Year |
Citation |
Score |
2016 |
Bellovin SM, Blaze M, Landau S. Insecure Surveillance: Technical Issues with Remote Computer Searches Computer. 49: 14-24. DOI: 10.1109/Mc.2016.68 |
0.368 |
|
2015 |
Abelson H, Anderson R, Bellovin SM, Benaloh J, Blaze M, Diffie W, Gilmore J, Green M, Landau S, Neumann PG, Rivest RL, Schiller JI, Schneier B, Specter MA, Weitzner DJ. Inside risks: Keys under doormats Communications of the Acm. 58: 24-26. DOI: 10.1145/2814825 |
0.431 |
|
2015 |
Abelson H, Anderson R, Bellovin SM, Benaloh J, Blaze M, Diffie W, Gilmore J, Green M, Landau S, Neumann PG, Rivest RL, Schiller JI, Schneier B, Specter MA, Weitzner DJ. Keys under doormats: mandating insecurity by requiring government access to all data and communications Journal of Cybersecurity. 1: 69-79. DOI: 10.1093/Cybsec/Tyv009 |
0.486 |
|
2014 |
Sherr M, Gill H, Saeed TA, Mao A, Marczak WR, Soundararajan S, Zhou W, Loo BT, Blaze M. The design and implementation of the A3 application-aware anonymity platform Computer Networks. 58: 206-227. DOI: 10.1016/J.Comnet.2013.09.021 |
0.377 |
|
2014 |
Aviv AJ, Blaze M, Sherr M, Smith JM. Privacy-aware message exchanges for HumaNets Computer Communications. 48: 30-43. DOI: 10.1016/J.Comcom.2014.03.013 |
0.394 |
|
2013 |
Bellovin SM, Blaze M, Clark S, Landau S. Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet Northwestern Journal of Technology and Intellectual Property. 12: 1. DOI: 10.2139/Ssrn.2312107 |
0.457 |
|
2013 |
Bellovin SM, Blaze M, Clark S, Landau S. Going bright: Wiretapping without weakening communications infrastructure Ieee Security and Privacy. 11: 62-72. DOI: 10.1109/MSP.2012.138 |
0.446 |
|
2013 |
Blaze M. Below the salt (transcript of discussion) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7028: 34-40. DOI: 10.1007/978-3-642-36213-2-6 |
0.313 |
|
2013 |
Blaze M, McDaniel P. Below the salt the dangers of unfulfilled physical media assumptions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7028: 24-27. DOI: 10.1007/978-3-642-36213-2-4 |
0.379 |
|
2012 |
Aviv AJ, Sherr M, Blaze M, Smith JM. Privacy-aware message exchanges for geographically routed human movement networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7459: 181-198. DOI: 10.1007/978-3-642-33167-1_11 |
0.338 |
|
2011 |
Blaze M. Bridging the gap between vulnerabilities and threats in electronic voting (transcript of discussion) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6615: 244-255. DOI: 10.1007/978-3-642-22137-8_34 |
0.305 |
|
2009 |
Blaze M, Ioannidis J, Keromytis AD, Malkin T, Rubin A. Anonymity in wireless broadcast networks International Journal of Network Security. 8: 37-51. DOI: 10.7916/D8183H1W |
0.404 |
|
2009 |
Sherr M, Shah G, Cronin E, Clark S, Blaze M. Can they hear me now? A security analysis of law enforcement wiretaps Proceedings of the Acm Conference On Computer and Communications Security. 512-523. DOI: 10.1145/1653662.1653724 |
0.437 |
|
2009 |
Blaze M, Kannan S, Lee I, Sokolsky O, Smith JM, Keromytis AD, Lee W. Dynamic trust management Computer. 42: 44-52. DOI: 10.1109/Mc.2009.51 |
0.341 |
|
2008 |
Cronin E, Sherr M, Blaze M. On the (un)reliability of eavesdropping International Journal of Security and Networks. 3: 103. DOI: 10.1504/Ijsn.2008.017223 |
0.342 |
|
2008 |
Bellovin SM, Blaze M, Diffie W, Landau S, Neumann PG, Rexford J. Risking communications security: Potential hazards of the Protect America Act Ieee Security and Privacy. 6: 24-33. DOI: 10.1109/MSP.2008.17 |
0.376 |
|
2006 |
Chowdhury PD, Christianson B, Malcolm J, Crispo B, Roe M, Blaze M, Massacci F. Anonymous authentication Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3957: 299-311. |
0.302 |
|
2006 |
Blaze M, Mitchell C, Stajano F, Massacci F, Lomas M, Clayton R, Christianson B, Gligor V, Serjantov A, Anderson R. Toward a broader view of security protocols Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3957: 106-132. |
0.328 |
|
2006 |
Christianson B, Blaze M. Introduction: Authentic privacy Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3957: 1-3. |
0.331 |
|
2006 |
Popescu BC, Crispo B, Tanenbaum AS, Blaze M, Christianson B, Stajano F, Anderson R, Mitchell C, Roe M, Mayo B, Massacci F, Ozment A, Bond M, Danezis G, Murdoch S. Safe and private data sharing with turtle: Friends team-up and beat the system Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3957: 213-230. |
0.302 |
|
2006 |
Aura T, Zugenmaier A, Blaze M, Christianson B. Privacy, control and internet mobility Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3957: 133-150. |
0.342 |
|
2006 |
Ylitalo J, Nikander P, Blaze M, Eronen P. BLIND: A complete identity protection framework for end-points Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3957: 163-178. |
0.381 |
|
2005 |
Bellovin SM, Blaze M, Landau S. The real national-security needs for VolP Communications of the Acm. 48: 120. DOI: 10.1145/1096000.1096030 |
0.483 |
|
2005 |
Blaze M, Ioannidis J, Keromytis AD, Malkin T, Rubin A. WAR: Wireless Anonymous Routing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3364: 218-232. DOI: 10.1007/11542322_27 |
0.343 |
|
2004 |
Aiello W, Bellovin SM, Blaze M, Canetti R, Ioannidis J, Keromytis AD, Reingold O. Just fast keying: Key agreement in a hostile internet Acm Transactions On Information and System Security. 7: 242-273. DOI: 10.1145/996943.996946 |
0.367 |
|
2003 |
Blaze M, Ioannidis J, Ioannidis S, Keromytis AD, Nikander P, Prevelakis V. TAPI: Transactions for accessing public infrastructure Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2775: 90-100. DOI: 10.1007/978-3-540-39867-7_8 |
0.314 |
|
2002 |
Aiello W, Bellovin SM, Blaze M, Canetti R, Ioannidis J, Keromytis AD, Reingold O. Efficient, DoS-resistant, secure key exchange for internet protocols Proceedings of the Acm Conference On Computer and Communications Security. 48-58. DOI: 10.1007/3-540-45807-7_5 |
0.357 |
|
1998 |
Blaze M, Feigenbaum J, Strauss M. Compliance checking in the policymaker trust management system Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1465: 254-274. DOI: 10.1007/BFb0055488 |
0.311 |
|
1998 |
Blaze M, Feigenbaum J, Naor M. A formal treatment of remotely keyed encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1403: 251-265. DOI: 10.1007/BFb0054131 |
0.37 |
|
1997 |
Abelson H, Anderson R, Bellovin SM, Benalob J, Blaze M, Diffie W, Gilmore J, Neumann PG, Rivest RL, Schiller JI, Schneier B. The risks of key recovery, key escrow, and trusted third-party encryption World Wide Web. 2: 241-257. DOI: 10.7916/D8Gm8F2W |
0.377 |
|
1994 |
Blaze M, Lacy J, London T, Reiter M. Issues and mechanisms for trustworthy systems: Creating transparent mistrust At&T Technical Journal. 73: 30-39. DOI: 10.1002/J.1538-7305.1994.Tb00608.X |
0.454 |
|
Low-probability matches (unlikely to be authored by this person) |
2006 |
Pashalidis A, Mitchell CJ, Christianson B, Wright R, Danezis G, Aura T, Blaze M, Claytol R, Stajano F, Pfitzmann B. Limits to anonymity when using credentials Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3957: 4-19. |
0.286 |
|
2011 |
Blaze M, Clark S. Bridging the gap between vulnerabilities and threats in electronic voting: Abstract Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6615: 241-243. DOI: 10.1007/978-3-642-22137-8_33 |
0.282 |
|
2006 |
Lomas M, Malcolm J, Stajano F, Roe M, Eronen P, Clayton R, Matyas V, Anderson R, Danezis G, Christianson B, Aura T, Wheeler D, Massacci F, Popescu B, Mitchell C, ... Blaze M, et al. Why are we authenticating Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3957: 291-298. |
0.278 |
|
2002 |
Blaze M, Ioannidis J, Keromytis AD. Offline micropayments without trusted hardware Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2339: 21-40. |
0.276 |
|
2006 |
Burmester M, Desmedt Y, Wright RN, Yasinsac A, Blaze M, Aura T, Christianson B, Gligor V, Anderson R, Serjantov A, Danezis G, Crispo B, Clayton R, Eronen P. Accountable privacy Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3957: 83-105. |
0.275 |
|
2000 |
Blaze M, Ioannidis J, Keromytis AD. Trust management and network layer security protocols Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1796: 103-108. |
0.273 |
|
2002 |
Blaze M. Efficient, dos-resistant, secure key exchange for internet protocols (Transcript of discussion) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2467: 40-48. DOI: 10.1007/3-540-45807-7_6 |
0.27 |
|
1997 |
Blaze M, Feigenbaum J, Resnick P, Strauss M. Managing Trust in an Information-Labeling System European Transactions On Telecommunications. 8: 491-501. DOI: 10.1002/Ett.4460080507 |
0.268 |
|
2000 |
Blaze M. Trust management and network layer security protocols (Transcript of discussion) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1796: 109-118. |
0.267 |
|
2009 |
Blaze M. Composing security metrics (Transcript of Discussion) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5087: 3-12. DOI: 10.1007/978-3-642-04904-0_2 |
0.262 |
|
2010 |
Sherr M, Cronin E, Blaze M. Measurable security through isotropic channels Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5964: 3-12. DOI: 10.1007/978-3-642-17773-6_2 |
0.255 |
|
1998 |
Blaze M, Bleumer G, Strauss M. Divertible protocols and atomic proxy cryptography Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1403: 127-144. DOI: 10.1007/BFb0054122 |
0.255 |
|
2006 |
Bangerter E, Camenisch J, Lysyanskaya A, Blaze M, Crispo B, Aura T, Christianson B, Popescu B, Massacci F, Eronen P, Danezis G, Mayo B. A cryptographic framework for the controlled release of certified data Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3957: 20-50. |
0.252 |
|
1996 |
Blaze M. High-bandwidth encryption with low-bandwidth smartcards Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1039: 33-40. DOI: 10.1007/3-540-60865-6_40 |
0.252 |
|
2006 |
Stajano F, Blaze M, Aura T, Popescu B, Massacci F. One user, many hats; and, sometimes, no hat: Towards a secure yet usable PDA Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3957: 51-67. |
0.249 |
|
2003 |
Blaze M, Ioannidis J, Keromytis AD. Experience with the KeyNote trust management system: Applications and future directions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2692: 284-300. |
0.249 |
|
2003 |
Blaze M. Rights amplification in master-keyed mechanical locks Ieee Security and Privacy. 1: 24-32. DOI: 10.1109/MSECP.2003.1193208 |
0.244 |
|
1998 |
Blaze M, Feigenbaum J, Keromytis AD. Keynote: Trust management for public-key infrastructures Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1550: 59-63. |
0.236 |
|
2006 |
Rissanen E, Firozabadi BS, Sergot M, Anderson R, Danezis G, Blaze M, Eronen P, Aura T. Towards a mechanism for discretionary overriding of access control Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3957: 312-323. |
0.234 |
|
2009 |
Sherr M, Blaze M. Application containers without virtual machines Proceedings of the Acm Conference On Computer and Communications Security. 39-41. DOI: 10.1145/1655148.1655155 |
0.232 |
|
2007 |
Bellovin SM, Blaze M, Diffie W, Landau S, Rexford J, Neumann PG. Internal surveillance, external risks Communications of the Acm. 50: 128. DOI: 10.1145/1323688.1323717 |
0.225 |
|
2009 |
Blaze M. Taking surveillance out of the shadows Ieee Security and Privacy. 7: 75-77. DOI: 10.1109/MSP.2009.138 |
0.222 |
|
1996 |
Blaze M. Oblivious key escrow Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1174: 335-343. |
0.211 |
|
2011 |
Clark S, Goodspeed T, Metzger P, Wasserman Z, Xu K, Blaze M. One-way cryptography Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7114: 336-340. DOI: 10.1007/978-3-642-25867-1_32 |
0.21 |
|
2005 |
Sherr M, Cronin E, Clark S, Blaze M. Signaling vulnerabilities in wiretapping systems Ieee Security and Privacy. 3: 13-25. DOI: 10.1109/MSP.2005.160 |
0.21 |
|
2009 |
West AG, Aviv AJ, Chang J, Prabhu VS, Blaze M, Kannan S, Lee I, Smith JM, Sokolsky O. QuanTM: A Quantitative Trust Management system Proceedings of the 2nd European Workshop On System Security, Eurosec'09. 28-35. DOI: 10.1145/1519144.1519149 |
0.205 |
|
1986 |
Robinson VB, Frank AU, Blaze MA. Expert systems applied to problems in geographic information systems: Introduction, review and prospects Computers, Environment and Urban Systems. 11: 161-173. DOI: 10.1016/0198-9715(86)90025-6 |
0.193 |
|
2012 |
Blaze M. The casino and the OODA Loop: Why our protocols always eventually fail (Transcript of discussion) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7622: 64-75. DOI: 10.1007/978-3-642-35694-0_9 |
0.19 |
|
2010 |
Clark S, Frei S, Blaze M, Smith J. Familiarity breeds contempt: The honeymoon effect and the role of legacy code in zero-day vulnerabilities Proceedings - Annual Computer Security Applications Conference, Acsac. 251-260. DOI: 10.1145/1920261.1920299 |
0.181 |
|
1986 |
Robinson VB, Frank AU, Blaze MA. Introduction to expert systems for land information systems Journal of Surveying Engineering. 112: 109-118. DOI: 10.1061/(Asce)0733-9453(1986)112:2(109) |
0.179 |
|
2014 |
Clark S, Collis M, Blaze M, Smith JM. Moving targets: Security and rapid-release in Firefox Proceedings of the Acm Conference On Computer and Communications Security. 1256-1266. DOI: 10.1145/2660267.2660320 |
0.179 |
|
1986 |
Robinson VB, Frank AU, Blaze MA. Expert systems and geographic information systems: Review and prospects Journal of Surveying Engineering. 112: 119-130. DOI: 10.1061/(Asce)0733-9453(1986)112:2(119) |
0.174 |
|
2006 |
Cronin E, Sherr M, Blaze M. On the reliability of network eavesdropping tools Ifip International Federation For Information Processing. 222: 199-213. |
0.172 |
|
1985 |
Robinson VB, Thongs D, Blaze M. Natural language in geographic data processing systems Advanced Technology For Monitoring and Processing Global Environmental Data. Proc. Rss/Cerma Conference, London, 1985, (Remote Sensing Society, University of Reading). 67-74. |
0.163 |
|
2011 |
Blaze M. Key escrow from a safe distance: Looking back at the clipper chip Acm International Conference Proceeding Series. 317-321. DOI: 10.1145/2076732.2076777 |
0.153 |
|
2009 |
Sherr M, Blaze M, Loo BT. Scalable link-based relay selection for anonymous routing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5672: 73-93. DOI: 10.1007/978-3-642-03168-7_5 |
0.138 |
|
2012 |
Aviv AJ, Sapp B, Blaze M, Smith JM. Practicality of accelerometer side channels on smartphones Acm International Conference Proceeding Series. 41-50. DOI: 10.1145/2420950.2420957 |
0.135 |
|
2001 |
Gligor V, Blaze M, Ioannidis J. Denial of service – Panel discussion Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2133: 194-203. |
0.121 |
|
2015 |
Clark S, Blaze M, Smith JM. Smearing fingerprints: Changing the game of web tracking with composite privacy Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9379: 178-182. DOI: 10.1007/978-3-319-26096-9_19 |
0.116 |
|
2013 |
Blaze M. Is the honeymoon over? (Transcript of Discussion) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7028: 28-33. DOI: 10.1007/978-3-642-36213-2-5 |
0.098 |
|
1998 |
Miller CG, Lyons AA, Pye DW, Blaze M, Fasano GA, Horneye S. Dual Energy X-Ray Absorptiometry (DXA) transmission methodology in clinical trials Drug Information Journal. 32: 1165-1168. |
0.087 |
|
2011 |
Blaze M. One-way cryptography (transcript of discussion) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7114: 341-358. DOI: 10.1007/978-3-642-25867-1_33 |
0.073 |
|
2001 |
Blaze M. Looking on the bright side of black-box cryptography (Transcript of discussion) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2133: 54-61. |
0.046 |
|
2008 |
Bellovin SM, Blaze M, Diffie W, Landau S, Rexford J, Neumann PG. Authors' response [1] Communications of the Acm. 51: 9. DOI: 10.1145/1314215.1340926 |
0.042 |
|
2007 |
Cronin E, Sherr M, Blaze M. Listen too closely and you may be confused Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4631: 245-249. |
0.04 |
|
2006 |
Bohm D, Lamming M, Mayo RN, Morgan J, Zhang K, Blaze M, Roe M, Clayton R, Christianson B, Aura T, Stajano F, Danezis G, Mitchell C, Lomas M, Gligor V, et al. Controlling who tracks me Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3957: 151-162. |
0.039 |
|
2014 |
Clark S, Blaze M, Smith J. Blood in the water: Are there honeymoon effects outside software? Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7061: 12-17. |
0.039 |
|
1989 |
Bradley DJ, Phillips-Howard PA, Bannister BA, Behrens R, Bell DR, Blackburn PJ, Blaze M, Bridgewood G, Bryceson A, Chiodini P, Clarke P, Colbourne MJ, Cook GC, Cowan GO, Draper CC, et al. Prophylaxis against malaria for travellers from the United Kingdom British Medical Journal. 299: 1087-1089. PMID 2511974 |
0.036 |
|
1995 |
Blaze M, Schneier B. The MacGuffin block cipher algorithm Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1008: 97-110. |
0.016 |
|
Hide low-probability matches. |