Uri Blumenthal
Uri Blumenthal
Associate Staff, MIT Lincoln Laboratory
Verified email at
Cited by
Cited by
User-based security model (USM) for version 3 of the simple network management protocol (SNMPv3)
U Blumenthal, B Wijnen
Methods and apparatus for managing dependencies in distributed systems
A Keller, U Blumenthal, G Kar, RD Jackson
US Patent 6,847,970, 2005
Provisioning active management technology (AMT) in computer systems
A Eldar, HC Herbert, P Goel, U Blumenthal, D Hines, C Smith
US Patent 8,438,618, 2013
Classification and computation of dependencies for distributed management
A Keller, U Blumenthal, G Kar
Proceedings ISCC 2000. Fifth IEEE Symposium on Computers and Communications …, 2000
Secure vault service for software components within an execution environment
D Durham, H Khosravi, U Blumenthal, M Long
US Patent 8,839,450, 2014
Pre-Shared Key (PSK) Ciphersuites with NULL Encryption for Transport Layer Security (TLS)
U Blumenthal, P Goel
The advanced encryption standard (AES) cipher algorithm in the SNMP user-based security model
U Blumenthal, F Maino, K McCloghrie
Secure platform voucher service for software components within an execution environment
D Durham, HM Khosravi, U Blumenthal, M Long
US Patent 8,132,003, 2012
Network security elements using endpoint resources
O Ben-Shalom, U Blumenthal
US Patent 8,949,986, 2015
Secured one time access code
A Eldar, Y Yaffe, U Blumenthal
US Patent App. 11/170,400, 2007
Method and apparatus for OS independent platform based network access control
HM Khosravi, D Larson, AD Ross, U Blumenthal, A Kroizer, A Eldar, ...
US Patent App. 11/480,629, 2008
Human behaviour and the epidemiology of helminth infections: The role of behaviour in exposure to infection.
DAP Bundy, UJ Blumenthal
Parasitism and host behaviour, 264-289, 1990
Network vulnerability assessment of a host platform from an isolated partition in the host platform
R Sahita, U Savagaonkar, H Khosravi, U Blumenthal
US Patent 8,281,402, 2012
Techniques for password attack mitigation
A Eldar, I Sharoni, T Mendelson, U Blumenthal
US Patent 8,132,018, 2012
Authenticating access to a wireless local area network based on security value (s) associated with a cellular system
M Marcovici, SB Mizikovsky, SM Patel, U Blumenthal
US Patent 7,593,717, 2009
RFC3414: User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3)
U Blumenthal, B Wijnen
RFC Editor, 2002
Platform posture and policy information exchange method and apparatus
U Blumenthal, H Khosravi, K Grewal
US Patent 8,205,238, 2012
Key derivation for network management applications
U Blumenthal, NC Hien, B Wijnen
IEEE Network 11 (3), 26-29, 1997
Tamper-resistant method and apparatus for verification and measurement of host agent dynamic data updates
P Rajagopal, T Schluessler, UR Savagaonkar, D Durham, R Sahita, ...
US Patent App. 11/648,252, 2008
Manageable one-time password for consumer applications
M Long, U Blumenthal
2007 Digest of Technical Papers International Conference on Consumer …, 2007
The system can't perform the operation now. Try again later.
Articles 1–20