Publications

Matching entries: 0
settings...
2015
Unger N, Dechand S, Bonneau J, Fahl S, Perl H, Goldberg I and Smith M (2015), "SoK: Secure Messaging", In Proceedings of the 2015 IEEE Symposium on Security and Privacy., May, 2015.
BibTeX:
@conference{unger2015sok,
  author = {Unger, Nik and Dechand, Sergej and Bonneau, Joseph and Fahl, Sascha and Perl, Henning and Goldberg, Ian and Smith, Matthew},
  title = {SoK: Secure Messaging},
  booktitle = {Proceedings of the 2015 IEEE Symposium on Security and Privacy},
  year = {2015},
  url = {http://cacr.uwaterloo.ca/techreports/2015/cacr2015-02.pdf}
}
Weber S, Harbach M and Smith M (2015), "Participatory Design for Security-Related User Interfaces", In Usable Security (NDSS USEC)., February, 2015.
BibTeX:
@conference{weber2015participatory,
  author = {Weber, Susanne and Harbach, Marian and Smith, Matthew},
  title = {Participatory Design for Security-Related User Interfaces},
  booktitle = {Usable Security (NDSS USEC)},
  year = {2015},
  url = {http://www.internetsociety.org/sites/default/files/04_1_3.pdf}
}
Yakdan K, Eschweiler S, Gerhards-Padilla E and Smith M (2015), "No More Gotos: Decompilation Using Pattern-Independent Control-Flow Structuring and Semantics-Preserving Transformations", In Network and Distributed System Security (NDSS), ISOC., February, 2015.
BibTeX:
@conference{yakdan2015no,
  author = {Yakdan, Khaled and Eschweiler, Sebastian and Gerhards-Padilla, Elmar and Smith, Matthew},
  title = {No More Gotos: Decompilation Using Pattern-Independent Control-Flow Structuring and Semantics-Preserving Transformations},
  booktitle = {Network and Distributed System Security (NDSS), ISOC},
  year = {2015},
  url = {http://www.internetsociety.org/sites/default/files/11_4_2.pdf}
}
2014
De Luca A, Harbach M, von Zezschwitz E, Maurer M-E, Slawik BE, Hussmann H and Smith M (2014), "Now you see me, now you don't: protecting smartphone authentication from shoulder surfers", In Proceedings of the 32nd annual ACM conference on Human factors in computing systems (ACM CHI). , pp. 2937-2946.
BibTeX:
@inproceedings{de2014now,
  author = {De Luca, Alexander and Harbach, Marian and von Zezschwitz, Emanuel and Maurer, Max-Emanuel and Slawik, Bernhard Ewald and Hussmann, Heinrich and Smith, Matthew},
  title = {Now you see me, now you don't: protecting smartphone authentication from shoulder surfers},
  booktitle = {Proceedings of the 32nd annual ACM conference on Human factors in computing systems (ACM CHI)},
  year = {2014},
  pages = {2937--2946}
}
Fahl S, Dechand S, Perl H, Fischer F, Smrcek J and Smith M (2014), "Hey, NSA: Stay Away from my Market! Future Proofing App Markets against Powerful Attackers", In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. , pp. 1143-1155.
BibTeX:
@inproceedings{fahl2014hey,
  author = {Fahl, Sascha and Dechand, Sergej and Perl, Henning and Fischer, Felix and Smrcek, Jaromir and Smith, Matthew},
  title = {Hey, NSA: Stay Away from my Market! Future Proofing App Markets against Powerful Attackers},
  booktitle = {Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security},
  year = {2014},
  pages = {1143--1155}
}
Harbach M, Fahl S and Smith M (2014), "Who's Afraid of Which Bad Wolf? A Survey of IT Security Risk Awareness", In Computer Security Foundations Symposium (CSF), 2014 IEEE 27th. , pp. 97-110.
BibTeX:
@inproceedings{harbach2014s,
  author = {Harbach, Marian and Fahl, Sascha and Smith, Matthew},
  title = {Who's Afraid of Which Bad Wolf? A Survey of IT Security Risk Awareness},
  booktitle = {Computer Security Foundations Symposium (CSF), 2014 IEEE 27th},
  year = {2014},
  pages = {97--110}
}
Harbach M, von Zezschwitz E, Fichtner A, De Luca A and Smith M (2014), "It’sa Hard Lock Life: A Field Study of Smartphone (Un) Locking Behavior and Risk Perception", Symposium on Usable Privacy and Security (SOUPS).
BibTeX:
@article{harbach2014sa,
  author = {Harbach, Marian and von Zezschwitz, Emanuel and Fichtner, Andreas and De Luca, Alexander and Smith, Matthew},
  title = {It’sa Hard Lock Life: A Field Study of Smartphone (Un) Locking Behavior and Risk Perception},
  journal = {Symposium on Usable Privacy and Security (SOUPS)},
  year = {2014}
}
Harbach M, Hettig M, Weber S and Smith M (2014), "Using personal examples to improve risk communication for security & privacy decisions", In Proceedings of the 32nd annual ACM conference on Human factors in computing systems (ACM CHI). , pp. 2647-2656.
BibTeX:
@inproceedings{harbach2014using,
  author = {Harbach, Marian and Hettig, Markus and Weber, Susanne and Smith, Matthew},
  title = {Using personal examples to improve risk communication for security & privacy decisions},
  booktitle = {Proceedings of the 32nd annual ACM conference on Human factors in computing systems (ACM CHI)},
  year = {2014},
  pages = {2647--2656}
}
Henne B, Koch M and Smith M (2014), "Short Paper: On the Awareness, Control and Privacy of Shared Photo Metadata", In 18th International Conference on Financial Cryptography and Data Security (FC 2014). Vol. 8437 Springer.
BibTeX:
@inproceedings{henneshort,
  author = {Henne, Benjamin and Koch, Maximilian and Smith, Matthew},
  title = {Short Paper: On the Awareness, Control and Privacy of Shared Photo Metadata},
  booktitle = {18th International Conference on Financial Cryptography and Data Security (FC 2014)},
  publisher = {Springer},
  year = {2014},
  volume = {8437}
}
Perl H, Mohammed Y, Brenner M and Smith M (2014), "Privacy/performance trade-off in private search on bio-medical data", Future Generation Computer Systems. Vol. 36, pp. 441-452. North-Holland.
BibTeX:
@article{perl2014privacy,
  author = {Perl, Henning and Mohammed, Yassene and Brenner, Michael and Smith, Matthew},
  title = {Privacy/performance trade-off in private search on bio-medical data},
  journal = {Future Generation Computer Systems},
  publisher = {North-Holland},
  year = {2014},
  volume = {36},
  pages = {441--452}
}
Perl H, Fahl S and Smith M (2014), "You Won’t Be Needing These Any More: On Removing Unused Certificates From Trust Stores", In Financial Cryptography and Data Security 2014.
BibTeX:
@inproceedings{perlyou,
  author = {Perl, Henning and Fahl, Sascha and Smith, Matthew},
  title = {You Won’t Be Needing These Any More: On Removing Unused Certificates From Trust Stores},
  booktitle = {Financial Cryptography and Data Security 2014},
  year = {2014}
}
2013
(2013), "Financial Cryptography and Data Security" Vol. 7862 Springer.
BibTeX:
@proceedings{adamsfinancial,,
  editor = {Adams, Andrew A and Brenner, Michael and Smith, Matthew},
  title = {Financial Cryptography and Data Security},
  publisher = {Springer},
  year = {2013},
  volume = {7862}
}
Brenner M and Smith M (2013), "POSTER: Caching oblivious memory access: an extension to the HCRYPT virtual machine", In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. , pp. 1363-1366.
BibTeX:
@inproceedings{brenner2013poster,
  author = {Brenner, Michael and Smith, Matthew},
  title = {POSTER: Caching oblivious memory access: an extension to the HCRYPT virtual machine},
  booktitle = {Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security},
  year = {2013},
  pages = {1363--1366}
}
Fahl S, Harbach M, Acar Y and Smith M (2013), "On the ecological validity of a password study", In Proceedings of the Ninth Symposium on Usable Privacy and Security. , pp. 13.
BibTeX:
@inproceedings{fahl2013ecological,
  author = {Fahl, Sascha and Harbach, Marian and Acar, Yasemin and Smith, Matthew},
  title = {On the ecological validity of a password study},
  booktitle = {Proceedings of the Ninth Symposium on Usable Privacy and Security},
  year = {2013},
  pages = {13}
}
Fahl S, Harbach M, Perl H, Koetter M and Smith M (2013), "Rethinking SSL development in an appified world", In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. , pp. 49-60.
BibTeX:
@inproceedings{fahl2013rethinking,
  author = {Fahl, Sascha and Harbach, Marian and Perl, Henning and Koetter, Markus and Smith, Matthew},
  title = {Rethinking SSL development in an appified world},
  booktitle = {Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security},
  year = {2013},
  pages = {49--60}
}
Fahl S, Harbach M, Oltrogge M, Muders T and Smith M (2013), "Hey, You, Get Off of My Clipboard", In Financial Cryptography and Data Security., April 1-5, 2013. Vol. 7859, pp. 144-161. Springer.
BibTeX:
@inproceedings{fahlhey,
  author = {Fahl, Sascha and Harbach, Marian and Oltrogge, Marten and Muders, Thomas and Smith, Matthew},
  editor = {Ahmad-Reza Sadeghi},
  title = {Hey, You, Get Off of My Clipboard},
  booktitle = {Financial Cryptography and Data Security},
  publisher = {Springer},
  year = {2013},
  volume = {7859},
  pages = {144-161}
}
Harbach M, Fahl S, Rieger M and Smith M (2013), "On the Acceptance of Privacy-Preserving Authentication Technology: The Curious Case of National Identity Cards", In Privacy Enhancing Technologies. , pp. 245-264. Springer Berlin Heidelberg.
BibTeX:
@incollection{harbach2013acceptance,
  author = {Harbach, Marian and Fahl, Sascha and Rieger, Matthias and Smith, Matthew},
  title = {On the Acceptance of Privacy-Preserving Authentication Technology: The Curious Case of National Identity Cards},
  booktitle = {Privacy Enhancing Technologies},
  publisher = {Springer Berlin Heidelberg},
  year = {2013},
  pages = {245--264}
}
Harbach M, Fahl S and Smith M (2013), "Position Statement: Risk Perception and the Acceptance of New Security Technology", In Symposium on Usable Privacy and Security (SOUPS), Workshop on Risk Perception in IT Security and Privacy.
BibTeX:
@inproceedings{harbach2013position,
  author = {Harbach, Marian and Fahl, Sascha and Smith, Matthew},
  title = {Position Statement: Risk Perception and the Acceptance of New Security Technology},
  booktitle = {Symposium on Usable Privacy and Security (SOUPS), Workshop on Risk Perception in IT Security and Privacy},
  year = {2013}
}
Harbach M, Fahl S, Yakovleva P and Smith M (2013), "Sorry, I Don’t Get It: An Analysis of Warning Message Texts", In Financial Cryptography and Data Security. Vol. 7862, pp. 94-111. Springer.
BibTeX:
@conference{harbachsorry,
  author = {Harbach, Marian and Fahl, Sascha and Yakovleva, Polina and Smith, Matthew},
  editor = {Adams, Andrew A. and Brenner, Michael and Smith, Matthew},
  title = {Sorry, I Don’t Get It: An Analysis of Warning Message Texts},
  booktitle = {Financial Cryptography and Data Security},
  publisher = {Springer},
  year = {2013},
  volume = {7862},
  pages = {94-111}
}
Henne B, Harbach M and Smith M (2013), "Location privacy revisited: factors of privacy decisions", In CHI'13 Extended Abstracts on Human Factors in Computing Systems. , pp. 805-810.
BibTeX:
@inproceedings{henne2013location,
  author = {Henne, Benjamin and Harbach, Marian and Smith, Matthew},
  title = {Location privacy revisited: factors of privacy decisions},
  booktitle = {CHI'13 Extended Abstracts on Human Factors in Computing Systems},
  year = {2013},
  pages = {805--810}
}
Henne B, Kater C, Smith M and Brenner M (2013), "Selective cloaking: Need-to-know for location-based apps", In Privacy, Security and Trust (PST), 2013 Eleventh Annual International Conference on. , pp. 19-26.
BibTeX:
@inproceedings{henne2013selective,
  author = {Henne, Benjamin and Kater, Christian and Smith, Matthew and Brenner, Michael},
  title = {Selective cloaking: Need-to-know for location-based apps},
  booktitle = {Privacy, Security and Trust (PST), 2013 Eleventh Annual International Conference on},
  year = {2013},
  pages = {19--26}
}
Henne B, Szongott C and Smith M (2013), "SnapMe if you can: privacy threats of other peoples' geo-tagged media and what we can do about it", In Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks. , pp. 95-106.
BibTeX:
@inproceedings{henne2013snapme,
  author = {Henne, Benjamin and Szongott, Christian and Smith, Matthew},
  title = {SnapMe if you can: privacy threats of other peoples' geo-tagged media and what we can do about it},
  booktitle = {Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks},
  year = {2013},
  pages = {95--106}
}
Henne B and Smith M (2013), "Awareness about photos on the Web and how privacy-privacy-tradeoffs could help", In Financial Cryptography and Data Security. Vol. 7862, pp. 131-148. Springer.
BibTeX:
@inproceedings{henneawareness,
  author = {Henne, Benjamin and Smith, Matthew},
  editor = {Adams, Andrew A. and Brenner, Michael and Smith, Matthew},
  title = {Awareness about photos on the Web and how privacy-privacy-tradeoffs could help},
  booktitle = {Financial Cryptography and Data Security},
  publisher = {Springer},
  year = {2013},
  volume = {7862},
  pages = {131--148}
}
Perl H, Fahl S and Smith M (2013), "An Evaluation System For SSL Validation Schemes", In IEEE Symposium on Security & Privacy.
BibTeX:
@inproceedings{perlevaluation,
  author = {Perl, Henning and Fahl, Sascha and Smith, Matthew},
  title = {An Evaluation System For SSL Validation Schemes},
  booktitle = {IEEE Symposium on Security & Privacy},
  year = {2013}
}
2012
Bastide R and Smith M (2012), "Track D: Healthcare and sustainable living", In Digital Ecosystems Technologies (DEST), 2012 6th IEEE International Conference on. , pp. 1-1.
BibTeX:
@inproceedings{bastide2012track,
  author = {Bastide, Remi and Smith, Matthew},
  title = {Track D: Healthcare and sustainable living},
  booktitle = {Digital Ecosystems Technologies (DEST), 2012 6th IEEE International Conference on},
  year = {2012},
  pages = {1--1}
}
Brenner M, Perl H and Smith M (2012), "How Practical is Homomorphically Encrypted Program Execution? An Implementation and Performance Evaluation", In Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on. , pp. 375-382.
BibTeX:
@inproceedings{brenner2012practical,
  author = {Brenner, Michael and Perl, Henning and Smith, Matthew},
  title = {How Practical is Homomorphically Encrypted Program Execution? An Implementation and Performance Evaluation},
  booktitle = {Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on},
  year = {2012},
  pages = {375--382}
}
Fahl S, Harbach M, Muders T and Smith M (2012), "Confidentiality as a Service--Usable Security for the Cloud", In Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on. , pp. 153-162.
BibTeX:
@inproceedings{fahl2012confidentiality,
  author = {Fahl, Sascha and Harbach, Marian and Muders, Thomas and Smith, Matthew},
  title = {Confidentiality as a Service--Usable Security for the Cloud},
  booktitle = {Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on},
  year = {2012},
  pages = {153--162}
}
Fahl S, Harbach M, Muders T, Smith M, Baumgärtner L and Freisleben B (2012), "Why eve and mallory love android: an analysis of android SSL (in) security", In Proceedings of the 2012 ACM conference on Computer and communications security. , pp. 50-61.
BibTeX:
@inproceedings{fahl2012eve,
  author = {Fahl, Sascha and Harbach, Marian and Muders, Thomas and Smith, Matthew and Baumgärtner, Lars and Freisleben, Bernd},
  title = {Why eve and mallory love android: an analysis of android SSL (in) security},
  booktitle = {Proceedings of the 2012 ACM conference on Computer and communications security},
  year = {2012},
  pages = {50--61}
}
Fahl S, Harbach M, Muders T, Smith M and Sander U (2012), "Helping Johnny 2.0 to encrypt his Facebook conversations", In Proceedings of the Eighth Symposium on Usable Privacy and Security. , pp. 11.
BibTeX:
@inproceedings{fahl2012helping,
  author = {Fahl, Sascha and Harbach, Marian and Muders, Thomas and Smith, Matthew and Sander, Uwe},
  title = {Helping Johnny 2.0 to encrypt his Facebook conversations},
  booktitle = {Proceedings of the Eighth Symposium on Usable Privacy and Security},
  year = {2012},
  pages = {11}
}
Fahl S, Harbach M and Smith M (2012), "Human-centric visual access control for clinical data management", In Digital Ecosystems Technologies (DEST), 2012 6th IEEE International Conference on. , pp. 1-8.
BibTeX:
@inproceedings{fahl2012human,
  author = {Fahl, Sascha and Harbach, Marian and Smith, Matthew},
  title = {Human-centric visual access control for clinical data management},
  booktitle = {Digital Ecosystems Technologies (DEST), 2012 6th IEEE International Conference on},
  year = {2012},
  pages = {1--8}
}
Fahl S, Harbach M, Muders T and Smith M (2012), "TrustSplit: usable confidentiality for social network messaging", In Proceedings of the 23rd ACM conference on Hypertext and social media. , pp. 145-154.
BibTeX:
@inproceedings{fahl2012trustsplit,
  author = {Fahl, Sascha and Harbach, Marian and Muders, Thomas and Smith, Matthew},
  title = {TrustSplit: usable confidentiality for social network messaging},
  booktitle = {Proceedings of the 23rd ACM conference on Hypertext and social media},
  year = {2012},
  pages = {145--154}
}
Harbach M, Fahl S, Brenner M, Muders T and Smith M (2012), "Towards privacy-preserving access control with hidden policies, hidden credentials and hidden decisions", In Privacy, Security and Trust (PST), 2012 Tenth Annual International Conference on. , pp. 17-24.
BibTeX:
@inproceedings{Harbach2012,
  author = {Harbach, Marian and Fahl, Sascha and Brenner, Michael and Muders, Thomas and Smith, Matthew},
  title = {Towards privacy-preserving access control with hidden policies, hidden credentials and hidden decisions},
  booktitle = {Privacy, Security and Trust (PST), 2012 Tenth Annual International Conference on},
  year = {2012},
  pages = {17--24}
}
Harbach M, Fahl S, Muders T and Smith M (2012), "All our messages are belong to us: usable confidentiality in social networks", In Proceedings of the 21st international conference companion on World Wide Web. , pp. 519-520.
BibTeX:
@inproceedings{harbach2012all,
  author = {Harbach, Marian and Fahl, Sascha and Muders, Thomas and Smith, Matthew},
  title = {All our messages are belong to us: usable confidentiality in social networks},
  booktitle = {Proceedings of the 21st international conference companion on World Wide Web},
  year = {2012},
  pages = {519--520}
}
Harbach M, Fahl S, Muders T and Smith M (2012), "Poster: Towards Measuring Warning Readability", In Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS 2012)., Oct., 2012. , pp. 989-991. ACM.
BibTeX:
@inproceedings{harbach2012poster,
  author = {Harbach, Marian and Fahl, Sascha and Muders, Thomas and Smith, Matthew},
  title = {Poster: Towards Measuring Warning Readability},
  booktitle = {Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS 2012)},
  publisher = {ACM},
  year = {2012},
  pages = {989--991},
  doi = {10.1145/2382196.2382301}
}
Harbach M, Fahl S, Muders T and Smith M (2012), "Towards measuring warning readability", In Proceedings of the 2012 ACM conference on Computer and communications security. , pp. 989-991.
BibTeX:
@inproceedings{harbach2012towards,
  author = {Harbach, Marian and Fahl, Sascha and Muders, Thomas and Smith, Matthew},
  title = {Towards measuring warning readability},
  booktitle = {Proceedings of the 2012 ACM conference on Computer and communications security},
  year = {2012},
  pages = {989--991}
}
Henne B, Szongott C and Smith M (2012), "Coupled multi-agent simulations for mobile security & privacy research", In Digital Ecosystems Technologies (DEST), 2012 6th IEEE International Conference on. , pp. 1-6.
BibTeX:
@inproceedings{henne2012coupled,
  author = {Henne, Benjamin and Szongott, Christian and Smith, Matthew},
  title = {Coupled multi-agent simulations for mobile security & privacy research},
  booktitle = {Digital Ecosystems Technologies (DEST), 2012 6th IEEE International Conference on},
  year = {2012},
  pages = {1--6}
}
Perl H, Mohammed Y, Brenner M and Smith M (2012), "Fast confidential search for bio-medical data using Bloom filters and Homomorphic Cryptography", In E-Science (e-Science), 2012 IEEE 8th International Conference on. , pp. 1-8.
BibTeX:
@inproceedings{perl2012fast,
  author = {Perl, Henning and Mohammed, Yassene and Brenner, Michael and Smith, Matthew},
  title = {Fast confidential search for bio-medical data using Bloom filters and Homomorphic Cryptography},
  booktitle = {E-Science (e-Science), 2012 IEEE 8th International Conference on},
  year = {2012},
  pages = {1--8}
}
Smith M, Szongott C, Henne B and von Voigt G (2012), "Big data privacy issues in public social media", In Digital Ecosystems Technologies (DEST), 2012 6th IEEE International Conference on. , pp. 1-6.
BibTeX:
@inproceedings{smith2012big,
  author = {Smith, Matthew and Szongott, Christian and Henne, Benjamin and von Voigt, Gabriele},
  title = {Big data privacy issues in public social media},
  booktitle = {Digital Ecosystems Technologies (DEST), 2012 6th IEEE International Conference on},
  year = {2012},
  pages = {1--6}
}
Sofean M and Smith M (2012), "A real-time architecture for detection of diseases using social networks: design, implementation and evaluation", In Proceedings of the 23rd ACM conference on Hypertext and social media. , pp. 309-310.
BibTeX:
@inproceedings{Sofean2012,
  author = {Sofean, Mustafa and Smith, Matthew},
  title = {A real-time architecture for detection of diseases using social networks: design, implementation and evaluation},
  booktitle = {Proceedings of the 23rd ACM conference on Hypertext and social media},
  year = {2012},
  pages = {309--310}
}
Sofean M, Denecke K, Stewart A and Smith M (2012), "Medical case-driven classification of microblogs: Characteristics and annotation", In Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium. , pp. 513-522.
BibTeX:
@inproceedings{sofean2012medical,
  author = {Sofean, Mustafa and Denecke, Kerstin and Stewart, Avare and Smith, Matthew},
  title = {Medical case-driven classification of microblogs: Characteristics and annotation},
  booktitle = {Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium},
  year = {2012},
  pages = {513--522}
}
Sofean M and Smith M (2012), "A real-time disease surveillance architecture using social networks.", Studies in health technology and informatics. Vol. 180, pp. 823.
BibTeX:
@article{sofean2012real,
  author = {Sofean, Mustafa and Smith, Matthew},
  title = {A real-time disease surveillance architecture using social networks.},
  journal = {Studies in health technology and informatics},
  year = {2012},
  volume = {180},
  pages = {823}
}
Sofean M and Smith M (2012), "Sentiment analysis on smoking in social networks.", Studies in health technology and informatics. Vol. 192, pp. 1118-1118.
BibTeX:
@article{sofean2012sentiment,
  author = {Sofean, Mustafa and Smith, Matthew},
  title = {Sentiment analysis on smoking in social networks.},
  journal = {Studies in health technology and informatics},
  year = {2012},
  volume = {192},
  pages = {1118--1118}
}
Szongott C, Henne B and Smith M (2012), "Evaluating the threat of epidemic mobile malware", In Wireless and Mobile Computing, Networking and Communications (WiMob), 2012 IEEE 8th International Conference on. , pp. 443-450.
BibTeX:
@inproceedings{szongott2012evaluating,
  author = {Szongott, Christian and Henne, Benjamin and Smith, Matthew},
  title = {Evaluating the threat of epidemic mobile malware},
  booktitle = {Wireless and Mobile Computing, Networking and Communications (WiMob), 2012 IEEE 8th International Conference on},
  year = {2012},
  pages = {443--450}
}
Szongott C, Henne B and Smith M (2012), "Mobile Evil Twin Malnets--The Worst of Both Worlds", In Cryptology and Network Security. , pp. 126-141. Springer Berlin Heidelberg.
BibTeX:
@incollection{szongott2012mobile,
  author = {Szongott, Christian and Henne, Benjamin and Smith, Matthew},
  title = {Mobile Evil Twin Malnets--The Worst of Both Worlds},
  booktitle = {Cryptology and Network Security},
  publisher = {Springer Berlin Heidelberg},
  year = {2012},
  pages = {126--141}
}
2011
Brenner M, Wiebelitz J, von Voigt G and Smith M (2011), "Secret program execution in the cloud applying homomorphic encryption", In Digital Ecosystems and Technologies Conference (DEST), 2011 Proceedings of the 5th IEEE International Conference on. , pp. 114-119.
BibTeX:
@inproceedings{brenner2011secret,
  author = {Brenner, Michael and Wiebelitz, Jan and von Voigt, Gabriele and Smith, Matthew},
  title = {Secret program execution in the cloud applying homomorphic encryption},
  booktitle = {Digital Ecosystems and Technologies Conference (DEST), 2011 Proceedings of the 5th IEEE International Conference on},
  year = {2011},
  pages = {114--119}
}
Brenner M, Wiebelitz J, von Voigt G and Smith M (2011), "A Smart-Gentry Based Software System for Secret Program Execution", In Proceedings of the 6th International Conference Security and Cryptography (SECRYPT). SciTePress., July, 2011. , pp. 238-244. IEEE.
BibTeX:
@inproceedings{brenner2011smart,
  author = {Brenner, Michael and Wiebelitz, Jan and von Voigt, Gabriele and Smith, Matthew},
  title = {A Smart-Gentry Based Software System for Secret Program Execution},
  booktitle = {Proceedings of the 6th International Conference Security and Cryptography (SECRYPT). SciTePress},
  publisher = {IEEE},
  year = {2011},
  pages = {238--244},
  doi = {10.5220/0003445802380244}
}
Harbach M, Muders T, Groeper R and Smith M (2011), "Email triage with Mind Meshes", In Digital Ecosystems and Technologies Conference (DEST), 2011 Proceedings of the 5th IEEE International Conference on. , pp. 176-181.
BibTeX:
@inproceedings{harbach2011email,
  author = {Harbach, Marian and Muders, Thomas and Groeper, Ralf and Smith, Matthew},
  title = {Email triage with Mind Meshes},
  booktitle = {Digital Ecosystems and Technologies Conference (DEST), 2011 Proceedings of the 5th IEEE International Conference on},
  year = {2011},
  pages = {176--181}
}
Harbach M and Smith M (2011), "Visual access control for research ecosystems", In Digital Ecosystems and Technologies Conference (DEST), 2011 Proceedings of the 5th IEEE International Conference on. , pp. 101-108.
BibTeX:
@inproceedings{harbach2011visual,
  author = {Harbach, Marian and Smith, Matthew},
  title = {Visual access control for research ecosystems},
  booktitle = {Digital Ecosystems and Technologies Conference (DEST), 2011 Proceedings of the 5th IEEE International Conference on},
  year = {2011},
  pages = {101--108}
}
Henne B, Szongott C and Smith M (2011), "Towards a mobile security & privacy simulator", In Open Systems (ICOS), 2011 IEEE Conference on. , pp. 95-100.
BibTeX:
@inproceedings{henne2011towards,
  author = {Henne, Benjamin and Szongott, Christian and Smith, Matthew},
  title = {Towards a mobile security & privacy simulator},
  booktitle = {Open Systems (ICOS), 2011 IEEE Conference on},
  year = {2011},
  pages = {95--100}
}
Juhnke E, Seiler D, Ewerth R, Smith M and Freisleben B (2011), "Request/response aspects for web services", In Advanced Information Systems Engineering. Vol. 6741, pp. 627-641. Springer.
BibTeX:
@incollection{juhnke2011request,
  author = {Juhnke, Ernst and Seiler, Dominik and Ewerth, Ralph and Smith, Matthew and Freisleben, Bernd},
  editor = {Mouratidis, Haralambos and Rolland, Colette},
  title = {Request/response aspects for web services},
  booktitle = {Advanced Information Systems Engineering},
  publisher = {Springer},
  year = {2011},
  volume = {6741},
  pages = {627--641}
}
Kunz C, Tahmasebi N, Risse T and Smith M (2011), "Detecting Credential Abuse in the Grid using Bayesian Networks", In Grid Computing (GRID), 2011 12th IEEE/ACM International Conference on., Sept, 2011. , pp. 114-120. IEEE.
BibTeX:
@inproceedings{kunzdetecting,
  author = {Kunz, Christopher and Tahmasebi, Nina and Risse, Thomas and Smith, Matthew},
  title = {Detecting Credential Abuse in the Grid using Bayesian Networks},
  booktitle = {Grid Computing (GRID), 2011 12th IEEE/ACM International Conference on},
  publisher = {IEEE},
  year = {2011},
  pages = {114--120},
  doi = {10.1109/Grid.2011.23}
}
Perl H, Brenner M and Smith M (2011), "POSTER: An Implementation of the Fully Homomorphic Smart-Vercauteren Crypto-System", In Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011., October, 2011. , pp. 837-839. ACM.
BibTeX:
@inproceedings{perlposter,
  author = {Perl, Henning and Brenner, Michael and Smith, Matthew},
  title = {POSTER: An Implementation of the Fully Homomorphic Smart-Vercauteren Crypto-System},
  booktitle = {Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011},
  publisher = {ACM},
  year = {2011},
  pages = {837--839}
}
Smith M, Schridde C, Agel B and Freisleben B (2011), "Secure mobile communication via identity-based cryptography and server-aided computations", The Journal of Supercomputing. Vol. 55(2), pp. 284-306. Springer.
BibTeX:
@article{smith2011secure,
  author = {Smith, Matthew and Schridde, Christian and Agel, Björn and Freisleben, Bernd},
  title = {Secure mobile communication via identity-based cryptography and server-aided computations},
  journal = {The Journal of Supercomputing},
  publisher = {Springer},
  year = {2011},
  volume = {55},
  number = {2},
  pages = {284--306}
}
Smith M, Harbach M, Lewis A, Mertins S and Griffiths L (2011), "Towards a translational medical research ecosystem", In Digital Ecosystems and Technologies Conference (DEST), 2011 Proceedings of the 5th IEEE International Conference on. , pp. 120-126.
BibTeX:
@inproceedings{smith2011towards,
  author = {Smith, Matthew and Harbach, Marian and Lewis, Andrew and Mertins, Susanne and Griffiths, Lyn},
  title = {Towards a translational medical research ecosystem},
  booktitle = {Digital Ecosystems and Technologies Conference (DEST), 2011 Proceedings of the 5th IEEE International Conference on},
  year = {2011},
  pages = {120--126}
}
Stewart A, Smith M and Nejdl W (2011), "A transfer approach to detecting disease reporting events in blog social media", In Proceedings of the 22nd ACM conference on Hypertext and hypermedia. , pp. 271-280.
BibTeX:
@inproceedings{stewart2011transfer,
  author = {Stewart, Avaré and Smith, Matthew and Nejdl, Wolfgang},
  title = {A transfer approach to detecting disease reporting events in blog social media},
  booktitle = {Proceedings of the 22nd ACM conference on Hypertext and hypermedia},
  year = {2011},
  pages = {271--280}
}
Stewart A, Herder E, Smith M and Nejdl W (2011), "A user study on public health events detected within the medical ecosystem", In Digital Ecosystems and Technologies Conference (DEST), 2011 Proceedings of the 5th IEEE International Conference on. , pp. 127-132.
BibTeX:
@inproceedings{stewart2011user,
  author = {Stewart, Avare and Herder, Eelco and Smith, Matthew and Nejdl, Wolfgang},
  title = {A user study on public health events detected within the medical ecosystem},
  booktitle = {Digital Ecosystems and Technologies Conference (DEST), 2011 Proceedings of the 5th IEEE International Conference on},
  year = {2011},
  pages = {127--132}
}
2010
Brenner M, Wiebelitz J and Smith M (2010), "A JEE-based Architecture for Distributed Multi-Domain Resource Accounting", In e-Science Workshops, 2010 Sixth IEEE International Conference on. , pp. 31-38.
BibTeX:
@inproceedings{brenner2010jee,
  author = {Brenner, Michael and Wiebelitz, Jan and Smith, Matthew},
  title = {A JEE-based Architecture for Distributed Multi-Domain Resource Accounting},
  booktitle = {e-Science Workshops, 2010 Sixth IEEE International Conference on},
  year = {2010},
  pages = {31--38}
}
Dalman T, Dörnemann T, Juhnke E, Weitzel M, Smith M, Wiechert W, Noh K and Freisleben B (2010), "Metabolic flux analysis in the cloud", In e-Science (e-Science), 2010 IEEE Sixth International Conference on. , pp. 57-64.
BibTeX:
@inproceedings{dalman2010metabolic,
  author = {Dalman, Tolga and Dörnemann, T and Juhnke, Ernst and Weitzel, Michael and Smith, Matthew and Wiechert, Wolfgang and Noh, Katharina and Freisleben, Bernd},
  title = {Metabolic flux analysis in the cloud},
  booktitle = {e-Science (e-Science), 2010 IEEE Sixth International Conference on},
  year = {2010},
  pages = {57--64}
}
Kunz C, Wiebelitz J and Smith M (2010), "An attack-resilient Grid auditing infrastructure", In Wireless Communications, Networking and Information Security (WCNIS), 2010 IEEE International Conference on. , pp. 635-639.
BibTeX:
@inproceedings{kunz2010attack,
  author = {Kunz, Christopher and Wiebelitz, Jan and Smith, Matthew},
  title = {An attack-resilient Grid auditing infrastructure},
  booktitle = {Wireless Communications, Networking and Information Security (WCNIS), 2010 IEEE International Conference on},
  year = {2010},
  pages = {635--639}
}
Mohammed Y, Dickmann F, Sax U, von Voigt G, Smith M and Rienhoff O (2010), "Reaching for the cloud: on the lessons learned from grid computing technology transfer process to the biomedical community.", Studies in health technology and informatics. Vol. 160(Pt 2), pp. 1339.
BibTeX:
@article{mohammed2010reaching,
  author = {Mohammed, Y and Dickmann, F and Sax, U and von Voigt, G and Smith, M and Rienhoff, O},
  title = {Reaching for the cloud: on the lessons learned from grid computing technology transfer process to the biomedical community.},
  journal = {Studies in health technology and informatics},
  year = {2010},
  volume = {160},
  number = {Pt 2},
  pages = {1339}
}
Mohammed Y, Sax U, Dickmann F, Lippert J, Solodenko J, von Voigt G, Smith M and Rienhoff O (2010), "On transferring the grid technology to the biomedical community.", Studies in health technology and informatics. Vol. 159, pp. 28.
BibTeX:
@article{mohammed2010transferring,
  author = {Mohammed, Y and Sax, U and Dickmann, F and Lippert, J and Solodenko, J and von Voigt, G and Smith, M and Rienhoff, O},
  title = {On transferring the grid technology to the biomedical community.},
  journal = {Studies in health technology and informatics},
  year = {2010},
  volume = {159},
  pages = {28}
}
Schmidt M, Fallenbeck N, Smith M and Freisleben B (2010), "Efficient distribution of virtual machines for cloud computing", In Parallel, Distributed and Network-Based Processing (PDP), 2010 18th Euromicro International Conference on. , pp. 567-574.
BibTeX:
@inproceedings{schmidt2010efficient,
  author = {Schmidt, Matthias and Fallenbeck, Niels and Smith, Matthew and Freisleben, Bernd},
  title = {Efficient distribution of virtual machines for cloud computing},
  booktitle = {Parallel, Distributed and Network-Based Processing (PDP), 2010 18th Euromicro International Conference on},
  year = {2010},
  pages = {567--574}
}
Schridde C, Dornemann T, Juhnke E, Freisleben B and Smith M (2010), "An identity-based security infrastructure for Cloud environments", In Wireless Communications, Networking and Information Security (WCNIS), 2010 IEEE International Conference on. , pp. 644-649.
BibTeX:
@inproceedings{schridde2010identity,
  author = {Schridde, Christian and Dornemann, Tim and Juhnke, Ernst and Freisleben, Bernd and Smith, Matthew},
  title = {An identity-based security infrastructure for Cloud environments},
  booktitle = {Wireless Communications, Networking and Information Security (WCNIS), 2010 IEEE International Conference on},
  year = {2010},
  pages = {644--649}
}
Stadelmann T, Wang Y, Smith M, Ewerth R and Freisleben B (2010), "Rethinking Algorithm Design and Development in Speech Processing", In Pattern Recognition (ICPR), 2010 20th International Conference on. , pp. 4476-4479.
BibTeX:
@inproceedings{stadelmann2010rethinking,
  author = {Stadelmann, Thilo and Wang, Yinghui and Smith, Matthew and Ewerth, Ralph and Freisleben, Bernd},
  title = {Rethinking Algorithm Design and Development in Speech Processing},
  booktitle = {Pattern Recognition (ICPR), 2010 20th International Conference on},
  year = {2010},
  pages = {4476--4479}
}
Wiebelitz J, Brenner M, Kunz C and Smith M (2010), "Early defense: enabling attribute-based authorization in Grid firewalls", In Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing. , pp. 336-339.
BibTeX:
@inproceedings{wiebelitz2010early,
  author = {Wiebelitz, Jan and Brenner, Michael and Kunz, Christopher and Smith, Matthew},
  title = {Early defense: enabling attribute-based authorization in Grid firewalls},
  booktitle = {Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing},
  year = {2010},
  pages = {336--339}
}
2009
FREISLEBEN B, SCHRIDDE C, SMITH MD, KEWITZ A and others (2009), "METHOD AND APPARATUS FOR PRODUCING CRYPTOGRAPHIC KEYS FOR PERFORMING KEY AGREEMENT FOR SECURE DIGITAL COMMUNICATION", Jan., 2009. (WO Patent 2,009,010,200)
BibTeX:
@patent{freisleben2009method,
  author = {FREISLEBEN, Bernd and SCHRIDDE, Christian and SMITH, Matthew David and KEWITZ, Ansgar and others},
  title = {METHOD AND APPARATUS FOR PRODUCING CRYPTOGRAPHIC KEYS FOR PERFORMING KEY AGREEMENT FOR SECURE DIGITAL COMMUNICATION},
  year = {2009},
  number = {WO Patent 2,009,010,200},
  note = {WO Patent 2,009,010,200}
}
Schmidt M, Fallenbeck N, Smith M and Freisleben B (2009), "Secure Service-Oriented Grid Computing with Public Virtual Worker Nodes", In Software Engineering and Advanced Applications, 2009. SEAA'09. 35th Euromicro Conference on. , pp. 555-562.
BibTeX:
@inproceedings{schmidt2009secure,
  author = {Schmidt, Matthias and Fallenbeck, Niels and Smith, Matthew and Freisleben, Bernd},
  title = {Secure Service-Oriented Grid Computing with Public Virtual Worker Nodes},
  booktitle = {Software Engineering and Advanced Applications, 2009. SEAA'09. 35th Euromicro Conference on},
  year = {2009},
  pages = {555--562}
}
Schridde C, Smith M and Freisleben B (2009), "TrueIP: prevention of IP spoofing attacks using identity-based cryptography", In Proceedings of the 2nd International Conference on Security of Information and Networks. , pp. 128-137.
BibTeX:
@inproceedings{schridde2009trueip,
  author = {Schridde, Christian and Smith, Matthew and Freisleben, Bernd},
  title = {TrueIP: prevention of IP spoofing attacks using identity-based cryptography},
  booktitle = {Proceedings of the 2nd International Conference on Security of Information and Networks},
  year = {2009},
  pages = {128--137}
}
Schridde C, Freisleben B, Smith M and others (2009), "Verfahren und Vorrichtung für eine verschlüsselte digitale Sprachkommunikation", Jan., 2009. (DE Patent 102,007,033,845)
BibTeX:
@patent{schridde2009verfahren,
  author = {Schridde, Christian and Freisleben, Bernd and Smith, Matthew and others},
  title = {Verfahren und Vorrichtung für eine verschlüsselte digitale Sprachkommunikation},
  year = {2009},
  number = {DE Patent 102,007,033,845},
  note = {DE Patent 102,007,033,845}
}
Smith M, Schridde C, Agel B and Freisleben B (2009), "Identity-Based Cryptography for Securing Mobile Phone Calls", In Advanced Information Networking and Applications Workshops, 2009. WAINA'09. International Conference on., May, 2009. , pp. 365-370.
BibTeX:
@inproceedings{smith2009identity,
  author = {Smith, Matthew and Schridde, Christian and Agel, Björn and Freisleben, Bernd},
  title = {Identity-Based Cryptography for Securing Mobile Phone Calls},
  booktitle = {Advanced Information Networking and Applications Workshops, 2009. WAINA'09. International Conference on},
  year = {2009},
  pages = {365--370},
  doi = {10.1109/WAINA.2009.167}
}
Smith M, Schmidt M, Fallenbeck N, Dörnemann T, Schridde C and Freisleben B (2009), "Secure on-demand grid computing", Future Generation Computer Systems. Vol. 25(3), pp. 315-325. North-Holland.
BibTeX:
@article{smith2009secure,
  author = {Smith, Matthew and Schmidt, Matthias and Fallenbeck, Niels and Dörnemann, Tim and Schridde, Christian and Freisleben, Bernd},
  title = {Secure on-demand grid computing},
  journal = {Future Generation Computer Systems},
  publisher = {North-Holland},
  year = {2009},
  volume = {25},
  number = {3},
  pages = {315--325}
}
Smith M, Schridde C, Agel B and Freisleben B (2009), "Securing Mobile Phone Calls with Identity-Based Cryptography", In Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance. Vol. 5576, pp. 210-222. Springer.
BibTeX:
@inproceedings{smith2009securing,
  author = {Smith, Matthew and Schridde, Christian and Agel, Björn and Freisleben, Bernd},
  title = {Securing Mobile Phone Calls with Identity-Based Cryptography},
  booktitle = {Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance},
  publisher = {Springer},
  year = {2009},
  volume = {5576},
  pages = {210--222},
  doi = {10.1007/978-3-642-02617-1_22}
}
Smith M, Schwarzer F, Harbach M, Noll T and Freisleben B (2009), "A streaming intrusion detection system for grid computing environments", In High Performance Computing and Communications, 2009. HPCC'09. 11th IEEE International Conference on. , pp. 44-51.
BibTeX:
@inproceedings{smith2009streaming,
  author = {Smith, Matthew and Schwarzer, Fabian and Harbach, Marian and Noll, Thomas and Freisleben, Bernd},
  title = {A streaming intrusion detection system for grid computing environments},
  booktitle = {High Performance Computing and Communications, 2009. HPCC'09. 11th IEEE International Conference on},
  year = {2009},
  pages = {44--51}
}
Smith M, Schridde C, Freisleben B and others (2009), "Verfahren und Vorrichtung zur kryptographischen Schlüsseleinigung für eine sichere digitale Kommunikation in Netzwerken", Jan., 2009. (DE Patent 102,007,033,847)
BibTeX:
@patent{smith2009verfahren,
  author = {Smith, Matthew and Schridde, Christian and Freisleben, Bernd and others},
  title = {Verfahren und Vorrichtung zur kryptographischen Schlüsseleinigung für eine sichere digitale Kommunikation in Netzwerken},
  year = {2009},
  number = {DE Patent 102,007,033,847},
  note = {DE Patent 102,007,033,847}
}
2008
Dornemann T, Smith M and Freisleben B (2008), "Composition and Execution of Secure Workflows in WSRF-Grids", In Cluster Computing and the Grid, 2008. CCGRID'08. 8th IEEE International Symposium on. , pp. 122-129.
BibTeX:
@inproceedings{dornemann2008composition,
  author = {Dornemann, T and Smith, Matthew and Freisleben, Bernd},
  title = {Composition and Execution of Secure Workflows in WSRF-Grids},
  booktitle = {Cluster Computing and the Grid, 2008. CCGRID'08. 8th IEEE International Symposium on},
  year = {2008},
  pages = {122--129}
}
Dornemann T, Smith M, Juhnke E and Freisleben B (2008), "Secure Grid Micro-Workflows Using Virtual Workspaces", In Software Engineering and Advanced Applications, 2008. SEAA'08. 34th Euromicro Conference. , pp. 119-126.
BibTeX:
@inproceedings{dornemann2008secure,
  author = {Dornemann, T and Smith, Matthew and Juhnke, Ernst and Freisleben, Bernd},
  title = {Secure Grid Micro-Workflows Using Virtual Workspaces},
  booktitle = {Software Engineering and Advanced Applications, 2008. SEAA'08. 34th Euromicro Conference},
  year = {2008},
  pages = {119--126}
}
Freisleben B, Kewitz A, Schridde C and Smith MD (2008), "Method and apparatus for producing cryptographic keys for performing key agreement for secure digital communication", Jul, 2008. (WO Patent App. PCT/EP2008/005,488)
BibTeX:
@patent{freisleben2008method,
  author = {Freisleben, Bernd and Kewitz, Ansgar and Schridde, Christian and Smith, Matthew David},
  title = {Method and apparatus for producing cryptographic keys for performing key agreement for secure digital communication},
  year = {2008},
  number = {WO Patent App. PCT/EP2008/005,488},
  note = {WO Patent App. PCT/EP2008/005,488}
}
Schridde C, Smith M and Freisleben B (2008), "An identity-based key agreement protocol for the network layer", In Security and Cryptography for Networks. Vol. 5229, pp. 409-422. Springer.
BibTeX:
@incollection{schridde2008identity,
  author = {Schridde, Christian and Smith, Matthew and Freisleben, Bernd},
  editor = {Ostrovsky, Rafail and De Prisco, Roberto and Visconti, Ivan},
  title = {An identity-based key agreement protocol for the network layer},
  booktitle = {Security and Cryptography for Networks},
  publisher = {Springer},
  year = {2008},
  volume = {5229},
  pages = {409--422},
  doi = {10.1007/978-3-540-85855-3_27}
}
Scriven I, Lewis A, Smith M and Friese T (2008), "Resource evaluation and node monitoring in service oriented ad-hoc grids", In Proceedings of the sixth Australasian workshop on Grid computing and e-research-Volume 82. , pp. 65-71. Australian Computer Society, Inc..
BibTeX:
@inproceedings{scriven2008resource,
  author = {Scriven, Ian and Lewis, Andrew and Smith, Matthew and Friese, Thomas},
  editor = {Wayne Kelly and Paul Roe},
  title = {Resource evaluation and node monitoring in service oriented ad-hoc grids},
  booktitle = {Proceedings of the sixth Australasian workshop on Grid computing and e-research-Volume 82},
  publisher = {Australian Computer Society, Inc.},
  year = {2008},
  pages = {65--71}
}
Smith M, Schridde C and Freisleben B (2008), "Securing stateful grid servers through virtual server rotation", In Proceedings of the 17th international symposium on High performance distributed computing. , pp. 11-22.
BibTeX:
@inproceedings{smith2008securing,
  author = {Smith, Matthew and Schridde, Christian and Freisleben, Bernd},
  title = {Securing stateful grid servers through virtual server rotation},
  booktitle = {Proceedings of the 17th international symposium on High performance distributed computing},
  year = {2008},
  pages = {11--22}
}
Smith M (2008), "Security for Service-Oriented On-Demand Grid Computing". Thesis at: Universitätsbibliothek Marburg.
BibTeX:
@phdthesis{smith2008security,
  author = {Smith, Matthew},
  title = {Security for Service-Oriented On-Demand Grid Computing},
  school = {Universitätsbibliothek Marburg},
  year = {2008}
}
2007
Barth T, Dörnemann K, Dörnemann T, Freisleben B, Friese T, Grauer M, Jakumeit Jü, Entrup CLü, Müller U, Reichwald J and others (2007), "Supporting Engineering Processes Utilizing Service-Oriented Grid Technology", In Proceedings of the German e-Science Conference 2007., May, 2007. , pp. 1-10.
BibTeX:
@inproceedings{barth2007supporting,
  author = {Barth, Thomas and Dörnemann, Kay and Dörnemann, Tim and Freisleben, Bernd and Friese, Thomas and Grauer, Manfred and Jakumeit, Jürgen and Entrup, C Lütke and Müller, Ulf and Reichwald, Julian and others},
  title = {Supporting Engineering Processes Utilizing Service-Oriented Grid Technology},
  booktitle = {Proceedings of the German e-Science Conference 2007},
  year = {2007},
  pages = {1--10}
}
Canisius S, Ploch T, Kesper K, Smith M, Freisleben B and Penzel T (2007), "Sleep Medicine as a Scenario for Medical Grid Application", Studies in Health Technology and Informatics. Vol. 126, pp. 37. IOS Press; 1999.
BibTeX:
@article{canisius2007sleep,
  author = {Canisius, Sebastian and Ploch, Thomas and Kesper, Karl and Smith, Matthew and Freisleben, Bernd and Penzel, Thomas},
  title = {Sleep Medicine as a Scenario for Medical Grid Application},
  journal = {Studies in Health Technology and Informatics},
  publisher = {IOS Press; 1999},
  year = {2007},
  volume = {126},
  pages = {37}
}
Dornemann T, Heinzl S, Dornemann K, Mathes M, Smith M and Freisleben B (2007), "Secure Grid Service Engineering for Industrial Optimization Problems", FRONTIERS SCIENCE SERIES. Vol. 49, pp. 371. UNIVERSAL ACADEMY PRESS, INC..
BibTeX:
@article{dornemann2007secure,
  author = {Dornemann, T and Heinzl, Steffen and Dornemann, K and Mathes, Markus and Smith, Matthew and Freisleben, Bernd},
  title = {Secure Grid Service Engineering for Industrial Optimization Problems},
  journal = {FRONTIERS SCIENCE SERIES},
  publisher = {UNIVERSAL ACADEMY PRESS, INC.},
  year = {2007},
  volume = {49},
  pages = {371}
}
Freisleben B, Kewitz A, Schridde C and Smith M (2007), "Cryptographic key generating method for encrypted digital communication between communication devices, involves converting end product address of communication device into part of key, and utilizing address for key agreement", Jul, 2007. (DE Patent App. 200,710,033,846)
BibTeX:
@patent{freisleben2007cryptographic,
  author = {Freisleben, Bernd and Kewitz, Ansgar and Schridde, Christian and Smith, Matthew},
  title = {Cryptographic key generating method for encrypted digital communication between communication devices, involves converting end product address of communication device into part of key, and utilizing address for key agreement},
  year = {2007},
  number = {DE Patent App. 200,710,033,846},
  note = {DE Patent App. 200,710,033,846}
}
Freisleben BPD, Schridde C and Smith M (2007), "Method for cryptographic key agreement between two communication devices in Internet protocol communications networks, involves arranging one or multiple Network address translation routers between two communication devices", Jul, 2007. (DE Patent App. 200,710,033,847)
BibTeX:
@patent{freisleben2007method,
  author = {Freisleben, Bernd Prof Dr and Schridde, Christian and Smith, Matthew},
  title = {Method for cryptographic key agreement between two communication devices in Internet protocol communications networks, involves arranging one or multiple Network address translation routers between two communication devices},
  year = {2007},
  number = {DE Patent App. 200,710,033,847},
  note = {DE Patent App. 200,710,033,847}
}
Freisleben BPD, Schridde C and Smith M (2007), "Public/private cryptographic key producing method for executing key agreement in digital data carrier, involves converting terminal end point address into key portion by applying inverse function of trap door one-way function for agreement", Jul, 2007. (DE Patent App. 200,710,033,845)
BibTeX:
@patent{freisleben2007public,
  author = {Freisleben, Bernd Prof Dr and Schridde, Christian and Smith, Matthew},
  title = {Public/private cryptographic key producing method for executing key agreement in digital data carrier, involves converting terminal end point address into key portion by applying inverse function of trap door one-way function for agreement},
  year = {2007},
  number = {DE Patent App. 200,710,033,845},
  note = {DE Patent App. 200,710,033,845}
}
Friese T, Smith M and Freisleben B (2007), "Native Code Security for Java Grid Services", In 8. Internationale Tagung Wirtschaftsinformatik 2007-Band 1., Feb, 2007. , pp. 513.
BibTeX:
@inproceedings{friese2007native,
  author = {Friese, Thomas and Smith, Matthew and Freisleben, Bernd},
  title = {Native Code Security for Java Grid Services},
  booktitle = {8. Internationale Tagung Wirtschaftsinformatik 2007-Band 1},
  year = {2007},
  pages = {513}
}
Schmidt M, Smith M, Fallenbeck N, Picht H and Freisleben B (2007), "Building a demilitarized zone with data encryption for grid environments", In Proceedings of the first international conference on Networks for grid applications. , pp. 17.
BibTeX:
@inproceedings{schmidt2007building,
  author = {Schmidt, Matthias and Smith, Matthew and Fallenbeck, Niels and Picht, Hans and Freisleben, Bernd},
  title = {Building a demilitarized zone with data encryption for grid environments},
  booktitle = {Proceedings of the first international conference on Networks for grid applications},
  year = {2007},
  pages = {17}
}
Schridde C, Picht H-J, Heidt M, Smith M and Freisleben B (2007), "Secure Integration of Desktop Grids and Compute Clusters Based on Virtualization and Meta-Scheduling", In Proceedings of the German e-Science Conference 2007., May, 2007. , pp. 1–9. Citeseer.
BibTeX:
@inproceedings{schridde2007secure,
  author = {Schridde, Christian and Picht, Hans-Joachim and Heidt, Michael and Smith, Matthew and Freisleben, B},
  title = {Secure Integration of Desktop Grids and Compute Clusters Based on Virtualization and Meta-Scheduling},
  booktitle = {Proceedings of the German e-Science Conference 2007},
  publisher = {Citeseer},
  year = {2007},
  pages = {1–9},
  url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.90.1362&rep=rep1&type=pdf}
}
Smith M, Schmidt M, Fallenbeck N, Schridde C and Freisleben B (2007), "Optimising Security Configurations with Service Level Agreements", FRONTIERS SCIENCE SERIES. Vol. 49, pp. 367. Citeseer.
BibTeX:
@article{smith2007optimising,
  author = {Smith, M and Schmidt, M and Fallenbeck, N and Schridde, C and Freisleben, B},
  title = {Optimising Security Configurations with Service Level Agreements},
  journal = {FRONTIERS SCIENCE SERIES},
  publisher = {Citeseer},
  year = {2007},
  volume = {49},
  pages = {367}
}
2006
Fallenbeck N, Picht H-J, Smith M and Freisleben B (2006), "Xen and the art of cluster scheduling", In Proceedings of the 2nd International Workshop on Virtualization Technology in Distributed Computing. , pp. 4.
BibTeX:
@inproceedings{fallenbeck2006xen,
  author = {Fallenbeck, Niels and Picht, Hans-Joachim and Smith, Matthew and Freisleben, Bernd},
  title = {Xen and the art of cluster scheduling},
  booktitle = {Proceedings of the 2nd International Workshop on Virtualization Technology in Distributed Computing},
  year = {2006},
  pages = {4}
}
Friese T, Smith M, Freisleben B, Reichwald J, Barth T and Grauer M (2006), "Collaborative Grid process creation support in an engineering domain", In High Performance Computing-HiPC 2006. Vol. 4297, pp. 263-276. Springer.
BibTeX:
@inproceedings{friese2006collaborative,
  author = {Friese, Thomas and Smith, Matthew and Freisleben, Bernd and Reichwald, Julian and Barth, Thomas and Grauer, Manfred},
  editor = {Robert, Yves and Parashar, Manish and Badrinath, Ramamurthy and Prasanna, ViktorK.},
  title = {Collaborative Grid process creation support in an engineering domain},
  booktitle = {High Performance Computing-HiPC 2006},
  publisher = {Springer},
  year = {2006},
  volume = {4297},
  pages = {263--276},
  doi = {10.1007/11945918_29}
}
Friese T, Smith M and Freisleben B (2006), "GDT: A toolkit for grid service development", In Proc. of the 3rd International Conference on Grid Service Engineering and Management. , pp. 131-148.
BibTeX:
@inproceedings{friese2006gdt,
  author = {Friese, Thomas and Smith, Matthew and Freisleben, Bernd},
  title = {GDT: A toolkit for grid service development},
  booktitle = {Proc. of the 3rd International Conference on Grid Service Engineering and Management},
  year = {2006},
  pages = {131--148}
}
Friese T, Smith M and Freisleben B (2006), "Grid development tools for eclipse", In Eclipse Technology eXchange workshop (eTX) at ECOOP 2006., July, 2006.
BibTeX:
@inproceedings{friese2006grid,
  author = {Friese, Thomas and Smith, Matthew and Freisleben, Bernd},
  title = {Grid development tools for eclipse},
  booktitle = {Eclipse Technology eXchange workshop (eTX) at ECOOP 2006},
  year = {2006}
}
Friese T, Smith M and Freisleben B (2006), "Service-Oriented Ad hoc Grids", Grid Computing., In Grid Computing. , pp. 143-190. Vieweg.
BibTeX:
@incollection{friese2006service,
  author = {Friese, T. and Smith, M. and Freisleben, B.},
  editor = {Barth, Thomas and Schüll, Anke},
  title = {Service-Oriented Ad hoc Grids},
  booktitle = {Grid Computing},
  journal = {Grid Computing},
  publisher = {Vieweg},
  year = {2006},
  pages = {143--190},
  doi = {10.1007/978-3-8348-9101-3_8}
}
Heinzl S, Mathes M, Friese T, Smith M and Freisleben B (2006), "Flex-swa: Flexible exchange of binary data based on soap messages with attachments", In Web Services, 2006. ICWS'06. International Conference on. , pp. 3-10.
BibTeX:
@inproceedings{heinzl2006flex,
  author = {Heinzl, Steffen and Mathes, Markus and Friese, Thomas and Smith, Matthew and Freisleben, Bernd},
  title = {Flex-swa: Flexible exchange of binary data based on soap messages with attachments},
  booktitle = {Web Services, 2006. ICWS'06. International Conference on},
  year = {2006},
  pages = {3--10}
}
Jakumeit Jü, Barth T, Reichwald J, Grauer M, Friese T, Smith M and Freisleben B (2006), "A Grid-Based Parallel Optimization Algorithm Applied to a Problem in Metal Casting Industry", In International Conference on Bioinspired Optimization Methods and their Applications (BIOMA)., Oct, 2006. , pp. 131-146.
BibTeX:
@inproceedings{jakumeit2006grid,
  author = {Jakumeit, Jürgen and Barth, Thomas and Reichwald, Julian and Grauer, Manfred and Friese, T and Smith, M and Freisleben, B},
  title = {A Grid-Based Parallel Optimization Algorithm Applied to a Problem in Metal Casting Industry},
  booktitle = {International Conference on Bioinspired Optimization Methods and their Applications (BIOMA)},
  year = {2006},
  pages = {131-146}
}
Smith M, Friese T and Freisleben B (2006), "Model Driven Service-Oriented Grid Application", In Grid Computing. , pp. 191-210. Vieweg.
BibTeX:
@incollection{Smith2006,
  author = {Smith, M and Friese, T and Freisleben, B},
  title = {Model Driven Service-Oriented Grid Application},
  booktitle = {Grid Computing},
  publisher = {Vieweg},
  year = {2006},
  pages = {191--210}
}
Smith M, Friese T, Engel M and Freisleben B (2006), "Countering security threats in service-oriented on-demand grid computing using sandboxing and trusted computing techniques", Journal of Parallel and Distributed Computing. Vol. 66(9), pp. 1189-1204. Elsevier.
BibTeX:
@article{smith2006countering,
  author = {Smith, Matthew and Friese, Thomas and Engel, Michael and Freisleben, Bernd},
  title = {Countering security threats in service-oriented on-demand grid computing using sandboxing and trusted computing techniques},
  journal = {Journal of Parallel and Distributed Computing},
  publisher = {Elsevier},
  year = {2006},
  volume = {66},
  number = {9},
  pages = {1189--1204}
}
Smith M, Friese T and Freisleben B (2006), "Model driven development of service-oriented grid applications", In Telecommunications, 2006. AICT-ICIW'06. International Conference on Internet and Web Applications and Services/Advanced International Conference on. , pp. 139-139.
BibTeX:
@inproceedings{smith2006model,
  author = {Smith, Matthew and Friese, Thomas and Freisleben, Bernd},
  title = {Model driven development of service-oriented grid applications},
  booktitle = {Telecommunications, 2006. AICT-ICIW'06. International Conference on Internet and Web Applications and Services/Advanced International Conference on},
  year = {2006},
  pages = {139--139}
}
Smith M, Klose B, Ewerth R, Friese T, Engel M and Freisleben B (2006), "Runtime Integration of Reconfigurable Hardware in Service-Oriented Grids", In Web Services, 2006. ICWS'06. International Conference on. , pp. 945-948.
BibTeX:
@inproceedings{smith2006runtime,
  author = {Smith, Matthew and Klose, B and Ewerth, Ralph and Friese, Thomas and Engel, Michael and Freisleben, Bernd},
  title = {Runtime Integration of Reconfigurable Hardware in Service-Oriented Grids},
  booktitle = {Web Services, 2006. ICWS'06. International Conference on},
  year = {2006},
  pages = {945--948}
}
Smith M, Engel M, Friese T and Freisleben B (2006), "Security issues in on-demand grid and cluster computing", In Cluster Computing and the Grid Workshops, 2006. Sixth IEEE International Symposium on. Vol. 2, pp. 14-pp.
BibTeX:
@inproceedings{smith2006security,
  author = {Smith, Matthew and Engel, Michael and Friese, Thomas and Freisleben, Bernd},
  title = {Security issues in on-demand grid and cluster computing},
  booktitle = {Cluster Computing and the Grid Workshops, 2006. Sixth IEEE International Symposium on},
  year = {2006},
  volume = {2},
  pages = {14--pp}
}
Smith M, Engel M, Hanemann S and Freisleben B (2006), "Towards a Roadcasting Communications Infrastructure", In Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, 2006. ICN/ICONS/MCL 2006. International Conference on. , pp. 213-213.
BibTeX:
@inproceedings{smith2006towards,
  author = {Smith, Matthew and Engel, Michael and Hanemann, Sven and Freisleben, Bernd},
  title = {Towards a Roadcasting Communications Infrastructure},
  booktitle = {Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, 2006. ICN/ICONS/MCL 2006. International Conference on},
  year = {2006},
  pages = {213--213}
}
Zhang J, Borisov N, Yurcik W, Slagell AJ and Smith M (2006), "Future Internet Security Services Enabled by Sharing of Anonymized Logs", In Workshop on Security and Privacy in Future Business Services held in conjunction with International Conference on Emerging Trends in Information and Communication Security (ETRICS)., June, 2006.
BibTeX:
@inproceedings{zhang2006future,
  author = {Zhang, Jianqing and Borisov, Nikita and Yurcik, William and Slagell, Adam J and Smith, Matthew},
  title = {Future Internet Security Services Enabled by Sharing of Anonymized Logs},
  booktitle = {Workshop on Security and Privacy in Future Business Services held in conjunction with International Conference on Emerging Trends in Information and Communication Security (ETRICS)},
  year = {2006}
}
2005
Battenfeld O, Smith M, Reinhardt P, Friese T and Freisleben B (2005), "A modular architecture for hot swappable mobile ad hoc routing algorithms", In Embedded Software and Systems, 2005. Second International Conference on. , pp. 8-pp.
BibTeX:
@inproceedings{battenfeld2005modular,
  author = {Battenfeld, Oliver and Smith, Matthew and Reinhardt, Patrick and Friese, Thomas and Freisleben, Bernd},
  title = {A modular architecture for hot swappable mobile ad hoc routing algorithms},
  booktitle = {Embedded Software and Systems, 2005. Second International Conference on},
  year = {2005},
  pages = {8--pp}
}
Friese T, Muller JP, Smith M and Freisleben B (2005), "A robust business resource management framework based on a peer-to-peer infrastructure", In E-Commerce Technology, 2005. CEC 2005. Seventh IEEE International Conference on. , pp. 215-222.
BibTeX:
@inproceedings{friese2005robust,
  author = {Friese, Thomas and Muller, Jorg P and Smith, Matthew and Freisleben, Bernd},
  title = {A robust business resource management framework based on a peer-to-peer infrastructure},
  booktitle = {E-Commerce Technology, 2005. CEC 2005. Seventh IEEE International Conference on},
  year = {2005},
  pages = {215--222}
}
Papalilo E, Friese T, Smith M and Freisleben B (2005), "Trust shaping: Adapting trust establishment and management to application requirements in a service-oriented grid environment", In Grid and Cooperative Computing -- GCC 2005., Nov, 2005. Vol. 3795, pp. 47-58. Springer.
BibTeX:
@incollection{papalilo2005trust,
  author = {Papalilo, E and Friese, T and Smith, M and Freisleben, B},
  title = {Trust shaping: Adapting trust establishment and management to application requirements in a service-oriented grid environment},
  booktitle = {Grid and Cooperative Computing -- GCC 2005},
  publisher = {Springer},
  year = {2005},
  volume = {3795},
  pages = {47--58},
  doi = {10.1007/11590354_6}
}
Smith M, Hanemann S and Freisleben B (2005), "Coupled simulation/emulation for cross-layer enabled mobile wireless computing", In Embedded Software and Systems, 2005. Second International Conference on. , pp. 9-pp.
BibTeX:
@inproceedings{smith2005coupled,
  author = {Smith, Matthew and Hanemann, Sven and Freisleben, Bernd},
  title = {Coupled simulation/emulation for cross-layer enabled mobile wireless computing},
  booktitle = {Embedded Software and Systems, 2005. Second International Conference on},
  year = {2005},
  pages = {9--pp}
}
Smith M, Friese T and Freisleben B (2005), "Intra-engine service security for grids based on WSRF", In Cluster Computing and the Grid, 2005. CCGrid 2005. IEEE International Symposium on. Vol. 2, pp. 644-653.
BibTeX:
@inproceedings{smith2005intra,
  author = {Smith, Matthew and Friese, Thomas and Freisleben, Bernd},
  title = {Intra-engine service security for grids based on WSRF},
  booktitle = {Cluster Computing and the Grid, 2005. CCGrid 2005. IEEE International Symposium on},
  year = {2005},
  volume = {2},
  pages = {644--653}
}
2004
Engel M, Smith M, Hanemann S and Freisleben B (2004), "Wireless ad-hoc network emulation using microkernel-based virtual linux systems", In Proceedings of the 5th EUROSIM Congress on Modeling and Simulation. , pp. 198-203. Citeseer.
BibTeX:
@inproceedings{engel2004wireless,
  author = {Engel, Michael and Smith, Matthew and Hanemann, Sven and Freisleben, Bernd},
  title = {Wireless ad-hoc network emulation using microkernel-based virtual linux systems},
  booktitle = {Proceedings of the 5th EUROSIM Congress on Modeling and Simulation},
  publisher = {Citeseer},
  year = {2004},
  pages = {198--203},
  url = {http://www.rrzn.uni-hannover.de/uploads/tx_tkpublikationen/1.pdf}
}
Friese T, Smith M and Freisleben B (2004), "Hot service deployment in an ad hoc grid environment", In Proceedings of the 2nd international conference on Service oriented computing. , pp. 75-83.
BibTeX:
@inproceedings{friese2004hot,
  author = {Friese, Thomas and Smith, Matthew and Freisleben, Bernd},
  title = {Hot service deployment in an ad hoc grid environment},
  booktitle = {Proceedings of the 2nd international conference on Service oriented computing},
  year = {2004},
  pages = {75--83}
}
Smith M and Freisleben B (2004), "Self-healing wireless ad hoc networks based on adaptive node mobility", In Proc. IFIP Conf. on Wireless and Optical Communications Networks. , pp. 121-124. Citeseer.
BibTeX:
@inproceedings{smith2004self,
  author = {Smith, Matthew and Freisleben, Bernd},
  title = {Self-healing wireless ad hoc networks based on adaptive node mobility},
  booktitle = {Proc. IFIP Conf. on Wireless and Optical Communications Networks},
  publisher = {Citeseer},
  year = {2004},
  pages = {121-124},
  url = {http://www.rrzn.uni-hannover.de/uploads/tx_tkpublikationen/2.pdf}
}
Smith M, Friese T and Freisleben B (2004), "Towards a service-oriented ad hoc grid", In Parallel and Distributed Computing, 2004. Third International Symposium on/Algorithms, Models and Tools for Parallel Computing on Heterogeneous Networks, 2004. Third International Workshop on. , pp. 201-208.
BibTeX:
@inproceedings{smith2004towards,
  author = {Smith, Matthew and Friese, Thomas and Freisleben, Bernd},
  title = {Towards a service-oriented ad hoc grid},
  booktitle = {Parallel and Distributed Computing, 2004. Third International Symposium on/Algorithms, Models and Tools for Parallel Computing on Heterogeneous Networks, 2004. Third International Workshop on},
  year = {2004},
  pages = {201--208}
}

Created by JabRef on 15/06/2015.