The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Matt Blaze: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Matt Blaze
    Transparent Mistrust: OS Support for Cryptography-in-the-Large. [Citation Graph (1, 0)][DBLP]
    Workshop on Workstation Operating Systems, 1993, pp:98-102 [Conf]
  2. Matt Blaze, Rafael Alonso
    Dynamic Hierarchical Caching for Large-Scale Distributed File Systems. [Citation Graph (1, 0)][DBLP]
    ICDCS, 1992, pp:521-528 [Conf]
  3. William Aiello, Steven M. Bellovin, Matt Blaze, John Ioannidis, Omer Reingold, Ran Canetti, Angelos D. Keromytis
    Efficient, DoS-resistant, secure key exchange for internet protocols. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:48-58 [Conf]
  4. Matt Blaze
    A Cryptographic File System for UNIX. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:9-16 [Conf]
  5. Matt Blaze
    Protocol Failure in the Escrowed Encryption Standard. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:59-67 [Conf]
  6. Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis
    The Role of Trust Management in Distributed Systems Security. [Citation Graph (0, 0)][DBLP]
    Secure Internet Programming, 1999, pp:185-210 [Conf]
  7. Matt Blaze, Gerrit Bleumer, Martin Strauss
    Divertible Protocols and Atomic Proxy Cryptography. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:127-144 [Conf]
  8. Matt Blaze, Joan Feigenbaum, Moni Naor
    A Formal Treatment of Remotely Keyed Encryption. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:251-265 [Conf]
  9. Matt Blaze, Joan Feigenbaum, Martin Strauss
    Compliance Checking in the PolicyMaker Trust Management System. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1998, pp:254-274 [Conf]
  10. Matt Blaze, John Ioannidis, Angelos D. Keromytis
    Offline Micropayments without Trusted Hardware. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2001, pp:21-40 [Conf]
  11. Matt Blaze
    High-Bandwidth Encryption with Low-Bandwidth Smartcards. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1996, pp:33-40 [Conf]
  12. Matt Blaze, Bruce Schneier
    The MacGuffin Block Cipher Algorithm. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:97-110 [Conf]
  13. Matt Blaze, John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis, Pekka Nikander, Vassilis Prevelakis
    TAPI: Transactions for Accessing Public Infrastructure. [Citation Graph (0, 0)][DBLP]
    PWC, 2003, pp:90-100 [Conf]
  14. Matt Blaze
    Oblevious Key Escrow. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1996, pp:335-343 [Conf]
  15. Matt Blaze, John Ioannidis, Angelos D. Keromytis
    Experience with the KeyNote Trust Management System: Applications and Future Directions. [Citation Graph (0, 0)][DBLP]
    iTrust, 2003, pp:284-300 [Conf]
  16. Matt Blaze
    Picking Locks with Cryptology. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:- [Conf]
  17. Matt Blaze, John Ioannidis, Angelos D. Keromytis
    Trust Management for IPsec. [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  18. Matt Blaze, Joan Feigenbaum, Moni Naor
    A Formal Treatment of Remotely Keyed Encryption. [Citation Graph (0, 0)][DBLP]
    SODA, 1999, pp:868-869 [Conf]
  19. Matt Blaze, Joan Feigenbaum, Jack Lacy
    Decentralized Trust Management. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:164-173 [Conf]
  20. William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold
    Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:27-39 [Conf]
  21. Virgil D. Gligor, Matt Blaze, John Ioannidis
    Denial of Service - Panel Discussion. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:194-203 [Conf]
  22. Matt Blaze
    Looking on the Bright Side of Black-Box Cryptography (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:54-61 [Conf]
  23. Matt Blaze
    Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:40-48 [Conf]
  24. Matt Blaze
    WAR: Wireless Anonymous Routing (Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:233-240 [Conf]
  25. Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis
    KeyNote: Trust Management for Public-Key Infrastructures (Position Paper). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:59-63 [Conf]
  26. Matt Blaze, John Ioannidis, Angelos D. Keromytis
    Trust Management and Network Layer Security Protocols. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1999, pp:103-118 [Conf]
  27. Matt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, Aviel D. Rubin
    WAR: Wireless Anonymous Routing. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:218-232 [Conf]
  28. Matt Blaze
    Toward a Broader View of Security Protocols (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2004, pp:121-132 [Conf]
  29. Matt Blaze
    Toward a Broader View of Security Protocols. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2004, pp:106-120 [Conf]
  30. Matt Blaze
    Key Management in an Encrypting File System. [Citation Graph (0, 0)][DBLP]
    USENIX Summer, 1994, pp:27-35 [Conf]
  31. Matt Blaze, Rafael Alonso
    Long-Term Caching Strategies for Very Large Distributed File Systems. [Citation Graph (0, 0)][DBLP]
    USENIX Summer, 1991, pp:3-16 [Conf]
  32. Steven M. Bellovin, Matt Blaze, Susan Landau
    The real national-security needs for VoIP. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:11, pp:120- [Journal]
  33. Matt Blaze, Steven M. Bellovin
    Tapping on my network door. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:10, pp:136- [Journal]
  34. Matt Blaze
    Rights Amplification in Master-Keyed Mechanical Locks. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:2, pp:24-32 [Journal]
  35. Micah Sherr, Eric Cronin, Sandy Clark, Matt Blaze
    Signaling Vulnerabilities in Wiretapping Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:6, pp:13-25 [Journal]
  36. William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold
    Just fast keying: Key agreement in a hostile internet. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2004, v:7, n:2, pp:242-273 [Journal]
  37. Matt Blaze, John Ioannidis, Angelos D. Keromytis
    Trust management for IPsec. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2002, v:5, n:2, pp:95-118 [Journal]

  38. Can they hear me now?: a security analysis of law enforcement wiretaps. [Citation Graph (, )][DBLP]


  39. On the Reliability of Network Eavesdropping Tools. [Citation Graph (, )][DBLP]


  40. Scalable Link-Based Relay Selection for Anonymous Routing. [Citation Graph (, )][DBLP]


  41. Listen Too Closely and You May Be Confused. [Citation Graph (, )][DBLP]


  42. Listen Too Closely and You May Be Confused. [Citation Graph (, )][DBLP]


  43. Composing Security Metrics. [Citation Graph (, )][DBLP]


  44. Security Evaluation of ES&S Voting Machines and Election Management System. [Citation Graph (, )][DBLP]


  45. QuanTM: a quantitative trust management system. [Citation Graph (, )][DBLP]


  46. Internal surveillance, external risks. [Citation Graph (, )][DBLP]


  47. Dynamic Trust Management. [Citation Graph (, )][DBLP]


Search in 0.036secs, Finished in 0.039secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002