Matt Blaze

Results: 62



#Item
11Cyberwarfare / Computer network security / Spamming / Cybercrime / Multi-agent systems / Ransomware / Computer security / Malware / Denial-of-service attack / Botnet / Search warrant / Phishing

Comments on Proposed Remote Search Rules Steven M. Bellovin Columbia University∗ Matt Blaze University of Pennsylvania*

Add to Reading List

Source URL: www.privacyink.org

Language: English - Date: 2015-10-13 22:14:45
12

A Cryptographic File System for Unix Matt Blaze AT&T Bell Laboratories 101 Crawfords Corner Road, Room 4G-634 Holmdel, NJ 07733

Add to Reading List

Source URL: crypto.com

Language: English - Date: 2001-07-26 15:17:59
    13Cryptography / Security / Cyberwarfare / Clipper chip / Key escrow / Crypto Wars / Computer security / Strong cryptography / National Security Agency / Escrow / Encryption / Secure communication

    Keys Under Doormats: mandating insecurity by requiring government access to all data and communications Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew

    Add to Reading List

    Source URL: www.schneier.com

    Language: English - Date: 2015-12-10 18:36:20
    14

    Protocol Failure in the Escrowed Encryption Standard Matt Blaze AT&T Bell Laboratories August 20, 1994 Abstract

    Add to Reading List

    Source URL: crypto.com

    Language: English - Date: 2001-05-15 19:09:38
      15

      Safecracking for the computer scientist∗ Matt Blaze Department of Computer and Information Science University of Pennsylvania DRAFT – 7 DecemberRevised 21 December 2004) – DRAFT

      Add to Reading List

      Source URL: crypto.com

      Language: English - Date: 2005-03-21 19:18:35
        16

        Key Management in an Encrypting File System Matt Blaze AT&T Bell Laboratories Abstract As distributed computing systems grow in size,

        Add to Reading List

        Source URL: crypto.com

        Language: English - Date: 1999-11-26 23:55:04
          17

          Application Containers without Virtual Machines Micah Sherr Matt Blaze Dept. of Computer and Information Science

          Add to Reading List

          Source URL: security.cs.georgetown.edu

          Language: English - Date: 2010-07-16 14:58:28
            18

            Scalable Link-Based Relay Selection for Anonymous Routing Micah Sherr, Matt Blaze, and Boon Thau Loo University of Pennsylvania {msherr,blaze,boonloo}@cis.upenn.edu

            Add to Reading List

            Source URL: security.cs.georgetown.edu

            Language: English - Date: 2010-07-16 14:58:26
              19

              Can They Hear Me Now? A Security Analysis of Law Enforcement Wiretaps Micah Sherr, Gaurav Shah, Eric Cronin, Sandy Clark, and Matt Blaze Dept. of Computer and Information Science, University of Pennsylvania Philadelphia,

              Add to Reading List

              Source URL: security.cs.georgetown.edu

              Language: English - Date: 2010-07-16 14:58:20
                20

                Keys Under Doormats: mandating insecurity by requiring government access to all data and communications Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew

                Add to Reading List

                Source URL: privacyink.org

                Language: English - Date: 2015-10-13 22:06:48
                  UPDATE