default search action
Matthew Smith 0001
Person information
- affiliation: University of Bonn, Institute of Computer Science, Germany
- affiliation: Leibniz University of Hannover, Institute of Distributed Systems, Germany
- affiliation (PhD): University of Marburg, Department of Mathematics and Computer Science, Marburg, Germany
Other persons with the same name
- Matthew Smith — disambiguation page
- Matthew Smith 0003 — University of Cambridge, Department of Chemistry, UK
- Matthew Smith 0004 — Valparaiso University, Information Technology, IN, USA
- Matthew Smith 0005 — Queens College New York, Library and Information Science, UK
- Matthew Smith 0006 — University of Oxford, UK
- Matthew Smith 0007 — University of Warwick, Department of Statistics, UK
- Matthew Smith 0008 — University of Washington, Department of Earth and Space Sciences, Seattle, WA, USA
- Matthew Smith 0009 — University of Greenwich, London, UK
- Matthew Smith 0010 — York St. John University, UK (and 1 more)
- Matthew Smith 0011 — Complutense University of Madrid, Spain (and 1 more)
- Matthew Smith 0012 — CEA Technologies, Australia
- Matthew Smith 0013 (aka: Matt Smith 0013) — University of Canterbury, Department of Computer Science, Christchurch, New Zealand (and 1 more)
- Matthew Smith 0014 (aka: Matthew J. A. Smith) — McGill University, Department of Computer Science, Quebec, Canada
- Matthew Smith 0015 — Drexel University, Digital Media Labs, Philadelphia, PA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c117]Maximilian Häring, Julia Angelika Grohs, Eva Tiefenau, Matthew Smith, Christian Tiefenau:
Can Johnny be a whistleblower? A qualitative user study of a social authentication Signal extension in an adversarial scenario. SOUPS @ USENIX Security Symposium 2024: 259-278 - 2023
- [j9]Peter Leo Gorski, Luigi Lo Iacono, Matthew Smith:
Eight Lightweight Usable Security Principles for Developers. IEEE Secur. Priv. 21(1): 20-26 (2023) - [c116]Stephan Plöger, Mischa Meier, Matthew Smith:
A Usability Evaluation of AFL and libFuzzer with CS Students. CHI 2023: 186:1-186:18 - [c115]Maximilian Häring, Eva Gerlitz, Matthew Smith, Christian Tiefenau:
Less About Privacy: Revisiting a Survey about the German COVID-19 Contact Tracing App. CHI 2023: 584:1-584:16 - [c114]Anna-Marie Ortloff, Matthias Fassl, Alexander Ponticello, Florin Martius, Anne Mertens, Katharina Krombholz, Matthew Smith:
Different Researchers, Different Results? Analyzing the Influence of Researcher Experience and Data Type During Qualitative Analysis of an Interview and Survey Study on Security Advice. CHI 2023: 864:1-864:21 - [c113]Eva Gerlitz, Maximilian Häring, Matthew Smith, Christian Tiefenau:
Evolution of Password Expiry in Companies: Measuring the Adoption of Recommendations by the German Federal Office for Information Security. SOUPS 2023: 191-210 - [c112]Eva Gerlitz, Maximilian Häring, Charlotte Theresa Mädler, Matthew Smith, Christian Tiefenau:
Adventures in Recovery Land: Testing the Account Recovery of Popular Websites When the Second Factor is Lost. SOUPS 2023: 227-243 - [c111]Anna-Marie Ortloff, Christian Tiefenau, Matthew Smith:
SoK: I Have the (Developer) Power! Sample Size Estimation for Fisher's Exact, Chi-Squared, McNemar's, Wilcoxon Rank-Sum, Wilcoxon Signed-Rank and t-tests in Developer-Centered Usable Security. SOUPS 2023: 341-359 - [c110]Lisa Geierhaas, Fabian Otto, Maximilian Häring, Matthew Smith:
Attitudes towards Client-Side Scanning for CSAM, Terrorism, Drug Trafficking, Drug Use and Tax Evasion in Germany. SP 2023: 217-233 - 2022
- [c109]Anastasia Danilova, Stefan Horstmann, Matthew Smith, Alena Naiakshina:
Testing Time Limits in Screener Questions for Online Surveys with Programmers. ICSE 2022: 2080-2090 - [c108]Lisa Geierhaas, Anna-Marie Ortloff, Matthew Smith, Alena Naiakshina:
Let's Hash: Helping Developers with Password Security. SOUPS @ USENIX Security Symposium 2022: 503-522 - 2021
- [c107]Maxim Schessler, Eva Gerlitz, Maximilian Häring, Matthew Smith:
Replication: Measuring User Perceptions in Smartphone Security and Privacy in Germany. EuroUSEC 2021: 165-179 - [c106]Anastasia Danilova, Alena Naiakshina, Stefan Horstmann, Matthew Smith:
Do you really code? Designing and Evaluating Screening Questions for Online Surveys with Programmers. ICSE 2021: 537-548 - [c105]Eva Gerlitz, Maximilian Häring, Matthew Smith:
Please do not use !?_ or your License Plate Number: Analyzing Password Policies in German Companies. SOUPS @ USENIX Security Symposium 2021: 17-36 - [c104]Maximilian Häring, Eva Gerlitz, Christian Tiefenau, Matthew Smith, Dominik Wermke, Sascha Fahl, Yasemin Acar:
Never ever or no matter what: Investigating Adoption Intentions and Misconceptions about the Corona-Warn-App in Germany. SOUPS @ USENIX Security Symposium 2021: 77-98 - [c103]Anastasia Danilova, Alena Naiakshina, Anna Rasgauski, Matthew Smith:
Code Reviewing as Methodology for Online Security Studies with Developers - A Case Study with Freelancers on Password Storage. SOUPS @ USENIX Security Symposium 2021: 397-416 - [c102]Stephan Plöger, Mischa Meier, Matthew Smith:
A Qualitative Usability Evaluation of the Clang Static Analyzer and libFuzzer with CS Students and CTF Players. SOUPS @ USENIX Security Symposium 2021: 553-572 - [i3]Anastasia Danilova, Alena Naiakshina, Stefan Horstmann, Matthew Smith:
Do you really code? Designing and Evaluating Screening Questions for Online Surveys with Programmers. CoRR abs/2103.04429 (2021) - 2020
- [j8]Karoline Busse, Jennifer Seifert, Matthew Smith:
Exploring the security narrative in the work context. J. Cybersecur. 6(1) (2020) - [c101]Alena Naiakshina, Anastasia Danilova, Eva Gerlitz, Matthew Smith:
On Conducting Security Developer Studies with CS Students: Examining a Password-Storage Study with CS Students, Freelancers, and Company Developers. CHI 2020: 1-13 - [c100]Claudia Bischoff, Eva Gerlitz, Matthew Smith:
Vision: I don't want to use my Phone! A Cognitive Walkthrough for YubiKeys. EuroS&P Workshops 2020: 160-165 - [c99]Karoline Busse, Mohammad Tahaei, Katharina Krombholz, Emanuel von Zezschwitz, Matthew Smith, Jing Tian, Wenyuan Xu:
Cash, Cards or Cryptocurrencies? A Study of Payment Culture in Four Countries. EuroS&P Workshops 2020: 200-209 - [c98]Anastasia Danilova, Alena Naiakshina, Matthew Smith:
One size does not fit all: a grounded theory and online survey study of developer preferences for security warning types. ICSE 2020: 136-148 - [c97]Anastasia Danilova, Alena Naiakshina, Johanna Deuter, Matthew Smith:
Replication: On the Ecological Validity of Online Security Developer Studies: Exploring Deception in a Password-Storage Study with Freelancers. SOUPS @ USENIX Security Symposium 2020: 165-183
2010 – 2019
- 2019
- [c96]Christian Tiefenau, Emanuel von Zezschwitz, Maximilian Häring, Katharina Krombholz, Matthew Smith:
A Usability Evaluation of Let's Encrypt and Certbot: Usable Security Done Right. CCS 2019: 1971-1988 - [c95]Alena Naiakshina, Anastasia Danilova, Eva Gerlitz, Emanuel von Zezschwitz, Matthew Smith:
"If you want, I can store the encrypted password": A Password-Storage Field Study with Freelance Developers. CHI 2019: 140 - [c94]Sergej Dechand, Alena Naiakshina, Anastasia Danilova, Matthew Smith:
In Encryption We Don't Trust: The Effect of End-to-End Encryption to the Masses on User Perception. EuroS&P 2019: 401-415 - [c93]Karoline Busse, Julia Schäfer, Matthew Smith:
Replication: No One Can Hack My Mind Revisiting a Study on Expert and Non-Expert Security Practices and Advice. SOUPS @ USENIX Security Symposium 2019 - [c92]Katharina Krombholz, Karoline Busse, Katharina Pfeffer, Matthew Smith, Emanuel von Zezschwitz:
"If HTTPS Were Secure, I Wouldn't Need 2FA" - End User and Administrator Mental Models of HTTPS. IEEE Symposium on Security and Privacy 2019: 246-263 - [i2]Adam Shostack, Matthew Smith, Sam Weber, Mary Ellen Zurko:
Empirical Evaluation of Secure Development Processes (Dagstuhl Seminar 19231). Dagstuhl Reports 9(6): 1-25 (2019) - 2018
- [c91]Alena Naiakshina, Anastasia Danilova, Christian Tiefenau, Matthew Smith:
Deception Task Design in Developer Password Studies: Exploring a Student Sample. SOUPS @ USENIX Security Symposium 2018: 297-313 - 2017
- [c90]Alena Naiakshina, Anastasia Danilova, Christian Tiefenau, Marco Herzog, Sergej Dechand, Matthew Smith:
Why Do Developers Get Password Storage Wrong?: A Qualitative Usability Study. CCS 2017: 311-328 - [c89]Ruba Abu-Salma, M. Angela Sasse, Joseph Bonneau, Anastasia Danilova, Alena Naiakshina, Matthew Smith:
Obstacles to the Adoption of Secure Communication Tools. IEEE Symposium on Security and Privacy 2017: 137-153 - [i1]Alena Naiakshina, Anastasia Danilova, Christian Tiefenau, Marco Herzog, Sergej Dechand, Matthew Smith:
Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study. CoRR abs/1708.08759 (2017) - 2016
- [j7]M. Angela Sasse, Matthew Smith:
The Security-Usability Tradeoff Myth [Guest editors' introduction]. IEEE Secur. Priv. 14(5): 11-13 (2016) - [j6]M. Angela Sasse, Matthew Smith, Cormac Herley, Heather Lipford, Kami Vaniea:
Debunking Security-Usability Tradeoff Myths. IEEE Secur. Priv. 14(5): 33-39 (2016) - [j5]Matthew Green, Matthew Smith:
Developers are Not the Enemy!: The Need for Usable Security APIs. IEEE Secur. Priv. 14(5): 40-46 (2016) - [c88]Khaled Yakdan, Sergej Dechand, Elmar Gerhards-Padilla, Matthew Smith:
Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study. IEEE Symposium on Security and Privacy 2016: 158-177 - [c87]Yasemin Acar, Michael Backes, Sven Bugiel, Sascha Fahl, Patrick D. McDaniel, Matthew Smith:
SoK: Lessons Learned from Android Security Research for Appified Software Platforms. IEEE Symposium on Security and Privacy 2016: 433-451 - [c86]Sergej Dechand, Dominik Schürmann, Karoline Busse, Yasemin Acar, Sascha Fahl, Matthew Smith:
An Empirical Study of Textual Key-Fingerprint Representations. USENIX Security Symposium 2016: 193-208 - 2015
- [c85]Henning Perl, Sergej Dechand, Matthew Smith, Daniel Arp, Fabian Yamaguchi, Konrad Rieck, Sascha Fahl, Yasemin Acar:
VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits. CCS 2015: 426-437 - [c84]Ruba Abu-Salma, M. Angela Sasse, Joseph Bonneau, Matthew Smith:
POSTER: Secure Chat for the Masses? User-centered Security to the Rescue. CCS 2015: 1623-1625 - [c83]Katharina Krombholz, Adrian Dabrowski, Matthew Smith, Edgar R. Weippl:
Ok Glass, Leave Me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing. Financial Cryptography Workshops 2015: 274-280 - [c82]Christian Szongott, Michael Brenner, Matthew Smith:
METDS - A Self-contained, Context-Based Detection System for Evil Twin Access Points. Financial Cryptography 2015: 370-386 - [c81]Khaled Yakdan, Sebastian Eschweiler, Elmar Gerhards-Padilla, Matthew Smith:
No More Gotos: Decompilation Using Pattern-Independent Control-Flow Structuring and Semantic-Preserving Transformations. NDSS 2015 - [c80]Alina Hang, Alexander De Luca, Matthew Smith, Michael Richter, Heinrich Hussmann:
Where Have You Been? Using Location-Based Security Questions for Fallback Authentication. SOUPS 2015: 169-183 - [c79]Nik Unger, Sergej Dechand, Joseph Bonneau, Sascha Fahl, Henning Perl, Ian Goldberg, Matthew Smith:
SoK: Secure Messaging. IEEE Symposium on Security and Privacy 2015: 232-249 - [c78]Marten Oltrogge, Yasemin Acar, Sergej Dechand, Matthew Smith, Sascha Fahl:
To Pin or Not to Pin-Helping App Developers Bullet Proof Their TLS Connections. USENIX Security Symposium 2015: 239-254 - 2014
- [j4]Henning Perl, Yassene Mohammed, Michael Brenner, Matthew Smith:
Privacy/performance trade-off in private search on bio-medical data. Future Gener. Comput. Syst. 36: 441-452 (2014) - [c77]Sascha Fahl, Yasemin Acar, Henning Perl, Matthew Smith:
Why eve and mallory (also) love webmasters: a study on the root causes of SSL misconfigurations. AsiaCCS 2014: 507-512 - [c76]Sascha Fahl, Sergej Dechand, Henning Perl, Felix Fischer, Jaromir Smrcek, Matthew Smith:
Hey, NSA: Stay Away from my Market! Future Proofing App Markets against Powerful Attackers. CCS 2014: 1143-1155 - [c75]Marian Harbach, Markus Hettig, Susanne Weber, Matthew Smith:
Using personal examples to improve risk communication for security & privacy decisions. CHI 2014: 2647-2656 - [c74]Alexander De Luca, Marian Harbach, Emanuel von Zezschwitz, Max-Emanuel Maurer, Bernhard Ewald Slawik, Heinrich Hussmann, Matthew Smith:
Now you see me, now you don't: protecting smartphone authentication from shoulder surfers. CHI 2014: 2937-2946 - [c73]Marian Harbach, Sascha Fahl, Matthew Smith:
Who's Afraid of Which Bad Wolf? A Survey of IT Security Risk Awareness. CSF 2014: 97-110 - [c72]Benjamin Henne, Maximilian Koch, Matthew Smith:
On the Awareness, Control and Privacy of Shared Photo Metadata. Financial Cryptography 2014: 77-88 - [c71]Henning Perl, Sascha Fahl, Matthew Smith:
You Won't Be Needing These Any More: On Removing Unused Certificates from Trust Stores. Financial Cryptography 2014: 307-315 - [c70]Marian Harbach, Emanuel von Zezschwitz, Andreas Fichtner, Alexander De Luca, Matthew Smith:
It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception. SOUPS 2014: 213-230 - [c69]Benjamin Henne, Christian Kater, Matthew Smith:
On Usable Location Privacy for Android with Crowd-Recommendations. TRUST 2014: 74-82 - [e3]Rainer Böhme, Michael Brenner, Tyler Moore, Matthew Smith:
Financial Cryptography and Data Security - FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers. Lecture Notes in Computer Science 8438, Springer 2014, ISBN 978-3-662-44773-4 [contents] - 2013
- [c68]Sascha Fahl, Marian Harbach, Henning Perl, Markus Koetter, Matthew Smith:
Rethinking SSL development in an appified world. CCS 2013: 49-60 - [c67]Michael Brenner, Matthew Smith:
Caching oblivious memory access: an extension to the HCRYPT virtual machine. CCS 2013: 1363-1366 - [c66]Benjamin Henne, Marian Harbach, Matthew Smith:
Location privacy revisited: factors of privacy decisions. CHI Extended Abstracts 2013: 805-810 - [c65]Rémi Bastide, Harold Boley, Amadou Sienou, Matthew Smith:
Track F: Healthcare and sustainable living. DEST 2013: 1 - [c64]Marian Harbach, Sascha Fahl, Polina Yakovleva, Matthew Smith:
Sorry, I Don't Get It: An Analysis of Warning Message Texts. Financial Cryptography Workshops 2013: 94-111 - [c63]Benjamin Henne, Matthew Smith:
Awareness about Photos on the Web and How Privacy-Privacy-Tradeoffs Could Help. Financial Cryptography Workshops 2013: 131-148 - [c62]Sascha Fahl, Marian Harbach, Marten Oltrogge, Thomas Muders, Matthew Smith:
Hey, You, Get Off of My Clipboard - On How Usability Trumps Security in Android Password Managers. Financial Cryptography 2013: 144-161 - [c61]Mustafa Sofean, Matthew Smith:
Sentiment Analysis on Smoking in Social Networks. MedInfo 2013: 1118 - [c60]Marian Harbach, Sascha Fahl, Matthias Rieger, Matthew Smith:
On the Acceptance of Privacy-Preserving Authentication Technology: The Curious Case of National Identity Cards. Privacy Enhancing Technologies 2013: 245-264 - [c59]Benjamin Henne, Christian Kater, Matthew Smith, Michael Brenner:
Selective cloaking: Need-to-know for location-based apps. PST 2013: 19-26 - [c58]Sascha Fahl, Marian Harbach, Yasemin Acar, Matthew Smith:
On the ecological validity of a password study. SOUPS 2013: 13:1-13:13 - [c57]Benjamin Henne, Christian Szongott, Matthew Smith:
SnapMe if you can: privacy threats of other peoples' geo-tagged media and what we can do about it. WISEC 2013: 95-106 - [e2]Xiaohua Hu, Tsau Young Lin, Vijay V. Raghavan, Benjamin W. Wah, Ricardo Baeza-Yates, Geoffrey C. Fox, Cyrus Shahabi, Matthew Smith, Qiang Yang, Rayid Ghani, Wei Fan, Ronny Lempel, Raghunath Nambiar:
2013 IEEE International Conference on Big Data (IEEE BigData 2013), 6-9 October 2013, Santa Clara, CA, USA. IEEE Computer Society 2013, ISBN 978-1-4799-1292-6 [contents] - [e1]Andrew A. Adams, Michael Brenner, Matthew Smith:
Financial Cryptography and Data Security - FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers. Lecture Notes in Computer Science 7862, Springer 2013, ISBN 978-3-642-41319-3 [contents] - 2012
- [c56]Christian Szongott, Benjamin Henne, Matthew Smith:
Mobile Evil Twin Malnets - The Worst of Both Worlds. CANS 2012: 126-141 - [c55]Sascha Fahl, Marian Harbach, Thomas Muders, Matthew Smith, Lars Baumgärtner, Bernd Freisleben:
Why eve and mallory love android: an analysis of android SSL (in)security. CCS 2012: 50-61 - [c54]Marian Harbach, Sascha Fahl, Thomas Muders, Matthew Smith:
Towards measuring warning readability. CCS 2012: 989-991 - [c53]Matthew Smith, Christian Szongott, Benjamin Henne, Gabriele von Voigt:
Big data privacy issues in public social media. DEST 2012: 1-6 - [c52]Sascha Fahl, Marian Harbach, Matthew Smith:
Human-centric visual access control for clinical data management. DEST 2012: 1-8 - [c51]Benjamin Henne, Christian Szongott, Matthew Smith:
Coupled multi-agent simulations for mobile security & privacy research. DEST 2012: 1-6 - [c50]Henning Perl, Yassene Mohammed, Michael Brenner, Matthew Smith:
Fast confidential search for bio-medical data using Bloom filters and Homomorphic Cryptography. eScience 2012: 1-8 - [c49]Sascha Fahl, Marian Harbach, Thomas Muders, Matthew Smith:
TrustSplit: usable confidentiality for social network messaging. HT 2012: 145-154 - [c48]Mustafa Sofean, Matthew Smith:
A real-time architecture for detection of diseases using social networks: design, implementation and evaluation. HT 2012: 309-310 - [c47]Mustafa Sofean, Kerstin Denecke, Avaré Stewart, Matthew Smith:
Medical case-driven classification of microblogs: characteristics and annotation. IHI 2012: 513-522 - [c46]Marian Harbach, Sascha Fahl, Michael Brenner, Thomas Muders, Matthew Smith:
Towards privacy-preserving access control with hidden policies, hidden credentials and hidden decisions. PST 2012: 17-24 - [c45]Michael Brenner, Henning Perl, Matthew Smith:
Practical Applications of Homomorphic Encryption. SECRYPT 2012: 5-14 - [c44]Sascha Fahl, Marian Harbach, Thomas Muders, Matthew Smith, Uwe Sander:
Helping Johnny 2.0 to encrypt his Facebook conversations. SOUPS 2012: 11 - [c43]Sascha Fahl, Marian Harbach, Thomas Muders, Matthew Smith:
Confidentiality as a Service - Usable Security for the Cloud. TrustCom 2012: 153-162 - [c42]Michael Brenner, Henning Perl, Matthew Smith:
How Practical is Homomorphically Encrypted Program Execution? An Implementation and Performance Evaluation. TrustCom 2012: 375-382 - [c41]Christian Szongott, Benjamin Henne, Matthew Smith:
Evaluating the threat of epidemic mobile malware. WiMob 2012: 443-450 - [c40]Marian Harbach, Sascha Fahl, Thomas Muders, Matthew Smith:
All our messages are belong to us: usable confidentiality in social networks. WWW (Companion Volume) 2012: 519-520 - 2011
- [j3]Matthew Smith, Christian Schridde, Björn Agel, Bernd Freisleben:
Secure mobile communication via identity-based cryptography and server-aided computations. J. Supercomput. 55(2): 284-306 (2011) - [c39]Ernst Juhnke, Dominik Seiler, Ralph Ewerth, Matthew Smith, Bernd Freisleben:
Request/Response Aspects for Web Services. CAiSE 2011: 627-641 - [c38]Henning Perl, Michael Brenner, Matthew Smith:
Poster: an implementation of the fully homomorphic smart-vercauteren crypto-system. CCS 2011: 837-840 - [c37]Christopher Kunz, Nina Tahmasebi, Thomas Risse, Matthew Smith:
Detecting Credential Abuse in the Grid Using Bayesian Networks. GRID 2011: 114-120 - [c36]Avaré Stewart, Matthew Smith, Wolfgang Nejdl:
A transfer approach to detecting disease reporting events in blog social media. HT 2011: 271-280 - [c35]Michael Brenner, Jan Wiebelitz, Gabriele von Voigt, Matthew Smith:
A Smart-gentry based Software System for Secret Program Execution. SECRYPT 2011: 238-244 - 2010
- [c34]Tolga Dalman, Tim Dörnemann, Ernst Juhnke, Michael Weitzel, Matthew Smith, Wolfgang Wiechert, Katharina Nöh, Bernd Freisleben:
Metabolic Flux Analysis in the Cloud. eScience 2010: 57-64 - [c33]Yassene Mohammed, Ulrich Sax, Frank Dickmann, Jörg Lippert, Juri Solodenko, Gabriele von Voigt, Matthew Smith, Otto Rienhoff:
On Transferring the Grid Technology to the Biomedical Community. HealthGrid 2010: 28-39 - [c32]Jan Wiebelitz, Michael Brenner, Christopher Kunz, Matthew Smith:
Early defense: enabling attribute-based authorization in Grid firewalls. HPDC 2010: 336-339 - [c31]Thilo Stadelmann, Yinghui Wang, Matthew Smith, Ralph Ewerth, Bernd Freisleben:
Rethinking Algorithm Design and Development in Speech Processing. ICPR 2010: 4476-4479 - [c30]Yassene Mohammed, Frank Dickmann, Ulrich Sax, Gabriele von Voigt, Matthew Smith, Otto Rienhoff:
Reaching for the Cloud: On the Lessons Learned from Grid Computing Technology Transfer Process to the Biomedical Community. MedInfo 2010: 1339-1343 - [c29]Matthias Schmidt, Niels Fallenbeck, Matthew Smith, Bernd Freisleben:
Efficient Distribution of Virtual Machines for Cloud Computing. PDP 2010: 567-574 - [c28]Christopher Kunz, Jan Wiebelitz, Matthew Smith:
An attack-resilient Grid auditing infrastructure. WCNIS 2010: 635-639 - [c27]Christian Schridde, Tim Dörnemann, Ernst Juhnke, Bernd Freisleben, Matthew Smith:
An identity-based security infrastructure for Cloud environments. WCNIS 2010: 644-649
2000 – 2009
- 2009
- [j2]Matthew Smith, Matthias Schmidt, Niels Fallenbeck, Tim Dörnemann, Christian Schridde, Bernd Freisleben:
Secure on-demand grid computing. Future Gener. Comput. Syst. 25(3): 315-325 (2009) - [c26]Matthew Smith, Christian Schridde, Björn Agel, Bernd Freisleben:
Identity-Based Cryptography for Securing Mobile Phone Calls. AINA Workshops 2009: 365-370 - [c25]Matthias Schmidt, Niels Fallenbeck, Matthew Smith, Bernd Freisleben:
Secure Service-Oriented Grid Computing with Public Virtual Worker Nodes. EUROMICRO-SEAA 2009: 555-562 - [c24]Matthew Smith, Fabian Schwarzer, Marian Harbach, Thomas Noll, Bernd Freisleben:
A Streaming Intrusion Detection System for Grid Computing Environments. HPCC 2009: 44-51 - [c23]Matthew Smith, Christian Schridde, Björn Agel, Bernd Freisleben:
Securing Mobile Phone Calls with Identity-Based Cryptography. ISA 2009: 210-222 - [c22]Christian Schridde, Matthew Smith, Bernd Freisleben:
TrueIP: prevention of IP spoofing attacks using identity-based cryptography. SIN 2009: 128-137 - 2008
- [b1]Matthew Smith:
Security for service-oriented on-demand grid computing. University of Marburg, Germany, 2008 - [c21]Ian Scriven, Andrew Lewis, Matthew Smith, Thomas Friese:
Resource Evaluation and Node Monitoring in Service Oriented Ad-hoc Grids. AusGrid 2008: 65-71 - [c20]Tim Dörnemann, Matthew Smith, Bernd Freisleben:
Composition and Execution of Secure Workflows in WSRF-Grids. CCGRID 2008: 122-129 - [c19]Matthew Smith, Christian Schridde, Bernd Freisleben:
Securing stateful grid servers through virtual server rotation. HPDC 2008: 11-22 - [c18]Christian Schridde, Matthew Smith, Bernd Freisleben:
An Identity-Based Key Agreement Protocol for the Network Layer. SCN 2008: 409-422 - [c17]Tim Dörnemann, Matthew Smith, Ernst Juhnke, Bernd Freisleben:
Secure Grid Micro-Workflows Using Virtual Workspaces. EUROMICRO-SEAA 2008: 119-126 - 2007
- [c16]Matthias Schmidt, Matthew Smith, Niels Fallenbeck, Hans Picht, Bernd Freisleben:
Building a demilitarized zone with data encryption for grid environments. GridNets 2007: 17 - [c15]Sebastian Canisius, Thomas Ploch, Karl Kesper, Matthew Smith, Bernd Freisleben, Thomas Penzel:
Sleep Medicine as a Scenario for Medical Grid Application. HealthGrid 2007: 37-46 - [c14]Thomas Friese, Matthew Smith, Bernd Freisleben:
Native Code Security for Grid Services. Wirtschaftsinformatik (1) 2007: 513-530 - 2006
- [j1]Matthew Smith, Thomas Friese, Michael Engel, Bernd Freisleben:
Countering security threats in service-oriented on-demand grid computing using sandboxing and trusted computing techniques. J. Parallel Distributed Comput. 66(9): 1189-1204 (2006) - [c13]Matthew Smith, Thomas Friese, Bernd Freisleben:
Model Driven Development of Service-Oriented Grid Applications. AICT/ICIW 2006: 139 - [c12]Matthew Smith, Michael Engel, Thomas Friese, Bernd Freisleben, Gregory A. Koenig, William Yurcik:
Security Issues in On-Demand Grid and Cluster Computing. CCGRID 2006: 24 - [c11]Thomas Friese, Matthew Smith, Bernd Freisleben:
GDT: A Toolkit for Grid Service Development. NODe/GSEM 2006: 131-147 - [c10]Thomas Friese, Matthew Smith, Bernd Freisleben, Julian Reichwald, Thomas Barth, Manfred Grauer:
Collaborative Grid Process Creation Support in an Engineering Domain. HiPC 2006: 263-276 - [c9]Matthew Smith, Michael Engel, Sven Hanemann, Bernd Freisleben:
Towards a Roadcasting Communications Infrastructure. ICN/ICONS/MCL 2006: 213 - [c8]Steffen Heinzl, Markus Mathes, Thomas Friese, Matthew Smith, Bernd Freisleben:
Flex-SwA: Flexible Exchange of Binary Data Based on SOAP Messages with Attachments. ICWS 2006: 3-10 - [c7]Matthew Smith, B. Klose, Ralph Ewerth, Thomas Friese, Michael Engel, Bernd Freisleben:
Runtime Integration of Reconfigurable Hardware in Service-Oriented Grids. ICWS 2006: 945-948 - [c6]Niels Fallenbeck, Hans-Joachim Picht, Matthew Smith, Bernd Freisleben:
Xen and the Art of Cluster Scheduling. VTDC@SC 2006: 4 - 2005
- [c5]Matthew Smith, Thomas Friese, Bernd Freisleben:
Intra-engine service security for grids based on WSRF. CCGRID 2005: 644-653 - [c4]Elvis Papalilo, Thomas Friese, Matthew Smith, Bernd Freisleben:
Trust Shaping: Adapting Trust Establishment and Management to Application Requirements in a Service-Oriented Grid Environment. GCC 2005: 47-58 - [c3]Thomas Friese, Jörg P. Müller, Matthew Smith, Bernd Freisleben:
A Robust Business Resource Management Framework Based on a Peer-to-Peer Infrastructure. CEC 2005: 215-222 - 2004
- [c2]Thomas Friese, Matthew Smith, Bernd Freisleben:
Hot service deployment in an ad hoc grid environment. ICSOC 2004: 75-83 - [c1]Matthew Smith, Thomas Friese, Bernd Freisleben:
Towards a Service-Oriented Ad Hoc Grid. ISPDC/HeteroPar 2004: 201-208
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint