Share This Author
Divertible Protocols and Atomic Proxy Cryptography
A definition of protocol divertibility is given that applies to arbitrary 2-party protocols and is compatible with Okamoto and Ohta's definition in the case of interactive zero-knowledge proofs and generalizes to cover several protocols not normally associated with divertibility.
Decentralized trust management
- M. Blaze, J. Feigenbaum, J. Lacy
- Computer ScienceProceedings IEEE Symposium on Security and…
- 6 May 1996
This paper presents a comprehensive approach to trust management, based on a simple language for specifying trusted actions and trust relationships, and describes a prototype implementation of a new trust management system, called PolicyMaker, that will facilitate the development of security features in a wide range of network services.
The KeyNote Trust-Management System Version 2
This memo describes version 2 of the KeyNote trust-management system. It specifies the syntax and semantics of KeyNote `assertions', describes `action attribute' processing, and outlines the…
Smudge Attacks on Smartphone Touch Screens
- Adam J. Aviv, Katherine L. Gibson, Evan Mossop, M. Blaze, Jonathan M. Smith
- Computer ScienceWOOT
- 9 August 2010
This paper examines the feasibility of smudge attacks on touch screens for smartphones, and focuses on the Android password pattern, and provides a preliminary analysis of applying the information learned in a smudge attack to guessing an Android passwordpattern.
A cryptographic file system for UNIX
- M. Blaze
- Computer Science, MathematicsCCS '93
- 1 December 1993
Encryption techniques for file system-level encryption are described, and general issues of cryptographic system interfaces to support routine secure computing are discussed.
KeyNote: Trust Management for Public-Key Infrastructures (Position Paper)
The rationale for designing a simple trust-management system for public-key infrastructures, called KeyNote, based on the motivating principles are expressibility, simplicity, and extensibility is discussed.
The Role of Trust Management in Distributed Systems Security
The concept of trust management is introduced, its basic principles are explained, and some existing trust-management engines are described, including PoHcyMaker and KeyNote, which allow for increased flexibility and expressibility, as well as standardization of modern, scalable security mechanisms.
Practicality of accelerometer side channels on smartphones
This paper demonstrates how to use the accelerometer sensor to learn user tap- and gesture-based input as required to unlock smartphones using a PIN/password or Android's graphical password pattern and develops sample rate independent features for accelerometer readings based on signal processing and polynomial fitting techniques.
Compliance Checking in the PolicyMaker Trust Management System
PolicyMaker trust management system, a general tool for addressing the trust management problem of emerging electronic commerce services that use public-key cryptography on a mass-market scale, is described.
Just fast keying: Key agreement in a hostile internet
Just Fast Keying is described, a new key-exchange protocol primarily designed for use in the IP security architecture that is simple, efficient, and secure; a proof of the latter property is sketched.