# G. R. Blakley

According to our database

Collaborative distances:

^{1}, G. R. Blakley authored at least 39 papers between 1978 and 2014.Collaborative distances:

## Timeline

#### Legend:

Book In proceedings Article PhD thesis Other## Links

#### Online presence:

#### On csauthors.net:

## Bibliography

2014

CoRR, 2014

2011

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

2010

Proceedings of the 2010 IEEE Information Theory Workshop, 2010

2005

Proceedings of the Encyclopedia of Cryptography and Security, 2005

Proceedings of the Encyclopedia of Cryptography and Security, 2005

Proceedings of the Encyclopedia of Cryptography and Security, 2005

Proceedings of the Encyclopedia of Cryptography and Security, 2005

Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004

Int. J. Inf. Sec., 2004

Random coding technique for digital fingerprinting codes: fighting two pirates revisited.

Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

2003

Digital fingerprinting codes: problem statements, constructions, identification of traitors.

IEEE Trans. Inf. Theory, 2003

2000

Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999

Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999

1997

Proceedings of the Information Security, First International Workshop, 1997

1995

Proceedings of the Advances in Cryptology, 1995

1993

Proceedings of the Error Control, Cryptology, and Speech Compression, 1993

1992

Proceedings of the Advances in Cryptology, 1992

1987

Proceedings of the Advances in Cryptology, 1987

1986

Proceedings of the Advances in Cryptology, 1986

1985

A Database Encryption Scheme Which Allows the Computation of Statistics Using Encrypted Data.

Proceedings of the 1985 IEEE Symposium on Security and Privacy, 1985

Proceedings of the Advances in Cryptology, 1985

Proceedings of the Advances in Cryptology, 1985

1984

Cryptologia, 1984

Proceedings of the Advances in Cryptology, 1984

Information Theory Without the Finiteness Assumption, I: Cryptosystems as Group-Theoretic Objects.

Proceedings of the Advances in Cryptology, 1984

1983

IEEE Trans. Computers, 1983

1982

Pooling, Splitting, and Restituting Information to Overcome Total Failure of Some Channels of Communication.

Proceedings of the 1982 IEEE Symposium on Security and Privacy, 1982

Proceedings of the Advances in Cryptology: Proceedings of CRYPTO '82, 1982

1981

A necessary and sufficient condition for fundamental periods of cascade machines to be products of the fundamental periods of their constituent finite state machines.

Inf. Sci., 1981

Proceedings of the 1981 IEEE Symposium on Security and Privacy, 1981

Key Management from a Security Viewpoint.

Proceedings of the Advances in Cryptology: A Report on CRYPTO 81, 1981

1980

One Time Pads Are Key Safeguarding Schemes, Not Cryptosystems Fast Key Safeguarding Schemes (Threshold Schemes) Exist.

Proceedings of the 1980 IEEE Symposium on Security and Privacy, 1980

1979

Cryptologia, 1979

Cryptologia, 1979

1978

Cryptologia, 1978