BibTeX records: Matt Blaze

download as .bib file

@article{DBLP:journals/cybersecurity/AbelsonABBBCDLNRSSTT24,
  author       = {Harold Abelson and
                  Ross J. Anderson and
                  Steven M. Bellovin and
                  Josh Benaloh and
                  Matt Blaze and
                  Jon Callas and
                  Whitfield Diffie and
                  Susan Landau and
                  Peter G. Neumann and
                  Ronald L. Rivest and
                  Jeffrey I. Schiller and
                  Bruce Schneier and
                  Vanessa Teague and
                  Carmela Troncoso},
  title        = {Bugs in our pockets: the risks of client-side scanning},
  journal      = {J. Cybersecur.},
  volume       = {10},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1093/cybsec/tyad020},
  doi          = {10.1093/CYBSEC/TYAD020},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/AbelsonABBBCDLNRSSTT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-07450,
  author       = {Hal Abelson and
                  Ross J. Anderson and
                  Steven M. Bellovin and
                  Josh Benaloh and
                  Matt Blaze and
                  Jon Callas and
                  Whitfield Diffie and
                  Susan Landau and
                  Peter G. Neumann and
                  Ronald L. Rivest and
                  Jeffrey I. Schiller and
                  Bruce Schneier and
                  Vanessa Teague and
                  Carmela Troncoso},
  title        = {Bugs in our Pockets: The Risks of Client-Side Scanning},
  journal      = {CoRR},
  volume       = {abs/2110.07450},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.07450},
  eprinttype    = {arXiv},
  eprint       = {2110.07450},
  timestamp    = {Fri, 22 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-07450.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/BellovinB016,
  author       = {Steven M. Bellovin and
                  Matt Blaze and
                  Susan Landau},
  title        = {Insecure Surveillance: Technical Issues with Remote Computer Searches},
  journal      = {Computer},
  volume       = {49},
  number       = {3},
  pages        = {14--24},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.68},
  doi          = {10.1109/MC.2016.68},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/BellovinB016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GutmannBBRS16,
  author       = {Peter Gutmann and
                  Steven M. Bellovin and
                  Matt Blaze and
                  Ronald L. Rivest and
                  Nigel P. Smart},
  title        = {An IBE-based Signcryption Scheme for Group Key Management},
  journal      = {CoRR},
  volume       = {abs/1603.09526},
  year         = {2016},
  url          = {http://arxiv.org/abs/1603.09526},
  eprinttype    = {arXiv},
  eprint       = {1603.09526},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GutmannBBRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/AbelsonABBBDGGL15,
  author       = {Harold Abelson and
                  Ross J. Anderson and
                  Steven M. Bellovin and
                  Josh Benaloh and
                  Matt Blaze and
                  Whitfield Diffie and
                  John Gilmore and
                  Matthew Green and
                  Susan Landau and
                  Peter G. Neumann and
                  Ronald L. Rivest and
                  Jeffrey I. Schiller and
                  Bruce Schneier and
                  Michael A. Specter and
                  Daniel J. Weitzner},
  title        = {Keys under doormats},
  journal      = {Commun. {ACM}},
  volume       = {58},
  number       = {10},
  pages        = {24--26},
  year         = {2015},
  url          = {https://doi.org/10.1145/2814825},
  doi          = {10.1145/2814825},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/AbelsonABBBDGGL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/AbelsonABBBDGG015,
  author       = {Harold Abelson and
                  Ross J. Anderson and
                  Steven M. Bellovin and
                  Josh Benaloh and
                  Matt Blaze and
                  Whitfield Diffie and
                  John Gilmore and
                  Matthew Green and
                  Susan Landau and
                  Peter G. Neumann and
                  Ronald L. Rivest and
                  Jeffrey I. Schiller and
                  Bruce Schneier and
                  Michael A. Specter and
                  Daniel J. Weitzner},
  title        = {Keys under doormats: mandating insecurity by requiring government
                  access to all data and communications},
  journal      = {J. Cybersecur.},
  volume       = {1},
  number       = {1},
  pages        = {69--79},
  year         = {2015},
  url          = {https://doi.org/10.1093/cybsec/tyv009},
  doi          = {10.1093/CYBSEC/TYV009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/AbelsonABBBDGG015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ClarkBS15,
  author       = {Sandy Clark and
                  Matt Blaze and
                  Jonathan M. Smith},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Smearing Fingerprints: Changing the Game of Web Tracking with Composite
                  Privacy},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {178--182},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_19},
  doi          = {10.1007/978-3-319-26096-9\_19},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ClarkBS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/SherrGSMMSZLB14,
  author       = {Micah Sherr and
                  Harjot Gill and
                  Taher Saeed and
                  Andrew Mao and
                  William R. Marczak and
                  Saravana Soundararajan and
                  Wenchao Zhou and
                  Boon Thau Loo and
                  Matt Blaze},
  title        = {The design and implementation of the A\({}^{\mbox{3}}\) application-aware
                  anonymity platform},
  journal      = {Comput. Networks},
  volume       = {58},
  pages        = {206--227},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.comnet.2013.09.021},
  doi          = {10.1016/J.COMNET.2013.09.021},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/SherrGSMMSZLB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/AvivBSS14,
  author       = {Adam J. Aviv and
                  Matt Blaze and
                  Micah Sherr and
                  Jonathan M. Smith},
  title        = {Privacy-aware message exchanges for HumaNets},
  journal      = {Comput. Commun.},
  volume       = {48},
  pages        = {30--43},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.comcom.2014.03.013},
  doi          = {10.1016/J.COMCOM.2014.03.013},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/AvivBSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ClarkCBS14,
  author       = {Sandy Clark and
                  Michael Collis and
                  Matt Blaze and
                  Jonathan M. Smith},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Moving Targets: Security and Rapid-Release in Firefox},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {1256--1266},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660320},
  doi          = {10.1145/2660267.2660320},
  timestamp    = {Tue, 10 Nov 2020 20:00:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ClarkCBS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BellovinBCL13,
  author       = {Steven M. Bellovin and
                  Matt Blaze and
                  Sandy Clark and
                  Susan Landau},
  title        = {Going Bright: Wiretapping without Weakening Communications Infrastructure},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {11},
  number       = {1},
  pages        = {62--72},
  year         = {2013},
  url          = {https://doi.org/10.1109/MSP.2012.138},
  doi          = {10.1109/MSP.2012.138},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BellovinBCL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AvivSBS12,
  author       = {Adam J. Aviv and
                  Benjamin Sapp and
                  Matt Blaze and
                  Jonathan M. Smith},
  editor       = {Robert H'obbes' Zakon},
  title        = {Practicality of accelerometer side channels on smartphones},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {41--50},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420957},
  doi          = {10.1145/2420950.2420957},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/AvivSBS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AvivSBS12,
  author       = {Adam J. Aviv and
                  Micah Sherr and
                  Matt Blaze and
                  Jonathan M. Smith},
  editor       = {Sara Foresti and
                  Moti Yung and
                  Fabio Martinelli},
  title        = {Privacy-Aware Message Exchanges for Geographically Routed Human Movement
                  Networks},
  booktitle    = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research
                  in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7459},
  pages        = {181--198},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33167-1\_11},
  doi          = {10.1007/978-3-642-33167-1\_11},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/AvivSBS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ClarkBS12,
  author       = {Sandy Clark and
                  Matt Blaze and
                  Jonathan M. Smith},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {The Casino and the {OODA} Loop - Why Our Protocols Always Eventually
                  Fail},
  booktitle    = {Security Protocols {XX} - 20th International Workshop, Cambridge,
                  UK, April 12-13, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7622},
  pages        = {60--63},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35694-0\_8},
  doi          = {10.1007/978-3-642-35694-0\_8},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ClarkBS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Blaze12,
  author       = {Matt Blaze},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {The Casino and the {OODA} Loop: Why Our Protocols Always Eventually
                  Fail (Transcript of Discussion)},
  booktitle    = {Security Protocols {XX} - 20th International Workshop, Cambridge,
                  UK, April 12-13, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7622},
  pages        = {64--75},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35694-0\_9},
  doi          = {10.1007/978-3-642-35694-0\_9},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Blaze12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ClarkWBLSSS12,
  author       = {Sandy Clark and
                  Chris Wacek and
                  Matt Blaze and
                  Boon Thau Loo and
                  Micah Sherr and
                  Clay Shields and
                  Jonathan M. Smith},
  editor       = {Sean Peisert and
                  Stephen Schwab},
  title        = {Collaborative Red Teaming for Anonymity System Evaluation},
  booktitle    = {5th Workshop on Cyber Security Experimentation and Test, {CSET} '12,
                  Bellevue, WA, USA, August 6, 2012},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/cset12/workshop-program/presentation/clark},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ClarkWBLSSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Blaze11,
  author       = {Matt Blaze},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {Key escrow from a safe distance: looking back at the Clipper Chip},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {317--321},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076777},
  doi          = {10.1145/2076732.2076777},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Blaze11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ClarkGMWXB11,
  author       = {Sandy Clark and
                  Travis Goodspeed and
                  Perry Metzger and
                  Zachary Wasserman and
                  Kevin Xu and
                  Matt Blaze},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {One-Way Cryptography},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {336--340},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_32},
  doi          = {10.1007/978-3-642-25867-1\_32},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ClarkGMWXB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Blaze11,
  author       = {Matt Blaze},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {One-Way Cryptography (Transcript of Discussion)},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {341--358},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_33},
  doi          = {10.1007/978-3-642-25867-1\_33},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Blaze11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ClarkGMWXB11,
  author       = {Sandy Clark and
                  Travis Goodspeed and
                  Perry Metzger and
                  Zachary Wasserman and
                  Kevin Xu and
                  Matt Blaze},
  title        = {Why (Special Agent) Johnny (Still) Can't Encrypt: {A} Security Analysis
                  of the {APCO} Project 25 Two-Way Radio System},
  booktitle    = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12,
                  2011, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {http://static.usenix.org/events/sec11/tech/full\_papers/Clark.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ClarkGMWXB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ClarkFBS10,
  author       = {Sandy Clark and
                  Stefan Frei and
                  Matt Blaze and
                  Jonathan M. Smith},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Familiarity breeds contempt: the honeymoon effect and the role of
                  legacy code in zero-day vulnerabilities},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {251--260},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920299},
  doi          = {10.1145/1920261.1920299},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ClarkFBS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/SherrMMZLB10,
  author       = {Micah Sherr and
                  Andrew Mao and
                  William R. Marczak and
                  Wenchao Zhou and
                  Boon Thau Loo and
                  Matt Blaze},
  title        = {{A3:} An Extensible Platform for Application-Aware Anonymity},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March
                  2010},
  publisher    = {The Internet Society},
  year         = {2010},
  url          = {https://www.ndss-symposium.org/ndss2010/a3-extensible-platform-application-aware-anonymity},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/SherrMMZLB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ClarkBS10,
  author       = {Sandy Clark and
                  Matt Blaze and
                  Jonathan M. Smith},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {Blood in the Water - Are there Honeymoon Effects Outside Software?},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {12--17},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_4},
  doi          = {10.1007/978-3-662-45921-8\_4},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ClarkBS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AvivSBS10,
  author       = {Adam J. Aviv and
                  Micah Sherr and
                  Matt Blaze and
                  Jonathan M. Smith},
  editor       = {Wietse Z. Venema},
  title        = {Evading Cellular Data Monitoring with Human Movement Networks},
  booktitle    = {5th {USENIX} Workshop on Hot Topics in Security, HotSec'10, Washington,
                  D.C., USA, August 10, 2010},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {https://www.usenix.org/conference/hotsec10/evading-cellular-data-monitoring-human-movement-networks},
  timestamp    = {Mon, 01 Feb 2021 08:43:16 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AvivSBS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/AvivGMBS10,
  author       = {Adam J. Aviv and
                  Katherine L. Gibson and
                  Evan Mossop and
                  Matt Blaze and
                  Jonathan M. Smith},
  editor       = {Charlie Miller and
                  Hovav Shacham},
  title        = {Smudge Attacks on Smartphone Touch Screens},
  booktitle    = {4th {USENIX} Workshop on Offensive Technologies, {WOOT} '10, Washington,
                  D.C., USA, August 9, 2010},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {https://www.usenix.org/conference/woot10/smudge-attacks-smartphone-touch-screens},
  timestamp    = {Mon, 01 Feb 2021 08:41:52 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/AvivGMBS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/BlazeKLSSKL09,
  author       = {Matt Blaze and
                  Sampath Kannan and
                  Insup Lee and
                  Oleg Sokolsky and
                  Jonathan M. Smith and
                  Angelos D. Keromytis and
                  Wenke Lee},
  title        = {Dynamic Trust Management},
  journal      = {Computer},
  volume       = {42},
  number       = {2},
  pages        = {44--52},
  year         = {2009},
  url          = {https://doi.org/10.1109/MC.2009.51},
  doi          = {10.1109/MC.2009.51},
  timestamp    = {Thu, 26 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/BlazeKLSSKL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Blaze09,
  author       = {Matt Blaze},
  title        = {Taking Surveillance Out of the Shadows},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {7},
  number       = {5},
  pages        = {75--77},
  year         = {2009},
  url          = {https://doi.org/10.1109/MSP.2009.138},
  doi          = {10.1109/MSP.2009.138},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Blaze09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/BlazeIKMR09,
  author       = {Matt Blaze and
                  John Ioannidis and
                  Angelos D. Keromytis and
                  Tal Malkin and
                  Aviel D. Rubin},
  title        = {Anonymity in Wireless Broadcast Networks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {37--51},
  year         = {2009},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v8-n1/ijns-2009-v8-n1-p37-51.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/BlazeIKMR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SherrB09,
  author       = {Micah Sherr and
                  Matt Blaze},
  editor       = {Angelos Stavrou},
  title        = {Application containers without virtual machines},
  booktitle    = {Proceedings of the 1st {ACM} Workshop on Virtual Machine Security,
                  VMSec '09, Chicago, Illinois, USA, November 9, 2009},
  pages        = {39--42},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655148.1655155},
  doi          = {10.1145/1655148.1655155},
  timestamp    = {Tue, 08 Feb 2022 13:20:18 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SherrB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SherrSCCB09,
  author       = {Micah Sherr and
                  Gaurav Shah and
                  Eric Cronin and
                  Sandy Clark and
                  Matt Blaze},
  editor       = {Ehab Al{-}Shaer and
                  Somesh Jha and
                  Angelos D. Keromytis},
  title        = {Can they hear me now?: a security analysis of law enforcement wiretaps},
  booktitle    = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages        = {512--523},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1653662.1653724},
  doi          = {10.1145/1653662.1653724},
  timestamp    = {Tue, 10 Nov 2020 19:58:07 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SherrSCCB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosec/WestACPBKLSS09,
  author       = {Andrew G. West and
                  Adam J. Aviv and
                  Jian Chang and
                  Vinayak S. Prabhu and
                  Matt Blaze and
                  Sampath Kannan and
                  Insup Lee and
                  Jonathan M. Smith and
                  Oleg Sokolsky},
  editor       = {Evangelos P. Markatos and
                  Manuel Costa},
  title        = {QuanTM: a quantitative trust management system},
  booktitle    = {Proceedings of the Second European Workshop on System Security, {EUROSEC}
                  2009, Nuremburg, Germany, March 31, 2009},
  pages        = {28--35},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1519144.1519149},
  doi          = {10.1145/1519144.1519149},
  timestamp    = {Thu, 26 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosec/WestACPBKLSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/SherrBL09,
  author       = {Micah Sherr and
                  Matt Blaze and
                  Boon Thau Loo},
  editor       = {Ian Goldberg and
                  Mikhail J. Atallah},
  title        = {Scalable Link-Based Relay Selection for Anonymous Routing},
  booktitle    = {Privacy Enhancing Technologies, 9th International Symposium, {PETS}
                  2009, Seattle, WA, USA, August 5-7, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5672},
  pages        = {73--93},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03168-7\_5},
  doi          = {10.1007/978-3-642-03168-7\_5},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/SherrBL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BlazeM09,
  author       = {Matt Blaze and
                  Patrick D. McDaniel},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Below the Salt},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {24--27},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_4},
  doi          = {10.1007/978-3-642-36213-2\_4},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BlazeM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Blaze09,
  author       = {Matt Blaze},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Is the Honeymoon over?},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {28--33},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_5},
  doi          = {10.1007/978-3-642-36213-2\_5},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Blaze09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Blaze09a,
  author       = {Matt Blaze},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Below the Salt},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {34--40},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_6},
  doi          = {10.1007/978-3-642-36213-2\_6},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Blaze09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/SherrBL09,
  author       = {Micah Sherr and
                  Matt Blaze and
                  Boon Thau Loo},
  editor       = {Geoffrey M. Voelker and
                  Alec Wolman},
  title        = {Veracity: Practical Secure Network Coordinates via Vote-based Agreements},
  booktitle    = {Proceedings of the 2009 {USENIX} Annual Technical Conference, {USENIX}
                  {ATC} 2009, San Diego, CA, USA, June 14-19, 2009},
  publisher    = {{USENIX} Association},
  year         = {2009},
  url          = {https://www.usenix.org/conference/usenix-09/veracity-practical-secure-network-coordinates-vote-based-agreements},
  timestamp    = {Tue, 16 Jul 2024 09:12:32 +0200},
  biburl       = {https://dblp.org/rec/conf/usenix/SherrBL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/ShahB09,
  author       = {Gaurav Shah and
                  Matt Blaze},
  editor       = {Dan Boneh and
                  Alexander Sotirov},
  title        = {Covert Channels through External Interference},
  booktitle    = {3rd {USENIX} Workshop on Offensive Technologies, {WOOT} 2009, Montreal,
                  Canada, August 10, 2009},
  pages        = {1--8},
  publisher    = {{USENIX} Association},
  year         = {2009},
  url          = {https://www.usenix.org/legacy/events/woot09/tech/full\_papers/shah.pdf},
  timestamp    = {Wed, 24 May 2023 10:25:04 +0200},
  biburl       = {https://dblp.org/rec/conf/woot/ShahB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BellovinBDSNR08,
  author       = {Steven M. Bellovin and
                  Matt Blaze and
                  Whitfield Diffie and
                  Susan Landau and
                  Peter G. Neumann and
                  Jennifer Rexford},
  title        = {Risking Communications Security: Potential Hazards of the Protect
                  America Act},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {6},
  number       = {1},
  pages        = {24--33},
  year         = {2008},
  url          = {https://doi.org/10.1109/MSP.2008.17},
  doi          = {10.1109/MSP.2008.17},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BellovinBDSNR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/CroninSB08,
  author       = {Eric Cronin and
                  Micah Sherr and
                  Matt Blaze},
  title        = {On the (un)reliability of eavesdropping},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {2},
  pages        = {103--113},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.017223},
  doi          = {10.1504/IJSN.2008.017223},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/CroninSB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptps/SherrLB08,
  author       = {Micah Sherr and
                  Boon Thau Loo and
                  Matt Blaze},
  editor       = {Adriana Iamnitchi and
                  Stefan Saroiu},
  title        = {Veracity: a fully decentralized service for securing network coordinate
                  systems},
  booktitle    = {Proceedings of the 7th international conference on Peer-to-peer systems,
                  IPTPS'08, Tampa, FL, USA, February 25-26, 2008},
  pages        = {15},
  publisher    = {{USENIX}},
  year         = {2008},
  url          = {http://www.iptps.org/papers-2008/36.pdf},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iptps/SherrLB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BlazeC08,
  author       = {Matt Blaze and
                  Sandy Clark},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Bridging the Gap between Vulnerabilities and Threats in Electronic
                  Voting - Abstract},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {241--243},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_33},
  doi          = {10.1007/978-3-642-22137-8\_33},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BlazeC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Blaze08,
  author       = {Matt Blaze},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Bridging the Gap between Vulnerabilities and Threats in Electronic
                  Voting (Transcript of Discussion)},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {244--255},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_34},
  doi          = {10.1007/978-3-642-22137-8\_34},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Blaze08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AvivCCCSSB08,
  author       = {Adam J. Aviv and
                  Pavol Cern{\'{y}} and
                  Sandy Clark and
                  Eric Cronin and
                  Gaurav Shah and
                  Micah Sherr and
                  Matt Blaze},
  editor       = {David L. Dill and
                  Tadayoshi Kohno},
  title        = {Security Evaluation of ES{\&}S Voting Machines and Election Management
                  System},
  booktitle    = {2008 {USENIX/ACCURATE} Electronic Voting Workshop, {EVT} 2008, July
                  28-29, 2008, San Jose, CA, USA, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/evt08/tech/full\_papers/aviv/aviv.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AvivCCCSSB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/BellovinBDLRN07,
  author       = {Steven M. Bellovin and
                  Matt Blaze and
                  Whitfield Diffie and
                  Susan Landau and
                  Jennifer Rexford and
                  Peter G. Neumann},
  title        = {Internal surveillance, external risks},
  journal      = {Commun. {ACM}},
  volume       = {50},
  number       = {12},
  pages        = {128},
  year         = {2007},
  url          = {https://doi.org/10.1145/1323688.1323717},
  doi          = {10.1145/1323688.1323717},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/BellovinBDLRN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/SherrCB07,
  author       = {Micah Sherr and
                  Eric Cronin and
                  Matt Blaze},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Measurable Security through Isotropic Channels},
  booktitle    = {Security Protocols - 15th International Workshop, Brno, Czech Republic,
                  April 18-20, 2007. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5964},
  pages        = {3--12},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-17773-6\_2},
  doi          = {10.1007/978-3-642-17773-6\_2},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/SherrCB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SherrLB07,
  author       = {Micah Sherr and
                  Boon Thau Loo and
                  Matt Blaze},
  title        = {Towards Application-Aware Anonymous Routing},
  booktitle    = {2nd {USENIX} Workshop on Hot Topics in Security, HotSec'07, Boston,
                  MA, USA, August 7, 2007},
  publisher    = {{USENIX} Association},
  year         = {2007},
  url          = {https://www.usenix.org/conference/hotsec-07/towards-application-aware-anonymous-routing},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/SherrLB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-9/CroninSB06,
  author       = {Eric Cronin and
                  Micah Sherr and
                  Matt Blaze},
  editor       = {Martin S. Olivier and
                  Sujeet Shenoi},
  title        = {On the Reliability of Network Eavesdropping Tools},
  booktitle    = {Advances in Digital Forensics {II} - {IFIP} International Conference
                  on Digital Forensics, National Centre for Forensic Science, Orlando,
                  Florida, USA, January 29 - February 1, 2006},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {222},
  pages        = {199--213},
  publisher    = {Springer},
  year         = {2006},
  url          = {http://dl.ifip.org/db/conf/ifip11-9/df2006/CroninSB06.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/CroninSB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Blaze06,
  author       = {Matt Blaze},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Composing Security Metrics},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {3--12},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_2},
  doi          = {10.1007/978-3-642-04904-0\_2},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Blaze06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnandCSBK06,
  author       = {Madhukar Anand and
                  Eric Cronin and
                  Micah Sherr and
                  Matt Blaze and
                  Sampath Kannan},
  title        = {Security Protocols with Isotropic Channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {396},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/396},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnandCSBK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/BellovinBL05,
  author       = {Steven M. Bellovin and
                  Matt Blaze and
                  Susan Landau},
  title        = {The real national-security needs for VoIP},
  journal      = {Commun. {ACM}},
  volume       = {48},
  number       = {11},
  pages        = {120},
  year         = {2005},
  url          = {https://doi.org/10.1145/1096000.1096030},
  doi          = {10.1145/1096000.1096030},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/BellovinBL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/SherrCCB05,
  author       = {Micah Sherr and
                  Eric Cronin and
                  Sandy Clark and
                  Matt Blaze},
  title        = {Signaling Vulnerabilities in Wiretapping Systems},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {3},
  number       = {6},
  pages        = {13--25},
  year         = {2005},
  url          = {https://doi.org/10.1109/MSP.2005.160},
  doi          = {10.1109/MSP.2005.160},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/SherrCCB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lisa/Blaze05,
  author       = {Matt Blaze},
  editor       = {David N. Blank{-}Edelman},
  title        = {Picking Locks with Cryptology},
  booktitle    = {Proceedings of the 19th Conference on Systems Administration {(LISA}
                  2005), December 4-9, 2005, San Diego, California, {USA}},
  publisher    = {{USENIX}},
  year         = {2005},
  url          = {http://www.usenix.org/events/lisa05/tech/mp3/blaze.mp3},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lisa/Blaze05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/CroninSB05,
  author       = {Eric Cronin and
                  Micah Sherr and
                  Matt Blaze},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Listen Too Closely and You May Be Confused},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {245--249},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_30},
  doi          = {10.1007/978-3-540-77156-2\_30},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/CroninSB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Blaze05,
  author       = {Matt Blaze},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Listen Too Closely and You May Be Confused},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {250--257},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_31},
  doi          = {10.1007/978-3-540-77156-2\_31},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Blaze05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AielloBBCIKR04,
  author       = {William Aiello and
                  Steven M. Bellovin and
                  Matt Blaze and
                  Ran Canetti and
                  John Ioannidis and
                  Angelos D. Keromytis and
                  Omer Reingold},
  title        = {Just fast keying: Key agreement in a hostile internet},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {2},
  pages        = {242--273},
  year         = {2004},
  url          = {https://doi.org/10.1145/996943.996946},
  doi          = {10.1145/996943.996946},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AielloBBCIKR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Blaze04,
  author       = {Matt Blaze},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Toward a Broader View of Security Protocols},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {106--120},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_12},
  doi          = {10.1007/11861386\_12},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Blaze04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Blaze04a,
  author       = {Matt Blaze},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Toward a Broader View of Security Protocols (Transcript of Discussion)},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {121--132},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_13},
  doi          = {10.1007/11861386\_13},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Blaze04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2004,
  editor       = {Matt Blaze},
  title        = {Proceedings of the 13th {USENIX} Security Symposium, August 9-13,
                  2004, San Diego, CA, {USA}},
  publisher    = {{USENIX}},
  year         = {2004},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Blaze03,
  author       = {Matt Blaze},
  title        = {Rights Amplification in Master-Keyed Mechanical Locks},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {2},
  pages        = {24--32},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1193208},
  doi          = {10.1109/MSECP.2003.1193208},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Blaze03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip6-8/BlazeIIKNP03,
  author       = {Matt Blaze and
                  John Ioannidis and
                  Sotiris Ioannidis and
                  Angelos D. Keromytis and
                  Pekka Nikander and
                  Vassilis Prevelakis},
  editor       = {Marco Conti and
                  Silvia Giordano and
                  Enrico Gregori and
                  Stephan Olariu},
  title        = {{TAPI:} Transactions for Accessing Public Infrastructure},
  booktitle    = {Personal Wireless Communications, {IFIP-TC6} 8th International Conference,
                  {PWC} 2003, Venice, Italy, September 23-25, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2775},
  pages        = {90--100},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39867-7\_8},
  doi          = {10.1007/978-3-540-39867-7\_8},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip6-8/BlazeIIKNP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itrust/BlazeIK03,
  author       = {Matt Blaze and
                  John Ioannidis and
                  Angelos D. Keromytis},
  editor       = {Paddy Nixon and
                  Sotirios Terzis},
  title        = {Experience with the KeyNote Trust Management System: Applications
                  and Future Directions},
  booktitle    = {Trust Management, First International Conference, iTrust 2003, Heraklion,
                  Crete, Greece, May 28-30, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2692},
  pages        = {284--300},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-44875-6\_21},
  doi          = {10.1007/3-540-44875-6\_21},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/itrust/BlazeIK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BlazeIKMR03,
  author       = {Matt Blaze and
                  John Ioannidis and
                  Angelos D. Keromytis and
                  Tal Malkin and
                  Aviel D. Rubin},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {{WAR:} Wireless Anonymous Routing},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {218--232},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_27},
  doi          = {10.1007/11542322\_27},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BlazeIKMR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Blaze03,
  author       = {Matt Blaze},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {{WAR:} Wireless Anonymous Routing (Discussion)},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {233--240},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_28},
  doi          = {10.1007/11542322\_28},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Blaze03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2002,
  editor       = {Matt Blaze},
  title        = {Financial Cryptography, 6th International Conference, {FC} 2002, Southampton,
                  Bermuda, March 11-14, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2357},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36504-4},
  doi          = {10.1007/3-540-36504-4},
  isbn         = {3-540-00646-X},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc3586,
  author       = {Matt Blaze and
                  Angelos D. Keromytis and
                  Michael C. Richardson and
                  Luis A. Sanchez},
  title        = {{IP} Security Policy {(IPSP)} Requirements},
  journal      = {{RFC}},
  volume       = {3586},
  pages        = {1--10},
  year         = {2003},
  url          = {https://doi.org/10.17487/RFC3586},
  doi          = {10.17487/RFC3586},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc3586.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BlazeIK02,
  author       = {Matt Blaze and
                  John Ioannidis and
                  Angelos D. Keromytis},
  title        = {Trust management for IPsec},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {5},
  number       = {2},
  pages        = {95--118},
  year         = {2002},
  url          = {https://doi.org/10.1145/505586.505587},
  doi          = {10.1145/505586.505587},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BlazeIK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AielloBBIRCK02,
  author       = {William Aiello and
                  Steven M. Bellovin and
                  Matt Blaze and
                  John Ioannidis and
                  Omer Reingold and
                  Ran Canetti and
                  Angelos D. Keromytis},
  editor       = {Vijayalakshmi Atluri},
  title        = {Efficient, DoS-resistant, secure key exchange for internet protocols},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages        = {48--58},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/586110.586118},
  doi          = {10.1145/586110.586118},
  timestamp    = {Tue, 10 Nov 2020 20:00:47 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AielloBBIRCK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Blaze02,
  author       = {Matt Blaze},
  title        = {Cryptology and Physical Security: Rights Amplification in Master-Keyed
                  Mechanical Locks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {160},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/160},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Blaze02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BlazeIK01,
  author       = {Matt Blaze and
                  John Ioannidis and
                  Angelos D. Keromytis},
  editor       = {Paul F. Syverson},
  title        = {Offline Micropayments without Trusted Hardware},
  booktitle    = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand
                  Cayman, British West Indies, February 19-22, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2339},
  pages        = {21--40},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-46088-8\_2},
  doi          = {10.1007/3-540-46088-8\_2},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/BlazeIK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BlazeIK01,
  author       = {Matt Blaze and
                  John Ioannidis and
                  Angelos D. Keromytis},
  title        = {Trust Management for IPsec},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2001, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2001},
  url          = {https://www.ndss-symposium.org/ndss2001/trust-management-ipsec/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/BlazeIK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AielloBBCIKR01,
  author       = {William Aiello and
                  Steven M. Bellovin and
                  Matt Blaze and
                  Ran Canetti and
                  John Ioannidis and
                  Angelos D. Keromytis and
                  Omer Reingold},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {27--39},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_5},
  doi          = {10.1007/3-540-45807-7\_5},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/AielloBBCIKR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Blaze01,
  author       = {Matt Blaze},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols
                  (Transcript of Discussion)},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {40--48},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_6},
  doi          = {10.1007/3-540-45807-7\_6},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Blaze01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/BlazeB00,
  author       = {Matt Blaze and
                  Steven M. Bellovin},
  title        = {Tapping on my network door},
  journal      = {Commun. {ACM}},
  volume       = {43},
  number       = {10},
  pages        = {136},
  year         = {2000},
  url          = {https://doi.org/10.1145/352183.352213},
  doi          = {10.1145/352183.352213},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/BlazeB00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Blaze00,
  author       = {Matt Blaze},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {Looking on the Bright Side of Black-Box Cryptography (Transcript of
                  Discussion)},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {54--61},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_9},
  doi          = {10.1007/3-540-44810-1\_9},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Blaze00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/GligorBI00,
  author       = {Virgil D. Gligor and
                  Matt Blaze and
                  John Ioannidis},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {Denial of Service - Panel Discussion},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {194--203},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_26},
  doi          = {10.1007/3-540-44810-1\_26},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/GligorBI00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc2792,
  author       = {Matt Blaze and
                  John Ioannidis and
                  Angelos D. Keromytis},
  title        = {{DSA} and {RSA} Key and Signature Encoding for the KeyNote Trust Management
                  System},
  journal      = {{RFC}},
  volume       = {2792},
  pages        = {1--7},
  year         = {2000},
  url          = {https://doi.org/10.17487/RFC2792},
  doi          = {10.17487/RFC2792},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc2792.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecoopw/BlazeFK99,
  author       = {Matt Blaze and
                  Joan Feigenbaum and
                  Angelos D. Keromytis},
  editor       = {Jan Vitek and
                  Christian Damsgaard Jensen},
  title        = {The Role of Trust Management in Distributed Systems Security},
  booktitle    = {Secure Internet Programming, Security Issues for Mobile and Distributed
                  Objects},
  series       = {Lecture Notes in Computer Science},
  volume       = {1603},
  pages        = {185--210},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48749-2\_8},
  doi          = {10.1007/3-540-48749-2\_8},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/ecoopw/BlazeFK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/BlazeFN99,
  author       = {Matt Blaze and
                  Joan Feigenbaum and
                  Moni Naor},
  editor       = {Robert Endre Tarjan and
                  Tandy J. Warnow},
  title        = {A Formal Treatment of Remotely Keyed Encryption},
  booktitle    = {Proceedings of the Tenth Annual {ACM-SIAM} Symposium on Discrete Algorithms,
                  17-19 January 1999, Baltimore, Maryland, {USA}},
  pages        = {868--869},
  publisher    = {{ACM/SIAM}},
  year         = {1999},
  url          = {http://dl.acm.org/citation.cfm?id=314500.315056},
  timestamp    = {Thu, 05 Jul 2018 07:29:57 +0200},
  biburl       = {https://dblp.org/rec/conf/soda/BlazeFN99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BlazeIK99,
  author       = {Matt Blaze and
                  John Ioannidis and
                  Angelos D. Keromytis},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Trust Management and Network Layer Security Protocols},
  booktitle    = {Security Protocols, 7th International Workshop, Cambridge, UK, April
                  19-21, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1796},
  pages        = {103--118},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/10720107\_16},
  doi          = {10.1007/10720107\_16},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BlazeIK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc2704,
  author       = {Matt Blaze and
                  Joan Feigenbaum and
                  John Ioannidis and
                  Angelos D. Keromytis},
  title        = {The KeyNote Trust-Management System Version 2},
  journal      = {{RFC}},
  volume       = {2704},
  pages        = {1--37},
  year         = {1999},
  url          = {https://doi.org/10.17487/RFC2704},
  doi          = {10.17487/RFC2704},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc2704.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BlazeBS98,
  author       = {Matt Blaze and
                  Gerrit Bleumer and
                  Martin Strauss},
  editor       = {Kaisa Nyberg},
  title        = {Divertible Protocols and Atomic Proxy Cryptography},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '98, International Conference
                  on the Theory and Application of Cryptographic Techniques, Espoo,
                  Finland, May 31 - June 4, 1998, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1403},
  pages        = {127--144},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054122},
  doi          = {10.1007/BFB0054122},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BlazeBS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BlazeFN98,
  author       = {Matt Blaze and
                  Joan Feigenbaum and
                  Moni Naor},
  editor       = {Kaisa Nyberg},
  title        = {A Formal Treatment of Remotely Keyed Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '98, International Conference
                  on the Theory and Application of Cryptographic Techniques, Espoo,
                  Finland, May 31 - June 4, 1998, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1403},
  pages        = {251--265},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054131},
  doi          = {10.1007/BFB0054131},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BlazeFN98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BlazeFS98,
  author       = {Matt Blaze and
                  Joan Feigenbaum and
                  Martin Strauss},
  editor       = {Rafael Hirschfeld},
  title        = {Compliance Checking in the PolicyMaker Trust Management System},
  booktitle    = {Financial Cryptography, Second International Conference, FC'98, Anguilla,
                  British West Indies, February 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1465},
  pages        = {254--274},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055488},
  doi          = {10.1007/BFB0055488},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/BlazeFS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BlazeFK98,
  author       = {Matt Blaze and
                  Joan Feigenbaum and
                  Angelos D. Keromytis},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {KeyNote: Trust Management for Public-Key Infrastructures (Position
                  Paper)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {59--63},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_9},
  doi          = {10.1007/3-540-49135-X\_9},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BlazeFK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/BlazeFRS97,
  author       = {Matt Blaze and
                  Joan Feigenbaum and
                  Paul Resnick and
                  Martin Strauss},
  title        = {Managing trust in an information-labeling system},
  journal      = {Eur. Trans. Telecommun.},
  volume       = {8},
  number       = {5},
  pages        = {491--501},
  year         = {1997},
  url          = {https://doi.org/10.1002/ett.4460080507},
  doi          = {10.1002/ETT.4460080507},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/BlazeFRS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wwwj/AbelsonABBBDGNR97,
  author       = {Hal Abelson and
                  Ross J. Anderson and
                  Steven M. Bellovin and
                  Josh Benaloh and
                  Matt Blaze and
                  Whitfield Diffie and
                  John Gilmore and
                  Peter G. Neumann and
                  Ronald L. Rivest and
                  Jeffrey I. Schiller and
                  Bruce Schneier},
  title        = {The risks of key recovery, key escrow, and trusted third-party encryption},
  journal      = {World Wide Web J.},
  volume       = {2},
  pages        = {241--257},
  year         = {1997},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wwwj/AbelsonABBBDGNR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Blaze96,
  author       = {Matt Blaze},
  editor       = {Dieter Gollmann},
  title        = {High-Bandwidth Encryption with Low-Bandwidth Smartcards},
  booktitle    = {Fast Software Encryption, Third International Workshop, Cambridge,
                  UK, February 21-23, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1039},
  pages        = {33--40},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-60865-6\_40},
  doi          = {10.1007/3-540-60865-6\_40},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Blaze96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Blaze96,
  author       = {Matt Blaze},
  editor       = {Ross J. Anderson},
  title        = {Oblevious Key Escrow},
  booktitle    = {Information Hiding, First International Workshop, Cambridge, UK, May
                  30 - June 1, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1174},
  pages        = {335--343},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-61996-8\_50},
  doi          = {10.1007/3-540-61996-8\_50},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Blaze96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BlazeFL96,
  author       = {Matt Blaze and
                  Joan Feigenbaum and
                  Jack Lacy},
  title        = {Decentralized Trust Management},
  booktitle    = {1996 {IEEE} Symposium on Security and Privacy, May 6-8, 1996, Oakland,
                  CA, {USA}},
  pages        = {164--173},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/SECPRI.1996.502679},
  doi          = {10.1109/SECPRI.1996.502679},
  timestamp    = {Thu, 21 Sep 2023 15:57:36 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BlazeFL96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BlazeB95,
  author       = {Matt Blaze and
                  Steven M. Bellovin},
  editor       = {Frederick M. Avolio and
                  Steven M. Bellovin},
  title        = {Session-Layer Encryption},
  booktitle    = {Proceedings of the 5th {USENIX} Security Symposium, Salt Lake City,
                  Utah, USA, June 5-7, 1995},
  publisher    = {{USENIX} Association},
  year         = {1995},
  url          = {https://www.usenix.org/legacy/publications/library/proceedings/security95/blaze.html},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BlazeB95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Blaze94,
  author       = {Matt Blaze},
  editor       = {Dorothy E. Denning and
                  Raymond Pyle and
                  Ravi Ganesan and
                  Ravi S. Sandhu},
  title        = {Protocol Failure in the Escrowed Encryption Standard},
  booktitle    = {{CCS} '94, Proceedings of the 2nd {ACM} Conference on Computer and
                  Communications Security, Fairfax, Virginia, USA, November 2-4, 1994},
  pages        = {59--67},
  publisher    = {{ACM}},
  year         = {1994},
  url          = {https://doi.org/10.1145/191177.191193},
  doi          = {10.1145/191177.191193},
  timestamp    = {Tue, 10 Nov 2020 20:00:24 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Blaze94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BlazeS94,
  author       = {Matt Blaze and
                  Bruce Schneier},
  editor       = {Bart Preneel},
  title        = {The MacGuffin Block Cipher Algorithm},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {97--110},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_8},
  doi          = {10.1007/3-540-60590-8\_8},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BlazeS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/Blaze94,
  author       = {Matt Blaze},
  title        = {Key Management in an Encrypting File System},
  booktitle    = {{USENIX} Summer 1994 Technical Conference, Boston, Massachusetts,
                  USA, June 6-10, 1994, Conference Proceeding},
  pages        = {27--35},
  publisher    = {{USENIX} Association},
  year         = {1994},
  url          = {https://www.usenix.org/conference/usenix-summer-1994-technical-conference/key-management-encrypting-file-system},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/usenix/Blaze94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Blaze93,
  author       = {Matt Blaze},
  editor       = {Dorothy E. Denning and
                  Raymond Pyle and
                  Ravi Ganesan and
                  Ravi S. Sandhu and
                  Victoria Ashby},
  title        = {A Cryptographic File System for {UNIX}},
  booktitle    = {{CCS} '93, Proceedings of the 1st {ACM} Conference on Computer and
                  Communications Security, Fairfax, Virginia, USA, November 3-5, 1993},
  pages        = {9--16},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/168588.168590},
  doi          = {10.1145/168588.168590},
  timestamp    = {Tue, 10 Nov 2020 20:00:40 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Blaze93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotos/Blaze93,
  author       = {Matt Blaze},
  title        = {Transparent Mistrust: {OS} Support for Cryptography-in-the-Large},
  booktitle    = {Proceedings Fourth Workshop on Workstation Operating Systems, {WWOS}
                  1993, Napa, California, USA, October 14-15, 1993},
  pages        = {98--102},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/WWOS.1993.348165},
  doi          = {10.1109/WWOS.1993.348165},
  timestamp    = {Wed, 25 Mar 2020 13:28:30 +0100},
  biburl       = {https://dblp.org/rec/conf/hotos/Blaze93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/IoannidisB93,
  author       = {John Ioannidis and
                  Matt Blaze},
  title        = {The Architecture and Implementation of Network Layer Security in {UNIX}},
  booktitle    = {Proceedings of the 4th {USENIX} Security Symposium, Santa Clara, CA,
                  USA, October 4-6, 1993},
  publisher    = {{USENIX} Association},
  year         = {1993},
  timestamp    = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/IoannidisB93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/BlazeA92,
  author       = {Matt Blaze and
                  Rafael Alonso},
  title        = {Dynamic Hierarchical Caching for Large-Scale Distributed File Systems},
  booktitle    = {Proceedings of the 12th International Conference on Distributed Computing
                  Systems, Yokohama, Japan, June 9-12, 1992},
  pages        = {521--528},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/ICDCS.1992.235001},
  doi          = {10.1109/ICDCS.1992.235001},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/BlazeA92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/BlazeA91,
  author       = {Matt Blaze and
                  Rafael Alonso},
  title        = {Long-Term Caching Strategies for Very Large Distributed File Systems},
  booktitle    = {Proceedings of the Summer 1991 {USENIX} Conference, Nashville, TE,
                  USA, June 1991},
  pages        = {3--16},
  publisher    = {{USENIX} Association},
  year         = {1991},
  timestamp    = {Thu, 15 May 2014 18:36:23 +0200},
  biburl       = {https://dblp.org/rec/conf/usenix/BlazeA91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}