Matt Blaze

Results: 62



#Item
1Keys Under Doormats: mandating insecurity by requiring government access to all data and communications Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew

Keys Under Doormats: mandating insecurity by requiring government access to all data and communications Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2015-12-10 18:36:20
2Key Management in an Encrypting File System Matt Blaze AT&T Bell Laboratories Abstract As distributed computing systems grow in size,

Key Management in an Encrypting File System Matt Blaze AT&T Bell Laboratories Abstract As distributed computing systems grow in size,

Add to Reading List

Source URL: www.mattblaze.org

Language: English - Date: 1999-11-26 23:55:04
3Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks Matt Blaze AT&T Labs – Research ,  PREPRINT — 15 SeptRevised 2 MarchA version o

Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks Matt Blaze AT&T Labs – Research , PREPRINT — 15 SeptRevised 2 MarchA version o

Add to Reading List

Source URL: www.mattblaze.org

Language: English - Date: 2003-03-10 20:37:31
4Protocol Failure in the Escrowed Encryption Standard Matt Blaze AT&T Bell Laboratories  August 20, 1994 Abstract

Protocol Failure in the Escrowed Encryption Standard Matt Blaze AT&T Bell Laboratories August 20, 1994 Abstract

Add to Reading List

Source URL: www.mattblaze.org

Language: English - Date: 2001-05-15 19:09:38
5Security Evaluation of ES&S Voting Machines and Election Management System ˇ y Sandy Clark Eric Cronin Gaurav Shah Micah Sherr Matt Blaze Adam Aviv Pavol Cern´ {aviv,cernyp,saender,ecronin,gauravsh,msherr,blaze}@cis.up

Security Evaluation of ES&S Voting Machines and Election Management System ˇ y Sandy Clark Eric Cronin Gaurav Shah Micah Sherr Matt Blaze Adam Aviv Pavol Cern´ {aviv,cernyp,saender,ecronin,gauravsh,msherr,blaze}@cis.up

Add to Reading List

Source URL: ecee.colorado.edu

Language: English - Date: 2013-01-11 01:48:11
    6Signaling vulnerabilities in wiretapping systems∗ Micah Sherr†, Eric Cronin, Sandy Clark‡, and Matt Blaze University of Pennsylvania Contact: Matt Blaze,   8 November 2005

    Signaling vulnerabilities in wiretapping systems∗ Micah Sherr†, Eric Cronin, Sandy Clark‡, and Matt Blaze University of Pennsylvania Contact: Matt Blaze, 8 November 2005

    Add to Reading List

    Source URL: www.mattblaze.org

    Language: English - Date: 2006-03-03 16:49:33
    7MATT	BLAZE	 UNIVERSITY OF PENNSYLVANIA1 US HOUSE OF REPRESENTATIVES COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM SUBCOMMITTEE ON INFORMATION TECHNOLOGY AND SUBCOMMITTEE ON INTERGOVERNMENTAL AFFAIRS

    MATT BLAZE UNIVERSITY OF PENNSYLVANIA1 US HOUSE OF REPRESENTATIVES COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM SUBCOMMITTEE ON INFORMATION TECHNOLOGY AND SUBCOMMITTEE ON INTERGOVERNMENTAL AFFAIRS

    Add to Reading List

    Source URL: www.crypto.com

    - Date: 2017-11-28 02:08:28
      8Collaborative Red Teaming for Anonymity System Evaluation Sandy Clark◦ Chris Wacek• Matt Blaze◦ Boon Thau Loo◦ Micah Sherr• Clay Shields• Jonathan Smith◦ ◦  University of Pennsylvania

      Collaborative Red Teaming for Anonymity System Evaluation Sandy Clark◦ Chris Wacek• Matt Blaze◦ Boon Thau Loo◦ Micah Sherr• Clay Shields• Jonathan Smith◦ ◦ University of Pennsylvania

      Add to Reading List

      Source URL: www.usenix.org

        9Scalable Link-Based Relay Selection for Anonymous Routing Micah Sherr, Matt Blaze, and Boon Thau Loo University of Pennsylvania {msherr,blaze,boonloo}@cis.upenn.edu

        Scalable Link-Based Relay Selection for Anonymous Routing Micah Sherr, Matt Blaze, and Boon Thau Loo University of Pennsylvania {msherr,blaze,boonloo}@cis.upenn.edu

        Add to Reading List

        Source URL: www.cis.upenn.edu

        - Date: 2009-08-06 14:25:56
          10IT’S TOO COMPLICATED: THE TECHNOLOGICAL IMPLICATIONS OF IP-BASED COMMUNICATIONS ON CONTENT/NON-CONTENT DISTINCTIONS AND THE THIRD PARTY DOCTRINE Steven M. Bellovin,1 Matt Blaze,2 Susan Landau,3 and Stephanie K. Pell4 F

          IT’S TOO COMPLICATED: THE TECHNOLOGICAL IMPLICATIONS OF IP-BASED COMMUNICATIONS ON CONTENT/NON-CONTENT DISTINCTIONS AND THE THIRD PARTY DOCTRINE Steven M. Bellovin,1 Matt Blaze,2 Susan Landau,3 and Stephanie K. Pell4 F

          Add to Reading List

          Source URL: www.cs.columbia.edu

          Language: English - Date: 2016-06-07 13:58:45