Matthew Blaze - Publications

Affiliations: 
Computer and Information Science University of Pennsylvania, Philadelphia, PA, United States 
Area:
Networks: Security and Privacy

31/80 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2016 Bellovin SM, Blaze M, Landau S. Insecure Surveillance: Technical Issues with Remote Computer Searches Computer. 49: 14-24. DOI: 10.1109/Mc.2016.68  0.368
2015 Abelson H, Anderson R, Bellovin SM, Benaloh J, Blaze M, Diffie W, Gilmore J, Green M, Landau S, Neumann PG, Rivest RL, Schiller JI, Schneier B, Specter MA, Weitzner DJ. Inside risks: Keys under doormats Communications of the Acm. 58: 24-26. DOI: 10.1145/2814825  0.431
2015 Abelson H, Anderson R, Bellovin SM, Benaloh J, Blaze M, Diffie W, Gilmore J, Green M, Landau S, Neumann PG, Rivest RL, Schiller JI, Schneier B, Specter MA, Weitzner DJ. Keys under doormats: mandating insecurity by requiring government access to all data and communications Journal of Cybersecurity. 1: 69-79. DOI: 10.1093/Cybsec/Tyv009  0.486
2014 Sherr M, Gill H, Saeed TA, Mao A, Marczak WR, Soundararajan S, Zhou W, Loo BT, Blaze M. The design and implementation of the A3 application-aware anonymity platform Computer Networks. 58: 206-227. DOI: 10.1016/J.Comnet.2013.09.021  0.377
2014 Aviv AJ, Blaze M, Sherr M, Smith JM. Privacy-aware message exchanges for HumaNets Computer Communications. 48: 30-43. DOI: 10.1016/J.Comcom.2014.03.013  0.394
2013 Bellovin SM, Blaze M, Clark S, Landau S. Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet Northwestern Journal of Technology and Intellectual Property. 12: 1. DOI: 10.2139/Ssrn.2312107  0.457
2013 Bellovin SM, Blaze M, Clark S, Landau S. Going bright: Wiretapping without weakening communications infrastructure Ieee Security and Privacy. 11: 62-72. DOI: 10.1109/MSP.2012.138  0.446
2013 Blaze M. Below the salt (transcript of discussion) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7028: 34-40. DOI: 10.1007/978-3-642-36213-2-6  0.313
2013 Blaze M, McDaniel P. Below the salt the dangers of unfulfilled physical media assumptions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7028: 24-27. DOI: 10.1007/978-3-642-36213-2-4  0.379
2012 Aviv AJ, Sherr M, Blaze M, Smith JM. Privacy-aware message exchanges for geographically routed human movement networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7459: 181-198. DOI: 10.1007/978-3-642-33167-1_11  0.338
2011 Blaze M. Bridging the gap between vulnerabilities and threats in electronic voting (transcript of discussion) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6615: 244-255. DOI: 10.1007/978-3-642-22137-8_34  0.305
2009 Blaze M, Ioannidis J, Keromytis AD, Malkin T, Rubin A. Anonymity in wireless broadcast networks International Journal of Network Security. 8: 37-51. DOI: 10.7916/D8183H1W  0.404
2009 Sherr M, Shah G, Cronin E, Clark S, Blaze M. Can they hear me now? A security analysis of law enforcement wiretaps Proceedings of the Acm Conference On Computer and Communications Security. 512-523. DOI: 10.1145/1653662.1653724  0.437
2009 Blaze M, Kannan S, Lee I, Sokolsky O, Smith JM, Keromytis AD, Lee W. Dynamic trust management Computer. 42: 44-52. DOI: 10.1109/Mc.2009.51  0.341
2008 Cronin E, Sherr M, Blaze M. On the (un)reliability of eavesdropping International Journal of Security and Networks. 3: 103. DOI: 10.1504/Ijsn.2008.017223  0.342
2008 Bellovin SM, Blaze M, Diffie W, Landau S, Neumann PG, Rexford J. Risking communications security: Potential hazards of the Protect America Act Ieee Security and Privacy. 6: 24-33. DOI: 10.1109/MSP.2008.17  0.376
2006 Chowdhury PD, Christianson B, Malcolm J, Crispo B, Roe M, Blaze M, Massacci F. Anonymous authentication Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3957: 299-311.  0.302
2006 Blaze M, Mitchell C, Stajano F, Massacci F, Lomas M, Clayton R, Christianson B, Gligor V, Serjantov A, Anderson R. Toward a broader view of security protocols Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3957: 106-132.  0.328
2006 Christianson B, Blaze M. Introduction: Authentic privacy Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3957: 1-3.  0.331
2006 Popescu BC, Crispo B, Tanenbaum AS, Blaze M, Christianson B, Stajano F, Anderson R, Mitchell C, Roe M, Mayo B, Massacci F, Ozment A, Bond M, Danezis G, Murdoch S. Safe and private data sharing with turtle: Friends team-up and beat the system Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3957: 213-230.  0.302
2006 Aura T, Zugenmaier A, Blaze M, Christianson B. Privacy, control and internet mobility Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3957: 133-150.  0.342
2006 Ylitalo J, Nikander P, Blaze M, Eronen P. BLIND: A complete identity protection framework for end-points Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3957: 163-178.  0.381
2005 Bellovin SM, Blaze M, Landau S. The real national-security needs for VolP Communications of the Acm. 48: 120. DOI: 10.1145/1096000.1096030  0.483
2005 Blaze M, Ioannidis J, Keromytis AD, Malkin T, Rubin A. WAR: Wireless Anonymous Routing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3364: 218-232. DOI: 10.1007/11542322_27  0.343
2004 Aiello W, Bellovin SM, Blaze M, Canetti R, Ioannidis J, Keromytis AD, Reingold O. Just fast keying: Key agreement in a hostile internet Acm Transactions On Information and System Security. 7: 242-273. DOI: 10.1145/996943.996946  0.367
2003 Blaze M, Ioannidis J, Ioannidis S, Keromytis AD, Nikander P, Prevelakis V. TAPI: Transactions for accessing public infrastructure Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2775: 90-100. DOI: 10.1007/978-3-540-39867-7_8  0.314
2002 Aiello W, Bellovin SM, Blaze M, Canetti R, Ioannidis J, Keromytis AD, Reingold O. Efficient, DoS-resistant, secure key exchange for internet protocols Proceedings of the Acm Conference On Computer and Communications Security. 48-58. DOI: 10.1007/3-540-45807-7_5  0.357
1998 Blaze M, Feigenbaum J, Strauss M. Compliance checking in the policymaker trust management system Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1465: 254-274. DOI: 10.1007/BFb0055488  0.311
1998 Blaze M, Feigenbaum J, Naor M. A formal treatment of remotely keyed encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1403: 251-265. DOI: 10.1007/BFb0054131  0.37
1997 Abelson H, Anderson R, Bellovin SM, Benalob J, Blaze M, Diffie W, Gilmore J, Neumann PG, Rivest RL, Schiller JI, Schneier B. The risks of key recovery, key escrow, and trusted third-party encryption World Wide Web. 2: 241-257. DOI: 10.7916/D8Gm8F2W  0.377
1994 Blaze M, Lacy J, London T, Reiter M. Issues and mechanisms for trustworthy systems: Creating transparent mistrust At&T Technical Journal. 73: 30-39. DOI: 10.1002/J.1538-7305.1994.Tb00608.X  0.454
Low-probability matches (unlikely to be authored by this person)
2006 Pashalidis A, Mitchell CJ, Christianson B, Wright R, Danezis G, Aura T, Blaze M, Claytol R, Stajano F, Pfitzmann B. Limits to anonymity when using credentials Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3957: 4-19.  0.286
2011 Blaze M, Clark S. Bridging the gap between vulnerabilities and threats in electronic voting: Abstract Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6615: 241-243. DOI: 10.1007/978-3-642-22137-8_33  0.282
2006 Lomas M, Malcolm J, Stajano F, Roe M, Eronen P, Clayton R, Matyas V, Anderson R, Danezis G, Christianson B, Aura T, Wheeler D, Massacci F, Popescu B, Mitchell C, ... Blaze M, et al. Why are we authenticating Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3957: 291-298.  0.278
2002 Blaze M, Ioannidis J, Keromytis AD. Offline micropayments without trusted hardware Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2339: 21-40.  0.276
2006 Burmester M, Desmedt Y, Wright RN, Yasinsac A, Blaze M, Aura T, Christianson B, Gligor V, Anderson R, Serjantov A, Danezis G, Crispo B, Clayton R, Eronen P. Accountable privacy Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3957: 83-105.  0.275
2000 Blaze M, Ioannidis J, Keromytis AD. Trust management and network layer security protocols Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1796: 103-108.  0.273
2002 Blaze M. Efficient, dos-resistant, secure key exchange for internet protocols (Transcript of discussion) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2467: 40-48. DOI: 10.1007/3-540-45807-7_6  0.27
1997 Blaze M, Feigenbaum J, Resnick P, Strauss M. Managing Trust in an Information-Labeling System European Transactions On Telecommunications. 8: 491-501. DOI: 10.1002/Ett.4460080507  0.268
2000 Blaze M. Trust management and network layer security protocols (Transcript of discussion) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1796: 109-118.  0.267
2009 Blaze M. Composing security metrics (Transcript of Discussion) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5087: 3-12. DOI: 10.1007/978-3-642-04904-0_2  0.262
2010 Sherr M, Cronin E, Blaze M. Measurable security through isotropic channels Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5964: 3-12. DOI: 10.1007/978-3-642-17773-6_2  0.255
1998 Blaze M, Bleumer G, Strauss M. Divertible protocols and atomic proxy cryptography Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1403: 127-144. DOI: 10.1007/BFb0054122  0.255
2006 Bangerter E, Camenisch J, Lysyanskaya A, Blaze M, Crispo B, Aura T, Christianson B, Popescu B, Massacci F, Eronen P, Danezis G, Mayo B. A cryptographic framework for the controlled release of certified data Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3957: 20-50.  0.252
1996 Blaze M. High-bandwidth encryption with low-bandwidth smartcards Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1039: 33-40. DOI: 10.1007/3-540-60865-6_40  0.252
2006 Stajano F, Blaze M, Aura T, Popescu B, Massacci F. One user, many hats; and, sometimes, no hat: Towards a secure yet usable PDA Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3957: 51-67.  0.249
2003 Blaze M, Ioannidis J, Keromytis AD. Experience with the KeyNote trust management system: Applications and future directions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2692: 284-300.  0.249
2003 Blaze M. Rights amplification in master-keyed mechanical locks Ieee Security and Privacy. 1: 24-32. DOI: 10.1109/MSECP.2003.1193208  0.244
1998 Blaze M, Feigenbaum J, Keromytis AD. Keynote: Trust management for public-key infrastructures Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1550: 59-63.  0.236
2006 Rissanen E, Firozabadi BS, Sergot M, Anderson R, Danezis G, Blaze M, Eronen P, Aura T. Towards a mechanism for discretionary overriding of access control Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3957: 312-323.  0.234
2009 Sherr M, Blaze M. Application containers without virtual machines Proceedings of the Acm Conference On Computer and Communications Security. 39-41. DOI: 10.1145/1655148.1655155  0.232
2007 Bellovin SM, Blaze M, Diffie W, Landau S, Rexford J, Neumann PG. Internal surveillance, external risks Communications of the Acm. 50: 128. DOI: 10.1145/1323688.1323717  0.225
2009 Blaze M. Taking surveillance out of the shadows Ieee Security and Privacy. 7: 75-77. DOI: 10.1109/MSP.2009.138  0.222
1996 Blaze M. Oblivious key escrow Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1174: 335-343.  0.211
2011 Clark S, Goodspeed T, Metzger P, Wasserman Z, Xu K, Blaze M. One-way cryptography Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7114: 336-340. DOI: 10.1007/978-3-642-25867-1_32  0.21
2005 Sherr M, Cronin E, Clark S, Blaze M. Signaling vulnerabilities in wiretapping systems Ieee Security and Privacy. 3: 13-25. DOI: 10.1109/MSP.2005.160  0.21
2009 West AG, Aviv AJ, Chang J, Prabhu VS, Blaze M, Kannan S, Lee I, Smith JM, Sokolsky O. QuanTM: A Quantitative Trust Management system Proceedings of the 2nd European Workshop On System Security, Eurosec'09. 28-35. DOI: 10.1145/1519144.1519149  0.205
1986 Robinson VB, Frank AU, Blaze MA. Expert systems applied to problems in geographic information systems: Introduction, review and prospects Computers, Environment and Urban Systems. 11: 161-173. DOI: 10.1016/0198-9715(86)90025-6  0.193
2012 Blaze M. The casino and the OODA Loop: Why our protocols always eventually fail (Transcript of discussion) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7622: 64-75. DOI: 10.1007/978-3-642-35694-0_9  0.19
2010 Clark S, Frei S, Blaze M, Smith J. Familiarity breeds contempt: The honeymoon effect and the role of legacy code in zero-day vulnerabilities Proceedings - Annual Computer Security Applications Conference, Acsac. 251-260. DOI: 10.1145/1920261.1920299  0.181
1986 Robinson VB, Frank AU, Blaze MA. Introduction to expert systems for land information systems Journal of Surveying Engineering. 112: 109-118. DOI: 10.1061/(Asce)0733-9453(1986)112:2(109)  0.179
2014 Clark S, Collis M, Blaze M, Smith JM. Moving targets: Security and rapid-release in Firefox Proceedings of the Acm Conference On Computer and Communications Security. 1256-1266. DOI: 10.1145/2660267.2660320  0.179
1986 Robinson VB, Frank AU, Blaze MA. Expert systems and geographic information systems: Review and prospects Journal of Surveying Engineering. 112: 119-130. DOI: 10.1061/(Asce)0733-9453(1986)112:2(119)  0.174
2006 Cronin E, Sherr M, Blaze M. On the reliability of network eavesdropping tools Ifip International Federation For Information Processing. 222: 199-213.  0.172
1985 Robinson VB, Thongs D, Blaze M. Natural language in geographic data processing systems Advanced Technology For Monitoring and Processing Global Environmental Data. Proc. Rss/Cerma Conference, London, 1985, (Remote Sensing Society, University of Reading). 67-74.  0.163
2011 Blaze M. Key escrow from a safe distance: Looking back at the clipper chip Acm International Conference Proceeding Series. 317-321. DOI: 10.1145/2076732.2076777  0.153
2009 Sherr M, Blaze M, Loo BT. Scalable link-based relay selection for anonymous routing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5672: 73-93. DOI: 10.1007/978-3-642-03168-7_5  0.138
2012 Aviv AJ, Sapp B, Blaze M, Smith JM. Practicality of accelerometer side channels on smartphones Acm International Conference Proceeding Series. 41-50. DOI: 10.1145/2420950.2420957  0.135
2001 Gligor V, Blaze M, Ioannidis J. Denial of service – Panel discussion Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2133: 194-203.  0.121
2015 Clark S, Blaze M, Smith JM. Smearing fingerprints: Changing the game of web tracking with composite privacy Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9379: 178-182. DOI: 10.1007/978-3-319-26096-9_19  0.116
2013 Blaze M. Is the honeymoon over? (Transcript of Discussion) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7028: 28-33. DOI: 10.1007/978-3-642-36213-2-5  0.098
1998 Miller CG, Lyons AA, Pye DW, Blaze M, Fasano GA, Horneye S. Dual Energy X-Ray Absorptiometry (DXA) transmission methodology in clinical trials Drug Information Journal. 32: 1165-1168.  0.087
2011 Blaze M. One-way cryptography (transcript of discussion) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7114: 341-358. DOI: 10.1007/978-3-642-25867-1_33  0.073
2001 Blaze M. Looking on the bright side of black-box cryptography (Transcript of discussion) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2133: 54-61.  0.046
2008 Bellovin SM, Blaze M, Diffie W, Landau S, Rexford J, Neumann PG. Authors' response [1] Communications of the Acm. 51: 9. DOI: 10.1145/1314215.1340926  0.042
2007 Cronin E, Sherr M, Blaze M. Listen too closely and you may be confused Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4631: 245-249.  0.04
2006 Bohm D, Lamming M, Mayo RN, Morgan J, Zhang K, Blaze M, Roe M, Clayton R, Christianson B, Aura T, Stajano F, Danezis G, Mitchell C, Lomas M, Gligor V, et al. Controlling who tracks me Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3957: 151-162.  0.039
2014 Clark S, Blaze M, Smith J. Blood in the water: Are there honeymoon effects outside software? Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7061: 12-17.  0.039
1989 Bradley DJ, Phillips-Howard PA, Bannister BA, Behrens R, Bell DR, Blackburn PJ, Blaze M, Bridgewood G, Bryceson A, Chiodini P, Clarke P, Colbourne MJ, Cook GC, Cowan GO, Draper CC, et al. Prophylaxis against malaria for travellers from the United Kingdom British Medical Journal. 299: 1087-1089. PMID 2511974  0.036
1995 Blaze M, Schneier B. The MacGuffin block cipher algorithm Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1008: 97-110.  0.016
Hide low-probability matches.