations inGF (2 m), Journal of Cryptology, 6(1), 1993, 3 - 13
  • Agnew, Gordon B. and Mullin, Ronald C. and Onyszchuk, IM and Vanstone, Scott A., An implementation for a fast public-key cryptosystem, Journal of CRYPTOLOGY, 3(2), 1991, 63 - 79
  • Agnew, GB and Mullin, RC and Vanstone, SA, Improved digital signature scheme based on discrete exponentiation, Electronics Letters, 26(14), 1990, 1024 - 1025
  • Beth, Thomas and Vanstone, SA and Agnew, GB and Europaeisches Inst. fuer Systemsicherheit (EISS), Karlsruhe (Germany);, What One Should Know about Public Key Algorithms—Today, Securicom, 90, 1990, 47 - 63
  • Agnew, Gordon B., Cryptographic systems using redundancy, IEEE Transactions on Information theory, 36(1), 1990, 31 - 39
  • Abel, MW and Abut, S and Aceves, J and Adelson, T and Adoul, JP and Aein, JM and Agnew, GB and Ahmadi, H and Ahmed, N and Akimaru, H and others, IEEE Communications Society, IEEE TRANSACTIONS ON COMMUNICATIONS, 36(12), 1988
  • Agnew, G and Mark, J, Performance modeling for communication networks at a switching node, IEEE transactions on communications, 32(8), 1984, 902 - 910
  • Abdelzaher, T and Agnew, Gordon B and Faraj, Ahmad and Ahmed, Masood and Ailamaki, Anastasia and Alfaro, FJ and Altman, E and Amano, H and Amano, Hideharu and An, Fengguang and others, 2007 Index IEEE Transactions on Parallel and Distributed Systems Vol. 18,
  • Agnew, Gordon B, Digital Storage, Wiley Encyclopedia of Electrical and Electronics Engineering
  • Ahmadzadeh, Seyed Ali and Agnew, Gordon, Turbo covert channel: An iterative framework for covert communication over data networks, INFOCOM, 2013 Proceedings IEEE, January 2013, 2031 - 2039
  • Alaboodi, Saad Saleh and Agnew, Gordon B, Bayesian networks for modeling failure dependency in access control models, Internet Security (WorldCIS), 2012 World Congress on, January 2012, 176 - 182
  • Ahmadzadeh, Seyed Ali and Agnew, Gordon B, Poster: a geometric approach for multicast authentication in adversarial channels, Proceedings of the 18th ACM conference on Computer and communications security, January 2011, 729 - 732
  • Ahmadzadeh, Seyed Ali and Agnew, Gordon, Behavioral Mimicry Covert Communication, International Conference on Security and Privacy in Communication Systems, January 2011, 134 - 153
  • Adibi, Sasan and Agnew, Gordon B, On the diversity of eHealth security systems and mechanisms., Conference proceedings:... Annual International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE Engineering in Medicine and Biology Society. Annual Conference, January 2008
  • Adibi, Sasan and Lin, Bin and Ho, Pin-Han and Agnew, GB and Erfani, Shervin, Authentication authorization and accounting (AAA) schemes in WiMAX, 2006 IEEE International Conference on Electro/Information Technology, January 2006, 210 - 215
  • Narimani, Kiarash and Agnew, Gordon B, Key Management and Mutual Authentication for Multiple Field Records Smart Cards, Third International Conference on Information Technology: New Generations (ITNG'06), January 2006, 568 - 569
  • Lian, Jie and Chen, Lei and Naik, Kshirasagar and Özsu, M Tamer and Agnew, G, Localized routing trees for query processing in sensor networks, Proceedings of the 14th ACM international conference on Information and knowledge management, January 2005, 259 - 260
  • Lian, Jie and Naik, Sagar and Agnew, Gordon B, Optimal solution of total routing table size for hierarchical networks, Computers and Communications, 2004. Proceedings. ISCC 2004. Ninth International Symposium on, January 2004, 834 - 839
  • Lian, Jie and Agnew, Gordon B and Naik, Sagar, A variable degree based clustering algorithm for networks, Computer Communications and Networks, 2003. ICCCN 2003. Proceedings. The 12th International Conference on, January 2003, 465 - 470
  • Agnew, Gordon B and Mullin, Ronald C and Vanstone, Scott A, On the development of a fast elliptic curve cryptosystem, Workshop on the Theory and Application of of Cryptographic Techniques, January 1992, 482 - 487
  • Beth, Thomas and Vanstone, SA and Agnew, GB and Europaeisches Inst. fuer Systemsicherheit (EISS), Karlsruhe (Germany);, What One Should Know about Public Key Algorithms—Today, Securicom, January 1990, 47 - 63
  • Agnew, Gordon B and Mullin, Ronald C and Vanstone, Scott A, A fast elliptic curve cryptosystem, Workshop on the Theory and Application of of Cryptographic Techniques, January 1989, 706 - 708
  • Agnew, Gordon B and Mullin, Ronald C and Vanstone, Scott A, Fast exponentiation in GF (2n), Workshop on the Theory and Application of of Cryptographic Techniques, January 1988, 251 - 255
  • Agnew, G and Mullin, R and Vanstone, Scott, An interactive data exchange protocol based on discrete exponentiation, Workshop on the Theory and Application of of Cryptographic Techniques, January 1988, 159 - 166
  • Agnew, Gordon B, Random sources for cryptographic systems, Workshop on the Theory and Application of of Cryptographic Techniques, January 1987, 77 - 81
  • Agnew, Gordon B, Modeling of encryption techniques for secrecy and privacy in multi-user networks, Workshop on the Theory and Application of of Cryptographic Techniques, January 1985, 221 - 230
  • Agnew, Gordon B, Secrecy and Privacy in a Local Area Network Environment, Workshop on the Theory and Application of of Cryptographic Techniques, January 1984, 349 - 363
  • Agnew, Gordon, Secure electronic transactions: overview, capabilities, and current status, Payment technologies for E-commerce, , 226 manuscript pages
  • Sans, Oda and Agnew, Gordon B, An efficient multiple merchants payment protocol for secure electronic transactions based on purchase consolidation, Electronic Commerce Technologies, , 19 manuscript pages
  • Agnew, GB, Development of Fast Multiplier Structures with Cryptographic Applications, Communications and Cryptography, , 11 manuscript pages
  • Ahmadzadeh, Seyed Ali and Agnew, Gordon B, A New Covert Channel Based on CSMA Algorithm,
  • Agnew, Gordon B, Techniques for network buffer management and congestion control,
  • Mark, Jon W and Field, James A and Wong, JW and Todd, Terence D and McMullan, JA and Agnew, GB, WELNET: A High Performance Local Area Communications Network,
  • Vanstone, Scott A and Mullin, Ronald C and Agnew, Gordon B, Elliptic curve encryption systems, January
  • Vanstone, Scott A and Mullin, Ronald C and Agnew, Gordon B, Elliptic curve encryption systems, January
  • Agnew, Gordon B, Techniques for network buffer management and congestion control, January