Matthew Green
Orcid: 0000-0002-6143-0683Affiliations:
- Johns Hopkins University, Baltimore, MD, USA
According to our database1,
Matthew Green
authored at least 94 papers
between 2000 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on twitter.com
-
on orcid.org
-
on github.com
On csauthors.net:
Bibliography
2025
Mirror Mirror on the Wall, Have I Forgotten it All? A New Framework for Evaluating Machine Unlearning.
CoRR, May, 2025
IACR Cryptol. ePrint Arch., 2025
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
2024
IACR Cryptol. ePrint Arch., 2024
Abuse-Resistant Location Tracking: Balancing Privacy and Safety in the Offline Finding Ecosystem.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the Public-Key Cryptography - PKC 2024, 2024
Proceedings of the International Conference on Machine Learning and Applications, 2024
Proceedings of the Financial Cryptography and Data Security, 2024
2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Proc. Priv. Enhancing Technol., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Theory of Cryptography - 20th International Conference, 2022
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Data Security on Mobile Devices: Current State of the Art, Open Problems, and Proposed Solutions.
CoRR, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the IEEE International Conference on Internet of Things and Intelligence Systems, 2021
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
2018
Commun. ACM, 2018
Proceedings of the 4th International Conference on Vehicle Technology and Intelligent Transport Systems, 2018
A Multi-party Protocol for Constructing the Public Parameters of the Pinocchio zk-SNARK.
Proceedings of the Financial Cryptography and Data Security, 2018
Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Financial Cryptography and Data Security, 2017
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Fairness in an Unfair World: Fair Multiparty Computation from Public Bulletin Boards.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
IEEE Secur. Priv., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the Financial Cryptography and Data Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Keys under doormats: mandating insecurity by requiring government access to all data and communications.
J. Cybersecur., 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the Financial Cryptography and Data Security, 2014
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014
2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Proceedings of the 3rd USENIX Workshop on Health Security and Privacy, 2012
Proceedings of the Public Key Cryptography - PKC 2012, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes.
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
ACM Trans. Inf. Syst. Secur., 2011
A Research Roadmap for Healthcare IT Security Inspired by the PCAST Health Information Technology Report.
Proceedings of the 2nd USENIX Workshop on Health Security and Privacy, 2011
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011
Securing electronic medical records using attribute-based encryption on mobile devices.
Proceedings of the SPSM'11, 2011
2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Proceedings of the Public Key Cryptography, 2009
Proceedings of the Topics in Cryptology, 2009
2008
Proceedings of the Advances in Cryptology, 2008
2007
Proceedings of the Advances in Cryptology, 2007
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
2006
2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage.
Proceedings of the Network and Distributed System Security Symposium, 2005
2004
Selection of a time-varying quadratic Volterra model using a wavelet packet basis expansion.
IEEE Trans. Signal Process., 2004
2003
Proceedings of BSDCon 2003, San Mateo, California, USA, September 8-12, 2003, 2003
2001
IEEE Internet Comput., 2001
2000
Proceedings of the IEEE International Conference on Acoustics, 2000