1. Keys under doormats: mandating insecurity by requiring government access to all data and communications Abelson, Hal; Anderson, Ross; Bellovin, Steven Michael; Benaloh, Josh; Blaze, Matt; Diffie, Whitfield; Gilmore, John; Green, Matthew; Landau, Susan; Neumann, Peter G.; Rivest, Ronald L.; Schiller, Jeffrey I.; Schneier, Bruce; Specter, Michael A.; Weitzner, Daniel J. 2015 Articles Computer networks--Security measuresComputer securityInternet--Security measuresComputer science
2. Anonymity in Wireless Broadcast Networks Blaze, Matt; Ioannidis, John; Keromytis, Angelos D.; Malkin, Tal G.; Rubin, Avi 2009 Articles Computer science
3. Dynamic Trust Management Blaze, Matt; Kannan, Sampath; Lee, Insup; Sokolsky, Oleg; Smith, Jonathan M.; Keromytis, Angelos D.; Lee, Wenke 2009 Articles Computer science
4. Risking Communications Security: Potential Hazards of the Protect America Act Bellovin, Steven Michael; Blaze, Matt; Diffie, Whitfield; Landau, Susan; Neumann, Peter G.; Rexford, Jennifer 2008 Articles Computer science
5. Security Implications of Applying the Communications Assistance to Law Enforcement Act to Voice over IP Bellovin, Steven Michael; Blaze, Matt; Brickell, Ernest; Brooks, Clinton; Cerf, Vinton; Diffie, Whitfield; Landau, Susan; Peterson, Jon; Treichler, John 2006 Articles Computer science
6. Just Fast Keying: Key Agreement in a Hostile Internet Aiello, William; Bellovin, Steven Michael; Blaze, Matt; Canetti, Ran; Ioannidis, John; Keromytis, Angelos D.; Reingold, Omer 2004 Articles Computer science
7. Experience with the KeyNote Trust Management System: Applications and Future Directions Blaze, Matt; Ioannidis, John; Keromytis, Angelos D. 2003 Articles Computer science
8. TAPI: Transactions for Accessing Public Infrastructure Blaze, Matt; Ioannidis, John; Ioannidis, Sotiris; Keromytis, Angelos D.; Nikander, Pekka; Prevelakis, Vassilis 2003 Articles Computer science
9. Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols Aiello, William; Bellovin, Steven Michael; Blaze, Matt; Canetti, Ran; Ioannidis, John; Keromytis, Angelos D.; Reingold, Omer 2002 Articles Computer science
10. Trust Management for IPsec Blaze, Matt; Ioannidis, John; Keromytis, Angelos D. 2002 Articles Computer science
11. Cryptographic Modes of Operation for the Internet Bellovin, Steven Michael; Blaze, Matt 2001 Articles Computer science
12. Efficient, DoS-resistant, Secure Key Exchange for Internet Protocols Aiello, William; Bellovin, Steven Michael; Blaze, Matt; Ioannidis, John; Canetti, Ran; Keromytis, Angelos D.; Reingold, Omer 2001 Articles Computer science
13. Offline Micropayments without Trusted Hardware Blaze, Matt; Ioannidis, John; Keromytis, Angelos D. 2001 Articles Computer science
14. KeyNote: Trust Management for Public-Key Infrastructures Blaze, Matt; Feigenbaum, Joan; Keromytis, Angelos D. 1998 Articles Computer science
15. The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption Abelson, Hal; Anderson, Ross; Bellovin, Steven Michael; Benaloh, Josh; Blaze, Matt; Diffie, Whitfield; Gilmore, John; Neumann, Peter G.; Rivest, Ronald L.; Schiller, Jeffrey I.; Schneier, Bruce 1997 Articles Computer science