John M. Carroll

Affiliations:
  • Queensland University of Technology, Information Security Research Centre, Brisbane, Australia
  • University of Western Ontario, Computer Science Department, London, ON, Canada


According to our database1, John M. Carroll authored at least 33 papers between 1970 and 1994.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

1994
Weak Keys and Weak Data Foiling the Two Nemeses.
Cryptologia, 1994

1993
A Process Approach to Information Security Management.
Proceedings of the Computer Security, 1993

International Standards and Organizational Security Needs: Bridging the Gap.
Proceedings of the Computer Security, 1993

1992
Chaos in Cryptography: the Escape from the Strange Attractor.
Cryptologia, 1992

1990
"Do-it-yourself" cryptography.
Comput. Secur., 1990

Security and credibility in an information-intensive society.
Comput. Secur., 1990

The Three Faces of Information Security.
Proceedings of the Advances in Cryptology, 1990

1989
The binary derivative test: noise filter, crypto aid, and random-number seed selector.
Simul., 1989

Computer Cryptanalysis of Product Ciphers.
Cryptologia, 1989

1988
Using Binary derivatives to Test an enhancement of des.
Cryptologia, 1988

The password predictor - a training aid for raising security awareness.
Comput. Secur., 1988

Implementing multilevel security by violation privilege.
Comput. Secur., 1988

1987
The Automated Cryptanalysis of Polyalphabetic Ciphers.
Cryptologia, 1987

Strategies for extending the useful lifetime of DES.
Comput. Secur., 1987

1986
The Automated Cryptanalysis of Substitution Ciphers.
Cryptologia, 1986

Design of a secure relational data base.
Comput. Secur., 1986

1985
COSSAC: a framework for analyzing and configuring secure computer facilities.
Comput. Secur., 1985

1984
Software Protection for Microcomputers.
Cryptologia, 1984

The Resurrection of Multiple-Key Ciphers.
Cryptologia, 1984

Hardware Requirements for Secure Computer Systems: A Framework.
Proceedings of the 1984 IEEE Symposium on Security and Privacy, Oakland, California, USA, April 29, 1984

1983
Decision support for risk analysis.
Comput. Secur., 1983

Methodology for security analysis of data-processing systems.
Comput. Secur., 1983

1982
The control of computer-based fraud.
Comput. Secur., 1982

1981
Content Analysis as a Word-Processing Option.
Proceedings of the Theoretical Issues in Information Retrieval, Proceedings of the Fourth International Conference on Information Storage and Retrieval, Oakland, California, USA, May 31, 1981

1978
The case for computer scientists teaching computer science or digit-alice in squanderland.
Proceedings of the Papers of the SIGCSE/CSA technical symposium on Computer science education, 1978

1976
Prospects for Parallelism and the Computer Crunch.
J. Am. Soc. Inf. Sci., 1976

1975
Comparison of checksum procedures by simulation.
J. Am. Soc. Inf. Sci., 1975

Use of synthetic text in the evaluation of statistically based keyword-selection strategies.
J. Am. Soc. Inf. Sci., 1975

1973
Use of an automatic text analyzer in preparation of SDI profiles.
J. Am. Soc. Inf. Sci., 1973

1972
Automatic Content Analysis in an On-Line Environment.
Inf. Process. Lett., 1972

Snapshot 1971: how Canada organizes information about people.
Proceedings of the American Federation of Information Processing Societies: Proceedings of the AFIPS '72 Fall Joint Computer Conference, December 5-7, 1972, Anaheim, California, USA, 1972

1971
Multi-dimensional security program for a generalized information retrieval system.
Proceedings of the American Federation of Information Processing Societies: Proceedings of the AFIPS '71 Fall Joint Computer Conference, 1971

1970
Fast "infinite-key" privacy transformation for resource-sharing systems.
Proceedings of the American Federation of Information Processing Societies: Proceedings of the AFIPS '70 Fall Joint Computer Conference, 1970


  Loading...