John Black
According to our database1,
John Black
authored at least 32 papers
between 1993 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Effects of different embodied scaffoldings on students' spatial abilities in digital game-based learning.
Proceedings of the Proceeding of the 31st International Conference on Computers in Education, 2023
2022
A treatment recommender clinical decision support system for personalized medicine: method development and proof-of-concept for drug resistant tuberculosis.
BMC Medical Informatics Decis. Mak., 2022
2014
The Cancer Genomics Hub (CGHub): overcoming cancer through the power of torrential data.
Database J. Biol. Databases Curation, 2014
Supporting CS education via virtualization and packages: tools for successfully accommodating "bring-your-own-device" at scale.
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014
2011
2010
Proceedings of the 2010 14th International Conference on Computer Supported Cooperative Work in Design, 2010
2009
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009
Proceedings of the Ad Hoc Networks, First International Conference, 2009
2008
Proceedings of the 2008 IEEE International Performance, 2008
2007
2006
Proceedings of the 2006 USENIX Annual Technical Conference, 2006
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006
The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006
2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
J. Telecommun. High Technol. Law, 2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
2004
IACR Cryptol. ePrint Arch., 2004
2003
ACM Trans. Inf. Syst. Secur., 2003
IACR Cryptol. ePrint Arch., 2003
2002
Side-Channel Attacks on Symmetric Encryption Schemes: The Case for Authenticated Encryption.
Proceedings of the 11th USENIX Security Symposium, 2002
Proceedings of the Selected Areas in Cryptography, 2002
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002
Proceedings of the Advances in Cryptology, 2002
2001
Proceedings of the CCS 2001, 2001
2000
Proceedings of the Advances in Cryptology, 2000
1999
Proceedings of the Advances in Cryptology, 1999
1993
Keynote Address: A Management View of Systems Administration.
Proceedings of the 7th Conference on Systems Administration (LISA 1993), 1993