John Black

According to our database1, John Black authored at least 31 papers between 1993 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
A treatment recommender clinical decision support system for personalized medicine: method development and proof-of-concept for drug resistant tuberculosis.
BMC Medical Informatics Decis. Mak., 2022

2014
The Cancer Genomics Hub (CGHub): overcoming cancer through the power of torrential data.
Database J. Biol. Databases Curation, 2014

Supporting CS education via virtualization and packages: tools for successfully accommodating "bring-your-own-device" at scale.
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014

2011
MyZone: A Next-Generation Online Social Network
CoRR, 2011

2010
An Analysis of the Blockcipher-Based Hash Functions from PGV.
J. Cryptol., 2010

A multi-user location-awareness system.
Proceedings of the 2010 14th International Conference on Computer Supported Cooperative Work in Design, 2010

2009
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions.
J. Cryptol., 2009

Security and Privacy in a Sensor-Based Search and Rescue System.
Proceedings of the Ad Hoc Networks, First International Conference, 2009

2008
Support for Security and Privacy in SenSearch.
Proceedings of the 2008 IEEE International Performance, 2008

2007
An integration model for organizing IT service management.
IBM Syst. J., 2007

2006
A Security Analysis of the Internet Chess Club.
IEEE Secur. Priv., 2006

MAC Reforgeability.
IACR Cryptol. ePrint Arch., 2006

Compare-by-Hash: A Reasoned Analysis.
Proceedings of the 2006 USENIX Annual Technical Conference, Boston, MA, USA, May 30, 2006

A Study of the MD5 Attacks: Insights and Improvements.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006

2005
Authenticated encryption.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

The Impossibility of Technology-Based DRM and a Modest Suggestion.
J. Telecommun. High Technol. Law, 2005

CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions.
J. Cryptol., 2005

The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function.
IACR Cryptol. ePrint Arch., 2005

Lessons Learned: A Security Analysis of the Internet Chess Club.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
How to Cheat at Chess: A Security Analysis of the Internet Chess Club.
IACR Cryptol. ePrint Arch., 2004

2003
OCB: A block-cipher mode of operation for efficient authenticated encryption.
ACM Trans. Inf. Syst. Secur., 2003

Building Secure Cryptographic Transforms, or How to Encrypt and MAC.
IACR Cryptol. ePrint Arch., 2003

2002
Encryption-Scheme Security in the Presence of Key-Dependent Messages.
IACR Cryptol. ePrint Arch., 2002

Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV.
IACR Cryptol. ePrint Arch., 2002

Side-Channel Attacks on Symmetric Encryption Schemes: The Case for Authenticated Encryption.
Proceedings of the 11th USENIX Security Symposium, 2002

2001
OCB Mode.
IACR Cryptol. ePrint Arch., 2001

A Block-Cipher Mode of Operation for Parallelizable Message Authentication.
IACR Cryptol. ePrint Arch., 2001

Ciphers with Arbitrary Finite Domains.
IACR Cryptol. ePrint Arch., 2001

OCB: a block-cipher mode of operation for efficient authenticated encryption.
Proceedings of the CCS 2001, 2001

1999
UMAC: Fast and Secure Message Authentication.
Proceedings of the Advances in Cryptology, 1999

1993
Keynote Address: A Management View of Systems Administration.
Proceedings of the 7th Conference on Systems Administration (LISA 1993), 1993


  Loading...