Matt Blaze
Affiliations:- University of Pennsylvania, Philadelphia, PA, USA
According to our database1,
Matt Blaze
authored at least 92 papers
between 1991 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on twitter.com
-
on id.loc.gov
On csauthors.net:
Bibliography
2024
J. Cybersecur., January, 2024
2016
Computer, 2016
2015
Keys under doormats: mandating insecurity by requiring government access to all data and communications.
J. Cybersecur., 2015
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015
2014
The design and implementation of the A<sup>3</sup> application-aware anonymity platform.
Comput. Networks, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
IEEE Secur. Priv., 2013
2012
Proceedings of the 5th Workshop on Cyber Security Experimentation and Test, 2012
Proceedings of the Security Protocols XX, 2012
The Casino and the OODA Loop: Why Our Protocols Always Eventually Fail (Transcript of Discussion).
Proceedings of the Security Protocols XX, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2011
Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System.
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the Security Protocols XIX, 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
Proceedings of the 4th USENIX Workshop on Offensive Technologies, 2010
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010
Proceedings of the Security Protocols XVIII, 2010
Proceedings of the Network and Distributed System Security Symposium, 2010
Familiarity breeds contempt: the honeymoon effect and the role of legacy code in zero-day vulnerabilities.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
Proceedings of the 3rd USENIX Workshop on Offensive Technologies, 2009
Proceedings of the 2009 USENIX Annual Technical Conference, 2009
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009
Proceedings of the Second European Workshop on System Security, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2009
2008
IEEE Secur. Priv., 2008
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008
Bridging the Gap between Vulnerabilities and Threats in Electronic Voting - Abstract.
Proceedings of the Security Protocols XVI, 2008
Bridging the Gap between Vulnerabilities and Threats in Electronic Voting (Transcript of Discussion).
Proceedings of the Security Protocols XVI, 2008
Proceedings of the 7th international conference on Peer-to-peer systems, 2008
2007
Proceedings of the 2nd USENIX Workshop on Hot Topics in Security, 2007
Proceedings of the Security Protocols, 2007
2006
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006
2005
Proceedings of the Security Protocols, 2005
Proceedings of the Security Protocols, 2005
Proceedings of the 19th Conference on Systems Administration (LISA 2005), 2005
2004
ACM Trans. Inf. Syst. Secur., 2004
Proceedings of the Security Protocols, 2004
Proceedings of the Security Protocols, 2004
2003
Proceedings of the Security Protocols, 2003
Experience with the KeyNote Trust Management System: Applications and Future Directions.
Proceedings of the Trust Management, First International Conference, 2003
Proceedings of the Personal Wireless Communications, IFIP-TC6 8th International Conference, 2003
2002
Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks.
IACR Cryptol. ePrint Arch., 2002
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002
2001
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols (Transcript of Discussion).
Proceedings of the Security Protocols, 2001
Proceedings of the Financial Cryptography, 2001
2000
RFC, March, 2000
Proceedings of the Security Protocols, 2000
1999
Proceedings of the Security Protocols, 1999
Proceedings of the Tenth Annual ACM-SIAM Symposium on Discrete Algorithms, 1999
Proceedings of the Secure Internet Programming, 1999
1998
Proceedings of the Security Protocols, 1998
Proceedings of the Financial Cryptography, 1998
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
1997
The risks of key recovery, key escrow, and trusted third-party encryption.
World Wide Web J., 1997
1996
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996
Proceedings of the Information Hiding, First International Workshop, Cambridge, UK, May 30, 1996
Proceedings of the Fast Software Encryption, 1996
1995
1994
Proceedings of the USENIX Summer 1994 Technical Conference, 1994
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994
Proceedings of the CCS '94, 1994
1993
The Architecture and Implementation of Network Layer Security in UNIX.
Proceedings of the 4th USENIX Security Symposium, Santa Clara, CA, USA, October 4-6, 1993, 1993
Proceedings of the Proceedings Fourth Workshop on Workstation Operating Systems, 1993
1992
Proceedings of the 12th International Conference on Distributed Computing Systems, 1992
1991
Long-Term Caching Strategies for Very Large Distributed File Systems.
Proceedings of the Summer 1991 USENIX Conference, Nashville, TE, USA, June 1991, 1991