Key management for large dynamic groups: One-way function trees and amortized initialization D Balenson, D McGrew, A Sherman Internet-Draft, 1999 | 354 | 1999 |
System and method for data recovery SB Lipner, DM Balenson, CM Ellison, ST Walker US Patent 5,557,765, 1996 | 268 | 1996 |
System and method for controlling access to a user secret SB Lipner, DM Balenson, CM Ellison, ST Walker US Patent 5,745,573, 1998 | 207 | 1998 |
Privacy enhancement for internet electronic mail: Part III: algorithms, modes, and identifiers D Balenson | 196 | 1993 |
System and method for key escrow encryption SB Lipner, DM Balenson, CM Ellison, ST Walker US Patent 5,557,346, 1996 | 184 | 1996 |
System and method for controlling access to a user secret using a key recovery field DW Carman, DM Balenson, H Tajalli, ST Walker US Patent 6,272,632, 2001 | 180 | 2001 |
System and method for data recovery SB Lipner, DM Balenson, CM Ellison, ST Walker US Patent 5,991,406, 1999 | 139 | 1999 |
System and method for access field verification SB Lipner, DM Balenson, CM Ellison, ST Walker US Patent 5,640,454, 1997 | 85 | 1997 |
Privacy enhancement for internet electronic mail: Part III: Algorithms, modes D Balenson and Identifiers. RFC 1423, 1993 | 82 | 1993 |
System and method for access field verification SB Lipner, DM Balenson, CM Ellison, ST Walker US Patent 5,956,403, 1999 | 69 | 1999 |
Commercial key recovery ST Walker, SB Lipner, CM Ellison, DM Balenson Communications of the ACM 39 (3), 41-47, 1996 | 69 | 1996 |
Policy-based security management for large dynamic groups: An overview of the DCCM project PT Dinsmore, DM Balenson, M Heyman, PS Kruus, CD Scace, ... Proceedings DARPA Information Survivability Conference and Exposition …, 2000 | 63 | 2000 |
Crossing the" Valley of Death": Transitioning cybersecurity research into practice D Maughan, D Balenson, U Lindqvist, Z Tudor IEEE Security & Privacy 11 (2), 14-23, 2013 | 38 | 2013 |
A new approach to software key escrow encryption DM Balenson, CM Ellison, SB Lipner, ST Walker Draft, August, 1994 | 25 | 1994 |
Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization. draft-balenson-groupkeymgmtoft-00. txt D Balenson, D McGrew, A Sherman IETF, February, 1999 | 22 | 1999 |
Automated distribution of cryptographic keys using the financial institution key management standard D Balenson IEEE Communications Magazine 23 (9), 41-46, 1985 | 22 | 1985 |
Cybersecurity experimentation of the future (CEF): catalyzing a new generation of experimental cybersecurity research D Balenson, L Tinnel, T Benzel SRI International, Tech. Rep., 2015 | 21 | 2015 |
Privacy Enhancement for Internet Electronic Mail: Part III: Algorithms D Balenson Modes, and Identifiers, 1993 | 20 | 1993 |
Barriers to science in security T Longstaff, D Balenson, M Matties Proceedings of the 26th Annual Computer Security Applications Conference …, 2010 | 18 | 2010 |
Commercial key escrow: Something for everyone now and for the future ST Walker, SB Lipner, CM Ellison, DK Branstad, DM Balenson TIS report, 1995 | 16 | 1995 |