Gustavus J. Simmons
Affiliations:- Sandia Laboratories, Albuquerque, NM, USA
According to our database1,
Gustavus J. Simmons
authored at least 59 papers
between 1964 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on id.loc.gov
-
on d-nb.info
On csauthors.net:
Bibliography
2020
2017
2015
Cubic, edge critical, Hamilton laceable bigraphs.
Ars Comb., 2015
2014
A surprising regularity in the number of Hamilton paths in polygonal bigraphs.
Ars Comb., 2014
2002
Parity Encoding of Binary Sequences.
Des. Codes Cryptogr., 2002
2001
1998
IEEE J. Sel. Areas Commun., 1998
1995
1994
1993
Proceedings of the Advances in Cryptology, 1993
Proceedings of the Advances in Cryptology, 1993
Proceedings of the 6th IEEE Computer Security Foundations Workshop, 1993
1992
Public-Key Cryptography: State of the Art and Future Directions, E.I.S.S. Workshop, Oberwolfach, Germany, July 3-6, 1991, Final Report
Lecture Notes in Computer Science 578, Springer, ISBN: 3-540-55215-4, 1992
1990
A Cartesian Product Construction for Unconditionally Secure Authentication Codes that Permit Arbitration.
J. Cryptol., 1990
A Protocol to Set Up Shared Secret Schemes Without the Assistance of a Mutualy Trusted Party.
Proceedings of the Advances in Cryptology, 1990
Proceedings of the Advances in Cryptology, 1990
1989
A protocol to provide verifiable proof of identity and unforgeable transaction receipts.
IEEE J. Sel. Areas Commun., 1989
Proceedings of the Advances in Cryptology, 1989
1988
Proc. IEEE, 1988
Proceedings of the Advances in Cryptology, 1988
1987
Cycle Structure of the DES for Keys Having Palindromic (or Antipalindromic) Sequences of Round Keys.
IEEE Trans. Software Eng., 1987
Proceedings of the Advances in Cryptology, 1987
Proceedings of the Advances in Cryptology, 1987
Proceedings of the Advances in Cryptology, 1987
1986
Cycle Structure of the Weak and Semi-Weak DES Keys.
EUROCRYPT, 1986
Proceedings of the Advances in Cryptology, 1986
1985
Proceedings of the 1985 IEEE Symposium on Security and Privacy, 1985
1984
A System for Verifying User Identity and Authorization at the Point-of Sale or Access.
Cryptologia, 1984
Proceedings of the Advances in Cryptology: Proceedings of EUROCRYPT 84, 1984
Proceedings of the Advances in Cryptology: Proceedings of EUROCRYPT 84, 1984
1983
Proceedings of the 1983 IEEE Symposium on Security and Privacy, 1983
The Prisoners' Problem and the Subliminal Channel.
Proceedings of the Advances in Cryptology, 1983
1982
Proceedings of the 1982 IEEE Symposium on Security and Privacy, 1982
Proceedings of the 1982 IEEE Symposium on Security and Privacy, 1982
Proceedings of the Advances in Cryptology: Proceedings of CRYPTO '82, 1982
1981
Proceedings of the 1981 IEEE Symposium on Security and Privacy, 1981
A System for Point-of-Sale or Access User Authentication and Identification.
Proceedings of the Advances in Cryptology: A Report on CRYPTO 81, 1981
Software Protection Using "Communal Key Cryptosystems".
Proceedings of the Advances in Cryptology: A Report on CRYPTO 81, 1981
1980
Proceedings of the 1980 IEEE Symposium on Security and Privacy, 1980
1979
1977
1974
Discret. Math., 1974
1973
1972
1969
IEEE Trans. Inf. Theory, 1969
1964
Proceedings of the 1964 spring joint computer conference, 1964