Cryptographers' World
 

G. R. Blakley



10 papers in database with 357 citations Star

Editor of 1 conference proceedings book

H-number: 7

Conference Proceedings

 
1. G. R. BlakleyDavid Chaum, editors, Advances in Cryptology, Proceedings of CRYPTO '84, Santa Barbara, California, USA, August 19-22, 1984, Proceedings. Springer, 1985. ISBN 3-540-15658-5.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. G. R. Blakley,  Gregory Kabatianskii,  On General Perfect Secret Sharing Schemes, pp. 367 - 371, CRYPTO 1995.

[Electronic Edition][Cited 7 times ]

2. Bob Blakley,  G. R. Blakley,  Agnes Hui Chan,  James L. Massey,  Threshold Schemes with Disenrollment, pp. 540 - 548, CRYPTO 1992.

[Electronic Edition][Cited 69 times Red Star]

3. G. R. Blakley,  William Rundell,  Cryptosystems Based on an Analog of Heat Flow, pp. 306 - 329, CRYPTO 1987.

[Electronic Edition][Cited 7 times ]

4. G. R. Blakley,  R. D. Dixon,  Smallest Possible Message Expansion in Threshold Schemes, pp. 266 - 274, CRYPTO 1986.

[Electronic Edition][Cited 2 times ]

5. G. R. Blakley,  Information Theory Without the Finiteness Assumption, II: Unfolding the DES, pp. 282 - 337, CRYPTO 1985.

[Electronic Edition][Cited 3 times ]

6. G. R. Blakley,  Catherine Meadows,  George B. Purdy,  Fingerprinting Long Forgiving Messages, pp. 180 - 189, CRYPTO 1985.

[Electronic Edition][Cited 106 times Red StarRed Star]

7. G. R. Blakley,  Information Theory Without the Finiteness Assumption, I: Cryptosystems as Group-Theoretic Objects, pp. 314 - 338, CRYPTO 1984.

[Electronic Edition][Cited 7 times ]

8. G. R. Blakley,  Catherine Meadows,  Security of Ramp Schemes, pp. 242 - 268, CRYPTO 1984.

[Electronic Edition][Cited 146 times Red StarRed Star]

9. G. R. Blakley,  Laif Swanson,  Infinite Structures in Information Theory, pp. 39 - 50, CRYPTO 1982.

[Electronic Edition][Cited 10 times ]

10. G. R. Blakley,  Key Management from a Security Viewpoint, pp. 82 - 82, CRYPTO 1981.

[Electronic Edition][No citation]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...