Search the dblp DataBase
Matt Blaze :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Matt Blaze Transparent Mistrust: OS Support for Cryptography-in-the-Large. [Citation Graph (1, 0)][DBLP ] Workshop on Workstation Operating Systems, 1993, pp:98-102 [Conf ] Matt Blaze , Rafael Alonso Dynamic Hierarchical Caching for Large-Scale Distributed File Systems. [Citation Graph (1, 0)][DBLP ] ICDCS, 1992, pp:521-528 [Conf ] William Aiello , Steven M. Bellovin , Matt Blaze , John Ioannidis , Omer Reingold , Ran Canetti , Angelos D. Keromytis Efficient, DoS-resistant, secure key exchange for internet protocols. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:48-58 [Conf ] Matt Blaze A Cryptographic File System for UNIX. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1993, pp:9-16 [Conf ] Matt Blaze Protocol Failure in the Escrowed Encryption Standard. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1994, pp:59-67 [Conf ] Matt Blaze , Joan Feigenbaum , Angelos D. Keromytis The Role of Trust Management in Distributed Systems Security. [Citation Graph (0, 0)][DBLP ] Secure Internet Programming, 1999, pp:185-210 [Conf ] Matt Blaze , Gerrit Bleumer , Martin Strauss Divertible Protocols and Atomic Proxy Cryptography. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:127-144 [Conf ] Matt Blaze , Joan Feigenbaum , Moni Naor A Formal Treatment of Remotely Keyed Encryption. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:251-265 [Conf ] Matt Blaze , Joan Feigenbaum , Martin Strauss Compliance Checking in the PolicyMaker Trust Management System. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1998, pp:254-274 [Conf ] Matt Blaze , John Ioannidis , Angelos D. Keromytis Offline Micropayments without Trusted Hardware. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2001, pp:21-40 [Conf ] Matt Blaze High-Bandwidth Encryption with Low-Bandwidth Smartcards. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1996, pp:33-40 [Conf ] Matt Blaze , Bruce Schneier The MacGuffin Block Cipher Algorithm. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1994, pp:97-110 [Conf ] Matt Blaze , John Ioannidis , Sotiris Ioannidis , Angelos D. Keromytis , Pekka Nikander , Vassilis Prevelakis TAPI: Transactions for Accessing Public Infrastructure. [Citation Graph (0, 0)][DBLP ] PWC, 2003, pp:90-100 [Conf ] Matt Blaze Oblevious Key Escrow. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1996, pp:335-343 [Conf ] Matt Blaze , John Ioannidis , Angelos D. Keromytis Experience with the KeyNote Trust Management System: Applications and Future Directions. [Citation Graph (0, 0)][DBLP ] iTrust, 2003, pp:284-300 [Conf ] Matt Blaze Picking Locks with Cryptology. [Citation Graph (0, 0)][DBLP ] LISA, 2005, pp:- [Conf ] Matt Blaze , John Ioannidis , Angelos D. Keromytis Trust Management for IPsec. [Citation Graph (0, 0)][DBLP ] NDSS, 2001, pp:- [Conf ] Matt Blaze , Joan Feigenbaum , Moni Naor A Formal Treatment of Remotely Keyed Encryption. [Citation Graph (0, 0)][DBLP ] SODA, 1999, pp:868-869 [Conf ] Matt Blaze , Joan Feigenbaum , Jack Lacy Decentralized Trust Management. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1996, pp:164-173 [Conf ] William Aiello , Steven M. Bellovin , Matt Blaze , Ran Canetti , John Ioannidis , Angelos D. Keromytis , Omer Reingold Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2001, pp:27-39 [Conf ] Virgil D. Gligor , Matt Blaze , John Ioannidis Denial of Service - Panel Discussion. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2000, pp:194-203 [Conf ] Matt Blaze Looking on the Bright Side of Black-Box Cryptography (Transcript of Discussion). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2000, pp:54-61 [Conf ] Matt Blaze Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols (Transcript of Discussion). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2001, pp:40-48 [Conf ] Matt Blaze WAR: Wireless Anonymous Routing (Discussion). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2003, pp:233-240 [Conf ] Matt Blaze , Joan Feigenbaum , Angelos D. Keromytis KeyNote: Trust Management for Public-Key Infrastructures (Position Paper). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1998, pp:59-63 [Conf ] Matt Blaze , John Ioannidis , Angelos D. Keromytis Trust Management and Network Layer Security Protocols. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1999, pp:103-118 [Conf ] Matt Blaze , John Ioannidis , Angelos D. Keromytis , Tal Malkin , Aviel D. Rubin WAR: Wireless Anonymous Routing. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2003, pp:218-232 [Conf ] Matt Blaze Toward a Broader View of Security Protocols (Transcript of Discussion). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2004, pp:121-132 [Conf ] Matt Blaze Toward a Broader View of Security Protocols. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2004, pp:106-120 [Conf ] Matt Blaze Key Management in an Encrypting File System. [Citation Graph (0, 0)][DBLP ] USENIX Summer, 1994, pp:27-35 [Conf ] Matt Blaze , Rafael Alonso Long-Term Caching Strategies for Very Large Distributed File Systems. [Citation Graph (0, 0)][DBLP ] USENIX Summer, 1991, pp:3-16 [Conf ] Steven M. Bellovin , Matt Blaze , Susan Landau The real national-security needs for VoIP. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:11, pp:120- [Journal ] Matt Blaze , Steven M. Bellovin Tapping on my network door. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2000, v:43, n:10, pp:136- [Journal ] Matt Blaze Rights Amplification in Master-Keyed Mechanical Locks. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:2, pp:24-32 [Journal ] Micah Sherr , Eric Cronin , Sandy Clark , Matt Blaze Signaling Vulnerabilities in Wiretapping Systems. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:6, pp:13-25 [Journal ] William Aiello , Steven M. Bellovin , Matt Blaze , Ran Canetti , John Ioannidis , Angelos D. Keromytis , Omer Reingold Just fast keying: Key agreement in a hostile internet. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:2, pp:242-273 [Journal ] Matt Blaze , John Ioannidis , Angelos D. Keromytis Trust management for IPsec. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2002, v:5, n:2, pp:95-118 [Journal ] Can they hear me now?: a security analysis of law enforcement wiretaps. [Citation Graph (, )][DBLP ] On the Reliability of Network Eavesdropping Tools. [Citation Graph (, )][DBLP ] Scalable Link-Based Relay Selection for Anonymous Routing. [Citation Graph (, )][DBLP ] Listen Too Closely and You May Be Confused. [Citation Graph (, )][DBLP ] Listen Too Closely and You May Be Confused. [Citation Graph (, )][DBLP ] Composing Security Metrics. [Citation Graph (, )][DBLP ] Security Evaluation of ES&S Voting Machines and Election Management System. [Citation Graph (, )][DBLP ] QuanTM: a quantitative trust management system. [Citation Graph (, )][DBLP ] Internal surveillance, external risks. [Citation Graph (, )][DBLP ] Dynamic Trust Management. [Citation Graph (, )][DBLP ] Search in 0.036secs, Finished in 0.039secs