G. R. Blakley
Affiliations: Texas A&M University, College Station, TX, USA
According to our database^{1},
G. R. Blakley
authored at least 40 papers
between 1978 and 2014.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:

on id.loc.gov
On csauthors.net:
Bibliography
2014
CoRR, 2014
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
2010
Proceedings of the 2010 IEEE Information Theory Workshop, 2010
2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005
2004
Int. J. Inf. Sec., 2004
Random coding technique for digital fingerprinting codes: fighting two pirates revisited.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004
2003
Digital fingerprinting codes: problem statements, constructions, identification of traitors.
IEEE Trans. Inf. Theory, 2003
2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
1999
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999
1997
Proceedings of the Information Security, First International Workshop, 1997
1995
Proceedings of the Advances in Cryptology, 1995
1993
Proceedings of the Error Control, Cryptology, and Speech Compression, 1993
1992
Proceedings of the Advances in Cryptology, 1992
1987
Proceedings of the Advances in Cryptology, 1987
1986
Proceedings of the Advances in Cryptology, 1986
1985
A Database Encryption Scheme Which Allows the Computation of Statistics Using Encrypted Data.
Proceedings of the 1985 IEEE Symposium on Security and Privacy, 1985
Proceedings of the Advances in Cryptology, 1985
Proceedings of the Advances in Cryptology, 1985
1984
Cryptologia, 1984
Proceedings of the Advances in Cryptology, 1984
Information Theory Without the Finiteness Assumption, I: Cryptosystems as GroupTheoretic Objects.
Proceedings of the Advances in Cryptology, 1984
1983
IEEE Trans. Computers, 1983
1982
Pooling, Splitting, and Restituting Information to Overcome Total Failure of Some Channels of Communication.
Proceedings of the 1982 IEEE Symposium on Security and Privacy, 1982
Proceedings of the Advances in Cryptology: Proceedings of CRYPTO '82, 1982
1981
A necessary and sufficient condition for fundamental periods of cascade machines to be products of the fundamental periods of their constituent finite state machines.
Inf. Sci., 1981
Proceedings of the 1981 IEEE Symposium on Security and Privacy, 1981
Key Management from a Security Viewpoint.
Proceedings of the Advances in Cryptology: A Report on CRYPTO 81, 1981
1980
One Time Pads Are Key Safeguarding Schemes, Not Cryptosystems Fast Key Safeguarding Schemes (Threshold Schemes) Exist.
Proceedings of the 1980 IEEE Symposium on Security and Privacy, 1980
1979
Cryptologia, 1979
Cryptologia, 1979
Proceedings of the 1979 International Workshop on Managing Requirements Knowledge, 1979
1978
Cryptologia, 1978