| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 1995 | General Perfect Secret Sharing Schemes | crypto | 367-371 |
| 2 | 1992 | Threshold Schemes with Disenrollment | crypto | 540-548 |
| 3 | 1987 | Cryptosystems Based on an Analog of Heat Flow | crypto | 306-329 |
| 4 | 1986 | Smallest Possible Message Expansion in Threshold Schemes | crypto | 266-274 |
| 5 | 1985 | Information Theory Without the Finiteness Assumption, II: Unfolding the DES | crypto | 282-337 |
| 6 | 1985 | Fingerprinting Long Forgiving Messages | crypto | 180-189 |
| 7 | 1984 | Information Theory Without the Finiteness Assumption, I: Cryptosystems as Group-Theoretic Objects | crypto | 314-338 |
| 8 | 1984 | Security of Ramp Schemes | crypto | 242-268 |
| 9 | 1982 | Infinite Structures in Information Theory | crypto | 39-50 |
| 10 | 1981 | Key Management from a Security Viewpoint | crypto | 82 |
Coauthors of G. R. Blakley |