Matt Blaze
#7,753
Most Influential Person Now
American researcher
Matt Blaze's AcademicInfluence.com Rankings
Matt Blazecriminal-justice Degrees
Criminal Justice
#88
World Rank
#103
Historical Rank
#46
USA Rank
Cyber Security
#24
World Rank
#26
Historical Rank
#10
USA Rank
Matt Blazecomputer-science Degrees
Computer Science
#868
World Rank
#900
Historical Rank
#474
USA Rank
Cybersecurity
#13
World Rank
#14
Historical Rank
#7
USA Rank
Database
#7231
World Rank
#7480
Historical Rank
#861
USA Rank
Download Badge
Criminal Justice Computer Science
Matt Blaze's Degrees
- PhD Computer Science Princeton University
- Masters Computer Science Princeton University
- Bachelors Computer Science University of California, Berkeley
Similar Degrees You Can Earn
Why Is Matt Blaze Influential?
(Suggest an Edit or Addition)According to Wikipedia, Matt Blaze is an American researcher who focuses on the areas of secure systems, cryptography, and trust management. He is currently the McDevitt Chair of Computer Science and Law at Georgetown University, and is on the board of directors of the Tor Project.
Matt Blaze's Published Works
Published Works
- Decentralized trust management (1996) (2395)
- Divertible Protocols and Atomic Proxy Cryptography (1998) (1486)
- The KeyNote Trust-Management System Version 2 (1999) (782)
- Smudge Attacks on Smartphone Touch Screens (2010) (721)
- The Role of Trust Management in Distributed Systems Security (2001) (584)
- A cryptographic file system for UNIX (1993) (485)
- The KeyNote trust management system version2, IETF RFC 2704 (1999) (381)
- KeyNote: Trust Management for Public-Key Infrastructures (Position Paper) (1998) (357)
- Compliance Checking in the PolicyMaker Trust Management System (1998) (293)
- Key note: Trust management for public-key infrastructures (1999) (234)
- Practicality of accelerometer side channels on smartphones (2012) (231)
- Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security. A Report by an Ad Hoc Group of Cryptographers and Computer Scientists (1996) (206)
- The KeyNote Trust-Management System (1998) (186)
- The risks of key recovery, key escrow, and trusted third-party encryption (1997) (179)
- Just fast keying: Key agreement in a hostile internet (2004) (150)
- Efficient, DoS-resistant, secure key exchange for internet protocols (2001) (127)
- Protocol failure in the escrowed encryption standard (1994) (97)
- Trust management for IPsec (2002) (90)
- Dynamic Trust Management (2009) (87)
- Experience with the KeyNote Trust Management System: Applications and Future Directions (2003) (84)
- Caching in large-scale distributed file systems (1993) (83)
- KeyNote : Trust management for public-key infrastructures. Discussion (1999) (75)
- High-Bandwidth Encryption with Low-Bandwidth Smartcards (1996) (68)
- Scalable Link-Based Relay Selection for Anonymous Routing (2009) (66)
- Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System (2011) (63)
- Familiarity breeds contempt: the honeymoon effect and the role of legacy code in zero-day vulnerabilities (2010) (62)
- Dynamic hierarchical caching in large-scale distributed file systems (1992) (62)
- Key Management in an Encrypting File System (1994) (60)
- Offline Micropayments without Trusted Hardware (2002) (56)
- NFS Tracing By Passive Network Monitoring (1992) (54)
- A formal treatment of remotely keyed encryption (1998) (53)
- A3: An Extensible Platform for Application-Aware Anonymity (2010) (48)
- EVEREST: Evaluation and Validation of Election-Related Equipment, Standards and Testing (2007) (48)
- Security Challenges in Next Generation Cyber Physical Systems (2006) (48)
- Risking Communications Security: Potential Hazards of the Protect America Act (2008) (41)
- Security Evaluation of ES&S Voting Machines and Election Management System (2008) (41)
- Veracity: Practical Secure Network Coordinates via Vote-based Agreements (2009) (40)
- Trust Management and Network Layer Security Protocols (1999) (40)
- Managing trust in an information-labeling system (1997) (35)
- Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet (2013) (33)
- Towards Application-Aware Anonymous Routing (2007) (29)
- QuanTM: a quantitative trust management system (2009) (28)
- Signaling vulnerabilities in wiretapping systems (2005) (28)
- Security Implications of Applying the Communications Assistance to Law Enforcement Act to Voice over IP (2006) (26)
- Moving Targets: Security and Rapid-Release in Firefox (2014) (26)
- The Architecture and Implementation of Network Layer Security in UNIX (1993) (26)
- Expert systems applied to problems in geographic information systems: Introduction, review and prospects (1986) (25)
- Veracity: a fully decentralized service for securing network coordinate systems (2008) (25)
- The MacGuffin Block Cipher Algorithm (1994) (24)
- Cryptographic Modes of Operation for the Internet (2001) (23)
- Rights Amplification in Master-Keyed Mechanical Locks (2003) (22)
- Source Code Review of the Sequoia Voting System 1 (2007) (21)
- On the (un)reliability of eavesdropping (2008) (20)
- Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks (2002) (19)
- Toward a Broader View of Security Protocols (2004) (19)
- Anonymity in Wireless Broadcast Networks (2009) (19)
- WAR: Wireless Anonymous Routing (2003) (18)
- Expert Systems and Geographic Information Systems: Review and Prospects (1986) (16)
- It's Too Complicated: How the Internet Upends Katz, Smith, and Electronic Surveillance Law (2016) (15)
- Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks (2012) (15)
- Oblevious Key Escrow (1996) (15)
- Covert channels through external interference (2009) (15)
- Going Bright: Wiretapping without Weakening Communications Infrastructure (2013) (14)
- Evading Cellular Data Monitoring with Human Movement Networks (2010) (14)
- TAPI: Transactions for Accessing Public Infrastructure (2003) (14)
- Long-Term Caching Strategies for Very Large Distributed File Systems (1991) (13)
- Bugs in our Pockets: The Risks of Client-Side Scanning (2021) (12)
- Safecracking for the computer scientist (2004) (12)
- Transparent Internet E-mail Security (1996) (11)
- Blood in the Water (2007) (11)
- DSA and RSA Key and Signature Encoding for the KeyNote Trust Management System (2000) (11)
- Tapping on my network door (2000) (11)
- IP Security Policy (IPSP) Requirements (2003) (10)
- Listen Too Closely and You May Be Confused (2005) (9)
- The real national-security needs for VoIP (2005) (9)
- Introduction to Expert Systems for Land Information Systems (1986) (9)
- The Eavesdropper's Dilemma (2006) (9)
- Privacy-aware message exchanges for HumaNets (2014) (8)
- Can they hear me now?: a security analysis of law enforcement wiretaps (2009) (7)
- Application containers without virtual machines (2009) (7)
- Protocols for anonymity in wireless networks (2003) (7)
- Master-Key Cryptosystems (1996) (6)
- Key escrow from a safe distance: looking back at the Clipper Chip (2011) (6)
- Moving Targets: Geographically Routed Human Movement Networks (2010) (6)
- The design and implementation of the A3 application-aware anonymity platform (2014) (6)
- Toward massive distributed file systems (1992) (6)
- Looking on the Bright Side of Black-Box Cryptography (Transcript of Discussion) (2000) (6)
- Blood in the Water - Are there Honeymoon Effects Outside Software? (2010) (6)
- Trust Management for IPsec. (2001) (5)
- Denial of Service - Panel Discussion (2000) (5)
- Is the Honeymoon over? (2009) (5)
- Coordinate-based routing for high performance anonymity (2009) (5)
- Seeking the Source: Criminal Defendants’ Constitutional Right to Source Code (2020) (5)
- A Formal Treatment of Remotely KeyedEncryption ( Extended Abstract ) ? (2007) (4)
- The Casino and the OODA Loop - Why Our Protocols Always Eventually Fail (2012) (4)
- Insecure Surveillance: Technical Issues with Remote Computer Searches (2016) (4)
- Firewalls in active networks (1998) (4)
- It's Too Complicated: The Technological Implications of IP-Based Communications on Content/Non-Content Distinctions and the Third Party Doctrine (2016) (4)
- Trust Management and Network Security Protocols (1999) (4)
- On the Reliability of Network Eavesdropping Tools (2006) (4)
- Taking Surveillance Out of the Shadows (2009) (3)
- My life as an international arms courier (1997) (3)
- Smearing Fingerprints: Changing the Game of Web Tracking with Composite Privacy (2015) (3)
- What we can learn from API security: (Transcript of discussion) (2005) (3)
- Transparent mistrust: OS support for cryptography-in-the-large (1993) (3)
- Steganographic Timing Channels (2011) (3)
- Security Protocols with Isotropic Channels (2006) (3)
- Issues and mechanisms for trustworthy systems: Creating transparent mistrust (1994) (3)
- Session-Layer Encryption (1995) (3)
- IPsec Policy Architecture (2000) (3)
- The Casino and the OODA Loop: Why Our Protocols Always Eventually Fail (Transcript of Discussion) (2012) (2)
- Collaborative Red Teaming for Anonymity System Evaluation (2012) (2)
- 23rd USENIX Security Symposium (2014) (2)
- One-Way Cryptography (2011) (1)
- Measurable Security through Isotropic Channels (2007) (1)
- Biometrics to enhance smartcard security. Commentary. Authors' reply (2005) (1)
- Security side channels enabled by smartphone user interaction (2012) (1)
- Security and privacy in the information economy. (1997) (1)
- Accountable Privacy. Authors' reply (2006) (1)
- Cryptography Policy and the Information Economy (2007) (1)
- Veracity: A Fully Decentralized Secure Network Coordinate Service (2008) (1)
- Combinatorial optimization of countermeasures against illegal copying. Discussion (2003) (0)
- TR-CIS-06-18 Security Protocols with Isotropic Channels (2015) (0)
- Panel: E-Voting (2007) (0)
- Covert timing channels in uncompromised hosts (2009) (0)
- Decentralized Thst Management (1999) (0)
- The Future of Crypto: Getting from Here to Guarantees (2014) (0)
- Limits to Anonymity When Using Credentials. Authors' reply (2006) (0)
- Proceedings of the 6th international conference on Financial cryptography (2002) (0)
- Below the Salt (2009) (0)
- Using authority certificates to create management structures. Discussion (2002) (0)
- Limitations of IPsec policy mechanisms. Commentary. Discussion (2005) (0)
- The Unpredictable Attacker Does the “Honeymoon Effect” Hold for Exploits? (2017) (0)
- Protocol codesign. Commentary. Authors' reply (2005) (0)
- Controlling Who Tracks Me. Authors'reply (2006) (0)
- The Eavesdropper ’ s Dilemma : Ensuring Interception Fidelity (2005) (0)
- Peer Review Process (2020) (0)
- Mobile IPv6 security. Discussion (2003) (0)
- Composing Security Metrics (2009) (0)
- Picking Locks with Cryptology (2005) (0)
- Safe and vault security : a computer science perspective (2004) (0)
- Trust management and network layer security protocols (Transcript of discussion) (2000) (0)
- Crypto War {II}: Why We Fight (2016) (0)
- WAR: Wireless Anonymous Routing (Discussion) (2003) (0)
- WAR: Wireless Anonymous Routing. Commentary. Authors' reply (2005) (0)
- Proceedings of the 2nd USENIX workshop on Hot topics in security (2007) (0)
- Bridging the Gap between Vulnerabilities and Threats in Electronic Voting (Transcript of Discussion) (2008) (0)
- Privacy Is Linking Permission to Purpose. Authors' reply (2006) (0)
- 2-1-2009 Dynamic Trust Management (2015) (0)
- Privacy, Control and Internet Mobility. Authors'reply (2006) (0)
- Trust Management: An Overview (2009) (0)
- Bridging the Gap between Vulnerabilities and Threats in Electronic Voting - Abstract (2008) (0)
- A Report by an Ad Hoc Group of Cryptographers and Computer Scientists & Trusted Third Party Encryption (1998) (0)
- Key Escrow Cryptosystems (1995) (0)
- Towards flexible credential negotiation protocols. Commentary. Authors' reply (2005) (0)
- Anonymous Authentication. Authors' reply (2006) (0)
- Dynamic Trust Management (DTM) (2009) (0)
- PIM security. Discussion (2002) (0)
- Internal surveillance, external risks (2007) (0)
- An IBE-based Signcryption Scheme for Group Key Management (2016) (0)
- Government Surveillance (2020) (0)
- Regular SPKI. Commentary. Authors' reply (2005) (0)
- Just out "It's Too Complicated: Implications of IP-Based Communications..." (2016) (0)
- Protocols using keys from faulty data. Discussion (2002) (0)
- Trust Architecture for Network Knowledge (Tank) (2006) (0)
- Deniable authenticated Key establishment for Internet protocols. Commentary. Authors' reply (2005) (0)
- One-Way Cryptography (Transcript of Discussion) (2011) (0)
- Why Our Protocols Always Eventually Fail (2012) (0)
- Notes on Theoretical Limitations and Practical Vulnerabilities of Internet Surveillance Capture (2010) (0)
- A protocol's life after attacks... Commentary. Authors' reply (2005) (0)
- Financial cryptography : 6th International Conference, FC 2002, Southampton, Bermuda, March 11-14, 2002 : reveised papers (2003) (0)
- Comments on Proposed Remote Search Rules (2014) (0)
- Analyzing delegation properties. Discussion (2003) (0)
- Biochemistry. In the article “BAP-135, a target for Bruton’s tyrosine kinase in response to B cell receptor (1997) (0)
- Foundational and Systems Support for Quantitative Trust Management (QTM) (2009) (0)
- Is entity authentication necessary? Discussion (2003) (0)
- Towards a framework for autonomic security protocols. Commentary. Authors' reply (2005) (0)
- Coalition Letter to President Obama Urging Support for Encryption (2015) (0)
- Toward a Broader View of Security Protocols (Transcript of Discussion) (2004) (0)
This paper list is powered by the following services:
Other Resources About Matt Blaze
What Schools Are Affiliated With Matt Blaze?
Matt Blaze is affiliated with the following schools: