Name
Affiliation
Papers
MATT BLAZE
university of pennsylvania
86
Collaborators
Citations 
PageRank 
103
3189
381.70
Referers 
Referees 
References 
5633
1027
752
Search Limit
1001000
Title
Citations
PageRank
Year
An IBE-based Signcryption Scheme for Group Key Management.00.342016
Insecure Surveillance: Technical Issues with Remote Computer Searches.00.342016
Smearing Fingerprints: Changing the Game of Web Tracking with Composite Privacy.00.342015
Keys under doormats: mandating insecurity by requiring government access to all data and communications.90.702015
Keys under doormats100.852015
The design and implementation of the A3 application-aware anonymity platform10.352014
Privacy-aware message exchanges for HumaNets.30.372014
Moving Targets: Security and Rapid-Release in Firefox30.392014
Going Bright: Wiretapping without Weakening Communications Infrastructure40.462013
The casino and the OODA loop: why our protocols always eventually fail00.342012
Practicality of accelerometer side channels on smartphones391.192012
Collaborative red teaming for anonymity system evaluation00.342012
The casino and the OODA loop: why our protocols always eventually fail (transcript of discussion)00.342012
Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks.80.552012
One-Way cryptography10.492011
One-Way cryptography (transcript of discussion)00.342011
Why (special agent) Johnny (still) can't encrypt: a security analysis of the APCO project 25 two-way radio system181.212011
Key escrow from a safe distance: looking back at the Clipper Chip20.372011
Evading cellular data monitoring with human movement networks60.502010
Smudge Attacks on Smartphone Touch Screens.00.342010
Smudge attacks on smartphone touch screens2119.702010
Familiarity breeds contempt: the honeymoon effect and the role of legacy code in zero-day vulnerabilities140.942010
A3: An Extensible Platform for Application-Aware Anonymity.180.732010
Blood in the Water - Are there Honeymoon Effects Outside Software?20.432010
QuanTM: a quantitative trust management system100.592009
Can they hear me now?: a security analysis of law enforcement wiretaps20.532009
Scalable Link-Based Relay Selection for Anonymous Routing250.932009
Anonymity in Wireless Broadcast Networks90.582009
Below the Salt.00.342009
Is the Honeymoon over?00.342009
Dynamic Trust Management111.752009
Application containers without virtual machines40.382009
Veracity: practical secure network coordinates via vote-based agreements230.792009
Taking Surveillance Out of the Shadows80.682009
Veracity: a fully decentralized service for securing network coordinate systems140.782008
On the (un)reliability of eavesdropping90.472008
Security evaluation of ES&S voting machines and election management system140.942008
Bridging the gap between vulnerabilities and threats in electronic voting (transcript of discussion)00.342008
Bridging the Gap between Vulnerabilities and Threats in Electronic Voting - Abstract.00.342008
Internal surveillance, external risks10.352007
Towards application-aware anonymous routing90.622007
Security Protocols with Isotropic Channels.00.342006
Sensor network security: more interesting than you think60.552006
Keyboards and covert channels683.052006
The real national-security needs for VoIP40.612005
Signaling vulnerabilities in wiretapping systems121.212005
Listen too closely and you may be confused30.412005
Listen Too Closely and You May Be Confused20.392005
Picking Locks with Cryptology00.342005
Just fast keying: Key agreement in a hostile internet563.572004
  • 1
  • 2