default search action
John M. Carroll 0002
Person information
- affiliation: Queensland University of Technology, Information Security Research Centre, Brisbane, Australia
- affiliation: University of Western Ontario, Computer Science Department, London, ON, Canada
Other persons with the same name
- John M. Carroll — disambiguation page
- John M. Carroll 0001 (aka: Jack M. Carroll 0001, John Millar Carroll) — Pennsylvania State University, University Park, PA, USA (and 3 more)
- John M. Carroll 0003 — Battelle Pacific Northwest National Laboratory (PNNL), Richland, WA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
1990 – 1999
- 1994
- [j24]John M. Carroll, Sri Nurdiati:
Weak Keys and Weak Data Foiling the Two Nemeses. Cryptologia 18(3): 253-280 (1994) - 1993
- [c9]C. J. Bosch, Jan H. P. Eloff, John M. Carroll:
International Standards and Organizational Security Needs: Bridging the Gap. SEC 1993: 171-183 - [c8]Rossouw von Solms, Sebastiaan H. von Solms, John M. Carroll:
A Process Approach to Information Security Management. SEC 1993: 385-399 - 1992
- [j23]John M. Carroll, Jeff Solo, Perry T. Wong:
Chaos in Cryptography: the Escape from the Strange Attractor. Cryptologia 16(1): 52-72 (1992) - 1990
- [j22]John M. Carroll:
Security and credibility in an information-intensive society. Comput. Secur. 9(6): 489-498 (1990) - [j21]John M. Carroll:
"Do-it-yourself" cryptography. Comput. Secur. 9(7): 613-619 (1990) - [c7]John M. Carroll:
The Three Faces of Information Security. AUSCRYPT 1990: 433-450
1980 – 1989
- 1989
- [j20]John M. Carroll, Lynda E. Robbins:
Computer Cryptanalysis of Product Ciphers. Cryptologia 13(4): 303-326 (1989) - [j19]John M. Carroll:
The binary derivative test: noise filter, crypto aid, and random-number seed selector. Simul. 53(3): 129-135 (1989) - 1988
- [j18]John M. Carroll, Robert B. Mowat, Lynda E. Robbins, David Wiseman:
The password predictor - a training aid for raising security awareness. Comput. Secur. 7(5): 475-481 (1988) - [j17]John M. Carroll:
Implementing multilevel security by violation privilege. Comput. Secur. 7(6): 563-573 (1988) - [j16]John M. Carroll, Lynda E. Robbins:
Using Binary derivatives to Test an enhancement of des. Cryptologia 12(4): 193-208 (1988) - 1987
- [j15]John M. Carroll:
Strategies for extending the useful lifetime of DES. Comput. Secur. 6(4): 300-313 (1987) - [j14]John M. Carroll, Lynda E. Robbins:
The Automated Cryptanalysis of Polyalphabetic Ciphers. Cryptologia 11(4): 193-205 (1987) - 1986
- [j13]John M. Carroll, Helmut Jürgensen:
Design of a secure relational data base. Comput. Secur. 5(2): 167 (1986) - [j12]John M. Carroll, Steve Martin:
The Automated Cryptanalysis of Substitution Ciphers. Cryptologia 10(4): 193-209 (1986) - 1985
- [j11]John M. Carroll, W. R. Mac Iver:
COSSAC: a framework for analyzing and configuring secure computer facilities. Comput. Secur. 4(1): 5-12 (1985) - 1984
- [j10]John M. Carroll, Pierre G. Laurin:
Software Protection for Microcomputers. Cryptologia 8(2): 142-160 (1984) - [j9]John M. Carroll:
The Resurrection of Multiple-Key Ciphers. Cryptologia 8(3): 262-265 (1984) - [c6]Carl E. Landwehr, John M. Carroll:
Hardware Requirements for Secure Computer Systems: A Framework. S&P 1984: 34-40 - 1983
- [j8]John M. Carroll, Oi-Lun Wu:
Methodology for security analysis of data-processing systems. Comput. Secur. 2(1): 24-34 (1983) - [j7]John M. Carroll:
Decision support for risk analysis. Comput. Secur. 2(3): 230-236 (1983) - 1982
- [j6]John M. Carroll:
The control of computer-based fraud. Comput. Secur. 1(2): 123-138 (1982) - 1981
- [c5]John M. Carroll:
Content Analysis as a Word-Processing Option. SIGIR 1981: 126-131
1970 – 1979
- 1978
- [c4]John M. Carroll:
The case for computer scientists teaching computer science or digit-alice in squanderland. SIGCSE/CSA 1978: 229-231 - 1976
- [j5]John M. Carroll:
Prospects for Parallelism and the Computer Crunch. J. Am. Soc. Inf. Sci. 27(1): 63-69 (1976) - 1975
- [j4]John M. Carroll, John Cakarnis:
Comparison of checksum procedures by simulation. J. Am. Soc. Inf. Sci. 26(2): 125-128 (1975) - [j3]John M. Carroll:
Use of synthetic text in the evaluation of statistically based keyword-selection strategies. J. Am. Soc. Inf. Sci. 26(4): 261-262 (1975) - 1973
- [j2]John M. Carroll, Jean Tague:
Use of an automatic text analyzer in preparation of SDI profiles. J. Am. Soc. Inf. Sci. 24(4): 277-281 (1973) - 1972
- [j1]John M. Carroll, William Fraser, Gregory Gill:
Automatic Content Analysis in an On-Line Environment. Inf. Process. Lett. 1(4): 134-140 (1972) - [c3]John M. Carroll:
Snapshot 1971: how Canada organizes information about people. AFIPS Fall Joint Computing Conference (1) 1972: 445-452 - 1971
- [c2]John M. Carroll, Robert Martin, Lorine McHardy, Hans P. Moravec:
Multi-dimensional security program for a generalized information retrieval system. AFIPS Fall Joint Computing Conference 1971: 571-577 - 1970
- [c1]John M. Carroll, P. M. McLelland:
Fast "infinite-key" privacy transformation for resource-sharing systems. AFIPS Fall Joint Computing Conference 1970: 223-230
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint