Matthew Smith

According to our database1, Matthew Smith authored at least 99 papers between 2004 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Deception Task Design in Developer Password Studies: Exploring a Student Sample.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

2017
Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study.
CoRR, 2017

Obstacles to the Adoption of Secure Communication Tools.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Why Do Developers Get Password Storage Wrong?: A Qualitative Usability Study.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Debunking Security-Usability Tradeoff Myths.
IEEE Security & Privacy, 2016

The Security-Usability Tradeoff Myth [Guest editors' introduction].
IEEE Security & Privacy, 2016

An Empirical Study of Textual Key-Fingerprint Representations.
Proceedings of the 25th USENIX Security Symposium, 2016

Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

SoK: Lessons Learned from Android Security Research for Appified Software Platforms.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

2015
To Pin or Not to Pin-Helping App Developers Bullet Proof Their TLS Connections.
Proceedings of the 24th USENIX Security Symposium, 2015

SoK: Secure Messaging.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Where Have You Been? Using Location-Based Security Questions for Fallback Authentication.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

No More Gotos: Decompilation Using Pattern-Independent Control-Flow Structuring and Semantic-Preserving Transformations.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

METDS - A Self-contained, Context-Based Detection System for Evil Twin Access Points.
Proceedings of the Financial Cryptography and Data Security, 2015

Ok Glass, Leave Me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing.
Proceedings of the Financial Cryptography and Data Security, 2015

VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

POSTER: Secure Chat for the Masses? User-centered Security to the Rescue.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Privacy/performance trade-off in private search on bio-medical data.
Future Generation Comp. Syst., 2014

On Usable Location Privacy for Android with Crowd-Recommendations.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014

You Won't Be Needing These Any More: On Removing Unused Certificates from Trust Stores.
Proceedings of the Financial Cryptography and Data Security, 2014

On the Awareness, Control and Privacy of Shared Photo Metadata.
Proceedings of the Financial Cryptography and Data Security, 2014

Who's Afraid of Which Bad Wolf? A Survey of IT Security Risk Awareness.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

Now you see me, now you don't: protecting smartphone authentication from shoulder surfers.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

Using personal examples to improve risk communication for security & privacy decisions.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

Hey, NSA: Stay Away from my Market! Future Proofing App Markets against Powerful Attackers.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Why eve and mallory (also) love webmasters: a study on the root causes of SSL misconfigurations.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
SnapMe if you can: privacy threats of other peoples' geo-tagged media and what we can do about it.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

On the ecological validity of a password study.
Proceedings of the Symposium On Usable Privacy and Security, 2013

Selective cloaking: Need-to-know for location-based apps.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

On the Acceptance of Privacy-Preserving Authentication Technology: The Curious Case of National Identity Cards.
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013

Sentiment Analysis on Smoking in Social Networks.
Proceedings of the MEDINFO 2013, 2013

Awareness about Photos on the Web and How Privacy-Privacy-Tradeoffs Could Help.
Proceedings of the Financial Cryptography and Data Security, 2013

Sorry, I Don't Get It: An Analysis of Warning Message Texts.
Proceedings of the Financial Cryptography and Data Security, 2013

Hey, You, Get Off of My Clipboard - On How Usability Trumps Security in Android Password Managers.
Proceedings of the Financial Cryptography and Data Security, 2013

Track F: Healthcare and sustainable living.
Proceedings of the 7th IEEE International Conference on Digital Ecosystems and Technologies, 2013

Location privacy revisited: factors of privacy decisions.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

Rethinking SSL development in an appified world.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Caching oblivious memory access: an extension to the HCRYPT virtual machine.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
All our messages are belong to us: usable confidentiality in social networks.
Proceedings of the 21st World Wide Web Conference, 2012

Evaluating the threat of epidemic mobile malware.
Proceedings of the 8th IEEE International Conference on Wireless and Mobile Computing, 2012

Confidentiality as a Service - Usable Security for the Cloud.
Proceedings of the 11th IEEE International Conference on Trust, 2012

How Practical is Homomorphically Encrypted Program Execution? An Implementation and Performance Evaluation.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Helping Johnny 2.0 to encrypt his Facebook conversations.
Proceedings of the Symposium On Usable Privacy and Security, 2012

Practical Applications of Homomorphic Encryption.
Proceedings of the SECRYPT 2012, 2012

Towards privacy-preserving access control with hidden policies, hidden credentials and hidden decisions.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

Medical case-driven classification of microblogs: characteristics and annotation.
Proceedings of the ACM International Health Informatics Symposium, 2012

A real-time architecture for detection of diseases using social networks: design, implementation and evaluation.
Proceedings of the 23rd ACM Conference on Hypertext and Social Media, 2012

TrustSplit: usable confidentiality for social network messaging.
Proceedings of the 23rd ACM Conference on Hypertext and Social Media, 2012

Fast confidential search for bio-medical data using Bloom filters and Homomorphic Cryptography.
Proceedings of the 8th IEEE International Conference on E-Science, 2012

Coupled multi-agent simulations for mobile security & privacy research.
Proceedings of the 6th IEEE International Conference on Digital Ecosystems and Technologies, 2012

Human-centric visual access control for clinical data management.
Proceedings of the 6th IEEE International Conference on Digital Ecosystems and Technologies, 2012

Big data privacy issues in public social media.
Proceedings of the 6th IEEE International Conference on Digital Ecosystems and Technologies, 2012

Towards measuring warning readability.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Why eve and mallory love android: an analysis of android SSL (in)security.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Mobile Evil Twin Malnets - The Worst of Both Worlds.
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012

2011
Secure mobile communication via identity-based cryptography and server-aided computations.
The Journal of Supercomputing, 2011

A Smart-gentry based Software System for Secret Program Execution.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

A transfer approach to detecting disease reporting events in blog social media.
Proceedings of the HT'11, 2011

Detecting Credential Abuse in the Grid Using Bayesian Networks.
Proceedings of the 12th IEEE/ACM International Conference on Grid Computing, 2011

Poster: an implementation of the fully homomorphic smart-vercauteren crypto-system.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Request/Response Aspects for Web Services.
Proceedings of the Advanced Information Systems Engineering, 2011

2010
An identity-based security infrastructure for Cloud environments.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

An attack-resilient Grid auditing infrastructure.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

Efficient Distribution of Virtual Machines for Cloud Computing.
Proceedings of the 18th Euromicro Conference on Parallel, 2010

Reaching for the Cloud: On the Lessons Learned from Grid Computing Technology Transfer Process to the Biomedical Community.
Proceedings of the MEDINFO 2010, 2010

Rethinking Algorithm Design and Development in Speech Processing.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

Early defense: enabling attribute-based authorization in Grid firewalls.
Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing, 2010

On Transferring the Grid Technology to the Biomedical Community.
Proceedings of the Healthgrid Applications and Core Technologies, 2010

Metabolic Flux Analysis in the Cloud.
Proceedings of the Sixth International Conference on e-Science, 2010

2009
Secure on-demand grid computing.
Future Generation Comp. Syst., 2009

TrueIP: prevention of IP spoofing attacks using identity-based cryptography.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

Securing Mobile Phone Calls with Identity-Based Cryptography.
Proceedings of the Advances in Information Security and Assurance, 2009

A Streaming Intrusion Detection System for Grid Computing Environments.
Proceedings of the 11th IEEE International Conference on High Performance Computing and Communications, 2009

Secure Service-Oriented Grid Computing with Public Virtual Worker Nodes.
Proceedings of the 35th Euromicro Conference on Software Engineering and Advanced Applications, 2009

Identity-Based Cryptography for Securing Mobile Phone Calls.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
Security for service-oriented on-demand grid computing.
PhD thesis, 2008

Secure Grid Micro-Workflows Using Virtual Workspaces.
Proceedings of the 34th Euromicro Conference on Software Engineering and Advanced Applications, 2008

An Identity-Based Key Agreement Protocol for the Network Layer.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008

Securing stateful grid servers through virtual server rotation.
Proceedings of the 17th International Symposium on High-Performance Distributed Computing (HPDC-17 2008), 2008

Composition and Execution of Secure Workflows in WSRF-Grids.
Proceedings of the 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2008), 2008

Resource Evaluation and Node Monitoring in Service Oriented Ad-hoc Grids.
Proceedings of the Sixth Australasian Symposium on Grid Computing and e-Research, 2008

2007
Native Code Security for Grid Services.
Proceedings of the eOrganisation: Service-, Prozess-, Market-Engineering: 8. Internationale Tagung Wirtschaftsinformatik, 2007

Sleep Medicine as a Scenario for Medical Grid Application.
Proceedings of the From Genes to Personalized HealthCare: Grid Solutions for the Life Sciences, 2007

Building a demilitarized zone with data encryption for grid environments.
Proceedings of the 1st International ICST Conference on Networks for Grid Applications, 2007

2006
Countering security threats in service-oriented on-demand grid computing using sandboxing and trusted computing techniques.
J. Parallel Distrib. Comput., 2006

Xen and the Art of Cluster Scheduling.
Proceedings of the First International Workshop on Virtualization Technology in Distributed Computing, 2006

Runtime Integration of Reconfigurable Hardware in Service-Oriented Grids.
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006

Flex-SwA: Flexible Exchange of Binary Data Based on SOAP Messages with Attachments.
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006

Towards a Roadcasting Communications Infrastructure.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

Collaborative Grid Process Creation Support in an Engineering Domain.
Proceedings of the High Performance Computing, 2006

GDT: A Toolkit for Grid Service Development.
Proceedings of the Conference Proceedings NODe 2006, 2006

Security Issues in On-Demand Grid and Cluster Computing.
Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 2006

Model Driven Development of Service-Oriented Grid Applications.
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006

2005
A Robust Business Resource Management Framework Based on a Peer-to-Peer Infrastructure.
Proceedings of the 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 2005

Trust Shaping: Adapting Trust Establishment and Management to Application Requirements in a Service-Oriented Grid Environment.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005

Intra-engine service security for grids based on WSRF.
Proceedings of the 5th International Symposium on Cluster Computing and the Grid (CCGrid 2005), 2005

2004
Towards a Service-Oriented Ad Hoc Grid.
Proceedings of the 3rd International Symposium on Parallel and Distributed Computing (ISPDC 2004), 2004

Hot service deployment in an ad hoc grid environment.
Proceedings of the Service-Oriented Computing, 2004


  Loading...