The SCEAS System
Navigation Menu

Search the dblp DataBase


Bob Blakley: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Bob Blakley, G. R. Blakley
    All Sail, No Anchor, 1: Cryptography, Risk, and e-Commerce. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:471-476 [Conf]
  2. Bob Blakley, G. R. Blakley
    All Sail, No Anchor III: Risk Aggregation and Time's Arrow. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:1-16 [Conf]
  3. Konstantin Beznosov, Yi Deng, Bob Blakley, C. Burt, John F. Barkley
    A Resource Access Decision Service for CORBA-Based Distributed Systems. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:310-319 [Conf]
  4. Bob Blakley, G. R. Blakley, Agnes Hui Chan, James L. Massey
    Threshold Schemes with Disenrollment. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1992, pp:540-548 [Conf]
  5. Bob Blakley, Ellen McDermott, Dan Geer
    Information security is information risk management. [Citation Graph (0, 0)][DBLP]
    NSPW, 2001, pp:97-104 [Conf]
  6. Bob Blakley, Darrell M. Kienzle
    Some weaknesses of the TCB model. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:3-5 [Conf]
  7. Bob Blakley
    Security Insights. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:2, pp:120-125 [Journal]
  8. Messaoud Benantar, Bob Blakley, Anthony J. Nadalin
    Approach to Object Security in Distributed SOM. [Citation Graph (0, 0)][DBLP]
    IBM Systems Journal, 1996, v:35, n:2, pp:192-203 [Journal]
  9. Bob Blakley, G. R. Blakley
    All sail, no anchor II: Acceptable high-end PKI. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2004, v:2, n:2, pp:66-77 [Journal]

Search in 0.038secs, Finished in 0.038secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002