The SCEAS System
Navigation Menu

Search the dblp DataBase


G. R. Blakley: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Bob Blakley, G. R. Blakley
    All Sail, No Anchor, 1: Cryptography, Risk, and e-Commerce. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:471-476 [Conf]
  2. Bob Blakley, G. R. Blakley
    All Sail, No Anchor III: Risk Aggregation and Time's Arrow. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:1-16 [Conf]
  3. G. R. Blakley, I. Borosh, Andreas Klappenecker
    Construction and Categories of Codes. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:266-277 [Conf]
  4. G. R. Blakley
    Key Management from a Security Viewpoint. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:82- [Conf]
  5. G. R. Blakley
    Information Theory Without the Finiteness Assumption, I: Cryptosystems as Group-Theoretic Objects. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:314-338 [Conf]
  6. G. R. Blakley
    Information Theory Without the Finiteness Assumption, II: Unfolding the DES. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1985, pp:282-337 [Conf]
  7. Bob Blakley, G. R. Blakley, Agnes Hui Chan, James L. Massey
    Threshold Schemes with Disenrollment. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1992, pp:540-548 [Conf]
  8. G. R. Blakley, R. D. Dixon
    Smallest Possible Message Expansion in Threshold Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:266-274 [Conf]
  9. G. R. Blakley, Gregory Kabatianskii
    General Perfect Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:367-371 [Conf]
  10. G. R. Blakley, Catherine Meadows
    Security of Ramp Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:242-268 [Conf]
  11. G. R. Blakley, Catherine Meadows, George B. Purdy
    Fingerprinting Long Forgiving Messages. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1985, pp:180-189 [Conf]
  12. G. R. Blakley, William Rundell
    Cryptosystems Based on an Analog of Heat Flow. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:306-329 [Conf]
  13. G. R. Blakley, Laif Swanson
    Infinite Structures in Information Theory. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1982, pp:39-50 [Conf]
  14. G. R. Blakley, Gregory Kabatianskii
    Linear Algebra Approach to Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    Error Control, Cryptology, and Speech Compression, 1993, pp:33-40 [Conf]
  15. G. R. Blakley, I. Borosh
    A General Theory of Codes, II: Paradigms and Homomorphisms. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:1-31 [Conf]
  16. G. R. Blakley
    One Time Pads Are Key Safeguarding Schemes, Not Cryptosystems Fast Key Safeguarding Schemes (Threshold Schemes) Exist. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1980, pp:108-113 [Conf]
  17. G. R. Blakley
    Twenty Years of Cryptography in the Open Literature. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:106-107 [Conf]
  18. Bob Blakley, G. R. Blakley
    All sail, no anchor II: Acceptable high-end PKI. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2004, v:2, n:2, pp:66-77 [Journal]
  19. G. R. Blakley, George B. Purdy
    A necessary and sufficient condition for fundamental periods of cascade machines to be products of the fundamental periods of their constituent finite state machines. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1981, v:24, n:1, pp:71-91 [Journal]
  20. G. R. Blakley
    A Computer Algorithm for Calculating the Product AB Modulo M. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1983, v:32, n:5, pp:497-500 [Journal]
  21. Alexander Barg, G. R. Blakley, Gregory A. Kabatiansky
    Digital fingerprinting codes: problem statements, constructions, identification of traitors. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2003, v:49, n:4, pp:852-865 [Journal]

Search in 0.014secs, Finished in 0.015secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002