Donald W. Davies

According to our database1, Donald W. Davies authored at least 38 papers between 1957 and 2001.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2001
An Historical Study of the Beginnings of Packet Switching.
Comput. J., 2001

2000
An Unidentified Cipher Device.
Cryptologia, 2000

1999
Effectiveness of the Diagonal Board.
Cryptologia, 1999

The Bombe a Remarkable Logic Machine.
Cryptologia, 1999

1997
A brief history of cryptography.
Inf. Secur. Tech. Rep., 1997

1995
Pairs and Triplets of DES S-Boxes.
J. Cryptol., 1995

The Lorenz Cipher Machine Sz42.
Cryptologia, 1995

Repairs to Turing's Universal Computing Machine.
Proceedings of the Machine Intelligence 15, 1995

1994
New Information on the History of the Siemens and Halske T52 Cipher Machines.
Cryptologia, 1994

1991
The Transition from Mechanisms to Electronic Computers, 1940 to 1950.
Proceedings of the Advances in Cryptology, 1991

1989
Security for computer networks - an introduction to data security in teleprocessing and electronic funds transfer (2. ed.).
Wiley series in communication and distributed systems, Wiley, ISBN: 978-0-471-92137-0, 1989

1986
Bolton's Cypher Wheel.
Cryptologia, 1986

How to use the DES safely.
Comput. Secur., 1986

1985
Charles Wheatstone's Cryptograph and Pletts' Cipher Machine.
Cryptologia, 1985

Engineering Secure Information Systems.
Proceedings of the Advances in Cryptology, 1985

1984
Sir Percy Scott's Cypher.
Cryptologia, 1984

Sidney Hole's Cryptographic Machine.
Cryptologia, 1984

The Autocryptograph.
Cryptologia, 1984

A Message Authenticator Algorithm Suitable for A Mainframe Computer.
Proceedings of the Advances in Cryptology, 1984

1983
The Early Models of the Seimens and Halske T52 Cipher Machine.
Cryptologia, 1983

Applying the RSA Digital Signature to Electronic Mail.
Computer, 1983

Use of the 'Signature Token' to Create a Negotiable Document.
Proceedings of the Advances in Cryptology, 1983

1982
The Siemens and Halske T52e Cipher Machine.
Cryptologia, 1982

The Average Cycle Size of the Key Stream in Output Feedback Encipherment.
Proceedings of the Advances in Cryptology: Proceedings of CRYPTO '82, 1982

Some Regular Properties of the 'Data Encryption Standard' Algorithm.
Proceedings of the Advances in Cryptology: Proceedings of CRYPTO '82, 1982

1981
Some Regular Properties of the DES.
Proceedings of the Advances in Cryptology: A Report on CRYPTO 81, 1981

1980
Hierarchy.
Proceedings of the Distributed Systems - Architecture and Implementation, 1980

Protection.
Proceedings of the Distributed Systems - Architecture and Implementation, 1980

1974
Packet Switching, Message Switching and Future Data Communication Networks.
Proceedings of the Information Processing, 1974

1972
The Control of Congestion in Packet-Switching Networks.
IEEE Trans. Commun., 1972

1971
A Comparison of Modified Newton Methods for Unconstrained Optimisation.
Comput. J., 1971

Packet Switching in a Public Data Network.
Proceedings of the Information Processing, Proceedings of IFIP Congress 1971, Volume 1, 1971

1968
The principles of a data communication network for computers and remote peripherals.
Proceedings of the Information Processing, Proceedings of IFIP Congress 1968, Edinburgh, UK, 5-10 August 1968, Volume 2, 1968

Communication networks to serve rapid-response computers.
Proceedings of the Information Processing, Proceedings of IFIP Congress 1968, Edinburgh, UK, 5-10 August 1968, Volume 2, 1968

1967
A digital communication network for computers giving rapid response at remote terminals.
Proceedings of the First Symposium on Operating Systems Principles, 1967

1965
Longest "Separated" Paths and Loops in an N Cube.
IEEE Trans. Electron. Comput., 1965

1963
An 11-Cryotron Full Adder.
IEEE Trans. Electron. Comput., 1963

1957
Switching Functions of Three Variables.
IRE Trans. Electron. Comput., 1957


  Loading...