default search action
Matt Blaze
Person information
- affiliation: University of Pennsylvania, Philadelphia, PA, USA
- award (1996): EFF Pioneer Award
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, Carmela Troncoso:
Bugs in our pockets: the risks of client-side scanning. J. Cybersecur. 10(1) (2024) - 2021
- [i7]Hal Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, Carmela Troncoso:
Bugs in our Pockets: The Risks of Client-Side Scanning. CoRR abs/2110.07450 (2021)
2010 – 2019
- 2016
- [j20]Steven M. Bellovin, Matt Blaze, Susan Landau:
Insecure Surveillance: Technical Issues with Remote Computer Searches. Computer 49(3): 14-24 (2016) - [i6]Peter Gutmann, Steven M. Bellovin, Matt Blaze, Ronald L. Rivest, Nigel P. Smart:
An IBE-based Signcryption Scheme for Group Key Management. CoRR abs/1603.09526 (2016) - 2015
- [j19]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner:
Keys under doormats. Commun. ACM 58(10): 24-26 (2015) - [j18]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner:
Keys under doormats: mandating insecurity by requiring government access to all data and communications. J. Cybersecur. 1(1): 69-79 (2015) - [c68]Sandy Clark, Matt Blaze, Jonathan M. Smith:
Smearing Fingerprints: Changing the Game of Web Tracking with Composite Privacy. Security Protocols Workshop 2015: 178-182 - 2014
- [j17]Micah Sherr, Harjot Gill, Taher Saeed, Andrew Mao, William R. Marczak, Saravana Soundararajan, Wenchao Zhou, Boon Thau Loo, Matt Blaze:
The design and implementation of the A3 application-aware anonymity platform. Comput. Networks 58: 206-227 (2014) - [j16]Adam J. Aviv, Matt Blaze, Micah Sherr, Jonathan M. Smith:
Privacy-aware message exchanges for HumaNets. Comput. Commun. 48: 30-43 (2014) - [c67]Sandy Clark, Michael Collis, Matt Blaze, Jonathan M. Smith:
Moving Targets: Security and Rapid-Release in Firefox. CCS 2014: 1256-1266 - 2013
- [j15]Steven M. Bellovin, Matt Blaze, Sandy Clark, Susan Landau:
Going Bright: Wiretapping without Weakening Communications Infrastructure. IEEE Secur. Priv. 11(1): 62-72 (2013) - 2012
- [c66]Adam J. Aviv, Benjamin Sapp, Matt Blaze, Jonathan M. Smith:
Practicality of accelerometer side channels on smartphones. ACSAC 2012: 41-50 - [c65]Adam J. Aviv, Micah Sherr, Matt Blaze, Jonathan M. Smith:
Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks. ESORICS 2012: 181-198 - [c64]Sandy Clark, Matt Blaze, Jonathan M. Smith:
The Casino and the OODA Loop - Why Our Protocols Always Eventually Fail. Security Protocols Workshop 2012: 60-63 - [c63]Matt Blaze:
The Casino and the OODA Loop: Why Our Protocols Always Eventually Fail (Transcript of Discussion). Security Protocols Workshop 2012: 64-75 - [c62]Sandy Clark, Chris Wacek, Matt Blaze, Boon Thau Loo, Micah Sherr, Clay Shields, Jonathan M. Smith:
Collaborative Red Teaming for Anonymity System Evaluation. CSET 2012 - 2011
- [c61]Matt Blaze:
Key escrow from a safe distance: looking back at the Clipper Chip. ACSAC 2011: 317-321 - [c60]Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman, Kevin Xu, Matt Blaze:
One-Way Cryptography. Security Protocols Workshop 2011: 336-340 - [c59]Matt Blaze:
One-Way Cryptography (Transcript of Discussion). Security Protocols Workshop 2011: 341-358 - [c58]Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman, Kevin Xu, Matt Blaze:
Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System. USENIX Security Symposium 2011 - 2010
- [c57]Sandy Clark, Stefan Frei, Matt Blaze, Jonathan M. Smith:
Familiarity breeds contempt: the honeymoon effect and the role of legacy code in zero-day vulnerabilities. ACSAC 2010: 251-260 - [c56]Micah Sherr, Andrew Mao, William R. Marczak, Wenchao Zhou, Boon Thau Loo, Matt Blaze:
A3: An Extensible Platform for Application-Aware Anonymity. NDSS 2010 - [c55]Sandy Clark, Matt Blaze, Jonathan M. Smith:
Blood in the Water - Are there Honeymoon Effects Outside Software? Security Protocols Workshop 2010: 12-17 - [c54]Adam J. Aviv, Micah Sherr, Matt Blaze, Jonathan M. Smith:
Evading Cellular Data Monitoring with Human Movement Networks. HotSec 2010 - [c53]Adam J. Aviv, Katherine L. Gibson, Evan Mossop, Matt Blaze, Jonathan M. Smith:
Smudge Attacks on Smartphone Touch Screens. WOOT 2010
2000 – 2009
- 2009
- [j14]Matt Blaze, Sampath Kannan, Insup Lee, Oleg Sokolsky, Jonathan M. Smith, Angelos D. Keromytis, Wenke Lee:
Dynamic Trust Management. Computer 42(2): 44-52 (2009) - [j13]Matt Blaze:
Taking Surveillance Out of the Shadows. IEEE Secur. Priv. 7(5): 75-77 (2009) - [j12]Matt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, Aviel D. Rubin:
Anonymity in Wireless Broadcast Networks. Int. J. Netw. Secur. 8(1): 37-51 (2009) - [c52]Micah Sherr, Matt Blaze:
Application containers without virtual machines. VMSec@CCS 2009: 39-42 - [c51]Micah Sherr, Gaurav Shah, Eric Cronin, Sandy Clark, Matt Blaze:
Can they hear me now?: a security analysis of law enforcement wiretaps. CCS 2009: 512-523 - [c50]Andrew G. West, Adam J. Aviv, Jian Chang, Vinayak S. Prabhu, Matt Blaze, Sampath Kannan, Insup Lee, Jonathan M. Smith, Oleg Sokolsky:
QuanTM: a quantitative trust management system. EUROSEC 2009: 28-35 - [c49]Micah Sherr, Matt Blaze, Boon Thau Loo:
Scalable Link-Based Relay Selection for Anonymous Routing. Privacy Enhancing Technologies 2009: 73-93 - [c48]Matt Blaze, Patrick D. McDaniel:
Below the Salt. Security Protocols Workshop 2009: 24-27 - [c47]Matt Blaze:
Is the Honeymoon over? Security Protocols Workshop 2009: 28-33 - [c46]Matt Blaze:
Below the Salt. Security Protocols Workshop 2009: 34-40 - [c45]Micah Sherr, Matt Blaze, Boon Thau Loo:
Veracity: Practical Secure Network Coordinates via Vote-based Agreements. USENIX ATC 2009 - [c44]Gaurav Shah, Matt Blaze:
Covert Channels through External Interference. WOOT 2009: 1-8 - 2008
- [j11]Steven M. Bellovin, Matt Blaze, Whitfield Diffie, Susan Landau, Peter G. Neumann, Jennifer Rexford:
Risking Communications Security: Potential Hazards of the Protect America Act. IEEE Secur. Priv. 6(1): 24-33 (2008) - [j10]Eric Cronin, Micah Sherr, Matt Blaze:
On the (un)reliability of eavesdropping. Int. J. Secur. Networks 3(2): 103-113 (2008) - [c43]Micah Sherr, Boon Thau Loo, Matt Blaze:
Veracity: a fully decentralized service for securing network coordinate systems. IPTPS 2008: 15 - [c42]Matt Blaze, Sandy Clark:
Bridging the Gap between Vulnerabilities and Threats in Electronic Voting - Abstract. Security Protocols Workshop 2008: 241-243 - [c41]Matt Blaze:
Bridging the Gap between Vulnerabilities and Threats in Electronic Voting (Transcript of Discussion). Security Protocols Workshop 2008: 244-255 - [c40]Adam J. Aviv, Pavol Cerný, Sandy Clark, Eric Cronin, Gaurav Shah, Micah Sherr, Matt Blaze:
Security Evaluation of ES&S Voting Machines and Election Management System. EVT 2008 - 2007
- [j9]Steven M. Bellovin, Matt Blaze, Whitfield Diffie, Susan Landau, Jennifer Rexford, Peter G. Neumann:
Internal surveillance, external risks. Commun. ACM 50(12): 128 (2007) - [c39]Micah Sherr, Eric Cronin, Matt Blaze:
Measurable Security through Isotropic Channels. Security Protocols Workshop 2007: 3-12 - [c38]Micah Sherr, Boon Thau Loo, Matt Blaze:
Towards Application-Aware Anonymous Routing. HotSec 2007 - 2006
- [c37]Eric Cronin, Micah Sherr, Matt Blaze:
On the Reliability of Network Eavesdropping Tools. IFIP Int. Conf. Digital Forensics 2006: 199-213 - [c36]Matt Blaze:
Composing Security Metrics. Security Protocols Workshop 2006: 3-12 - [i5]Madhukar Anand, Eric Cronin, Micah Sherr, Matt Blaze, Sampath Kannan:
Security Protocols with Isotropic Channels. IACR Cryptol. ePrint Arch. 2006: 396 (2006) - 2005
- [j8]Steven M. Bellovin, Matt Blaze, Susan Landau:
The real national-security needs for VoIP. Commun. ACM 48(11): 120 (2005) - [j7]Micah Sherr, Eric Cronin, Sandy Clark, Matt Blaze:
Signaling Vulnerabilities in Wiretapping Systems. IEEE Secur. Priv. 3(6): 13-25 (2005) - [c35]Matt Blaze:
Picking Locks with Cryptology. LISA 2005 - [c34]Eric Cronin, Micah Sherr, Matt Blaze:
Listen Too Closely and You May Be Confused. Security Protocols Workshop 2005: 245-249 - [c33]Matt Blaze:
Listen Too Closely and You May Be Confused. Security Protocols Workshop 2005: 250-257 - 2004
- [j6]William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold:
Just fast keying: Key agreement in a hostile internet. ACM Trans. Inf. Syst. Secur. 7(2): 242-273 (2004) - [c32]Matt Blaze:
Toward a Broader View of Security Protocols. Security Protocols Workshop 2004: 106-120 - [c31]Matt Blaze:
Toward a Broader View of Security Protocols (Transcript of Discussion). Security Protocols Workshop 2004: 121-132 - [e2]Matt Blaze:
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA. USENIX 2004 [contents] - 2003
- [j5]Matt Blaze:
Rights Amplification in Master-Keyed Mechanical Locks. IEEE Secur. Priv. 1(2): 24-32 (2003) - [c30]Matt Blaze, John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis, Pekka Nikander, Vassilis Prevelakis:
TAPI: Transactions for Accessing Public Infrastructure. PWC 2003: 90-100 - [c29]Matt Blaze, John Ioannidis, Angelos D. Keromytis:
Experience with the KeyNote Trust Management System: Applications and Future Directions. iTrust 2003: 284-300 - [c28]Matt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, Aviel D. Rubin:
WAR: Wireless Anonymous Routing. Security Protocols Workshop 2003: 218-232 - [c27]Matt Blaze:
WAR: Wireless Anonymous Routing (Discussion). Security Protocols Workshop 2003: 233-240 - [e1]Matt Blaze:
Financial Cryptography, 6th International Conference, FC 2002, Southampton, Bermuda, March 11-14, 2002, Revised Papers. Lecture Notes in Computer Science 2357, Springer 2003, ISBN 3-540-00646-X [contents] - [i4]Matt Blaze, Angelos D. Keromytis, Michael C. Richardson, Luis A. Sanchez:
IP Security Policy (IPSP) Requirements. RFC 3586: 1-10 (2003) - 2002
- [j4]Matt Blaze, John Ioannidis, Angelos D. Keromytis:
Trust management for IPsec. ACM Trans. Inf. Syst. Secur. 5(2): 95-118 (2002) - [c26]William Aiello, Steven M. Bellovin, Matt Blaze, John Ioannidis, Omer Reingold, Ran Canetti, Angelos D. Keromytis:
Efficient, DoS-resistant, secure key exchange for internet protocols. CCS 2002: 48-58 - [i3]Matt Blaze:
Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks. IACR Cryptol. ePrint Arch. 2002: 160 (2002) - 2001
- [c25]Matt Blaze, John Ioannidis, Angelos D. Keromytis:
Offline Micropayments without Trusted Hardware. Financial Cryptography 2001: 21-40 - [c24]Matt Blaze, John Ioannidis, Angelos D. Keromytis:
Trust Management for IPsec. NDSS 2001 - [c23]William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold:
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols. Security Protocols Workshop 2001: 27-39 - [c22]Matt Blaze:
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols (Transcript of Discussion). Security Protocols Workshop 2001: 40-48 - 2000
- [j3]Matt Blaze, Steven M. Bellovin:
Tapping on my network door. Commun. ACM 43(10): 136 (2000) - [c21]Matt Blaze:
Looking on the Bright Side of Black-Box Cryptography (Transcript of Discussion). Security Protocols Workshop 2000: 54-61 - [c20]Virgil D. Gligor, Matt Blaze, John Ioannidis:
Denial of Service - Panel Discussion. Security Protocols Workshop 2000: 194-203 - [i2]Matt Blaze, John Ioannidis, Angelos D. Keromytis:
DSA and RSA Key and Signature Encoding for the KeyNote Trust Management System. RFC 2792: 1-7 (2000)
1990 – 1999
- 1999
- [c19]Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis:
The Role of Trust Management in Distributed Systems Security. Secure Internet Programming 1999: 185-210 - [c18]Matt Blaze, Joan Feigenbaum, Moni Naor:
A Formal Treatment of Remotely Keyed Encryption. SODA 1999: 868-869 - [c17]Matt Blaze, John Ioannidis, Angelos D. Keromytis:
Trust Management and Network Layer Security Protocols. Security Protocols Workshop 1999: 103-118 - [i1]Matt Blaze, Joan Feigenbaum, John Ioannidis, Angelos D. Keromytis:
The KeyNote Trust-Management System Version 2. RFC 2704: 1-37 (1999) - 1998
- [c16]Matt Blaze, Gerrit Bleumer, Martin Strauss:
Divertible Protocols and Atomic Proxy Cryptography. EUROCRYPT 1998: 127-144 - [c15]Matt Blaze, Joan Feigenbaum, Moni Naor:
A Formal Treatment of Remotely Keyed Encryption. EUROCRYPT 1998: 251-265 - [c14]Matt Blaze, Joan Feigenbaum, Martin Strauss:
Compliance Checking in the PolicyMaker Trust Management System. Financial Cryptography 1998: 254-274 - [c13]Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis:
KeyNote: Trust Management for Public-Key Infrastructures (Position Paper). Security Protocols Workshop 1998: 59-63 - 1997
- [j2]Matt Blaze, Joan Feigenbaum, Paul Resnick, Martin Strauss:
Managing trust in an information-labeling system. Eur. Trans. Telecommun. 8(5): 491-501 (1997) - [j1]Hal Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier:
The risks of key recovery, key escrow, and trusted third-party encryption. World Wide Web J. 2: 241-257 (1997) - 1996
- [c12]Matt Blaze:
High-Bandwidth Encryption with Low-Bandwidth Smartcards. FSE 1996: 33-40 - [c11]Matt Blaze:
Oblevious Key Escrow. Information Hiding 1996: 335-343 - [c10]Matt Blaze, Joan Feigenbaum, Jack Lacy:
Decentralized Trust Management. S&P 1996: 164-173 - 1995
- [c9]Matt Blaze, Steven M. Bellovin:
Session-Layer Encryption. USENIX Security Symposium 1995 - 1994
- [c8]Matt Blaze:
Protocol Failure in the Escrowed Encryption Standard. CCS 1994: 59-67 - [c7]Matt Blaze, Bruce Schneier:
The MacGuffin Block Cipher Algorithm. FSE 1994: 97-110 - [c6]Matt Blaze:
Key Management in an Encrypting File System. USENIX Summer 1994: 27-35 - 1993
- [c5]Matt Blaze:
A Cryptographic File System for UNIX. CCS 1993: 9-16 - [c4]Matt Blaze:
Transparent Mistrust: OS Support for Cryptography-in-the-Large. Workshop on Workstation Operating Systems 1993: 98-102 - [c3]John Ioannidis, Matt Blaze:
The Architecture and Implementation of Network Layer Security in UNIX. USENIX Security Symposium 1993 - 1992
- [c2]Matt Blaze, Rafael Alonso:
Dynamic Hierarchical Caching for Large-Scale Distributed File Systems. ICDCS 1992: 521-528 - 1991
- [c1]Matt Blaze, Rafael Alonso:
Long-Term Caching Strategies for Very Large Distributed File Systems. USENIX Summer 1991: 3-16
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-17 21:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint