Year |
Citation |
Score |
2016 |
Bellovin SM, Blaze M, Landau S. Insecure Surveillance: Technical Issues with Remote Computer Searches Computer. 49: 14-24. DOI: 10.1109/Mc.2016.68 |
0.368 |
|
2015 |
Abelson H, Anderson R, Bellovin SM, Benaloh J, Blaze M, Diffie W, Gilmore J, Green M, Landau S, Neumann PG, Rivest RL, Schiller JI, Schneier B, Specter MA, Weitzner DJ. Inside risks: Keys under doormats Communications of the Acm. 58: 24-26. DOI: 10.1145/2814825 |
0.431 |
|
2015 |
Abelson H, Anderson R, Bellovin SM, Benaloh J, Blaze M, Diffie W, Gilmore J, Green M, Landau S, Neumann PG, Rivest RL, Schiller JI, Schneier B, Specter MA, Weitzner DJ. Keys under doormats: mandating insecurity by requiring government access to all data and communications Journal of Cybersecurity. 1: 69-79. DOI: 10.1093/Cybsec/Tyv009 |
0.486 |
|
2014 |
Sherr M, Gill H, Saeed TA, Mao A, Marczak WR, Soundararajan S, Zhou W, Loo BT, Blaze M. The design and implementation of the A3 application-aware anonymity platform Computer Networks. 58: 206-227. DOI: 10.1016/J.Comnet.2013.09.021 |
0.377 |
|
2014 |
Aviv AJ, Blaze M, Sherr M, Smith JM. Privacy-aware message exchanges for HumaNets Computer Communications. 48: 30-43. DOI: 10.1016/J.Comcom.2014.03.013 |
0.394 |
|
2013 |
Bellovin SM, Blaze M, Clark S, Landau S. Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet Northwestern Journal of Technology and Intellectual Property. 12: 1. DOI: 10.2139/Ssrn.2312107 |
0.457 |
|
2013 |
Bellovin SM, Blaze M, Clark S, Landau S. Going bright: Wiretapping without weakening communications infrastructure Ieee Security and Privacy. 11: 62-72. DOI: 10.1109/MSP.2012.138 |
0.446 |
|
2013 |
Blaze M. Below the salt (transcript of discussion) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7028: 34-40. DOI: 10.1007/978-3-642-36213-2-6 |
0.313 |
|
2013 |
Blaze M, McDaniel P. Below the salt the dangers of unfulfilled physical media assumptions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7028: 24-27. DOI: 10.1007/978-3-642-36213-2-4 |
0.379 |
|
2012 |
Aviv AJ, Sherr M, Blaze M, Smith JM. Privacy-aware message exchanges for geographically routed human movement networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7459: 181-198. DOI: 10.1007/978-3-642-33167-1_11 |
0.338 |
|
2011 |
Blaze M. Bridging the gap between vulnerabilities and threats in electronic voting (transcript of discussion) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6615: 244-255. DOI: 10.1007/978-3-642-22137-8_34 |
0.305 |
|
2009 |
Blaze M, Ioannidis J, Keromytis AD, Malkin T, Rubin A. Anonymity in wireless broadcast networks International Journal of Network Security. 8: 37-51. DOI: 10.7916/D8183H1W |
0.404 |
|
2009 |
Sherr M, Shah G, Cronin E, Clark S, Blaze M. Can they hear me now? A security analysis of law enforcement wiretaps Proceedings of the Acm Conference On Computer and Communications Security. 512-523. DOI: 10.1145/1653662.1653724 |
0.437 |
|
2009 |
Blaze M, Kannan S, Lee I, Sokolsky O, Smith JM, Keromytis AD, Lee W. Dynamic trust management Computer. 42: 44-52. DOI: 10.1109/Mc.2009.51 |
0.341 |
|
2008 |
Cronin E, Sherr M, Blaze M. On the (un)reliability of eavesdropping International Journal of Security and Networks. 3: 103. DOI: 10.1504/Ijsn.2008.017223 |
0.342 |
|
2008 |
Bellovin SM, Blaze M, Diffie W, Landau S, Neumann PG, Rexford J. Risking communications security: Potential hazards of the Protect America Act Ieee Security and Privacy. 6: 24-33. DOI: 10.1109/MSP.2008.17 |
0.376 |
|
2006 |
Chowdhury PD, Christianson B, Malcolm J, Crispo B, Roe M, Blaze M, Massacci F. Anonymous authentication Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3957: 299-311. |
0.302 |
|
2006 |
Blaze M, Mitchell C, Stajano F, Massacci F, Lomas M, Clayton R, Christianson B, Gligor V, Serjantov A, Anderson R. Toward a broader view of security protocols Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3957: 106-132. |
0.328 |
|
2006 |
Christianson B, Blaze M. Introduction: Authentic privacy Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3957: 1-3. |
0.331 |
|
2006 |
Ylitalo J, Nikander P, Blaze M, Eronen P. BLIND: A complete identity protection framework for end-points Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3957: 163-178. |
0.381 |
|
2006 |
Popescu BC, Crispo B, Tanenbaum AS, Blaze M, Christianson B, Stajano F, Anderson R, Mitchell C, Roe M, Mayo B, Massacci F, Ozment A, Bond M, Danezis G, Murdoch S. Safe and private data sharing with turtle: Friends team-up and beat the system Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3957: 213-230. |
0.302 |
|
2006 |
Aura T, Zugenmaier A, Blaze M, Christianson B. Privacy, control and internet mobility Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3957: 133-150. |
0.342 |
|
2005 |
Bellovin SM, Blaze M, Landau S. The real national-security needs for VolP Communications of the Acm. 48: 120. DOI: 10.1145/1096000.1096030 |
0.483 |
|
2005 |
Blaze M, Ioannidis J, Keromytis AD, Malkin T, Rubin A. WAR: Wireless Anonymous Routing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3364: 218-232. DOI: 10.1007/11542322_27 |
0.343 |
|
2004 |
Aiello W, Bellovin SM, Blaze M, Canetti R, Ioannidis J, Keromytis AD, Reingold O. Just fast keying: Key agreement in a hostile internet Acm Transactions On Information and System Security. 7: 242-273. DOI: 10.1145/996943.996946 |
0.367 |
|
2003 |
Blaze M, Ioannidis J, Ioannidis S, Keromytis AD, Nikander P, Prevelakis V. TAPI: Transactions for accessing public infrastructure Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2775: 90-100. DOI: 10.1007/978-3-540-39867-7_8 |
0.314 |
|
2002 |
Aiello W, Bellovin SM, Blaze M, Canetti R, Ioannidis J, Keromytis AD, Reingold O. Efficient, DoS-resistant, secure key exchange for internet protocols Proceedings of the Acm Conference On Computer and Communications Security. 48-58. DOI: 10.1007/3-540-45807-7_5 |
0.357 |
|
1998 |
Blaze M, Feigenbaum J, Strauss M. Compliance checking in the policymaker trust management system Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1465: 254-274. DOI: 10.1007/BFb0055488 |
0.311 |
|
1998 |
Blaze M, Feigenbaum J, Naor M. A formal treatment of remotely keyed encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1403: 251-265. DOI: 10.1007/BFb0054131 |
0.37 |
|
1997 |
Abelson H, Anderson R, Bellovin SM, Benalob J, Blaze M, Diffie W, Gilmore J, Neumann PG, Rivest RL, Schiller JI, Schneier B. The risks of key recovery, key escrow, and trusted third-party encryption World Wide Web. 2: 241-257. DOI: 10.7916/D8Gm8F2W |
0.377 |
|
1994 |
Blaze M, Lacy J, London T, Reiter M. Issues and mechanisms for trustworthy systems: Creating transparent mistrust At&T Technical Journal. 73: 30-39. DOI: 10.1002/J.1538-7305.1994.Tb00608.X |
0.454 |
|
Show low-probability matches. |