default search action
John F. Dooley
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]John F. Dooley:
Review of From the Ground Up by Betsy Rohaly SmootSmoot, Betsy Rohaly. 2023. From the Ground Up: American Cryptology during World War I . Vol. 48. Series II: World War I. Ft. George G. Meade, MD: National Security Agency, Center for Cryptologic History. https://media.defense.gov/2023/Jan/26/2003150273/-1/-1/0/WWI_BOOK_01192023.PDF Accessed 01 February 2023. Cryptologia 48(1): 91-94 (2024) - [j31]John F. Dooley:
Review of The Puzzle Master by Danielle TrussoniTrussoni, Danielle. 2023. The Puzzle Master . New York, NY: Random House. https://www.randomhousebooks.com/. 362 pages, ISBN 978-0-593-59529-9. $22.95: Trussoni, Danielle. 2023. The Puzzle Master . New York, NY: Random House. https://www.randomhousebooks.com/. 362 pages, ISBN 978-0-593-59529-9. $22.95. Cryptologia 48(1): 95-96 (2024) - [j30]John F. Dooley:
Review of The Enigma Affair by Charlie LovettLovett, Charlie. The Enigma Affair . Ashland, OR: Blackstone Publishing. 2022. 323 pages, Hardcover, $26.99. ISBN 978-1-66504-707-4. https://www.blackstonepublishing.com: Hardcover. Ashland, or: Blackstone Publishing. https://www.blackstonepublishing.com. ISBN 978-1-66504-707-4. 2022. 323 pages. $26.99. Cryptologia 48(4): 381-383 (2024) - 2023
- [b3]John F. Dooley:
The Gambler and the Scholars - Herbert Yardley, William & Elizebeth Friedman, and the Birth of Modern American Cryptology. History of Computing, Springer 2023, ISBN 978-3-031-28317-8, pp. 1-299 - [j29]John F. Dooley:
Review of The Rose Code by Kate Quinn. Cryptologia 47(4): 393-395 (2023) - [c10]Vera A. Kazakova, John F. Dooley, Monica M. McGill:
Soft-Aware Development: Social Emotional Learning as an Agile Process. ICER (2) 2023: 39-40 - 2022
- [j28]John F. Dooley:
Review of codebreaker by Marc McMenamin. Cryptologia 46(6): 556-560 (2022) - 2021
- [j27]John F. Dooley:
Review of Flight of the Fox by Gray Basnight. Cryptologia 45(3): 287-288 (2021) - 2020
- [j26]John F. Dooley:
Review of The Third Reich is Listening by Christian Jennings. Cryptologia 44(1): 91-95 (2020) - [j25]John F. Dooley:
Review of the secret world by Christopher Andrew. Cryptologia 44(3): 280-284 (2020) - [j24]John F. Dooley:
Review of A Most Enigmatic War by James Goodchild. Cryptologia 44(5): 477-480 (2020)
2010 – 2019
- 2019
- [j23]John F. Dooley:
The Beale ciphers in fiction. Cryptologia 43(4): 344-358 (2019) - [j22]John F. Dooley:
Review of 3 Ciphers by Carol Ritz. Cryptologia 43(6): 551-552 (2019) - [c9]Henry M. Walker, John F. Dooley:
The History of the SIGCSE Submission and Review Software: From Paper to the Cloud? SIGCSE 2019: 1074-1080 - 2018
- [b2]John F. Dooley:
History of Cryptography and Cryptanalysis - Codes, Ciphers, and Their Algorithms. History of Computing, Springer 2018, ISBN 978-3-319-90442-9, pp. 1-292 - [j21]John F. Dooley:
Review of A Mind at Play by Jimmy Soni and Rob Goodman. Cryptologia 42(2): 183-190 (2018) - 2017
- [c8]Cynthia Bagier Taylor, Joe Hummel, David Hovemeyer, David P. Bunde, John F. Dooley, Jaime Spacco:
Peer Instruction in Practice (Abstract Only). SIGCSE 2017: 743 - 2016
- [j20]John F. Dooley:
Review of Prisoners, Lovers, & Spies by Kristie Macrakis. Cryptologia 40(1): 107-112 (2016) - 2015
- [j19]John F. Dooley:
Review of George Fabyan by Richard Munson. Cryptologia 39(1): 92-98 (2015) - [c7]Henry M. Walker, Sue Fitzgerald, John F. Dooley:
Curricular Assessment: Tips and Techniques. SIGCSE 2015: 265-266 - 2014
- [j18]John F. Dooley, Elizabeth Anne King:
John Matthews Manly: The Collier's Articles. Cryptologia 38(1): 77-88 (2014) - [j17]John F. Dooley:
Review of Inferno by Dan Brown. Cryptologia 38(1): 89-92 (2014) - [j16]John F. Dooley:
Review of Mr. Penumbra's 24-Hour Bookstore by Robin Sloan. Cryptologia 38(1): 93-95 (2014) - 2013
- [b1]John F. Dooley:
A Brief History of Cryptology and Cryptographic Algorithms. Springer Briefs in Computer Science, Springer 2013, ISBN 978-3-319-01627-6, pp. i-xii, 1-99 - [j15]John F. Dooley:
1929-1931: A Transition Period in U.S. Cryptologic History. Cryptologia 37(1): 84-98 (2013) - [c6]David P. Bunde, John F. Dooley, Jaime Spacco:
Making the most of the assessment process. ITiCSE 2013: 359 - 2012
- [j14]John F. Dooley:
Review of The Mystic Cipher by Dennis L. Mangrum. Cryptologia 36(1): 80-83 (2012) - [j13]John F. Dooley:
Review of Joe Rochefort's War by Elliot Carlson. Cryptologia 36(2): 161-163 (2012) - 2011
- [j12]John F. Dooley:
Was Herbert O. Yardley a Traitor? Cryptologia 35(1): 1-15 (2011) - 2010
- [j11]John F. Dooley:
Reviews of Cryptologic Fiction. Cryptologia 34(1): 96-100 (2010) - [j10]John F. Dooley:
Reviews of Cryptologic Fiction. Cryptologia 34(2): 180-185 (2010)
2000 – 2009
- 2009
- [j9]John F. Dooley, Yvonne I. Ramirez:
Who Wrote The Blonde Countess? A Stylometric Analysis of Herbert O. Yardley's Fiction. Cryptologia 33(2): 108-117 (2009) - [j8]John F. Dooley:
Reviews of Cryptologic Fiction. Cryptologia 33(2): 212-215 (2009) - [j7]John F. Dooley:
Another Yardley Mystery. Cryptologia 33(3): 276-282 (2009) - [c5]John F. Dooley:
Peer assessments using the moodle workshop tool. ITiCSE 2009: 344 - 2008
- [j6]John F. Dooley:
Reviews of Cryptologic Fiction. Cryptologia 32(3): 295-298 (2008) - [c4]John F. Dooley:
A software development course for CC2001: the third time is charming. ITiCSE 2008: 346 - 2007
- [j5]John F. Dooley:
Reviews of Cryptologic Fiction. Cryptologia 31(2): 192-195 (2007) - [j4]John F. Dooley:
Reviews of Cryptologic Fiction. Cryptologia 31(4): 363-366 (2007) - [c3]John F. Dooley:
Experiences with CC2001 at a small college. ITiCSE 2007: 314 - 2005
- [j3]John F. Dooley:
Codes and Ciphers in Fiction: an Overview. Cryptologia 29(4): 290-328 (2005) - 2004
- [c2]John F. Dooley:
Moving to CC2001 at a small college. ITiCSE 2004: 196-198 - 2003
- [j2]John F. Dooley:
Software engineering in the liberal arts: combining theory and practice. ACM SIGCSE Bull. 35(2): 48-51 (2003)
1990 – 1999
- 1994
- [c1]John F. Dooley, Vince Guarna:
Creating a Configurable Compiler Driver for System V Release 4. USENIX Applications Development Symposium 1994
1980 – 1989
- 1988
- [j1]John F. Dooley:
An artifical intelligence course in a liberal arts program. ACM SIGCSE Bull. 20(2): 36-39 (1988)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-05 21:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint