User-based security model (USM) for version 3 of the simple network management protocol (SNMPv3) U Blumenthal, B Wijnen | 737 | 2002 |
Methods and apparatus for managing dependencies in distributed systems A Keller, U Blumenthal, G Kar, RD Jackson US Patent 6,847,970, 2005 | 294 | 2005 |
Provisioning active management technology (AMT) in computer systems A Eldar, HC Herbert, P Goel, U Blumenthal, D Hines, C Smith US Patent 8,438,618, 2013 | 103 | 2013 |
Classification and computation of dependencies for distributed management A Keller, U Blumenthal, G Kar Proceedings ISCC 2000. Fifth IEEE Symposium on Computers and Communications …, 2000 | 100 | 2000 |
Secure vault service for software components within an execution environment D Durham, H Khosravi, U Blumenthal, M Long US Patent 8,839,450, 2014 | 95 | 2014 |
Pre-Shared Key (PSK) Ciphersuites with NULL Encryption for Transport Layer Security (TLS) U Blumenthal, P Goel | 79 | 2007 |
The advanced encryption standard (AES) cipher algorithm in the SNMP user-based security model U Blumenthal, F Maino, K McCloghrie | 67 | 2004 |
Network security elements using endpoint resources O Ben-Shalom, U Blumenthal US Patent 8,949,986, 2015 | 61 | 2015 |
Secure platform voucher service for software components within an execution environment D Durham, HM Khosravi, U Blumenthal, M Long US Patent 8,132,003, 2012 | 58 | 2012 |
Secured one time access code A Eldar, Y Yaffe, U Blumenthal US Patent App. 11/170,400, 2007 | 53 | 2007 |
Human behaviour and the epidemiology of helminth infections: The role of behaviour in exposure to infection. DAP Bundy, UJ Blumenthal | 50 | 1990 |
Method and apparatus for OS independent platform based network access control HM Khosravi, D Larson, AD Ross, U Blumenthal, A Kroizer, A Eldar, ... US Patent App. 11/480,629, 2008 | 47 | 2008 |
Network vulnerability assessment of a host platform from an isolated partition in the host platform R Sahita, U Savagaonkar, H Khosravi, U Blumenthal US Patent 8,281,402, 2012 | 39 | 2012 |
Techniques for password attack mitigation A Eldar, I Sharoni, T Mendelson, U Blumenthal US Patent 8,132,018, 2012 | 33 | 2012 |
Authenticating access to a wireless local area network based on security value (s) associated with a cellular system M Marcovici, SB Mizikovsky, SM Patel, U Blumenthal US Patent 7,593,717, 2009 | 30 | 2009 |
Platform posture and policy information exchange method and apparatus U Blumenthal, H Khosravi, K Grewal US Patent 8,205,238, 2012 | 28 | 2012 |
RFC3414: User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3) U Blumenthal, B Wijnen RFC Editor, 2002 | 28 | 2002 |
Tamper-resistant method and apparatus for verification and measurement of host agent dynamic data updates P Rajagopal, T Schluessler, UR Savagaonkar, D Durham, R Sahita, ... US Patent App. 11/648,252, 2008 | 26 | 2008 |
Key derivation for network management applications U Blumenthal, NC Hien, B Wijnen IEEE Network 11 (3), 26-29, 1997 | 26 | 1997 |
Manageable one-time password for consumer applications M Long, U Blumenthal 2007 Digest of Technical Papers International Conference on Consumer …, 2007 | 19 | 2007 |