Key management for large dynamic groups: One-way function trees and amortized initialization D Balenson, D McGrew, A Sherman Internet-Draft, 1999 | 356 | 1999 |
System and method for data recovery SB Lipner, DM Balenson, CM Ellison, ST Walker US Patent 5,557,765, 1996 | 267 | 1996 |
System and method for controlling access to a user secret SB Lipner, DM Balenson, CM Ellison, ST Walker US Patent 5,745,573, 1998 | 207 | 1998 |
Privacy enhancement for internet electronic mail: Part III: algorithms, modes, and identifiers D Balenson | 196 | 1993 |
System and method for key escrow encryption SB Lipner, DM Balenson, CM Ellison, ST Walker US Patent 5,557,346, 1996 | 184 | 1996 |
System and method for controlling access to a user secret using a key recovery field DW Carman, DM Balenson, H Tajalli, ST Walker US Patent 6,272,632, 2001 | 181 | 2001 |
System and method for data recovery SB Lipner, DM Balenson, CM Ellison, ST Walker US Patent 5,991,406, 1999 | 139 | 1999 |
System and method for access field verification SB Lipner, DM Balenson, CM Ellison, ST Walker US Patent 5,640,454, 1997 | 86 | 1997 |
Privacy enhancement for internet electronic mail: Part III: Algorithms, modes D Balenson and Identifiers. RFC 1423, 1993 | 78 | 1993 |
Commercial key recovery ST Walker, SB Lipner, CM Ellison, DM Balenson Communications of the ACM 39 (3), 41-47, 1996 | 70 | 1996 |
System and method for access field verification SB Lipner, DM Balenson, CM Ellison, ST Walker US Patent 5,956,403, 1999 | 69 | 1999 |
Policy-based security management for large dynamic groups: An overview of the DCCM project PT Dinsmore, DM Balenson, M Heyman, PS Kruus, CD Scace, ... Proceedings DARPA Information Survivability Conference and Exposition …, 2000 | 62 | 2000 |
Crossing the" Valley of Death": Transitioning cybersecurity research into practice D Maughan, D Balenson, U Lindqvist, Z Tudor IEEE Security & Privacy 11 (2), 14-23, 2013 | 42 | 2013 |
A new approach to software key escrow encryption DM Balenson, CM Ellison, SB Lipner, ST Walker Draft, August, 1994 | 26 | 1994 |
Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization. draft-balenson-groupkeymgmtoft-00. txt D Balenson, D McGrew, A Sherman IETF, February, 1999 | 23 | 1999 |
Cybersecurity experimentation of the future (CEF): catalyzing a new generation of experimental cybersecurity research D Balenson, L Tinnel, T Benzel SRI International, Tech. Rep., 2015 | 22 | 2015 |
Automated distribution of cryptographic keys using the financial institution key management standard D Balenson IEEE Communications Magazine 23 (9), 41-46, 1985 | 22 | 1985 |
Barriers to science in security T Longstaff, D Balenson, M Matties Proceedings of the 26th Annual Computer Security Applications Conference …, 2010 | 21 | 2010 |
Privacy Enhancement for Internet Electronic Mail: Part III: Algorithms D Balenson Modes, and Identifiers, 1993 | 21 | 1993 |
Using a WWW-based mail user agent for secure electronic mail service for health care users T Kiuchi, K Ohe, S Kaihara Methods of information in medicine 37 (03), 247-253, 1998 | 18 | 1998 |