Follow
David Balenson
Title
Cited by
Cited by
Year
Key management for large dynamic groups: One-way function trees and amortized initialization
D Balenson, D McGrew, A Sherman
Internet-Draft, 1999
3551999
System and method for data recovery
SB Lipner, DM Balenson, CM Ellison, ST Walker
US Patent 5,557,765, 1996
2671996
System and method for controlling access to a user secret
SB Lipner, DM Balenson, CM Ellison, ST Walker
US Patent 5,745,573, 1998
2071998
Privacy enhancement for internet electronic mail: Part III: algorithms, modes, and identifiers
D Balenson
1961993
System and method for key escrow encryption
SB Lipner, DM Balenson, CM Ellison, ST Walker
US Patent 5,557,346, 1996
1841996
System and method for controlling access to a user secret using a key recovery field
DW Carman, DM Balenson, H Tajalli, ST Walker
US Patent 6,272,632, 2001
1812001
System and method for data recovery
SB Lipner, DM Balenson, CM Ellison, ST Walker
US Patent 5,991,406, 1999
1391999
System and method for access field verification
SB Lipner, DM Balenson, CM Ellison, ST Walker
US Patent 5,640,454, 1997
851997
Privacy enhancement for internet electronic mail: Part III: Algorithms, modes
D Balenson
and Identifiers. RFC 1423, 1993
781993
Commercial key recovery
ST Walker, SB Lipner, CM Ellison, DM Balenson
Communications of the ACM 39 (3), 41-47, 1996
701996
System and method for access field verification
SB Lipner, DM Balenson, CM Ellison, ST Walker
US Patent 5,956,403, 1999
691999
Policy-based security management for large dynamic groups: An overview of the DCCM project
PT Dinsmore, DM Balenson, M Heyman, PS Kruus, CD Scace, ...
Proceedings DARPA Information Survivability Conference and Exposition …, 2000
622000
Crossing the" Valley of Death": Transitioning cybersecurity research into practice
D Maughan, D Balenson, U Lindqvist, Z Tudor
IEEE Security & Privacy 11 (2), 14-23, 2013
402013
A new approach to software key escrow encryption
DM Balenson, CM Ellison, SB Lipner, ST Walker
Draft, August, 1994
261994
Cybersecurity experimentation of the future (CEF): catalyzing a new generation of experimental cybersecurity research
D Balenson, L Tinnel, T Benzel
SRI International, Tech. Rep., 2015
222015
Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization. draft-balenson-groupkeymgmtoft-00. txt
D Balenson, D McGrew, A Sherman
IETF, February, 1999
221999
Automated distribution of cryptographic keys using the financial institution key management standard
D Balenson
IEEE Communications Magazine 23 (9), 41-46, 1985
221985
Privacy Enhancement for Internet Electronic Mail: Part III: Algorithms
D Balenson
Modes, and Identifiers, 1993
211993
Barriers to science in security
T Longstaff, D Balenson, M Matties
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
192010
Using a WWW-based mail user agent for secure electronic mail service for health care users
T Kiuchi, K Ohe, S Kaihara
Methods of information in medicine 37 (03), 247-253, 1998
181998
The system can't perform the operation now. Try again later.
Articles 1–20