Matthew Blaze - Publications

Affiliations: 
Computer and Information Science University of Pennsylvania, Philadelphia, PA, United States 
Area:
Networks: Security and Privacy

31 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2016 Bellovin SM, Blaze M, Landau S. Insecure Surveillance: Technical Issues with Remote Computer Searches Computer. 49: 14-24. DOI: 10.1109/Mc.2016.68  0.368
2015 Abelson H, Anderson R, Bellovin SM, Benaloh J, Blaze M, Diffie W, Gilmore J, Green M, Landau S, Neumann PG, Rivest RL, Schiller JI, Schneier B, Specter MA, Weitzner DJ. Inside risks: Keys under doormats Communications of the Acm. 58: 24-26. DOI: 10.1145/2814825  0.431
2015 Abelson H, Anderson R, Bellovin SM, Benaloh J, Blaze M, Diffie W, Gilmore J, Green M, Landau S, Neumann PG, Rivest RL, Schiller JI, Schneier B, Specter MA, Weitzner DJ. Keys under doormats: mandating insecurity by requiring government access to all data and communications Journal of Cybersecurity. 1: 69-79. DOI: 10.1093/Cybsec/Tyv009  0.486
2014 Sherr M, Gill H, Saeed TA, Mao A, Marczak WR, Soundararajan S, Zhou W, Loo BT, Blaze M. The design and implementation of the A3 application-aware anonymity platform Computer Networks. 58: 206-227. DOI: 10.1016/J.Comnet.2013.09.021  0.377
2014 Aviv AJ, Blaze M, Sherr M, Smith JM. Privacy-aware message exchanges for HumaNets Computer Communications. 48: 30-43. DOI: 10.1016/J.Comcom.2014.03.013  0.394
2013 Bellovin SM, Blaze M, Clark S, Landau S. Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet Northwestern Journal of Technology and Intellectual Property. 12: 1. DOI: 10.2139/Ssrn.2312107  0.457
2013 Bellovin SM, Blaze M, Clark S, Landau S. Going bright: Wiretapping without weakening communications infrastructure Ieee Security and Privacy. 11: 62-72. DOI: 10.1109/MSP.2012.138  0.446
2013 Blaze M. Below the salt (transcript of discussion) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7028: 34-40. DOI: 10.1007/978-3-642-36213-2-6  0.313
2013 Blaze M, McDaniel P. Below the salt the dangers of unfulfilled physical media assumptions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7028: 24-27. DOI: 10.1007/978-3-642-36213-2-4  0.379
2012 Aviv AJ, Sherr M, Blaze M, Smith JM. Privacy-aware message exchanges for geographically routed human movement networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7459: 181-198. DOI: 10.1007/978-3-642-33167-1_11  0.338
2011 Blaze M. Bridging the gap between vulnerabilities and threats in electronic voting (transcript of discussion) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6615: 244-255. DOI: 10.1007/978-3-642-22137-8_34  0.305
2009 Blaze M, Ioannidis J, Keromytis AD, Malkin T, Rubin A. Anonymity in wireless broadcast networks International Journal of Network Security. 8: 37-51. DOI: 10.7916/D8183H1W  0.404
2009 Sherr M, Shah G, Cronin E, Clark S, Blaze M. Can they hear me now? A security analysis of law enforcement wiretaps Proceedings of the Acm Conference On Computer and Communications Security. 512-523. DOI: 10.1145/1653662.1653724  0.437
2009 Blaze M, Kannan S, Lee I, Sokolsky O, Smith JM, Keromytis AD, Lee W. Dynamic trust management Computer. 42: 44-52. DOI: 10.1109/Mc.2009.51  0.341
2008 Cronin E, Sherr M, Blaze M. On the (un)reliability of eavesdropping International Journal of Security and Networks. 3: 103. DOI: 10.1504/Ijsn.2008.017223  0.342
2008 Bellovin SM, Blaze M, Diffie W, Landau S, Neumann PG, Rexford J. Risking communications security: Potential hazards of the Protect America Act Ieee Security and Privacy. 6: 24-33. DOI: 10.1109/MSP.2008.17  0.376
2006 Chowdhury PD, Christianson B, Malcolm J, Crispo B, Roe M, Blaze M, Massacci F. Anonymous authentication Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3957: 299-311.  0.302
2006 Blaze M, Mitchell C, Stajano F, Massacci F, Lomas M, Clayton R, Christianson B, Gligor V, Serjantov A, Anderson R. Toward a broader view of security protocols Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3957: 106-132.  0.328
2006 Christianson B, Blaze M. Introduction: Authentic privacy Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3957: 1-3.  0.331
2006 Ylitalo J, Nikander P, Blaze M, Eronen P. BLIND: A complete identity protection framework for end-points Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3957: 163-178.  0.381
2006 Popescu BC, Crispo B, Tanenbaum AS, Blaze M, Christianson B, Stajano F, Anderson R, Mitchell C, Roe M, Mayo B, Massacci F, Ozment A, Bond M, Danezis G, Murdoch S. Safe and private data sharing with turtle: Friends team-up and beat the system Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3957: 213-230.  0.302
2006 Aura T, Zugenmaier A, Blaze M, Christianson B. Privacy, control and internet mobility Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3957: 133-150.  0.342
2005 Bellovin SM, Blaze M, Landau S. The real national-security needs for VolP Communications of the Acm. 48: 120. DOI: 10.1145/1096000.1096030  0.483
2005 Blaze M, Ioannidis J, Keromytis AD, Malkin T, Rubin A. WAR: Wireless Anonymous Routing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3364: 218-232. DOI: 10.1007/11542322_27  0.343
2004 Aiello W, Bellovin SM, Blaze M, Canetti R, Ioannidis J, Keromytis AD, Reingold O. Just fast keying: Key agreement in a hostile internet Acm Transactions On Information and System Security. 7: 242-273. DOI: 10.1145/996943.996946  0.367
2003 Blaze M, Ioannidis J, Ioannidis S, Keromytis AD, Nikander P, Prevelakis V. TAPI: Transactions for accessing public infrastructure Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2775: 90-100. DOI: 10.1007/978-3-540-39867-7_8  0.314
2002 Aiello W, Bellovin SM, Blaze M, Canetti R, Ioannidis J, Keromytis AD, Reingold O. Efficient, DoS-resistant, secure key exchange for internet protocols Proceedings of the Acm Conference On Computer and Communications Security. 48-58. DOI: 10.1007/3-540-45807-7_5  0.357
1998 Blaze M, Feigenbaum J, Strauss M. Compliance checking in the policymaker trust management system Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1465: 254-274. DOI: 10.1007/BFb0055488  0.311
1998 Blaze M, Feigenbaum J, Naor M. A formal treatment of remotely keyed encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1403: 251-265. DOI: 10.1007/BFb0054131  0.37
1997 Abelson H, Anderson R, Bellovin SM, Benalob J, Blaze M, Diffie W, Gilmore J, Neumann PG, Rivest RL, Schiller JI, Schneier B. The risks of key recovery, key escrow, and trusted third-party encryption World Wide Web. 2: 241-257. DOI: 10.7916/D8Gm8F2W  0.377
1994 Blaze M, Lacy J, London T, Reiter M. Issues and mechanisms for trustworthy systems: Creating transparent mistrust At&T Technical Journal. 73: 30-39. DOI: 10.1002/J.1538-7305.1994.Tb00608.X  0.454
Show low-probability matches.