default search action
Donald W. Davies
Person information
- award (2012): Internet Hall of Fame
- award: National Inventors Hall of Fame
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2000 – 2009
- 2001
- [j22]Donald W. Davies:
An Historical Study of the Beginnings of Packet Switching. Comput. J. 44(3): 152-162 (2001) - 2000
- [j21]Donald W. Davies:
An Unidentified Cipher Device. Cryptologia 24(2): 131-134 (2000)
1990 – 1999
- 1999
- [j20]Donald W. Davies:
The Bombe a Remarkable Logic Machine. Cryptologia 23(2): 108-138 (1999) - [j19]Donald W. Davies:
Effectiveness of the Diagonal Board. Cryptologia 23(3): 229-239 (1999) - 1997
- [j18]Donald W. Davies:
A brief history of cryptography. Inf. Secur. Tech. Rep. 2(2): 14-17 (1997) - 1995
- [j17]Donald W. Davies:
The Lorenz Cipher Machine Sz42. Cryptologia 19(1): 39-61 (1995) - [j16]Donald W. Davies, Sean Murphy:
Pairs and Triplets of DES S-Boxes. J. Cryptol. 8(1): 1-25 (1995) - [c17]Donald W. Davies:
Repairs to Turing's Universal Computing Machine. Machine Intelligence 15 1995: 477-488 - 1994
- [j15]Donald W. Davies:
New Information on the History of the Siemens and Halske T52 Cipher Machines. Cryptologia 18(2): 141-146 (1994) - 1991
- [c16]Donald W. Davies:
The Transition from Mechanisms to Electronic Computers, 1940 to 1950. ASIACRYPT 1991: 1-21 - [e1]Donald W. Davies:
Advances in Cryptology - EUROCRYPT '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings. Lecture Notes in Computer Science 547, Springer 1991, ISBN 3-540-54620-0 [contents]
1980 – 1989
- 1989
- [b1]Donald W. Davies, Wyn L. Price:
Security for computer networks - an introduction to data security in teleprocessing and electronic funds transfer (2. ed.). Wiley series in communication and distributed systems, Wiley 1989, ISBN 978-0-471-92137-0, pp. I-XX, 1-377 - 1986
- [j14]Donald W. Davies:
How to use the DES safely. Comput. Secur. 5(2): 169 (1986) - [j13]Donald W. Davies:
Bolton's Cypher Wheel. Cryptologia 10(1): 64 (1986) - 1985
- [j12]Donald W. Davies:
Charles Wheatstone's Cryptograph and Pletts' Cipher Machine. Cryptologia 9(2): 155-160 (1985) - [c15]Donald W. Davies, Wyn L. Price:
Engineering Secure Information Systems. EUROCRYPT 1985: 191-199 - 1984
- [j11]Donald W. Davies:
The Autocryptograph. Cryptologia 8(1): 82-92 (1984) - [j10]Donald W. Davies:
Sidney Hole's Cryptographic Machine. Cryptologia 8(2): 115-126 (1984) - [j9]Donald W. Davies:
Sir Percy Scott's Cypher. Cryptologia 8(3): 250-252 (1984) - [c14]Donald W. Davies:
A Message Authenticator Algorithm Suitable for A Mainframe Computer. CRYPTO 1984: 393-400 - 1983
- [j8]Donald W. Davies:
Applying the RSA Digital Signature to Electronic Mail. Computer 16(2): 55-62 (1983) - [j7]Donald W. Davies:
The Early Models of the Seimens and Halske T52 Cipher Machine. Cryptologia 7(3): 235-253 (1983) - [c13]Donald W. Davies:
Use of the 'Signature Token' to Create a Negotiable Document. CRYPTO 1983: 377-382 - 1982
- [j6]Donald W. Davies:
The Siemens and Halske T52e Cipher Machine. Cryptologia 6(4): 289-308 (1982) - [c12]Donald W. Davies:
Some Regular Properties of the 'Data Encryption Standard' Algorithm. CRYPTO 1982: 89-96 - [c11]Donald W. Davies, Graeme I. P. Parkin:
The Average Cycle Size of the Key Stream in Output Feedback Encipherment. CRYPTO 1982: 97-98 - [c10]Donald W. Davies, Graeme I. P. Parkin:
The average Cycle size of the Key-Stream in Output Feedback Encipherment. EUROCRYPT 1982: 263-279 - 1981
- [c9]Donald W. Davies:
Some Regular Properties of the DES. CRYPTO 1981: 41 - 1980
- [c8]Donald W. Davies, Richard W. Watson:
Hierarchy. Advanced Course: Distributed Systems 1980: 94-139 - [c7]Donald W. Davies:
Protection. Advanced Course: Distributed Systems 1980: 211-245
1970 – 1979
- 1974
- [c6]Donald W. Davies:
Packet Switching, Message Switching and Future Data Communication Networks. IFIP Congress 1974: 147-150 - 1972
- [j5]Donald Watts Davies:
The Control of Congestion in Packet-Switching Networks. IEEE Trans. Commun. 20(3): 546-550 (1972) - 1971
- [j4]A. Matthews, Donald W. Davies:
A Comparison of Modified Newton Methods for Unconstrained Optimisation. Comput. J. 14(3): 293-294 (1971) - [c5]Donald W. Davies:
Packet Switching in a Public Data Network. IFIP Congress (1) 1971: 622-627 - [c4]Donald W. Davies:
The control of congestion in packet switching networks. Symposium on Problems in the Optimizations of Data Communications Systems 1971: 46-49
1960 – 1969
- 1968
- [c3]Donald W. Davies:
Communication networks to serve rapid-response computers. IFIP Congress (2) 1968: 650-658 - [c2]Donald W. Davies:
The principles of a data communication network for computers and remote peripherals. IFIP Congress (2) 1968: 709-715 - 1967
- [c1]Donald W. Davies, Keith A. Bartlett, Roger A. Scantlebury, Peter T. Wilkinson:
A digital communication network for computers giving rapid response at remote terminals. SOSP 1967 - 1965
- [j3]Donald W. Davies:
Longest "Separated" Paths and Loops in an N Cube. IEEE Trans. Electron. Comput. 14(2): 261 (1965) - 1963
- [j2]Donald W. Davies:
An 11-Cryotron Full Adder. IEEE Trans. Electron. Comput. 12(3): 319 (1963)
1950 – 1959
- 1957
- [j1]Donald W. Davies:
Switching Functions of Three Variables. IRE Trans. Electron. Comput. 6(4): 265-275 (1957)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint