default search action
BibTeX records: Matt Blaze
@article{DBLP:journals/cybersecurity/AbelsonABBBCDLNRSSTT24, author = {Harold Abelson and Ross J. Anderson and Steven M. Bellovin and Josh Benaloh and Matt Blaze and Jon Callas and Whitfield Diffie and Susan Landau and Peter G. Neumann and Ronald L. Rivest and Jeffrey I. Schiller and Bruce Schneier and Vanessa Teague and Carmela Troncoso}, title = {Bugs in our pockets: the risks of client-side scanning}, journal = {J. Cybersecur.}, volume = {10}, number = {1}, year = {2024}, url = {https://doi.org/10.1093/cybsec/tyad020}, doi = {10.1093/CYBSEC/TYAD020}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecurity/AbelsonABBBCDLNRSSTT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-07450, author = {Hal Abelson and Ross J. Anderson and Steven M. Bellovin and Josh Benaloh and Matt Blaze and Jon Callas and Whitfield Diffie and Susan Landau and Peter G. Neumann and Ronald L. Rivest and Jeffrey I. Schiller and Bruce Schneier and Vanessa Teague and Carmela Troncoso}, title = {Bugs in our Pockets: The Risks of Client-Side Scanning}, journal = {CoRR}, volume = {abs/2110.07450}, year = {2021}, url = {https://arxiv.org/abs/2110.07450}, eprinttype = {arXiv}, eprint = {2110.07450}, timestamp = {Fri, 22 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-07450.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BellovinB016, author = {Steven M. Bellovin and Matt Blaze and Susan Landau}, title = {Insecure Surveillance: Technical Issues with Remote Computer Searches}, journal = {Computer}, volume = {49}, number = {3}, pages = {14--24}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.68}, doi = {10.1109/MC.2016.68}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BellovinB016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GutmannBBRS16, author = {Peter Gutmann and Steven M. Bellovin and Matt Blaze and Ronald L. Rivest and Nigel P. Smart}, title = {An IBE-based Signcryption Scheme for Group Key Management}, journal = {CoRR}, volume = {abs/1603.09526}, year = {2016}, url = {http://arxiv.org/abs/1603.09526}, eprinttype = {arXiv}, eprint = {1603.09526}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GutmannBBRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/AbelsonABBBDGGL15, author = {Harold Abelson and Ross J. Anderson and Steven M. Bellovin and Josh Benaloh and Matt Blaze and Whitfield Diffie and John Gilmore and Matthew Green and Susan Landau and Peter G. Neumann and Ronald L. Rivest and Jeffrey I. Schiller and Bruce Schneier and Michael A. Specter and Daniel J. Weitzner}, title = {Keys under doormats}, journal = {Commun. {ACM}}, volume = {58}, number = {10}, pages = {24--26}, year = {2015}, url = {https://doi.org/10.1145/2814825}, doi = {10.1145/2814825}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/AbelsonABBBDGGL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/AbelsonABBBDGG015, author = {Harold Abelson and Ross J. Anderson and Steven M. Bellovin and Josh Benaloh and Matt Blaze and Whitfield Diffie and John Gilmore and Matthew Green and Susan Landau and Peter G. Neumann and Ronald L. Rivest and Jeffrey I. Schiller and Bruce Schneier and Michael A. Specter and Daniel J. Weitzner}, title = {Keys under doormats: mandating insecurity by requiring government access to all data and communications}, journal = {J. Cybersecur.}, volume = {1}, number = {1}, pages = {69--79}, year = {2015}, url = {https://doi.org/10.1093/cybsec/tyv009}, doi = {10.1093/CYBSEC/TYV009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/AbelsonABBBDGG015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ClarkBS15, author = {Sandy Clark and Matt Blaze and Jonathan M. Smith}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Smearing Fingerprints: Changing the Game of Web Tracking with Composite Privacy}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {178--182}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_19}, doi = {10.1007/978-3-319-26096-9\_19}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/ClarkBS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/SherrGSMMSZLB14, author = {Micah Sherr and Harjot Gill and Taher Saeed and Andrew Mao and William R. Marczak and Saravana Soundararajan and Wenchao Zhou and Boon Thau Loo and Matt Blaze}, title = {The design and implementation of the A\({}^{\mbox{3}}\) application-aware anonymity platform}, journal = {Comput. Networks}, volume = {58}, pages = {206--227}, year = {2014}, url = {https://doi.org/10.1016/j.comnet.2013.09.021}, doi = {10.1016/J.COMNET.2013.09.021}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/SherrGSMMSZLB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/AvivBSS14, author = {Adam J. Aviv and Matt Blaze and Micah Sherr and Jonathan M. Smith}, title = {Privacy-aware message exchanges for HumaNets}, journal = {Comput. Commun.}, volume = {48}, pages = {30--43}, year = {2014}, url = {https://doi.org/10.1016/j.comcom.2014.03.013}, doi = {10.1016/J.COMCOM.2014.03.013}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/AvivBSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ClarkCBS14, author = {Sandy Clark and Michael Collis and Matt Blaze and Jonathan M. Smith}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Moving Targets: Security and Rapid-Release in Firefox}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1256--1266}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660320}, doi = {10.1145/2660267.2660320}, timestamp = {Tue, 10 Nov 2020 20:00:23 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ClarkCBS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BellovinBCL13, author = {Steven M. Bellovin and Matt Blaze and Sandy Clark and Susan Landau}, title = {Going Bright: Wiretapping without Weakening Communications Infrastructure}, journal = {{IEEE} Secur. Priv.}, volume = {11}, number = {1}, pages = {62--72}, year = {2013}, url = {https://doi.org/10.1109/MSP.2012.138}, doi = {10.1109/MSP.2012.138}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BellovinBCL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AvivSBS12, author = {Adam J. Aviv and Benjamin Sapp and Matt Blaze and Jonathan M. Smith}, editor = {Robert H'obbes' Zakon}, title = {Practicality of accelerometer side channels on smartphones}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {41--50}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420957}, doi = {10.1145/2420950.2420957}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/AvivSBS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AvivSBS12, author = {Adam J. Aviv and Micah Sherr and Matt Blaze and Jonathan M. Smith}, editor = {Sara Foresti and Moti Yung and Fabio Martinelli}, title = {Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks}, booktitle = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7459}, pages = {181--198}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33167-1\_11}, doi = {10.1007/978-3-642-33167-1\_11}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AvivSBS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ClarkBS12, author = {Sandy Clark and Matt Blaze and Jonathan M. Smith}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {The Casino and the {OODA} Loop - Why Our Protocols Always Eventually Fail}, booktitle = {Security Protocols {XX} - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7622}, pages = {60--63}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35694-0\_8}, doi = {10.1007/978-3-642-35694-0\_8}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/ClarkBS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Blaze12, author = {Matt Blaze}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {The Casino and the {OODA} Loop: Why Our Protocols Always Eventually Fail (Transcript of Discussion)}, booktitle = {Security Protocols {XX} - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7622}, pages = {64--75}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35694-0\_9}, doi = {10.1007/978-3-642-35694-0\_9}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Blaze12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ClarkWBLSSS12, author = {Sandy Clark and Chris Wacek and Matt Blaze and Boon Thau Loo and Micah Sherr and Clay Shields and Jonathan M. Smith}, editor = {Sean Peisert and Stephen Schwab}, title = {Collaborative Red Teaming for Anonymity System Evaluation}, booktitle = {5th Workshop on Cyber Security Experimentation and Test, {CSET} '12, Bellevue, WA, USA, August 6, 2012}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/cset12/workshop-program/presentation/clark}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ClarkWBLSSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Blaze11, author = {Matt Blaze}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {Key escrow from a safe distance: looking back at the Clipper Chip}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {317--321}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076777}, doi = {10.1145/2076732.2076777}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Blaze11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ClarkGMWXB11, author = {Sandy Clark and Travis Goodspeed and Perry Metzger and Zachary Wasserman and Kevin Xu and Matt Blaze}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {One-Way Cryptography}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {336--340}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_32}, doi = {10.1007/978-3-642-25867-1\_32}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/ClarkGMWXB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Blaze11, author = {Matt Blaze}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {One-Way Cryptography (Transcript of Discussion)}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {341--358}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_33}, doi = {10.1007/978-3-642-25867-1\_33}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Blaze11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ClarkGMWXB11, author = {Sandy Clark and Travis Goodspeed and Perry Metzger and Zachary Wasserman and Kevin Xu and Matt Blaze}, title = {Why (Special Agent) Johnny (Still) Can't Encrypt: {A} Security Analysis of the {APCO} Project 25 Two-Way Radio System}, booktitle = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12, 2011, Proceedings}, publisher = {{USENIX} Association}, year = {2011}, url = {http://static.usenix.org/events/sec11/tech/full\_papers/Clark.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ClarkGMWXB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ClarkFBS10, author = {Sandy Clark and Stefan Frei and Matt Blaze and Jonathan M. Smith}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Familiarity breeds contempt: the honeymoon effect and the role of legacy code in zero-day vulnerabilities}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {251--260}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920299}, doi = {10.1145/1920261.1920299}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ClarkFBS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/SherrMMZLB10, author = {Micah Sherr and Andrew Mao and William R. Marczak and Wenchao Zhou and Boon Thau Loo and Matt Blaze}, title = {{A3:} An Extensible Platform for Application-Aware Anonymity}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March 2010}, publisher = {The Internet Society}, year = {2010}, url = {https://www.ndss-symposium.org/ndss2010/a3-extensible-platform-application-aware-anonymity}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/SherrMMZLB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ClarkBS10, author = {Sandy Clark and Matt Blaze and Jonathan M. Smith}, editor = {Bruce Christianson and James A. Malcolm}, title = {Blood in the Water - Are there Honeymoon Effects Outside Software?}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {12--17}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_4}, doi = {10.1007/978-3-662-45921-8\_4}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/ClarkBS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AvivSBS10, author = {Adam J. Aviv and Micah Sherr and Matt Blaze and Jonathan M. Smith}, editor = {Wietse Z. Venema}, title = {Evading Cellular Data Monitoring with Human Movement Networks}, booktitle = {5th {USENIX} Workshop on Hot Topics in Security, HotSec'10, Washington, D.C., USA, August 10, 2010}, publisher = {{USENIX} Association}, year = {2010}, url = {https://www.usenix.org/conference/hotsec10/evading-cellular-data-monitoring-human-movement-networks}, timestamp = {Mon, 01 Feb 2021 08:43:16 +0100}, biburl = {https://dblp.org/rec/conf/uss/AvivSBS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/AvivGMBS10, author = {Adam J. Aviv and Katherine L. Gibson and Evan Mossop and Matt Blaze and Jonathan M. Smith}, editor = {Charlie Miller and Hovav Shacham}, title = {Smudge Attacks on Smartphone Touch Screens}, booktitle = {4th {USENIX} Workshop on Offensive Technologies, {WOOT} '10, Washington, D.C., USA, August 9, 2010}, publisher = {{USENIX} Association}, year = {2010}, url = {https://www.usenix.org/conference/woot10/smudge-attacks-smartphone-touch-screens}, timestamp = {Mon, 01 Feb 2021 08:41:52 +0100}, biburl = {https://dblp.org/rec/conf/woot/AvivGMBS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BlazeKLSSKL09, author = {Matt Blaze and Sampath Kannan and Insup Lee and Oleg Sokolsky and Jonathan M. Smith and Angelos D. Keromytis and Wenke Lee}, title = {Dynamic Trust Management}, journal = {Computer}, volume = {42}, number = {2}, pages = {44--52}, year = {2009}, url = {https://doi.org/10.1109/MC.2009.51}, doi = {10.1109/MC.2009.51}, timestamp = {Thu, 26 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/BlazeKLSSKL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Blaze09, author = {Matt Blaze}, title = {Taking Surveillance Out of the Shadows}, journal = {{IEEE} Secur. Priv.}, volume = {7}, number = {5}, pages = {75--77}, year = {2009}, url = {https://doi.org/10.1109/MSP.2009.138}, doi = {10.1109/MSP.2009.138}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Blaze09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/BlazeIKMR09, author = {Matt Blaze and John Ioannidis and Angelos D. Keromytis and Tal Malkin and Aviel D. Rubin}, title = {Anonymity in Wireless Broadcast Networks}, journal = {Int. J. Netw. Secur.}, volume = {8}, number = {1}, pages = {37--51}, year = {2009}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v8-n1/ijns-2009-v8-n1-p37-51.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/BlazeIKMR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SherrB09, author = {Micah Sherr and Matt Blaze}, editor = {Angelos Stavrou}, title = {Application containers without virtual machines}, booktitle = {Proceedings of the 1st {ACM} Workshop on Virtual Machine Security, VMSec '09, Chicago, Illinois, USA, November 9, 2009}, pages = {39--42}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655148.1655155}, doi = {10.1145/1655148.1655155}, timestamp = {Tue, 08 Feb 2022 13:20:18 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SherrB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SherrSCCB09, author = {Micah Sherr and Gaurav Shah and Eric Cronin and Sandy Clark and Matt Blaze}, editor = {Ehab Al{-}Shaer and Somesh Jha and Angelos D. Keromytis}, title = {Can they hear me now?: a security analysis of law enforcement wiretaps}, booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009}, pages = {512--523}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1653662.1653724}, doi = {10.1145/1653662.1653724}, timestamp = {Tue, 10 Nov 2020 19:58:07 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SherrSCCB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosec/WestACPBKLSS09, author = {Andrew G. West and Adam J. Aviv and Jian Chang and Vinayak S. Prabhu and Matt Blaze and Sampath Kannan and Insup Lee and Jonathan M. Smith and Oleg Sokolsky}, editor = {Evangelos P. Markatos and Manuel Costa}, title = {QuanTM: a quantitative trust management system}, booktitle = {Proceedings of the Second European Workshop on System Security, {EUROSEC} 2009, Nuremburg, Germany, March 31, 2009}, pages = {28--35}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1519144.1519149}, doi = {10.1145/1519144.1519149}, timestamp = {Thu, 26 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosec/WestACPBKLSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/SherrBL09, author = {Micah Sherr and Matt Blaze and Boon Thau Loo}, editor = {Ian Goldberg and Mikhail J. Atallah}, title = {Scalable Link-Based Relay Selection for Anonymous Routing}, booktitle = {Privacy Enhancing Technologies, 9th International Symposium, {PETS} 2009, Seattle, WA, USA, August 5-7, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5672}, pages = {73--93}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03168-7\_5}, doi = {10.1007/978-3-642-03168-7\_5}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/SherrBL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BlazeM09, author = {Matt Blaze and Patrick D. McDaniel}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Below the Salt}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {24--27}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_4}, doi = {10.1007/978-3-642-36213-2\_4}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/BlazeM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Blaze09, author = {Matt Blaze}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Is the Honeymoon over?}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {28--33}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_5}, doi = {10.1007/978-3-642-36213-2\_5}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Blaze09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Blaze09a, author = {Matt Blaze}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Below the Salt}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {34--40}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_6}, doi = {10.1007/978-3-642-36213-2\_6}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Blaze09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/SherrBL09, author = {Micah Sherr and Matt Blaze and Boon Thau Loo}, editor = {Geoffrey M. Voelker and Alec Wolman}, title = {Veracity: Practical Secure Network Coordinates via Vote-based Agreements}, booktitle = {Proceedings of the 2009 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2009, San Diego, CA, USA, June 14-19, 2009}, publisher = {{USENIX} Association}, year = {2009}, url = {https://www.usenix.org/conference/usenix-09/veracity-practical-secure-network-coordinates-vote-based-agreements}, timestamp = {Tue, 16 Jul 2024 09:12:32 +0200}, biburl = {https://dblp.org/rec/conf/usenix/SherrBL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/ShahB09, author = {Gaurav Shah and Matt Blaze}, editor = {Dan Boneh and Alexander Sotirov}, title = {Covert Channels through External Interference}, booktitle = {3rd {USENIX} Workshop on Offensive Technologies, {WOOT} 2009, Montreal, Canada, August 10, 2009}, pages = {1--8}, publisher = {{USENIX} Association}, year = {2009}, url = {https://www.usenix.org/legacy/events/woot09/tech/full\_papers/shah.pdf}, timestamp = {Wed, 24 May 2023 10:25:04 +0200}, biburl = {https://dblp.org/rec/conf/woot/ShahB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BellovinBDSNR08, author = {Steven M. Bellovin and Matt Blaze and Whitfield Diffie and Susan Landau and Peter G. Neumann and Jennifer Rexford}, title = {Risking Communications Security: Potential Hazards of the Protect America Act}, journal = {{IEEE} Secur. Priv.}, volume = {6}, number = {1}, pages = {24--33}, year = {2008}, url = {https://doi.org/10.1109/MSP.2008.17}, doi = {10.1109/MSP.2008.17}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BellovinBDSNR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/CroninSB08, author = {Eric Cronin and Micah Sherr and Matt Blaze}, title = {On the (un)reliability of eavesdropping}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {2}, pages = {103--113}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.017223}, doi = {10.1504/IJSN.2008.017223}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/CroninSB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptps/SherrLB08, author = {Micah Sherr and Boon Thau Loo and Matt Blaze}, editor = {Adriana Iamnitchi and Stefan Saroiu}, title = {Veracity: a fully decentralized service for securing network coordinate systems}, booktitle = {Proceedings of the 7th international conference on Peer-to-peer systems, IPTPS'08, Tampa, FL, USA, February 25-26, 2008}, pages = {15}, publisher = {{USENIX}}, year = {2008}, url = {http://www.iptps.org/papers-2008/36.pdf}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iptps/SherrLB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BlazeC08, author = {Matt Blaze and Sandy Clark}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Bridging the Gap between Vulnerabilities and Threats in Electronic Voting - Abstract}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {241--243}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_33}, doi = {10.1007/978-3-642-22137-8\_33}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/BlazeC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Blaze08, author = {Matt Blaze}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Bridging the Gap between Vulnerabilities and Threats in Electronic Voting (Transcript of Discussion)}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {244--255}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_34}, doi = {10.1007/978-3-642-22137-8\_34}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Blaze08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AvivCCCSSB08, author = {Adam J. Aviv and Pavol Cern{\'{y}} and Sandy Clark and Eric Cronin and Gaurav Shah and Micah Sherr and Matt Blaze}, editor = {David L. Dill and Tadayoshi Kohno}, title = {Security Evaluation of ES{\&}S Voting Machines and Election Management System}, booktitle = {2008 {USENIX/ACCURATE} Electronic Voting Workshop, {EVT} 2008, July 28-29, 2008, San Jose, CA, USA, Proceedings}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/evt08/tech/full\_papers/aviv/aviv.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/AvivCCCSSB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/BellovinBDLRN07, author = {Steven M. Bellovin and Matt Blaze and Whitfield Diffie and Susan Landau and Jennifer Rexford and Peter G. Neumann}, title = {Internal surveillance, external risks}, journal = {Commun. {ACM}}, volume = {50}, number = {12}, pages = {128}, year = {2007}, url = {https://doi.org/10.1145/1323688.1323717}, doi = {10.1145/1323688.1323717}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/BellovinBDLRN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/SherrCB07, author = {Micah Sherr and Eric Cronin and Matt Blaze}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Measurable Security through Isotropic Channels}, booktitle = {Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5964}, pages = {3--12}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-17773-6\_2}, doi = {10.1007/978-3-642-17773-6\_2}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/SherrCB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SherrLB07, author = {Micah Sherr and Boon Thau Loo and Matt Blaze}, title = {Towards Application-Aware Anonymous Routing}, booktitle = {2nd {USENIX} Workshop on Hot Topics in Security, HotSec'07, Boston, MA, USA, August 7, 2007}, publisher = {{USENIX} Association}, year = {2007}, url = {https://www.usenix.org/conference/hotsec-07/towards-application-aware-anonymous-routing}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/SherrLB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/CroninSB06, author = {Eric Cronin and Micah Sherr and Matt Blaze}, editor = {Martin S. Olivier and Sujeet Shenoi}, title = {On the Reliability of Network Eavesdropping Tools}, booktitle = {Advances in Digital Forensics {II} - {IFIP} International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29 - February 1, 2006}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {222}, pages = {199--213}, publisher = {Springer}, year = {2006}, url = {http://dl.ifip.org/db/conf/ifip11-9/df2006/CroninSB06.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-9/CroninSB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Blaze06, author = {Matt Blaze}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Composing Security Metrics}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {3--12}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_2}, doi = {10.1007/978-3-642-04904-0\_2}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/Blaze06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnandCSBK06, author = {Madhukar Anand and Eric Cronin and Micah Sherr and Matt Blaze and Sampath Kannan}, title = {Security Protocols with Isotropic Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {396}, year = {2006}, url = {http://eprint.iacr.org/2006/396}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnandCSBK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/BellovinBL05, author = {Steven M. Bellovin and Matt Blaze and Susan Landau}, title = {The real national-security needs for VoIP}, journal = {Commun. {ACM}}, volume = {48}, number = {11}, pages = {120}, year = {2005}, url = {https://doi.org/10.1145/1096000.1096030}, doi = {10.1145/1096000.1096030}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/BellovinBL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/SherrCCB05, author = {Micah Sherr and Eric Cronin and Sandy Clark and Matt Blaze}, title = {Signaling Vulnerabilities in Wiretapping Systems}, journal = {{IEEE} Secur. Priv.}, volume = {3}, number = {6}, pages = {13--25}, year = {2005}, url = {https://doi.org/10.1109/MSP.2005.160}, doi = {10.1109/MSP.2005.160}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/SherrCCB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lisa/Blaze05, author = {Matt Blaze}, editor = {David N. Blank{-}Edelman}, title = {Picking Locks with Cryptology}, booktitle = {Proceedings of the 19th Conference on Systems Administration {(LISA} 2005), December 4-9, 2005, San Diego, California, {USA}}, publisher = {{USENIX}}, year = {2005}, url = {http://www.usenix.org/events/lisa05/tech/mp3/blaze.mp3}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lisa/Blaze05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/CroninSB05, author = {Eric Cronin and Micah Sherr and Matt Blaze}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Listen Too Closely and You May Be Confused}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {245--249}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_30}, doi = {10.1007/978-3-540-77156-2\_30}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/CroninSB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Blaze05, author = {Matt Blaze}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Listen Too Closely and You May Be Confused}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {250--257}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_31}, doi = {10.1007/978-3-540-77156-2\_31}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Blaze05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AielloBBCIKR04, author = {William Aiello and Steven M. Bellovin and Matt Blaze and Ran Canetti and John Ioannidis and Angelos D. Keromytis and Omer Reingold}, title = {Just fast keying: Key agreement in a hostile internet}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {2}, pages = {242--273}, year = {2004}, url = {https://doi.org/10.1145/996943.996946}, doi = {10.1145/996943.996946}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AielloBBCIKR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Blaze04, author = {Matt Blaze}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Toward a Broader View of Security Protocols}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {106--120}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_12}, doi = {10.1007/11861386\_12}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/Blaze04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Blaze04a, author = {Matt Blaze}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Toward a Broader View of Security Protocols (Transcript of Discussion)}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {121--132}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_13}, doi = {10.1007/11861386\_13}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Blaze04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uss/2004, editor = {Matt Blaze}, title = {Proceedings of the 13th {USENIX} Security Symposium, August 9-13, 2004, San Diego, CA, {USA}}, publisher = {{USENIX}}, year = {2004}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Blaze03, author = {Matt Blaze}, title = {Rights Amplification in Master-Keyed Mechanical Locks}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {2}, pages = {24--32}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1193208}, doi = {10.1109/MSECP.2003.1193208}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Blaze03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip6-8/BlazeIIKNP03, author = {Matt Blaze and John Ioannidis and Sotiris Ioannidis and Angelos D. Keromytis and Pekka Nikander and Vassilis Prevelakis}, editor = {Marco Conti and Silvia Giordano and Enrico Gregori and Stephan Olariu}, title = {{TAPI:} Transactions for Accessing Public Infrastructure}, booktitle = {Personal Wireless Communications, {IFIP-TC6} 8th International Conference, {PWC} 2003, Venice, Italy, September 23-25, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2775}, pages = {90--100}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39867-7\_8}, doi = {10.1007/978-3-540-39867-7\_8}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ifip6-8/BlazeIIKNP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itrust/BlazeIK03, author = {Matt Blaze and John Ioannidis and Angelos D. Keromytis}, editor = {Paddy Nixon and Sotirios Terzis}, title = {Experience with the KeyNote Trust Management System: Applications and Future Directions}, booktitle = {Trust Management, First International Conference, iTrust 2003, Heraklion, Crete, Greece, May 28-30, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2692}, pages = {284--300}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-44875-6\_21}, doi = {10.1007/3-540-44875-6\_21}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/itrust/BlazeIK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BlazeIKMR03, author = {Matt Blaze and John Ioannidis and Angelos D. Keromytis and Tal Malkin and Aviel D. Rubin}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {{WAR:} Wireless Anonymous Routing}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {218--232}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_27}, doi = {10.1007/11542322\_27}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/BlazeIKMR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Blaze03, author = {Matt Blaze}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {{WAR:} Wireless Anonymous Routing (Discussion)}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {233--240}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_28}, doi = {10.1007/11542322\_28}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Blaze03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2002, editor = {Matt Blaze}, title = {Financial Cryptography, 6th International Conference, {FC} 2002, Southampton, Bermuda, March 11-14, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2357}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36504-4}, doi = {10.1007/3-540-36504-4}, isbn = {3-540-00646-X}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc3586, author = {Matt Blaze and Angelos D. Keromytis and Michael C. Richardson and Luis A. Sanchez}, title = {{IP} Security Policy {(IPSP)} Requirements}, journal = {{RFC}}, volume = {3586}, pages = {1--10}, year = {2003}, url = {https://doi.org/10.17487/RFC3586}, doi = {10.17487/RFC3586}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc3586.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BlazeIK02, author = {Matt Blaze and John Ioannidis and Angelos D. Keromytis}, title = {Trust management for IPsec}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {5}, number = {2}, pages = {95--118}, year = {2002}, url = {https://doi.org/10.1145/505586.505587}, doi = {10.1145/505586.505587}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BlazeIK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AielloBBIRCK02, author = {William Aiello and Steven M. Bellovin and Matt Blaze and John Ioannidis and Omer Reingold and Ran Canetti and Angelos D. Keromytis}, editor = {Vijayalakshmi Atluri}, title = {Efficient, DoS-resistant, secure key exchange for internet protocols}, booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002}, pages = {48--58}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/586110.586118}, doi = {10.1145/586110.586118}, timestamp = {Tue, 10 Nov 2020 20:00:47 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AielloBBIRCK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Blaze02, author = {Matt Blaze}, title = {Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {160}, year = {2002}, url = {http://eprint.iacr.org/2002/160}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Blaze02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BlazeIK01, author = {Matt Blaze and John Ioannidis and Angelos D. Keromytis}, editor = {Paul F. Syverson}, title = {Offline Micropayments without Trusted Hardware}, booktitle = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand Cayman, British West Indies, February 19-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2339}, pages = {21--40}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-46088-8\_2}, doi = {10.1007/3-540-46088-8\_2}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/BlazeIK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BlazeIK01, author = {Matt Blaze and John Ioannidis and Angelos D. Keromytis}, title = {Trust Management for IPsec}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2001, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2001}, url = {https://www.ndss-symposium.org/ndss2001/trust-management-ipsec/}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/BlazeIK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AielloBBCIKR01, author = {William Aiello and Steven M. Bellovin and Matt Blaze and Ran Canetti and John Ioannidis and Angelos D. Keromytis and Omer Reingold}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {27--39}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_5}, doi = {10.1007/3-540-45807-7\_5}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/AielloBBCIKR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Blaze01, author = {Matt Blaze}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols (Transcript of Discussion)}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {40--48}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_6}, doi = {10.1007/3-540-45807-7\_6}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Blaze01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/BlazeB00, author = {Matt Blaze and Steven M. Bellovin}, title = {Tapping on my network door}, journal = {Commun. {ACM}}, volume = {43}, number = {10}, pages = {136}, year = {2000}, url = {https://doi.org/10.1145/352183.352213}, doi = {10.1145/352183.352213}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/BlazeB00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Blaze00, author = {Matt Blaze}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {Looking on the Bright Side of Black-Box Cryptography (Transcript of Discussion)}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {54--61}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_9}, doi = {10.1007/3-540-44810-1\_9}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/Blaze00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/GligorBI00, author = {Virgil D. Gligor and Matt Blaze and John Ioannidis}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {Denial of Service - Panel Discussion}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {194--203}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_26}, doi = {10.1007/3-540-44810-1\_26}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/GligorBI00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc2792, author = {Matt Blaze and John Ioannidis and Angelos D. Keromytis}, title = {{DSA} and {RSA} Key and Signature Encoding for the KeyNote Trust Management System}, journal = {{RFC}}, volume = {2792}, pages = {1--7}, year = {2000}, url = {https://doi.org/10.17487/RFC2792}, doi = {10.17487/RFC2792}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc2792.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecoopw/BlazeFK99, author = {Matt Blaze and Joan Feigenbaum and Angelos D. Keromytis}, editor = {Jan Vitek and Christian Damsgaard Jensen}, title = {The Role of Trust Management in Distributed Systems Security}, booktitle = {Secure Internet Programming, Security Issues for Mobile and Distributed Objects}, series = {Lecture Notes in Computer Science}, volume = {1603}, pages = {185--210}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48749-2\_8}, doi = {10.1007/3-540-48749-2\_8}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/ecoopw/BlazeFK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soda/BlazeFN99, author = {Matt Blaze and Joan Feigenbaum and Moni Naor}, editor = {Robert Endre Tarjan and Tandy J. Warnow}, title = {A Formal Treatment of Remotely Keyed Encryption}, booktitle = {Proceedings of the Tenth Annual {ACM-SIAM} Symposium on Discrete Algorithms, 17-19 January 1999, Baltimore, Maryland, {USA}}, pages = {868--869}, publisher = {{ACM/SIAM}}, year = {1999}, url = {http://dl.acm.org/citation.cfm?id=314500.315056}, timestamp = {Thu, 05 Jul 2018 07:29:57 +0200}, biburl = {https://dblp.org/rec/conf/soda/BlazeFN99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BlazeIK99, author = {Matt Blaze and John Ioannidis and Angelos D. Keromytis}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Trust Management and Network Layer Security Protocols}, booktitle = {Security Protocols, 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1796}, pages = {103--118}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/10720107\_16}, doi = {10.1007/10720107\_16}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/BlazeIK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc2704, author = {Matt Blaze and Joan Feigenbaum and John Ioannidis and Angelos D. Keromytis}, title = {The KeyNote Trust-Management System Version 2}, journal = {{RFC}}, volume = {2704}, pages = {1--37}, year = {1999}, url = {https://doi.org/10.17487/RFC2704}, doi = {10.17487/RFC2704}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc2704.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BlazeBS98, author = {Matt Blaze and Gerrit Bleumer and Martin Strauss}, editor = {Kaisa Nyberg}, title = {Divertible Protocols and Atomic Proxy Cryptography}, booktitle = {Advances in Cryptology - {EUROCRYPT} '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1403}, pages = {127--144}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054122}, doi = {10.1007/BFB0054122}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BlazeBS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BlazeFN98, author = {Matt Blaze and Joan Feigenbaum and Moni Naor}, editor = {Kaisa Nyberg}, title = {A Formal Treatment of Remotely Keyed Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1403}, pages = {251--265}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054131}, doi = {10.1007/BFB0054131}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BlazeFN98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BlazeFS98, author = {Matt Blaze and Joan Feigenbaum and Martin Strauss}, editor = {Rafael Hirschfeld}, title = {Compliance Checking in the PolicyMaker Trust Management System}, booktitle = {Financial Cryptography, Second International Conference, FC'98, Anguilla, British West Indies, February 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1465}, pages = {254--274}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055488}, doi = {10.1007/BFB0055488}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/BlazeFS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BlazeFK98, author = {Matt Blaze and Joan Feigenbaum and Angelos D. Keromytis}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {KeyNote: Trust Management for Public-Key Infrastructures (Position Paper)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {59--63}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_9}, doi = {10.1007/3-540-49135-X\_9}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/BlazeFK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/BlazeFRS97, author = {Matt Blaze and Joan Feigenbaum and Paul Resnick and Martin Strauss}, title = {Managing trust in an information-labeling system}, journal = {Eur. Trans. Telecommun.}, volume = {8}, number = {5}, pages = {491--501}, year = {1997}, url = {https://doi.org/10.1002/ett.4460080507}, doi = {10.1002/ETT.4460080507}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/BlazeFRS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wwwj/AbelsonABBBDGNR97, author = {Hal Abelson and Ross J. Anderson and Steven M. Bellovin and Josh Benaloh and Matt Blaze and Whitfield Diffie and John Gilmore and Peter G. Neumann and Ronald L. Rivest and Jeffrey I. Schiller and Bruce Schneier}, title = {The risks of key recovery, key escrow, and trusted third-party encryption}, journal = {World Wide Web J.}, volume = {2}, pages = {241--257}, year = {1997}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wwwj/AbelsonABBBDGNR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Blaze96, author = {Matt Blaze}, editor = {Dieter Gollmann}, title = {High-Bandwidth Encryption with Low-Bandwidth Smartcards}, booktitle = {Fast Software Encryption, Third International Workshop, Cambridge, UK, February 21-23, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1039}, pages = {33--40}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-60865-6\_40}, doi = {10.1007/3-540-60865-6\_40}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/Blaze96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Blaze96, author = {Matt Blaze}, editor = {Ross J. Anderson}, title = {Oblevious Key Escrow}, booktitle = {Information Hiding, First International Workshop, Cambridge, UK, May 30 - June 1, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1174}, pages = {335--343}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-61996-8\_50}, doi = {10.1007/3-540-61996-8\_50}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/Blaze96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BlazeFL96, author = {Matt Blaze and Joan Feigenbaum and Jack Lacy}, title = {Decentralized Trust Management}, booktitle = {1996 {IEEE} Symposium on Security and Privacy, May 6-8, 1996, Oakland, CA, {USA}}, pages = {164--173}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/SECPRI.1996.502679}, doi = {10.1109/SECPRI.1996.502679}, timestamp = {Thu, 21 Sep 2023 15:57:36 +0200}, biburl = {https://dblp.org/rec/conf/sp/BlazeFL96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BlazeB95, author = {Matt Blaze and Steven M. Bellovin}, editor = {Frederick M. Avolio and Steven M. Bellovin}, title = {Session-Layer Encryption}, booktitle = {Proceedings of the 5th {USENIX} Security Symposium, Salt Lake City, Utah, USA, June 5-7, 1995}, publisher = {{USENIX} Association}, year = {1995}, url = {https://www.usenix.org/legacy/publications/library/proceedings/security95/blaze.html}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/BlazeB95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Blaze94, author = {Matt Blaze}, editor = {Dorothy E. Denning and Raymond Pyle and Ravi Ganesan and Ravi S. Sandhu}, title = {Protocol Failure in the Escrowed Encryption Standard}, booktitle = {{CCS} '94, Proceedings of the 2nd {ACM} Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 2-4, 1994}, pages = {59--67}, publisher = {{ACM}}, year = {1994}, url = {https://doi.org/10.1145/191177.191193}, doi = {10.1145/191177.191193}, timestamp = {Tue, 10 Nov 2020 20:00:24 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Blaze94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BlazeS94, author = {Matt Blaze and Bruce Schneier}, editor = {Bart Preneel}, title = {The MacGuffin Block Cipher Algorithm}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {97--110}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_8}, doi = {10.1007/3-540-60590-8\_8}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/BlazeS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/Blaze94, author = {Matt Blaze}, title = {Key Management in an Encrypting File System}, booktitle = {{USENIX} Summer 1994 Technical Conference, Boston, Massachusetts, USA, June 6-10, 1994, Conference Proceeding}, pages = {27--35}, publisher = {{USENIX} Association}, year = {1994}, url = {https://www.usenix.org/conference/usenix-summer-1994-technical-conference/key-management-encrypting-file-system}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/usenix/Blaze94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Blaze93, author = {Matt Blaze}, editor = {Dorothy E. Denning and Raymond Pyle and Ravi Ganesan and Ravi S. Sandhu and Victoria Ashby}, title = {A Cryptographic File System for {UNIX}}, booktitle = {{CCS} '93, Proceedings of the 1st {ACM} Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 3-5, 1993}, pages = {9--16}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/168588.168590}, doi = {10.1145/168588.168590}, timestamp = {Tue, 10 Nov 2020 20:00:40 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Blaze93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotos/Blaze93, author = {Matt Blaze}, title = {Transparent Mistrust: {OS} Support for Cryptography-in-the-Large}, booktitle = {Proceedings Fourth Workshop on Workstation Operating Systems, {WWOS} 1993, Napa, California, USA, October 14-15, 1993}, pages = {98--102}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/WWOS.1993.348165}, doi = {10.1109/WWOS.1993.348165}, timestamp = {Wed, 25 Mar 2020 13:28:30 +0100}, biburl = {https://dblp.org/rec/conf/hotos/Blaze93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/IoannidisB93, author = {John Ioannidis and Matt Blaze}, title = {The Architecture and Implementation of Network Layer Security in {UNIX}}, booktitle = {Proceedings of the 4th {USENIX} Security Symposium, Santa Clara, CA, USA, October 4-6, 1993}, publisher = {{USENIX} Association}, year = {1993}, timestamp = {Wed, 04 Jul 2018 13:06:34 +0200}, biburl = {https://dblp.org/rec/conf/uss/IoannidisB93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/BlazeA92, author = {Matt Blaze and Rafael Alonso}, title = {Dynamic Hierarchical Caching for Large-Scale Distributed File Systems}, booktitle = {Proceedings of the 12th International Conference on Distributed Computing Systems, Yokohama, Japan, June 9-12, 1992}, pages = {521--528}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/ICDCS.1992.235001}, doi = {10.1109/ICDCS.1992.235001}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/BlazeA92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/BlazeA91, author = {Matt Blaze and Rafael Alonso}, title = {Long-Term Caching Strategies for Very Large Distributed File Systems}, booktitle = {Proceedings of the Summer 1991 {USENIX} Conference, Nashville, TE, USA, June 1991}, pages = {3--16}, publisher = {{USENIX} Association}, year = {1991}, timestamp = {Thu, 15 May 2014 18:36:23 +0200}, biburl = {https://dblp.org/rec/conf/usenix/BlazeA91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.