Matt Blaze

Affiliations:
  • University of Pennsylvania, Philadelphia, PA, USA


According to our database1, Matt Blaze authored at least 92 papers between 1991 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Bugs in our pockets: the risks of client-side scanning.
J. Cybersecur., January, 2024

2016
An IBE-based Signcryption Scheme for Group Key Management.
CoRR, 2016

Insecure Surveillance: Technical Issues with Remote Computer Searches.
Computer, 2016

2015
Keys under doormats: mandating insecurity by requiring government access to all data and communications.
J. Cybersecur., 2015

Keys under doormats.
Commun. ACM, 2015

Smearing Fingerprints: Changing the Game of Web Tracking with Composite Privacy.
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

2014
Privacy-aware message exchanges for HumaNets.
Comput. Commun., 2014

The design and implementation of the A<sup>3</sup> application-aware anonymity platform.
Comput. Networks, 2014

Moving Targets: Security and Rapid-Release in Firefox.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Going Bright: Wiretapping without Weakening Communications Infrastructure.
IEEE Secur. Priv., 2013

2012
Collaborative Red Teaming for Anonymity System Evaluation.
Proceedings of the 5th Workshop on Cyber Security Experimentation and Test, 2012

The Casino and the OODA Loop - Why Our Protocols Always Eventually Fail.
Proceedings of the Security Protocols XX, 2012

The Casino and the OODA Loop: Why Our Protocols Always Eventually Fail (Transcript of Discussion).
Proceedings of the Security Protocols XX, 2012

Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks.
Proceedings of the Computer Security - ESORICS 2012, 2012

Practicality of accelerometer side channels on smartphones.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System.
Proceedings of the 20th USENIX Security Symposium, 2011

One-Way Cryptography.
Proceedings of the Security Protocols XIX, 2011

One-Way Cryptography (Transcript of Discussion).
Proceedings of the Security Protocols XIX, 2011

Key escrow from a safe distance: looking back at the Clipper Chip.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
Smudge Attacks on Smartphone Touch Screens.
Proceedings of the 4th USENIX Workshop on Offensive Technologies, 2010

Evading Cellular Data Monitoring with Human Movement Networks.
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010

Blood in the Water - Are there Honeymoon Effects Outside Software?
Proceedings of the Security Protocols XVIII, 2010

A3: An Extensible Platform for Application-Aware Anonymity.
Proceedings of the Network and Distributed System Security Symposium, 2010

Familiarity breeds contempt: the honeymoon effect and the role of legacy code in zero-day vulnerabilities.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Anonymity in Wireless Broadcast Networks.
Int. J. Netw. Secur., 2009

Taking Surveillance Out of the Shadows.
IEEE Secur. Priv., 2009

Dynamic Trust Management.
Computer, 2009

Covert Channels through External Interference.
Proceedings of the 3rd USENIX Workshop on Offensive Technologies, 2009

Veracity: Practical Secure Network Coordinates via Vote-based Agreements.
Proceedings of the 2009 USENIX Annual Technical Conference, 2009

Below the Salt.
Proceedings of the Security Protocols XVII, 2009

Below the Salt.
Proceedings of the Security Protocols XVII, 2009

Is the Honeymoon over?
Proceedings of the Security Protocols XVII, 2009

Scalable Link-Based Relay Selection for Anonymous Routing.
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009

QuanTM: a quantitative trust management system.
Proceedings of the Second European Workshop on System Security, 2009

Can they hear me now?: a security analysis of law enforcement wiretaps.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

Application containers without virtual machines.
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2009

2008
On the (un)reliability of eavesdropping.
Int. J. Secur. Networks, 2008

Risking Communications Security: Potential Hazards of the Protect America Act.
IEEE Secur. Priv., 2008

Security Evaluation of ES&S Voting Machines and Election Management System.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008

Bridging the Gap between Vulnerabilities and Threats in Electronic Voting - Abstract.
Proceedings of the Security Protocols XVI, 2008

Bridging the Gap between Vulnerabilities and Threats in Electronic Voting (Transcript of Discussion).
Proceedings of the Security Protocols XVI, 2008

Veracity: a fully decentralized service for securing network coordinate systems.
Proceedings of the 7th international conference on Peer-to-peer systems, 2008

2007
Internal surveillance, external risks.
Commun. ACM, 2007

Towards Application-Aware Anonymous Routing.
Proceedings of the 2nd USENIX Workshop on Hot Topics in Security, 2007

Measurable Security through Isotropic Channels.
Proceedings of the Security Protocols, 2007

2006
Security Protocols with Isotropic Channels.
IACR Cryptol. ePrint Arch., 2006

Composing Security Metrics.
Proceedings of the Security Protocols, 2006

On the Reliability of Network Eavesdropping Tools.
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006

2005
Signaling Vulnerabilities in Wiretapping Systems.
IEEE Secur. Priv., 2005

The real national-security needs for VoIP.
Commun. ACM, 2005

Listen Too Closely and You May Be Confused.
Proceedings of the Security Protocols, 2005

Listen Too Closely and You May Be Confused.
Proceedings of the Security Protocols, 2005

Picking Locks with Cryptology.
Proceedings of the 19th Conference on Systems Administration (LISA 2005), 2005

2004
Just fast keying: Key agreement in a hostile internet.
ACM Trans. Inf. Syst. Secur., 2004

Toward a Broader View of Security Protocols (Transcript of Discussion).
Proceedings of the Security Protocols, 2004

Toward a Broader View of Security Protocols.
Proceedings of the Security Protocols, 2004

2003
IP Security Policy (IPSP) Requirements.
RFC, August, 2003

Rights Amplification in Master-Keyed Mechanical Locks.
IEEE Secur. Priv., 2003

WAR: Wireless Anonymous Routing.
Proceedings of the Security Protocols, 2003

WAR: Wireless Anonymous Routing (Discussion).
Proceedings of the Security Protocols, 2003

Experience with the KeyNote Trust Management System: Applications and Future Directions.
Proceedings of the Trust Management, First International Conference, 2003

TAPI: Transactions for Accessing Public Infrastructure.
Proceedings of the Personal Wireless Communications, IFIP-TC6 8th International Conference, 2003

2002
Trust management for IPsec.
ACM Trans. Inf. Syst. Secur., 2002

Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks.
IACR Cryptol. ePrint Arch., 2002

Efficient, DoS-resistant, secure key exchange for internet protocols.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

2001
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols (Transcript of Discussion).
Proceedings of the Security Protocols, 2001

Offline Micropayments without Trusted Hardware.
Proceedings of the Financial Cryptography, 2001

2000
DSA and RSA Key and Signature Encoding for the KeyNote Trust Management System.
RFC, March, 2000

Tapping on my network door.
Commun. ACM, 2000

Denial of Service - Panel Discussion.
Proceedings of the Security Protocols, 2000

Looking on the Bright Side of Black-Box Cryptography (Transcript of Discussion).
Proceedings of the Security Protocols, 2000

1999
The KeyNote Trust-Management System Version 2.
RFC, September, 1999

Trust Management and Network Layer Security Protocols.
Proceedings of the Security Protocols, 1999

A Formal Treatment of Remotely Keyed Encryption.
Proceedings of the Tenth Annual ACM-SIAM Symposium on Discrete Algorithms, 1999

The Role of Trust Management in Distributed Systems Security.
Proceedings of the Secure Internet Programming, 1999

1998
KeyNote: Trust Management for Public-Key Infrastructures (Position Paper).
Proceedings of the Security Protocols, 1998

Compliance Checking in the PolicyMaker Trust Management System.
Proceedings of the Financial Cryptography, 1998

Divertible Protocols and Atomic Proxy Cryptography.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998

1997
The risks of key recovery, key escrow, and trusted third-party encryption.
World Wide Web J., 1997

Managing trust in an information-labeling system.
Eur. Trans. Telecommun., 1997

1996
Decentralized Trust Management.
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996

Oblevious Key Escrow.
Proceedings of the Information Hiding, First International Workshop, Cambridge, UK, May 30, 1996

High-Bandwidth Encryption with Low-Bandwidth Smartcards.
Proceedings of the Fast Software Encryption, 1996

1995
Session-Layer Encryption.
Proceedings of the 5th USENIX Security Symposium, 1995

1994
Key Management in an Encrypting File System.
Proceedings of the USENIX Summer 1994 Technical Conference, 1994

The MacGuffin Block Cipher Algorithm.
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994

Protocol Failure in the Escrowed Encryption Standard.
Proceedings of the CCS '94, 1994

1993
The Architecture and Implementation of Network Layer Security in UNIX.
Proceedings of the 4th USENIX Security Symposium, Santa Clara, CA, USA, October 4-6, 1993, 1993

Transparent Mistrust: OS Support for Cryptography-in-the-Large.
Proceedings of the Proceedings Fourth Workshop on Workstation Operating Systems, 1993

A Cryptographic File System for UNIX.
Proceedings of the CCS '93, 1993

1992
Dynamic Hierarchical Caching for Large-Scale Distributed File Systems.
Proceedings of the 12th International Conference on Distributed Computing Systems, 1992

1991
Long-Term Caching Strategies for Very Large Distributed File Systems.
Proceedings of the Summer 1991 USENIX Conference, Nashville, TE, USA, June 1991, 1991


  Loading...