|
Search the dblp DataBase
Bob Blakley:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Bob Blakley, G. R. Blakley
All Sail, No Anchor, 1: Cryptography, Risk, and e-Commerce. [Citation Graph (0, 0)][DBLP] ACISP, 2000, pp:471-476 [Conf]
- Bob Blakley, G. R. Blakley
All Sail, No Anchor III: Risk Aggregation and Time's Arrow. [Citation Graph (0, 0)][DBLP] ACISP, 2005, pp:1-16 [Conf]
- Konstantin Beznosov, Yi Deng, Bob Blakley, C. Burt, John F. Barkley
A Resource Access Decision Service for CORBA-Based Distributed Systems. [Citation Graph (0, 0)][DBLP] ACSAC, 1999, pp:310-319 [Conf]
- Bob Blakley, G. R. Blakley, Agnes Hui Chan, James L. Massey
Threshold Schemes with Disenrollment. [Citation Graph (0, 0)][DBLP] CRYPTO, 1992, pp:540-548 [Conf]
- Bob Blakley, Ellen McDermott, Dan Geer
Information security is information risk management. [Citation Graph (0, 0)][DBLP] NSPW, 2001, pp:97-104 [Conf]
- Bob Blakley, Darrell M. Kienzle
Some weaknesses of the TCB model. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1997, pp:3-5 [Conf]
- Bob Blakley
Security Insights. [Citation Graph (0, 0)][DBLP] Computers & Security, 2002, v:21, n:2, pp:120-125 [Journal]
- Messaoud Benantar, Bob Blakley, Anthony J. Nadalin
Approach to Object Security in Distributed SOM. [Citation Graph (0, 0)][DBLP] IBM Systems Journal, 1996, v:35, n:2, pp:192-203 [Journal]
- Bob Blakley, G. R. Blakley
All sail, no anchor II: Acceptable high-end PKI. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2004, v:2, n:2, pp:66-77 [Journal]
Search in 0.001secs, Finished in 0.002secs
|