Publikationen

Matching entries: 0
settings...
2021
Danilova A, Naiakshina A, Horstmann S and Smith M (2021), "Do you really code? Designing and Evaluating Screening Questions for Online Surveys with Programmers", In 43rd International Conference on Software Engineering 2021.
BibTeX:
@inproceedings{Danilova2021,
  author = {Anastasia Danilova and Alena Naiakshina and Stefan Horstmann and Matthew Smith},
  title = {Do you really code? Designing and Evaluating Screening Questions for Online Surveys with Programmers},
  booktitle = {43rd International Conference on Software Engineering 2021},
  year = {2021},
  url = {https://arxiv.org/pdf/2103.04429.pdf}
}
Danilova A, Naiakshina A, Rasgauski A and Smith M (2021), "Code Reviewing as Methodology for Online Security Studies with Developers - A Case Study with Freelancers on Password Storage", In Symposium on Usable Privacy and Security (SOUPS 2021).
BibTeX:
@inproceedings{Danilova2021a,
  author = {Anastasia Danilova, Alena Naiakshina, Anna Rasgauski, Matthew Smith},
  title = {Code Reviewing as Methodology for Online Security Studies with Developers - A Case Study with Freelancers on Password Storage},
  booktitle = {Symposium on Usable Privacy and Security (SOUPS 2021)},
  year = {2021},
  url = {https://www.usenix.org/system/files/soups2021-danilova.pdf}
}
Gerlitz E, Häring M and Smith M (2021), "Please do not use !?_ or your License Plate Number: Analyzing Password Policies in German Companies", In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021)., aug, 2021. , pp. 17-36. USENIX Association.
BibTeX:
@inproceedings{274415,
  author = {Gerlitz, Eva and Häring, Maximilian and Smith, Matthew},
  title = {Please do not use !?_ or your License Plate Number: Analyzing Password Policies in German Companies},
  booktitle = {Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021)},
  publisher = {USENIX Association},
  year = {2021},
  pages = {17--36},
  url = {https://www.usenix.org/conference/soups2021/presentation/gerlitz}
}
Häring M, Gerlitz E, Tiefenau C, Smith M, Wermke D, Fahl S and Acar Y (2021), "Never ever or no matter what: Investigating Adoption Intentions and Misconceptions about the Corona-Warn-App in Germany", In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021)., aug, 2021. , pp. 77-98. USENIX Association.
BibTeX:
@inproceedings{274421,
  author = {Häring, Maximilian and Gerlitz, Eva and Tiefenau, Christian and Smith, Matthew and Wermke, Dominik and Fahl, Sascha and Acar, Yasemin},
  title = {Never ever or no matter what: Investigating Adoption Intentions and Misconceptions about the Corona-Warn-App in Germany},
  booktitle = {Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021)},
  publisher = {USENIX Association},
  year = {2021},
  pages = {77--98},
  url = {https://www.usenix.org/conference/soups2021/presentation/acar}
}
Ortloff A-M, Vossen M and Tiefenau C (2021), "Replicating a Study of Ransomware in Germany", In European Symposium on Usable Security 2021. New York, NY, USA , pp. 151–164. Association for Computing Machinery.
Abstract: Ransomware is a pertinent threat to businesses and end user data. While several attacks on enterprises are reported and give insights into the prevalence of such ransomware attacks, this prevalence in the general population is hard to estimate since they are not monitored by an official entity. A 2019 study by Simoiu et al. surveyed a representative sample of American consumers to estimate it for the US population. One year later, we aimed to replicate this effort for a representative German population (N=963) to study the spread of ransomware in a different context. Our findings suggest some differences between the two samples concerning payment methods and the participants’ way of dealing with ransomware. Other aspects, like the ransom amounts and behavioral changes after an attack, were largely similar. We extend prior work by examining disagreements and uncertainty in judging whether a ransomware attack occurred for participants and researchers alike.
BibTeX:
@inproceedings{Ortloff2021_ReplicatingStudy,
  author = {Ortloff, Anna-Marie and Vossen, Maike and Tiefenau, Christian},
  title = {Replicating a Study of Ransomware in Germany},
  booktitle = {European Symposium on Usable Security 2021},
  publisher = {Association for Computing Machinery},
  year = {2021},
  pages = {151–164},
  url = {https://dl.acm.org/doi/10.1145/3481357.3481508}
}
Ortloff A-M, Zimmerman S, Elsweiler D and Henze N (2021), "The Effect of Nudges and Boosts on Browsing Privacy in a Naturalistic Environment", In Proceedings of the 2021 Conference on Human Information Interaction and Retrieval. New York, NY, USA , pp. 63–73. Association for Computing Machinery.
Abstract: During everyday web browsing and search users reveal many pieces of private information to third parties. Even though people report being concerned about their privacy online, they often do not take steps to protect it. This is known as the 'privacy paradox' in the literature. In this work we study two well-known strategies based on theories from the behavioral sciences, nudging and boosting, which encourage users to browse in a way that their private data are less exposed. First, an online survey (N=127) tested the comprehensibility and efficacy of various facts (boosts), before the most effective of these were evaluated against 'nudge' interventions previously shown to be efficacious in lab-studies. A three week naturalistic study (N=68) using a browser extension revealed that both nudges and boosts improve browsing privacy, as approximated by different measures. Boosts are also shown to improve user knowledge about privacy in the short term, but the benefit weakens over time.
BibTeX:
@inproceedings{Ortloff2021EffectOfNudges,
  author = {Ortloff, Anna-Marie and Zimmerman, Steven and Elsweiler, David and Henze, Niels},
  title = {The Effect of Nudges and Boosts on Browsing Privacy in a Naturalistic Environment},
  booktitle = {Proceedings of the 2021 Conference on Human Information Interaction and Retrieval},
  publisher = {Association for Computing Machinery},
  year = {2021},
  pages = {63–73},
  url = {https://dl.acm.org/doi/10.1145/3406522.3446014}
}
Plöger S, Meier M and Smith M (2021), "A Qualitative Usability Evaluation of the Clang Static Analyzer and libFuzzer with CS Students and CTF Players", In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021)., August, 2021. , pp. 553-572. USENIX Association.
BibTeX:
@inproceedings{274469,
  author = {Stephan Plöger and Mischa Meier and Matthew Smith},
  title = {A Qualitative Usability Evaluation of the Clang Static Analyzer and libFuzzer with CS Students and CTF Players},
  booktitle = {Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021)},
  publisher = {USENIX Association},
  year = {2021},
  pages = {553--572},
  url = {https://www.usenix.org/conference/soups2021/presentation/ploger}
}
Schessler M, Gerlitz E, Häring M and Smith M (2021), "Replication: Measuring User Perceptions in Smartphone Security and Privacy in Germany", In European Symposium on Usable Security 2021. New York, NY, USA , pp. 165–179. Association for Computing Machinery.
Abstract: In 2021, smartphones are ubiquitous and offer numerous possibilities. Previous work found that the interaction of people with smartphones is influenced by the perception of the devices’ security and privacy. Therefore, it is important to learn about the relations of behavior and perception, to better understand challenges and design systems accordingly. In 2012, a study conducted in the US found differences in how participants perceive their devices’ (laptop vs. smartphone) security and privacy. At the time, smartphones were still relatively new, and the participants had significantly less trust in their smartphones compared to laptops. Since then, smartphones and computers have improved a lot in soft- and hardware, and people are now much more familiar with smartphones in general. To understand the current state and the development of device perception, we repeated the original study in Germany, with minor adaptions, as online interviews with 30 participants. While the US study suggested security concerns limit smartphone usage, we did not find significant differences that would restrict the use of smartphones today. However, there are still comparatively great concerns about privacy on smartphones.
BibTeX:
@inproceedings{10.1145/3481357.3481511,
  author = {Schessler, Maxim and Gerlitz, Eva and Häring, Maximilian and Smith, Matthew},
  title = {Replication: Measuring User Perceptions in Smartphone Security and Privacy in Germany},
  booktitle = {European Symposium on Usable Security 2021},
  publisher = {Association for Computing Machinery},
  year = {2021},
  pages = {165–179},
  url = {https://dl.acm.org/doi/10.1145/3481357.3481511}
}
Tiefenau C (2021), "Behavioral Studies with IT-Administrators - Updating in Complex Environments and Securing Web Servers"
BibTeX:
@phdthesis{tiefenau2021behavioral,
  author = {Tiefenau, Christian},
  title = {Behavioral Studies with IT-Administrators - Updating in Complex Environments and Securing Web Servers},
  year = {2021}
}
Willing M, Dresen C, Gerlitz E, Haering M, Smith M, Binnewies C, Guess T, Haverkamp U and Schinzel S (2021), "Behavioral responses to a cyber attack in a hospital environment", Scientific Reports., sep, 2021. Vol. 11(1), pp. 19352.
Abstract: Technical and organizational steps are necessary to mitigate cyber threats and reduce risks. Human behavior is the last line of defense for many hospitals and is considered as equally important as technical security. Medical staff must be properly trained to perform such procedures. This paper presents the first qualitative, interdisciplinary research on how members of an intermediate care unit react to a cyberattack against their patient monitoring equipment. We conducted a simulation in a hospital training environment with 20 intensive care nurses. By the end of the experiment, 12 of the 20 participants realized the monitors' incorrect behavior. We present a qualitative behavior analysis of high performing participants (HPP) and low performing participants (LPP). The HPP showed fewer signs of stress, were easier on their colleagues, and used analog systems more often than the LPP. With 40% of our participants not recognizing the attack, we see room for improvements through the use of proper tools and provision of adequate training to prepare staff for potential attacks in the future.
BibTeX:
@article{Willing2021,
  author = {Willing, Markus and Dresen, Christian and Gerlitz, Eva and Haering, Maximilian and Smith, Matthew and Binnewies, Carmen and Guess, Tim and Haverkamp, Uwe and Schinzel, Sebastian},
  title = {Behavioral responses to a cyber attack in a hospital environment},
  journal = {Scientific Reports},
  year = {2021},
  volume = {11},
  number = {1},
  pages = {19352},
  url = {https://www.nature.com/articles/s41598-021-98576-7}
}
2020
Bischoff C, Gerlitz E and Smith M (2020), "Vision: I don’t want to use my Phone! A Cognitive Walkthrough for YubiKeys", In 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS PW). , pp. 160-165.
BibTeX:
@inproceedings{9229818,
  author = {Bischoff, Claudia and Gerlitz, Eva and Smith, Matthew},
  title = {Vision: I don’t want to use my Phone! A Cognitive Walkthrough for YubiKeys},
  booktitle = {2020 IEEE European Symposium on Security and Privacy Workshops (EuroS PW)},
  year = {2020},
  pages = {160-165},
  url = {https://ieeexplore.ieee.org/document/9229818}
}
Danilova A, Naiakshina A, Deuter J and Smith M (2020), "Replication: On the Ecological Validity of Online Security Developer Studies: Exploring Deception in a Password-Storage Study with Freelancers", In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020)., August, 2020. , pp. 165-183. USENIX Association.
BibTeX:
@inproceedings{Danilova2020b,
  author = {Anastasia Danilova and Alena Naiakshina and Johanna Deuter and Matthew Smith},
  title = {Replication: On the Ecological Validity of Online Security Developer Studies: Exploring Deception in a Password-Storage Study with Freelancers},
  booktitle = {Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020)},
  publisher = {USENIX Association},
  year = {2020},
  pages = {165--183},
  url = {https://www.usenix.org/conference/soups2020/presentation/danilova}
}
Danilova A, Naiakshina A and Smith M (2020), "One Size Does Not Fit All: A Grounded Theory and Online Survey Study of Developer Preferences for Security Warning Types​", In 42nd International Conference on Software Engineering 2020 (ICSE'20).
BibTeX:
@conference{Danilova2020a,
  author = {Danilova, A. and Naiakshina, A. and Smith, M.},
  title = {One Size Does Not Fit All: A Grounded Theory and Online Survey Study of Developer Preferences for Security Warning Types​},
  booktitle = {42nd International Conference on Software Engineering 2020 (ICSE'20)},
  year = {2020},
  url = {https://net.cs.uni-bonn.de/fileadmin/user_upload/danilova/2020___ICSE___Warning_Study_Quantitative_1_.pdf},
  doi = {https://ieeexplore.ieee.org/document/9284069}
}
Naiakshina A, Danilova A, Gerlitz E and Smith M (2020), "On Conducting Security Developer Studies with CS Students: Examining a Password Storage Study with CS Students, Freelancers, and Company Developers", In ACM CHI Conference on Human Factors in Computing Systems.
BibTeX:
@conference{Naiakshina2020a,
  author = {Naiakshina, A. and Danilova, A. and Gerlitz, E. and Smith, M.},
  title = {On Conducting Security Developer Studies with CS Students: Examining a Password Storage Study with CS Students, Freelancers, and Company Developers},
  booktitle = {ACM CHI Conference on Human Factors in Computing Systems},
  year = {2020},
  doi = {10.1145/3313831.3376791}
}
Tiefenau C, Häring M, Krombholz K and von Zezschwitz E (2020), "Security, Availability, and Multiple Information Sources: Exploring Update Behavior of System Administrators", In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020)., August, 2020. , pp. 239-258. USENIX Association.
BibTeX:
@inproceedings{tiefenau2020security,
  author = {Christian Tiefenau and Maximilian Häring and Katharina Krombholz and Emanuel von Zezschwitz},
  title = {Security, Availability, and Multiple Information Sources: Exploring Update Behavior of System Administrators},
  booktitle = {Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020)},
  publisher = {USENIX Association},
  year = {2020},
  pages = {239--258},
  url = {https://arxiv.org/abs/2007.08875}
}
2019
Dechand S, Naiakshina A, Danilova A and Smith M (2019), "In Encryption We Don’t Trust: The Effect of End-to-End Encryption to the Masses on User Perception", In 2019 IEEE European Symposium on Security and Privacy (EuroS P)., June, 2019. , pp. 401-415.
BibTeX:
@inproceedings{Dechand2019a,
  author = {S. Dechand and A. Naiakshina and A. Danilova and M. Smith},
  title = {In Encryption We Don’t Trust: The Effect of End-to-End Encryption to the Masses on User Perception},
  booktitle = {2019 IEEE European Symposium on Security and Privacy (EuroS P)},
  year = {2019},
  pages = {401-415},
  doi = {10.1109/EuroSP.2019.00037}
}
Naiakshina A, Danilova A, Gerlitz E, von Zezschwitz E and Smith M (2019), ""If you want, I can store the encrypted password." A Password-Storage Field Study with Freelance Developers", In ACM CHI Conference on Human Factors in Computing Systems.
BibTeX:
@conference{Naiakshina2019a,
  author = {Naiakshina, A. and Danilova, A. and Gerlitz, E. and von Zezschwitz, E. and Smith, M.},
  title = {"If you want, I can store the encrypted password." A Password-Storage Field Study with Freelance Developers},
  booktitle = {ACM CHI Conference on Human Factors in Computing Systems},
  year = {2019},
  url = {https://net.cs.uni-bonn.de/fileadmin/ag/smith/publications/FreelancerOnlinePasswordStudySupplementalMaterial.pdf},
  doi = {10.1145/3290605.3300370}
}
Tiefenau C, Häring M, Gerlitz E and von Zezschwitz E (2019), "Making Privacy Graspable: Can we Nudge Users to use Privacy Enhancing Techniques?", CoRR. Vol. abs/1911.07701
BibTeX:
@article{journals/corr/abs-1911-07701,
  author = {Tiefenau, Christian and Häring, Maximilian and Gerlitz, Eva and von Zezschwitz, Emanuel},
  title = {Making Privacy Graspable: Can we Nudge Users to use Privacy Enhancing Techniques?},
  journal = {CoRR},
  year = {2019},
  volume = {abs/1911.07701},
  url = {https://dblp.uni-trier.de/db/journals/corr/corr1911.html#abs-1911-07701}
}
Tiefenau C, Häring M, Khamis M and von Zezschwitz E (2019), ""Please enter your PIN" - On the Risk of Bypass Attacks on Biometric Authentication on Mobile Devices.", CoRR. Vol. abs/1911.07692
BibTeX:
@article{journals/corr/abs-1911-07692,
  author = {Tiefenau, Christian and Häring, Maximilian and Khamis, Mohamed and von Zezschwitz, Emanuel},
  title = {"Please enter your PIN" - On the Risk of Bypass Attacks on Biometric Authentication on Mobile Devices.},
  journal = {CoRR},
  year = {2019},
  volume = {abs/1911.07692},
  url = {https://dblp.uni-trier.de/db/journals/corr/corr1911.html#abs-1911-07692}
}
Tiefenau C, von Zezschwitz E, Häring M, Krombholz K and Smith M (2019), "A Usability Evaluation of Let's Encrypt and Certbot: Usable Security Done Right", In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. London, United Kingdom , pp. 1971-1988. ACM.
BibTeX:
@inproceedings{Tiefenau2019,
  author = {Tiefenau, Christian and von Zezschwitz, Emanuel and Häring, Maximilian and Krombholz, Katharina and Smith, Matthew},
  title = {A Usability Evaluation of Let's Encrypt and Certbot: Usable Security Done Right},
  booktitle = {Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security},
  publisher = {ACM},
  year = {2019},
  pages = {1971--1988},
  doi = {10.1145/3319535.3363220}
}
2018
Busse K (2018), "Position Paper: Differences in Cross-Cultural and Individual Perception of Security and Privacy", In CHI 2018 Workshop Networked Privacy, Montreal.
BibTeX:
@inproceedings{Busse2018a,
  author = {Karoline Busse},
  title = {Position Paper: Differences in Cross-Cultural and Individual Perception of Security and Privacy},
  booktitle = {CHI 2018 Workshop Networked Privacy, Montreal},
  year = {2018},
  url = {https://networkedprivacy2018.files.wordpress.com/2018/04/busse.pdf}
}
Busse K, Wermke D, Amft S, Fahl S, von Zezschwitz E and Smith M (2018), "Replication: Do We Snooze If We Can't Lose? Modelling Risk with Incentives in Habituation User Studies", In USENIX Security SOUPS 2018.
BibTeX:
@conference{KarolineBusse2018a,
  author = {Karoline Busse and Dominik Wermke and Sabrina Amft and Sascha Fahl and Emanuel von Zezschwitz and Matthew Smith},
  title = {Replication: Do We Snooze If We Can't Lose? Modelling Risk with Incentives in Habituation User Studies},
  booktitle = {USENIX Security SOUPS 2018},
  year = {2018},
  url = {https://www.usenix.org/sites/default/files/soups2018posters-busse.pdf}
}
Häring M, Reinhardt D and Omlor Y (2018), "Pick Me Up and I Will Tell You Who You Are: Analyzing Pick-Up Motions to Authenticate Users", In PerCom Workshops. , pp. 472-475. IEEE Computer Society.
BibTeX:
@inproceedings{Haering2018,
  author = {Häring, Maximilian and Reinhardt, Delphine and Omlor, Yvonne},
  title = {Pick Me Up and I Will Tell You Who You Are: Analyzing Pick-Up Motions to Authenticate Users},
  booktitle = {PerCom Workshops},
  publisher = {IEEE Computer Society},
  year = {2018},
  pages = {472-475},
  url = {https://dblp.uni-trier.de/db/conf/percom/percomw2018.html#HaringRO18}
}
Naiakshina A, Danilova A, Tiefenau C and Smith M (2018), "Deception Task Design in Developer Password Studies: Exploring a Student Sample", In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). Baltimore, MD , pp. 297-313. USENIX Association.
BibTeX:
@inproceedings{Naiakshina2018,
  author = {Alena Naiakshina and Anastasia Danilova and Christian Tiefenau and Matthew Smith},
  title = {Deception Task Design in Developer Password Studies: Exploring a Student Sample},
  booktitle = {Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018)},
  publisher = {USENIX Association},
  year = {2018},
  pages = {297--313},
  url = {https://www.usenix.org/system/files/conference/soups2018/soups2018-naiakshina.pdf}
}
2017
Abu-Salma R, Sasse MA, Bonneau J, Danilova A, Naiakshina A and Smith M (2017), "Obstacles to the Adoption of Secure Communication Tools ", In Security and Privacy (S&P), 2017 IEEE Symposium on (SP 17). IEEE Computer Society., May, 2017. , pp. 137-153.
BibTeX:
@inproceedings{Abu-Salma2017,
  author = {Ruba Abu-Salma and M. Angela Sasse and Joseph Bonneau and Anastasia Danilova and Alena Naiakshina and Matthew Smith},
  title = {Obstacles to the Adoption of Secure Communication Tools },
  booktitle = {Security and Privacy (S&P), 2017 IEEE Symposium on (SP 17). IEEE Computer Society},
  year = {2017},
  pages = {137-153},
  note = {conference = 38th IEEE Symposium on Security and Privacy, conference_begin = 22.05.2017, conference_end = 24.05.2017, conference_venue = San Jose, CA, USA, isbn = , classification = Open, keywords = Usable Security, abstract = , url = }
}
Busse K, Seifert J and Smith M (2017), "Security Narrative: Can (Language) Insecurities be Beneficial for Security Departments?", In EuroUSEC., April, 2017. , pp. 1-6.
BibTeX:
@inproceedings{Busse2017,
  author = {Karoline Busse and Jennifer Seifert and Matthew Smith},
  title = {Security Narrative: Can (Language) Insecurities be Beneficial for Security Departments?},
  booktitle = {EuroUSEC},
  year = {2017},
  pages = {1-6},
  note = {conference = EuroUSEC 2017 – 2nd European Workshop on Usable Security, conference_begin = 29.04.2017, conference_end = 29.04.2017, conference_venue = Paris, France, isbn = , classification = Open, keywords = Usable Security, abstract = , url = }
}
Krombholz K, Dabrowski A, Smith M and Weippl E (2017), "Exploring Design Directions for Wearable Privacy", In USEC., February, 2017. , pp. 1-10.
BibTeX:
@inproceedings{Krombholz2017,
  author = {Katharina Krombholz and Adrian Dabrowski and Matthew Smith and Edgar Weippl},
  title = {Exploring Design Directions for Wearable Privacy},
  booktitle = {USEC},
  year = {2017},
  pages = {1-10},
  note = {conference = USEC 2017 – Usable Security Mini Conference 2017, conference_begin = 26.02.2017, conference_end = 26.02.2017, conference_venue = San Diego, CA, USA, isbn = , classification = Open, keywords = Usable Security, abstract = , url = }
}
Naiakshina A, Danilova A, Tiefenau C, Herzog M and Smith M (2017), "Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study ", In 24th ACM Conference on Computer and Communications Security - ACM CCS 2017. Dallas, USA, November, 2017. , pp. 311-328.
BibTeX:
@inproceedings{Naiakshina2017,
  author = {Alena Naiakshina and Anastasia Danilova and Christian Tiefenau and Marco Herzog and Matthew Smith},
  title = {Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study },
  booktitle = {24th ACM Conference on Computer and Communications Security - ACM CCS 2017},
  year = {2017},
  pages = {311--328},
  url = {https://net.cs.uni-bonn.de/fileadmin/ag/smith/publications/API_Usability_Developer.pdf}
}
2016
Eschweiler S, Yakdan K and Gerhards-Padilla E (2016), "discovRE: Efficient Cross-Architecture Identification of Bugs in Binary Code", In Proceedings of the 23nd Network and Distributed System Security Symposium (NDSS).
BibTeX:
@inproceedings{eschweiler_ndss2016,
  author = {Sebastian Eschweiler and Khaled Yakdan and Elmar Gerhards-Padilla},
  title = {discovRE: Efficient Cross-Architecture Identification of Bugs in Binary Code},
  booktitle = {Proceedings of the 23nd Network and Distributed System Security Symposium (NDSS)},
  year = {2016}
}
Naiakshina A, Danilova A, Dechand S, Krol K, Sasse MA and Smith M (2016), "Poster: Mental Models--User understanding of messaging and encryption", In Proceedings of European Symposium on Security and Privacy..
BibTeX:
@inproceedings{naiakshina2016poster,
  author = {Naiakshina, Alena and Danilova, Anastasia and Dechand, Sergej and Krol, Kat and Sasse, M Angela and Smith, Matthew},
  title = {Poster: Mental Models--User understanding of messaging and encryption},
  booktitle = {Proceedings of European Symposium on Security and Privacy.},
  year = {2016},
  url = {https://www.ieee-security.org/TC/EuroSP2016/posters/number18.pdf}
}
Plohmann D, Yakdan K, Klatt M, Bader J and Gerhards-Padilla E (2016), "A Comprehensive Measurement Study of Domain Generating Malware", In Proceedings of the 25th USENIX Security Symposium.
BibTeX:
@inproceedings{plohmann_sec016,
  author = {Daniel Plohmann and Khaled Yakdan and Michael Klatt and Johannes Bader and Elmar Gerhards-Padilla},
  title = {A Comprehensive Measurement Study of Domain Generating Malware},
  booktitle = {Proceedings of the 25th USENIX Security Symposium},
  year = {2016}
}
Yakdan K, Dechand S, Gerhards-Padilla E and Smith M (2016), "Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study", In Proceedings of the 37th IEEE Symposium on Security and Privacy (S&P).
BibTeX:
@inproceedings{yakdan_oakland2016,
  author = {Khaled Yakdan and Sergej Dechand and Elmar Gerhards-Padilla and Matthew Smith},
  title = {Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study},
  booktitle = {Proceedings of the 37th IEEE Symposium on Security and Privacy (S&P)},
  year = {2016}
}
2015
Unger N, Dechand S, Bonneau J, Fahl S, Perl H, Goldberg I and Smith M (2015), "SoK: Secure Messaging", In Proceedings of the 2015 IEEE Symposium on Security and Privacy. San Jose, California, USA, May, 2015.
BibTeX:
@conference{unger2015sok,
  author = {Unger, Nik and Dechand, Sergej and Bonneau, Joseph and Fahl, Sascha and Perl, Henning and Goldberg, Ian and Smith, Matthew},
  title = {SoK: Secure Messaging},
  booktitle = {Proceedings of the 2015 IEEE Symposium on Security and Privacy},
  year = {2015},
  url = {http://cacr.uwaterloo.ca/techreports/2015/cacr2015-02.pdf}
}
Weber S, Harbach M and Smith M (2015), "Participatory Design for Security-Related User Interfaces", In Usable Security (NDSS USEC). San Diego, California, USA, February, 2015.
BibTeX:
@conference{weber2015participatory,
  author = {Weber, Susanne and Harbach, Marian and Smith, Matthew},
  title = {Participatory Design for Security-Related User Interfaces},
  booktitle = {Usable Security (NDSS USEC)},
  year = {2015},
  url = {http://www.internetsociety.org/sites/default/files/04_1_3.pdf}
}
Yakdan K, Eschweiler S, Gerhards-Padilla E and Smith M (2015), "No More Gotos: Decompilation Using Pattern-Independent Control-Flow Structuring and Semantics-Preserving Transformations", In Network and Distributed System Security (NDSS), ISOC. San Diego, California, USA, February, 2015.
BibTeX:
@conference{yakdan2015no,
  author = {Yakdan, Khaled and Eschweiler, Sebastian and Gerhards-Padilla, Elmar and Smith, Matthew},
  title = {No More Gotos: Decompilation Using Pattern-Independent Control-Flow Structuring and Semantics-Preserving Transformations},
  booktitle = {Network and Distributed System Security (NDSS), ISOC},
  year = {2015},
  url = {http://www.internetsociety.org/sites/default/files/11_4_2.pdf}
}
2014
De Luca A, Harbach M, von Zezschwitz E, Maurer M-E, Slawik BE, Hussmann H and Smith M (2014), "Now You See Me, Now You Don't: Protecting Smartphone Authentication from Shoulder Surfers", In Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems. New York, NY, USA , pp. 2937-2946. ACM.
BibTeX:
@inproceedings{deluca2014,
  author = {De Luca,, Alexander and Harbach,, Marian and von Zezschwitz,, Emanuel and Maurer,, Max-Emanuel and Slawik,, Bernhard Ewald and Hussmann,, Heinrich and Smith,, Matthew},
  title = {Now You See Me, Now You Don't: Protecting Smartphone Authentication from Shoulder Surfers},
  booktitle = {Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems},
  publisher = {ACM},
  year = {2014},
  pages = {2937--2946},
  url = {http://doi.acm.org/10.1145/2556288.2557097},
  doi = {10.1145/2556288.2557097}
}
Fahl S, Dechand S, Perl H, Fischer F, Smrcek J and Smith M (2014), "Hey, NSA: Stay Away from my Market! Future Proofing App Markets against Powerful Attackers", In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. , pp. 1143-1155.
BibTeX:
@inproceedings{fahl2014hey,
  author = {Fahl, Sascha and Dechand, Sergej and Perl, Henning and Fischer, Felix and Smrcek, Jaromir and Smith, Matthew},
  title = {Hey, NSA: Stay Away from my Market! Future Proofing App Markets against Powerful Attackers},
  booktitle = {Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security},
  year = {2014},
  pages = {1143--1155}
}
Harbach M, Fahl S and Smith M (2014), "Who's Afraid of Which Bad Wolf? A Survey of IT Security Risk Awareness", In Computer Security Foundations Symposium (CSF), 2014 IEEE 27th. , pp. 97-110.
BibTeX:
@inproceedings{harbach2014s,
  author = {Harbach, Marian and Fahl, Sascha and Smith, Matthew},
  title = {Who's Afraid of Which Bad Wolf? A Survey of IT Security Risk Awareness},
  booktitle = {Computer Security Foundations Symposium (CSF), 2014 IEEE 27th},
  year = {2014},
  pages = {97--110}
}
Harbach M, Hettig M, Weber S and Smith M (2014), "Using personal examples to improve risk communication for security & privacy decisions", In Proceedings of the 32nd annual ACM conference on Human factors in computing systems (ACM CHI). , pp. 2647-2656.
BibTeX:
@inproceedings{harbach2014using,
  author = {Harbach, Marian and Hettig, Markus and Weber, Susanne and Smith, Matthew},
  title = {Using personal examples to improve risk communication for security & privacy decisions},
  booktitle = {Proceedings of the 32nd annual ACM conference on Human factors in computing systems (ACM CHI)},
  year = {2014},
  pages = {2647--2656}
}
Harbach M, von Zezschwitz E, Fichtner A, Luca AD and Smith M (2014), "It’s a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception", In Symposium On Usable Privacy and Security (SOUPS 2014). Menlo Park, CA, July, 2014. , pp. 213-230. USENIX Association.
BibTeX:
@inproceedings{Harbach2014a,
  author = {Marian Harbach and Emanuel von Zezschwitz and Andreas Fichtner and Alexander De Luca and Matthew Smith},
  title = {It’s a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception},
  booktitle = {Symposium On Usable Privacy and Security (SOUPS 2014)},
  publisher = {USENIX Association},
  year = {2014},
  pages = {213--230},
  url = {https://www.usenix.org/conference/soups2014/proceedings/presentation/harbach}
}
Henne B, Koch M and Smith M (2014), "Short Paper: On the Awareness, Control and Privacy of Shared Photo Metadata", In 18th International Conference on Financial Cryptography and Data Security (FC 2014). Vol. 8437 Springer.
BibTeX:
@inproceedings{henneshort,
  author = {Henne, Benjamin and Koch, Maximilian and Smith, Matthew},
  title = {Short Paper: On the Awareness, Control and Privacy of Shared Photo Metadata},
  booktitle = {18th International Conference on Financial Cryptography and Data Security (FC 2014)},
  publisher = {Springer},
  year = {2014},
  volume = {8437}
}
Perl H, Fahl S and Smith M (2014), "You Won’t Be Needing These Any More: On Removing Unused Certificates From Trust Stores", In Financial Cryptography and Data Security 2014.
BibTeX:
@inproceedings{perlyou,
  author = {Perl, Henning and Fahl, Sascha and Smith, Matthew},
  title = {You Won’t Be Needing These Any More: On Removing Unused Certificates From Trust Stores},
  booktitle = {Financial Cryptography and Data Security 2014},
  year = {2014}
}
Perl H, Mohammed Y, Brenner M and Smith M (2014), "Privacy/performance trade-off in private search on bio-medical data", Future Generation Computer Systems. Vol. 36, pp. 441-452. North-Holland.
BibTeX:
@article{perl2014privacy,
  author = {Perl, Henning and Mohammed, Yassene and Brenner, Michael and Smith, Matthew},
  title = {Privacy/performance trade-off in private search on bio-medical data},
  journal = {Future Generation Computer Systems},
  publisher = {North-Holland},
  year = {2014},
  volume = {36},
  pages = {441--452}
}
2013
Brenner M and Smith M (2013), "POSTER: Caching oblivious memory access: an extension to the HCRYPT virtual machine", In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. , pp. 1363-1366.
BibTeX:
@inproceedings{brenner2013poster,
  author = {Brenner, Michael and Smith, Matthew},
  title = {POSTER: Caching oblivious memory access: an extension to the HCRYPT virtual machine},
  booktitle = {Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security},
  year = {2013},
  pages = {1363--1366}
}
Fahl S, Harbach M, Acar Y and Smith M (2013), "On the ecological validity of a password study", In Proceedings of the Ninth Symposium on Usable Privacy and Security. , pp. 13.
BibTeX:
@inproceedings{fahl2013ecological,
  author = {Fahl, Sascha and Harbach, Marian and Acar, Yasemin and Smith, Matthew},
  title = {On the ecological validity of a password study},
  booktitle = {Proceedings of the Ninth Symposium on Usable Privacy and Security},
  year = {2013},
  pages = {13}
}
Fahl S, Harbach M, Oltrogge M, Muders T and Smith M (2013), "Hey, You, Get Off of My Clipboard", In Financial Cryptography and Data Security., April 1-5, 2013. Vol. 7859, pp. 144-161. Springer.
BibTeX:
@inproceedings{fahlhey,
  author = {Fahl, Sascha and Harbach, Marian and Oltrogge, Marten and Muders, Thomas and Smith, Matthew},
  editor = {Ahmad-Reza Sadeghi},
  title = {Hey, You, Get Off of My Clipboard},
  booktitle = {Financial Cryptography and Data Security},
  publisher = {Springer},
  year = {2013},
  volume = {7859},
  pages = {144-161}
}
Fahl S, Harbach M, Perl H, Koetter M and Smith M (2013), "Rethinking SSL development in an appified world", In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. , pp. 49-60.
BibTeX:
@inproceedings{fahl2013rethinking,
  author = {Fahl, Sascha and Harbach, Marian and Perl, Henning and Koetter, Markus and Smith, Matthew},
  title = {Rethinking SSL development in an appified world},
  booktitle = {Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security},
  year = {2013},
  pages = {49--60}
}
Harbach M, Fahl S, Rieger M and Smith M (2013), "On the Acceptance of Privacy-Preserving Authentication Technology: The Curious Case of National Identity Cards", In Privacy Enhancing Technologies. , pp. 245-264. Springer Berlin Heidelberg.
BibTeX:
@incollection{harbach2013acceptance,
  author = {Harbach, Marian and Fahl, Sascha and Rieger, Matthias and Smith, Matthew},
  title = {On the Acceptance of Privacy-Preserving Authentication Technology: The Curious Case of National Identity Cards},
  booktitle = {Privacy Enhancing Technologies},
  publisher = {Springer Berlin Heidelberg},
  year = {2013},
  pages = {245--264}
}
Harbach M, Fahl S and Smith M (2013), "Position Statement: Risk Perception and the Acceptance of New Security Technology", In Symposium on Usable Privacy and Security (SOUPS), Workshop on Risk Perception in IT Security and Privacy.
BibTeX:
@inproceedings{harbach2013position,
  author = {Harbach, Marian and Fahl, Sascha and Smith, Matthew},
  title = {Position Statement: Risk Perception and the Acceptance of New Security Technology},
  booktitle = {Symposium on Usable Privacy and Security (SOUPS), Workshop on Risk Perception in IT Security and Privacy},
  year = {2013}
}
Harbach M, Fahl S, Yakovleva P and Smith M (2013), "Sorry, I Don’t Get It: An Analysis of Warning Message Texts", In Financial Cryptography and Data Security. Vol. 7862, pp. 94-111. Springer.
BibTeX:
@conference{harbachsorry,
  author = {Harbach, Marian and Fahl, Sascha and Yakovleva, Polina and Smith, Matthew},
  editor = {Adams, Andrew A. and Brenner, Michael and Smith, Matthew},
  title = {Sorry, I Don’t Get It: An Analysis of Warning Message Texts},
  booktitle = {Financial Cryptography and Data Security},
  publisher = {Springer},
  year = {2013},
  volume = {7862},
  pages = {94-111}
}
Henne B, Harbach M and Smith M (2013), "Location privacy revisited: factors of privacy decisions", In CHI'13 Extended Abstracts on Human Factors in Computing Systems. , pp. 805-810.
BibTeX:
@inproceedings{henne2013location,
  author = {Henne, Benjamin and Harbach, Marian and Smith, Matthew},
  title = {Location privacy revisited: factors of privacy decisions},
  booktitle = {CHI'13 Extended Abstracts on Human Factors in Computing Systems},
  year = {2013},
  pages = {805--810}
}
Henne B, Kater C, Smith M and Brenner M (2013), "Selective cloaking: Need-to-know for location-based apps", In Privacy, Security and Trust (PST), 2013 Eleventh Annual International Conference on. , pp. 19-26.
BibTeX:
@inproceedings{henne2013selective,
  author = {Henne, Benjamin and Kater, Christian and Smith, Matthew and Brenner, Michael},
  title = {Selective cloaking: Need-to-know for location-based apps},
  booktitle = {Privacy, Security and Trust (PST), 2013 Eleventh Annual International Conference on},
  year = {2013},
  pages = {19--26}
}
Henne B and Smith M (2013), "Awareness about photos on the Web and how privacy-privacy-tradeoffs could help", In Financial Cryptography and Data Security. Vol. 7862, pp. 131-148. Springer.
BibTeX:
@inproceedings{henneawareness,
  author = {Henne, Benjamin and Smith, Matthew},
  editor = {Adams, Andrew A. and Brenner, Michael and Smith, Matthew},
  title = {Awareness about photos on the Web and how privacy-privacy-tradeoffs could help},
  booktitle = {Financial Cryptography and Data Security},
  publisher = {Springer},
  year = {2013},
  volume = {7862},
  pages = {131--148}
}
Henne B, Szongott C and Smith M (2013), "SnapMe if you can: privacy threats of other peoples' geo-tagged media and what we can do about it", In Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks. , pp. 95-106.
BibTeX:
@inproceedings{henne2013snapme,
  author = {Henne, Benjamin and Szongott, Christian and Smith, Matthew},
  title = {SnapMe if you can: privacy threats of other peoples' geo-tagged media and what we can do about it},
  booktitle = {Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks},
  year = {2013},
  pages = {95--106}
}
Perl H, Fahl S and Smith M (2013), "An Evaluation System For SSL Validation Schemes", In IEEE Symposium on Security & Privacy.
BibTeX:
@inproceedings{perlevaluation,
  author = {Perl, Henning and Fahl, Sascha and Smith, Matthew},
  title = {An Evaluation System For SSL Validation Schemes},
  booktitle = {IEEE Symposium on Security & Privacy},
  year = {2013}
}
(2013), "Financial Cryptography and Data Security" Vol. 7862 Springer.
BibTeX:
@proceedings{adamsfinancial,,
  editor = {Adams, Andrew A and Brenner, Michael and Smith, Matthew},
  title = {Financial Cryptography and Data Security},
  publisher = {Springer},
  year = {2013},
  volume = {7862}
}
2012
Bastide R and Smith M (2012), "Track D: Healthcare and sustainable living", In Digital Ecosystems Technologies (DEST), 2012 6th IEEE International Conference on. , pp. 1-1.
BibTeX:
@inproceedings{bastide2012track,
  author = {Bastide, Remi and Smith, Matthew},
  title = {Track D: Healthcare and sustainable living},
  booktitle = {Digital Ecosystems Technologies (DEST), 2012 6th IEEE International Conference on},
  year = {2012},
  pages = {1--1}
}
Brenner M, Perl H and Smith M (2012), "How Practical is Homomorphically Encrypted Program Execution? An Implementation and Performance Evaluation", In Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on. , pp. 375-382.
BibTeX:
@inproceedings{brenner2012practical,
  author = {Brenner, Michael and Perl, Henning and Smith, Matthew},
  title = {How Practical is Homomorphically Encrypted Program Execution? An Implementation and Performance Evaluation},
  booktitle = {Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on},
  year = {2012},
  pages = {375--382}
}
Fahl S, Harbach M, Muders T and Smith M (2012), "Confidentiality as a Service--Usable Security for the Cloud", In Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on. , pp. 153-162.
BibTeX:
@inproceedings{fahl2012confidentiality,
  author = {Fahl, Sascha and Harbach, Marian and Muders, Thomas and Smith, Matthew},
  title = {Confidentiality as a Service--Usable Security for the Cloud},
  booktitle = {Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on},
  year = {2012},
  pages = {153--162}
}
Fahl S, Harbach M, Muders T and Smith M (2012), "TrustSplit: usable confidentiality for social network messaging", In Proceedings of the 23rd ACM conference on Hypertext and social media. , pp. 145-154.
BibTeX:
@inproceedings{fahl2012trustsplit,
  author = {Fahl, Sascha and Harbach, Marian and Muders, Thomas and Smith, Matthew},
  title = {TrustSplit: usable confidentiality for social network messaging},
  booktitle = {Proceedings of the 23rd ACM conference on Hypertext and social media},
  year = {2012},
  pages = {145--154}
}
Fahl S, Harbach M, Muders T, Smith M, Baumgärtner L and Freisleben B (2012), "Why eve and mallory love android: an analysis of android SSL (in) security", In Proceedings of the 2012 ACM conference on Computer and communications security. , pp. 50-61.
BibTeX:
@inproceedings{fahl2012eve,
  author = {Fahl, Sascha and Harbach, Marian and Muders, Thomas and Smith, Matthew and Baumgärtner, Lars and Freisleben, Bernd},
  title = {Why eve and mallory love android: an analysis of android SSL (in) security},
  booktitle = {Proceedings of the 2012 ACM conference on Computer and communications security},
  year = {2012},
  pages = {50--61}
}
Fahl S, Harbach M, Muders T, Smith M and Sander U (2012), "Helping Johnny 2.0 to encrypt his Facebook conversations", In Proceedings of the Eighth Symposium on Usable Privacy and Security. , pp. 11.
BibTeX:
@inproceedings{fahl2012helping,
  author = {Fahl, Sascha and Harbach, Marian and Muders, Thomas and Smith, Matthew and Sander, Uwe},
  title = {Helping Johnny 2.0 to encrypt his Facebook conversations},
  booktitle = {Proceedings of the Eighth Symposium on Usable Privacy and Security},
  year = {2012},
  pages = {11}
}
Fahl S, Harbach M and Smith M (2012), "Human-centric visual access control for clinical data management", In Digital Ecosystems Technologies (DEST), 2012 6th IEEE International Conference on. , pp. 1-8.
BibTeX:
@inproceedings{fahl2012human,
  author = {Fahl, Sascha and Harbach, Marian and Smith, Matthew},
  title = {Human-centric visual access control for clinical data management},
  booktitle = {Digital Ecosystems Technologies (DEST), 2012 6th IEEE International Conference on},
  year = {2012},
  pages = {1--8}
}
Harbach M, Fahl S, Brenner M, Muders T and Smith M (2012), "Towards privacy-preserving access control with hidden policies, hidden credentials and hidden decisions", In Privacy, Security and Trust (PST), 2012 Tenth Annual International Conference on. , pp. 17-24.
BibTeX:
@inproceedings{Harbach2012,
  author = {Harbach, Marian and Fahl, Sascha and Brenner, Michael and Muders, Thomas and Smith, Matthew},
  title = {Towards privacy-preserving access control with hidden policies, hidden credentials and hidden decisions},
  booktitle = {Privacy, Security and Trust (PST), 2012 Tenth Annual International Conference on},
  year = {2012},
  pages = {17--24}
}
Harbach M, Fahl S, Muders T and Smith M (2012), "Poster: Towards Measuring Warning Readability", In Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS 2012)., Oct., 2012. , pp. 989-991. ACM.
BibTeX:
@inproceedings{harbach2012poster,
  author = {Harbach, Marian and Fahl, Sascha and Muders, Thomas and Smith, Matthew},
  title = {Poster: Towards Measuring Warning Readability},
  booktitle = {Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS 2012)},
  publisher = {ACM},
  year = {2012},
  pages = {989--991},
  doi = {10.1145/2382196.2382301}
}
Harbach M, Fahl S, Muders T and Smith M (2012), "All our messages are belong to us: usable confidentiality in social networks", In Proceedings of the 21st international conference companion on World Wide Web. , pp. 519-520.
BibTeX:
@inproceedings{harbach2012all,
  author = {Harbach, Marian and Fahl, Sascha and Muders, Thomas and Smith, Matthew},
  title = {All our messages are belong to us: usable confidentiality in social networks},
  booktitle = {Proceedings of the 21st international conference companion on World Wide Web},
  year = {2012},
  pages = {519--520}
}
Harbach M, Fahl S, Muders T and Smith M (2012), "Towards measuring warning readability", In Proceedings of the 2012 ACM conference on Computer and communications security. , pp. 989-991.
BibTeX:
@inproceedings{harbach2012towards,
  author = {Harbach, Marian and Fahl, Sascha and Muders, Thomas and Smith, Matthew},
  title = {Towards measuring warning readability},
  booktitle = {Proceedings of the 2012 ACM conference on Computer and communications security},
  year = {2012},
  pages = {989--991}
}
Henne B, Szongott C and Smith M (2012), "Coupled multi-agent simulations for mobile security & privacy research", In Digital Ecosystems Technologies (DEST), 2012 6th IEEE International Conference on. , pp. 1-6.
BibTeX:
@inproceedings{henne2012coupled,
  author = {Henne, Benjamin and Szongott, Christian and Smith, Matthew},
  title = {Coupled multi-agent simulations for mobile security & privacy research},
  booktitle = {Digital Ecosystems Technologies (DEST), 2012 6th IEEE International Conference on},
  year = {2012},
  pages = {1--6}
}
Perl H, Mohammed Y, Brenner M and Smith M (2012), "Fast confidential search for bio-medical data using Bloom filters and Homomorphic Cryptography", In E-Science (e-Science), 2012 IEEE 8th International Conference on. , pp. 1-8.
BibTeX:
@inproceedings{perl2012fast,
  author = {Perl, Henning and Mohammed, Yassene and Brenner, Michael and Smith, Matthew},
  title = {Fast confidential search for bio-medical data using Bloom filters and Homomorphic Cryptography},
  booktitle = {E-Science (e-Science), 2012 IEEE 8th International Conference on},
  year = {2012},
  pages = {1--8}
}
Smith M, Szongott C, Henne B and von Voigt G (2012), "Big data privacy issues in public social media", In Digital Ecosystems Technologies (DEST), 2012 6th IEEE International Conference on. , pp. 1-6.
BibTeX:
@inproceedings{smith2012big,
  author = {Smith, Matthew and Szongott, Christian and Henne, Benjamin and von Voigt, Gabriele},
  title = {Big data privacy issues in public social media},
  booktitle = {Digital Ecosystems Technologies (DEST), 2012 6th IEEE International Conference on},
  year = {2012},
  pages = {1--6}
}
Sofean M, Denecke K, Stewart A and Smith M (2012), "Medical case-driven classification of microblogs: Characteristics and annotation", In Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium. , pp. 513-522.
BibTeX:
@inproceedings{sofean2012medical,
  author = {Sofean, Mustafa and Denecke, Kerstin and Stewart, Avare and Smith, Matthew},
  title = {Medical case-driven classification of microblogs: Characteristics and annotation},
  booktitle = {Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium},
  year = {2012},
  pages = {513--522}
}
Sofean M and Smith M (2012), "A real-time architecture for detection of diseases using social networks: design, implementation and evaluation", In Proceedings of the 23rd ACM conference on Hypertext and social media. , pp. 309-310.
BibTeX:
@inproceedings{Sofean2012,
  author = {Sofean, Mustafa and Smith, Matthew},
  title = {A real-time architecture for detection of diseases using social networks: design, implementation and evaluation},
  booktitle = {Proceedings of the 23rd ACM conference on Hypertext and social media},
  year = {2012},
  pages = {309--310}
}
Sofean M and Smith M (2012), "A real-time disease surveillance architecture using social networks.", Studies in health technology and informatics. Vol. 180, pp. 823.
BibTeX:
@article{sofean2012real,
  author = {Sofean, Mustafa and Smith, Matthew},
  title = {A real-time disease surveillance architecture using social networks.},
  journal = {Studies in health technology and informatics},
  year = {2012},
  volume = {180},
  pages = {823}
}
Sofean M and Smith M (2012), "Sentiment analysis on smoking in social networks.", Studies in health technology and informatics. Vol. 192, pp. 1118-1118.
BibTeX:
@article{sofean2012sentiment,
  author = {Sofean, Mustafa and Smith, Matthew},
  title = {Sentiment analysis on smoking in social networks.},
  journal = {Studies in health technology and informatics},
  year = {2012},
  volume = {192},
  pages = {1118--1118}
}
Szongott C, Henne B and Smith M (2012), "Evaluating the threat of epidemic mobile malware", In Wireless and Mobile Computing, Networking and Communications (WiMob), 2012 IEEE 8th International Conference on. , pp. 443-450.
BibTeX:
@inproceedings{szongott2012evaluating,
  author = {Szongott, Christian and Henne, Benjamin and Smith, Matthew},
  title = {Evaluating the threat of epidemic mobile malware},
  booktitle = {Wireless and Mobile Computing, Networking and Communications (WiMob), 2012 IEEE 8th International Conference on},
  year = {2012},
  pages = {443--450}
}
Szongott C, Henne B and Smith M (2012), "Mobile Evil Twin Malnets--The Worst of Both Worlds", In Cryptology and Network Security. , pp. 126-141. Springer Berlin Heidelberg.
BibTeX:
@incollection{szongott2012mobile,
  author = {Szongott, Christian and Henne, Benjamin and Smith, Matthew},
  title = {Mobile Evil Twin Malnets--The Worst of Both Worlds},
  booktitle = {Cryptology and Network Security},
  publisher = {Springer Berlin Heidelberg},
  year = {2012},
  pages = {126--141}
}
2011
Brenner M, Wiebelitz J, von Voigt G and Smith M (2011), "A Smart-Gentry Based Software System for Secret Program Execution", In Proceedings of the 6th International Conference Security and Cryptography (SECRYPT). SciTePress., July, 2011. , pp. 238-244. IEEE.
BibTeX:
@inproceedings{brenner2011smart,
  author = {Brenner, Michael and Wiebelitz, Jan and von Voigt, Gabriele and Smith, Matthew},
  title = {A Smart-Gentry Based Software System for Secret Program Execution},
  booktitle = {Proceedings of the 6th International Conference Security and Cryptography (SECRYPT). SciTePress},
  publisher = {IEEE},
  year = {2011},
  pages = {238--244},
  doi = {10.5220/0003445802380244}
}
Brenner M, Wiebelitz J, von Voigt G and Smith M (2011), "Secret program execution in the cloud applying homomorphic encryption", In Digital Ecosystems and Technologies Conference (DEST), 2011 Proceedings of the 5th IEEE International Conference on. , pp. 114-119.
BibTeX:
@inproceedings{brenner2011secret,
  author = {Brenner, Michael and Wiebelitz, Jan and von Voigt, Gabriele and Smith, Matthew},
  title = {Secret program execution in the cloud applying homomorphic encryption},
  booktitle = {Digital Ecosystems and Technologies Conference (DEST), 2011 Proceedings of the 5th IEEE International Conference on},
  year = {2011},
  pages = {114--119}
}
Harbach M, Muders T, Groeper R and Smith M (2011), "Email triage with Mind Meshes", In Digital Ecosystems and Technologies Conference (DEST), 2011 Proceedings of the 5th IEEE International Conference on. , pp. 176-181.
BibTeX:
@inproceedings{harbach2011email,
  author = {Harbach, Marian and Muders, Thomas and Groeper, Ralf and Smith, Matthew},
  title = {Email triage with Mind Meshes},
  booktitle = {Digital Ecosystems and Technologies Conference (DEST), 2011 Proceedings of the 5th IEEE International Conference on},
  year = {2011},
  pages = {176--181}
}
Harbach M and Smith M (2011), "Visual access control for research ecosystems", In Digital Ecosystems and Technologies Conference (DEST), 2011 Proceedings of the 5th IEEE International Conference on. , pp. 101-108.
BibTeX:
@inproceedings{harbach2011visual,
  author = {Harbach, Marian and Smith, Matthew},
  title = {Visual access control for research ecosystems},
  booktitle = {Digital Ecosystems and Technologies Conference (DEST), 2011 Proceedings of the 5th IEEE International Conference on},
  year = {2011},
  pages = {101--108}
}
Henne B, Szongott C and Smith M (2011), "Towards a mobile security & privacy simulator", In Open Systems (ICOS), 2011 IEEE Conference on. , pp. 95-100.
BibTeX:
@inproceedings{henne2011towards,
  author = {Henne, Benjamin and Szongott, Christian and Smith, Matthew},
  title = {Towards a mobile security & privacy simulator},
  booktitle = {Open Systems (ICOS), 2011 IEEE Conference on},
  year = {2011},
  pages = {95--100}
}
Juhnke E, Seiler D, Ewerth R, Smith M and Freisleben B (2011), "Request/response aspects for web services", In Advanced Information Systems Engineering. Vol. 6741, pp. 627-641. Springer.
BibTeX:
@incollection{juhnke2011request,
  author = {Juhnke, Ernst and Seiler, Dominik and Ewerth, Ralph and Smith, Matthew and Freisleben, Bernd},
  editor = {Mouratidis, Haralambos and Rolland, Colette},
  title = {Request/response aspects for web services},
  booktitle = {Advanced Information Systems Engineering},
  publisher = {Springer},
  year = {2011},
  volume = {6741},
  pages = {627--641}
}
Kunz C, Tahmasebi N, Risse T and Smith M (2011), "Detecting Credential Abuse in the Grid using Bayesian Networks", In Grid Computing (GRID), 2011 12th IEEE/ACM International Conference on., Sept, 2011. , pp. 114-120. IEEE.
BibTeX:
@inproceedings{kunzdetecting,
  author = {Kunz, Christopher and Tahmasebi, Nina and Risse, Thomas and Smith, Matthew},
  title = {Detecting Credential Abuse in the Grid using Bayesian Networks},
  booktitle = {Grid Computing (GRID), 2011 12th IEEE/ACM International Conference on},
  publisher = {IEEE},
  year = {2011},
  pages = {114--120},
  doi = {10.1109/Grid.2011.23}
}
Perl H, Brenner M and Smith M (2011), "POSTER: An Implementation of the Fully Homomorphic Smart-Vercauteren Crypto-System", In Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011., October, 2011. , pp. 837-839. ACM.
BibTeX:
@inproceedings{perlposter,
  author = {Perl, Henning and Brenner, Michael and Smith, Matthew},
  title = {POSTER: An Implementation of the Fully Homomorphic Smart-Vercauteren Crypto-System},
  booktitle = {Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011},
  publisher = {ACM},
  year = {2011},
  pages = {837--839}
}
Smith M, Harbach M, Lewis A, Mertins S and Griffiths L (2011), "Towards a translational medical research ecosystem", In Digital Ecosystems and Technologies Conference (DEST), 2011 Proceedings of the 5th IEEE International Conference on. , pp. 120-126.
BibTeX:
@inproceedings{smith2011towards,
  author = {Smith, Matthew and Harbach, Marian and Lewis, Andrew and Mertins, Susanne and Griffiths, Lyn},
  title = {Towards a translational medical research ecosystem},
  booktitle = {Digital Ecosystems and Technologies Conference (DEST), 2011 Proceedings of the 5th IEEE International Conference on},
  year = {2011},
  pages = {120--126}
}
Smith M, Schridde C, Agel B and Freisleben B (2011), "Secure mobile communication via identity-based cryptography and server-aided computations", The Journal of Supercomputing. Vol. 55(2), pp. 284-306. Springer.
BibTeX:
@article{smith2011secure,
  author = {Smith, Matthew and Schridde, Christian and Agel, Björn and Freisleben, Bernd},
  title = {Secure mobile communication via identity-based cryptography and server-aided computations},
  journal = {The Journal of Supercomputing},
  publisher = {Springer},
  year = {2011},
  volume = {55},
  number = {2},
  pages = {284--306}
}
Stewart A, Herder E, Smith M and Nejdl W (2011), "A user study on public health events detected within the medical ecosystem", In Digital Ecosystems and Technologies Conference (DEST), 2011 Proceedings of the 5th IEEE International Conference on. , pp. 127-132.
BibTeX:
@inproceedings{stewart2011user,
  author = {Stewart, Avare and Herder, Eelco and Smith, Matthew and Nejdl, Wolfgang},
  title = {A user study on public health events detected within the medical ecosystem},
  booktitle = {Digital Ecosystems and Technologies Conference (DEST), 2011 Proceedings of the 5th IEEE International Conference on},
  year = {2011},
  pages = {127--132}
}
Stewart A, Smith M and Nejdl W (2011), "A transfer approach to detecting disease reporting events in blog social media", In Proceedings of the 22nd ACM conference on Hypertext and hypermedia. , pp. 271-280.
BibTeX:
@inproceedings{stewart2011transfer,
  author = {Stewart, Avaré and Smith, Matthew and Nejdl, Wolfgang},
  title = {A transfer approach to detecting disease reporting events in blog social media},
  booktitle = {Proceedings of the 22nd ACM conference on Hypertext and hypermedia},
  year = {2011},
  pages = {271--280}
}
2010
Brenner M, Wiebelitz J and Smith M (2010), "A JEE-based Architecture for Distributed Multi-Domain Resource Accounting", In e-Science Workshops, 2010 Sixth IEEE International Conference on. , pp. 31-38.
BibTeX:
@inproceedings{brenner2010jee,
  author = {Brenner, Michael and Wiebelitz, Jan and Smith, Matthew},
  title = {A JEE-based Architecture for Distributed Multi-Domain Resource Accounting},
  booktitle = {e-Science Workshops, 2010 Sixth IEEE International Conference on},
  year = {2010},
  pages = {31--38}
}
Dalman T, Dörnemann T, Juhnke E, Weitzel M, Smith M, Wiechert W, Noh K and Freisleben B (2010), "Metabolic flux analysis in the cloud", In e-Science (e-Science), 2010 IEEE Sixth International Conference on. , pp. 57-64.
BibTeX:
@inproceedings{dalman2010metabolic,
  author = {Dalman, Tolga and Dörnemann, T and Juhnke, Ernst and Weitzel, Michael and Smith, Matthew and Wiechert, Wolfgang and Noh, Katharina and Freisleben, Bernd},
  title = {Metabolic flux analysis in the cloud},
  booktitle = {e-Science (e-Science), 2010 IEEE Sixth International Conference on},
  year = {2010},
  pages = {57--64}
}
Kunz C, Wiebelitz J and Smith M (2010), "An attack-resilient Grid auditing infrastructure", In Wireless Communications, Networking and Information Security (WCNIS), 2010 IEEE International Conference on. , pp. 635-639.
BibTeX:
@inproceedings{kunz2010attack,
  author = {Kunz, Christopher and Wiebelitz, Jan and Smith, Matthew},
  title = {An attack-resilient Grid auditing infrastructure},
  booktitle = {Wireless Communications, Networking and Information Security (WCNIS), 2010 IEEE International Conference on},
  year = {2010},
  pages = {635--639}
}
Mohammed Y, Dickmann F, Sax U, von Voigt G, Smith M and Rienhoff O (2010), "Reaching for the cloud: on the lessons learned from grid computing technology transfer process to the biomedical community.", Studies in health technology and informatics. Vol. 160(Pt 2), pp. 1339.
BibTeX:
@article{mohammed2010reaching,
  author = {Mohammed, Y and Dickmann, F and Sax, U and von Voigt, G and Smith, M and Rienhoff, O},
  title = {Reaching for the cloud: on the lessons learned from grid computing technology transfer process to the biomedical community.},
  journal = {Studies in health technology and informatics},
  year = {2010},
  volume = {160},
  number = {Pt 2},
  pages = {1339}
}
Mohammed Y, Sax U, Dickmann F, Lippert J, Solodenko J, von Voigt G, Smith M and Rienhoff O (2010), "On transferring the grid technology to the biomedical community.", Studies in health technology and informatics. Vol. 159, pp. 28.
BibTeX:
@article{mohammed2010transferring,
  author = {Mohammed, Y and Sax, U and Dickmann, F and Lippert, J and Solodenko, J and von Voigt, G and Smith, M and Rienhoff, O},
  title = {On transferring the grid technology to the biomedical community.},
  journal = {Studies in health technology and informatics},
  year = {2010},
  volume = {159},
  pages = {28}
}
Schmidt M, Fallenbeck N, Smith M and Freisleben B (2010), "Efficient distribution of virtual machines for cloud computing", In Parallel, Distributed and Network-Based Processing (PDP), 2010 18th Euromicro International Conference on. , pp. 567-574.
BibTeX:
@inproceedings{schmidt2010efficient,
  author = {Schmidt, Matthias and Fallenbeck, Niels and Smith, Matthew and Freisleben, Bernd},
  title = {Efficient distribution of virtual machines for cloud computing},
  booktitle = {Parallel, Distributed and Network-Based Processing (PDP), 2010 18th Euromicro International Conference on},
  year = {2010},
  pages = {567--574}
}
Schridde C, Dornemann T, Juhnke E, Freisleben B and Smith M (2010), "An identity-based security infrastructure for Cloud environments", In Wireless Communications, Networking and Information Security (WCNIS), 2010 IEEE International Conference on. , pp. 644-649.
BibTeX:
@inproceedings{schridde2010identity,
  author = {Schridde, Christian and Dornemann, Tim and Juhnke, Ernst and Freisleben, Bernd and Smith, Matthew},
  title = {An identity-based security infrastructure for Cloud environments},
  booktitle = {Wireless Communications, Networking and Information Security (WCNIS), 2010 IEEE International Conference on},
  year = {2010},
  pages = {644--649}
}
Stadelmann T, Wang Y, Smith M, Ewerth R and Freisleben B (2010), "Rethinking Algorithm Design and Development in Speech Processing", In Pattern Recognition (ICPR), 2010 20th International Conference on. , pp. 4476-4479.
BibTeX:
@inproceedings{stadelmann2010rethinking,
  author = {Stadelmann, Thilo and Wang, Yinghui and Smith, Matthew and Ewerth, Ralph and Freisleben, Bernd},
  title = {Rethinking Algorithm Design and Development in Speech Processing},
  booktitle = {Pattern Recognition (ICPR), 2010 20th International Conference on},
  year = {2010},
  pages = {4476--4479}
}
Wiebelitz J, Brenner M, Kunz C and Smith M (2010), "Early defense: enabling attribute-based authorization in Grid firewalls", In Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing. , pp. 336-339.
BibTeX:
@inproceedings{wiebelitz2010early,
  author = {Wiebelitz, Jan and Brenner, Michael and Kunz, Christopher and Smith, Matthew},
  title = {Early defense: enabling attribute-based authorization in Grid firewalls},
  booktitle = {Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing},
  year = {2010},
  pages = {336--339}
}
2009
FREISLEBEN B, SCHRIDDE C, SMITH MD, KEWITZ A and others (2009), "METHOD AND APPARATUS FOR PRODUCING CRYPTOGRAPHIC KEYS FOR PERFORMING KEY AGREEMENT FOR SECURE DIGITAL COMMUNICATION", Jan., 2009. (WO Patent 2,009,010,200)
BibTeX:
@patent{freisleben2009method,
  author = {FREISLEBEN, Bernd and SCHRIDDE, Christian and SMITH, Matthew David and KEWITZ, Ansgar and others},
  title = {METHOD AND APPARATUS FOR PRODUCING CRYPTOGRAPHIC KEYS FOR PERFORMING KEY AGREEMENT FOR SECURE DIGITAL COMMUNICATION},
  year = {2009},
  number = {WO Patent 2,009,010,200},
  note = {WO Patent 2,009,010,200}
}
Schmidt M, Fallenbeck N, Smith M and Freisleben B (2009), "Secure Service-Oriented Grid Computing with Public Virtual Worker Nodes", In Software Engineering and Advanced Applications, 2009. SEAA'09. 35th Euromicro Conference on. , pp. 555-562.
BibTeX:
@inproceedings{schmidt2009secure,
  author = {Schmidt, Matthias and Fallenbeck, Niels and Smith, Matthew and Freisleben, Bernd},
  title = {Secure Service-Oriented Grid Computing with Public Virtual Worker Nodes},
  booktitle = {Software Engineering and Advanced Applications, 2009. SEAA'09. 35th Euromicro Conference on},
  year = {2009},
  pages = {555--562}
}
Schridde C, Freisleben B, Smith M and others (2009), "Verfahren und Vorrichtung für eine verschlüsselte digitale Sprachkommunikation", Jan., 2009. (DE Patent 102,007,033,845)
BibTeX:
@patent{schridde2009verfahren,
  author = {Schridde, Christian and Freisleben, Bernd and Smith, Matthew and others},
  title = {Verfahren und Vorrichtung für eine verschlüsselte digitale Sprachkommunikation},
  year = {2009},
  number = {DE Patent 102,007,033,845},
  note = {DE Patent 102,007,033,845}
}
Schridde C, Smith M and Freisleben B (2009), "TrueIP: prevention of IP spoofing attacks using identity-based cryptography", In Proceedings of the 2nd International Conference on Security of Information and Networks. , pp. 128-137.
BibTeX:
@inproceedings{schridde2009trueip,
  author = {Schridde, Christian and Smith, Matthew and Freisleben, Bernd},
  title = {TrueIP: prevention of IP spoofing attacks using identity-based cryptography},
  booktitle = {Proceedings of the 2nd International Conference on Security of Information and Networks},
  year = {2009},
  pages = {128--137}
}
Smith M, Schmidt M, Fallenbeck N, Dörnemann T, Schridde C and Freisleben B (2009), "Secure on-demand grid computing", Future Generation Computer Systems. Vol. 25(3), pp. 315-325. North-Holland.
BibTeX:
@article{smith2009secure,
  author = {Smith, Matthew and Schmidt, Matthias and Fallenbeck, Niels and Dörnemann, Tim and Schridde, Christian and Freisleben, Bernd},
  title = {Secure on-demand grid computing},
  journal = {Future Generation Computer Systems},
  publisher = {North-Holland},
  year = {2009},
  volume = {25},
  number = {3},
  pages = {315--325}
}
Smith M, Schridde C, Agel B and Freisleben B (2009), "Identity-Based Cryptography for Securing Mobile Phone Calls", In Advanced Information Networking and Applications Workshops, 2009. WAINA'09. International Conference on., May, 2009. , pp. 365-370.
BibTeX:
@inproceedings{smith2009identity,
  author = {Smith, Matthew and Schridde, Christian and Agel, Björn and Freisleben, Bernd},
  title = {Identity-Based Cryptography for Securing Mobile Phone Calls},
  booktitle = {Advanced Information Networking and Applications Workshops, 2009. WAINA'09. International Conference on},
  year = {2009},
  pages = {365--370},
  doi = {10.1109/WAINA.2009.167}
}
Smith M, Schridde C, Agel B and Freisleben B (2009), "Securing Mobile Phone Calls with Identity-Based Cryptography", In Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance. Vol. 5576, pp. 210-222. Springer.
BibTeX:
@inproceedings{smith2009securing,
  author = {Smith, Matthew and Schridde, Christian and Agel, Björn and Freisleben, Bernd},
  title = {Securing Mobile Phone Calls with Identity-Based Cryptography},
  booktitle = {Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance},
  publisher = {Springer},
  year = {2009},
  volume = {5576},
  pages = {210--222},
  doi = {10.1007/978-3-642-02617-1_22}
}
Smith M, Schridde C, Freisleben B and others (2009), "Verfahren und Vorrichtung zur kryptographischen Schlüsseleinigung für eine sichere digitale Kommunikation in Netzwerken", Jan., 2009. (DE Patent 102,007,033,847)
BibTeX:
@patent{smith2009verfahren,
  author = {Smith, Matthew and Schridde, Christian and Freisleben, Bernd and others},
  title = {Verfahren und Vorrichtung zur kryptographischen Schlüsseleinigung für eine sichere digitale Kommunikation in Netzwerken},
  year = {2009},
  number = {DE Patent 102,007,033,847},
  note = {DE Patent 102,007,033,847}
}
Smith M, Schwarzer F, Harbach M, Noll T and Freisleben B (2009), "A streaming intrusion detection system for grid computing environments", In High Performance Computing and Communications, 2009. HPCC'09. 11th IEEE International Conference on. , pp. 44-51.
BibTeX:
@inproceedings{smith2009streaming,
  author = {Smith, Matthew and Schwarzer, Fabian and Harbach, Marian and Noll, Thomas and Freisleben, Bernd},
  title = {A streaming intrusion detection system for grid computing environments},
  booktitle = {High Performance Computing and Communications, 2009. HPCC'09. 11th IEEE International Conference on},
  year = {2009},
  pages = {44--51}
}
2008
Dornemann T, Smith M and Freisleben B (2008), "Composition and Execution of Secure Workflows in WSRF-Grids", In Cluster Computing and the Grid, 2008. CCGRID'08. 8th IEEE International Symposium on. , pp. 122-129.
BibTeX:
@inproceedings{dornemann2008composition,
  author = {Dornemann, T and Smith, Matthew and Freisleben, Bernd},
  title = {Composition and Execution of Secure Workflows in WSRF-Grids},
  booktitle = {Cluster Computing and the Grid, 2008. CCGRID'08. 8th IEEE International Symposium on},
  year = {2008},
  pages = {122--129}
}
Dornemann T, Smith M, Juhnke E and Freisleben B (2008), "Secure Grid Micro-Workflows Using Virtual Workspaces", In Software Engineering and Advanced Applications, 2008. SEAA'08. 34th Euromicro Conference. , pp. 119-126.
BibTeX:
@inproceedings{dornemann2008secure,
  author = {Dornemann, T and Smith, Matthew and Juhnke, Ernst and Freisleben, Bernd},
  title = {Secure Grid Micro-Workflows Using Virtual Workspaces},
  booktitle = {Software Engineering and Advanced Applications, 2008. SEAA'08. 34th Euromicro Conference},
  year = {2008},
  pages = {119--126}
}
Freisleben B, Kewitz A, Schridde C and Smith MD (2008), "Method and apparatus for producing cryptographic keys for performing key agreement for secure digital communication", Jul, 2008. (WO Patent App. PCT/EP2008/005,488)
BibTeX:
@patent{freisleben2008method,
  author = {Freisleben, Bernd and Kewitz, Ansgar and Schridde, Christian and Smith, Matthew David},
  title = {Method and apparatus for producing cryptographic keys for performing key agreement for secure digital communication},
  year = {2008},
  number = {WO Patent App. PCT/EP2008/005,488},
  note = {WO Patent App. PCT/EP2008/005,488}
}
Schridde C, Smith M and Freisleben B (2008), "An identity-based key agreement protocol for the network layer", In Security and Cryptography for Networks. Vol. 5229, pp. 409-422. Springer.
BibTeX:
@incollection{schridde2008identity,
  author = {Schridde, Christian and Smith, Matthew and Freisleben, Bernd},
  editor = {Ostrovsky, Rafail and De Prisco, Roberto and Visconti, Ivan},
  title = {An identity-based key agreement protocol for the network layer},
  booktitle = {Security and Cryptography for Networks},
  publisher = {Springer},
  year = {2008},
  volume = {5229},
  pages = {409--422},
  doi = {10.1007/978-3-540-85855-3_27}
}
Scriven I, Lewis A, Smith M and Friese T (2008), "Resource evaluation and node monitoring in service oriented ad-hoc grids", In Proceedings of the sixth Australasian workshop on Grid computing and e-research-Volume 82. , pp. 65-71. Australian Computer Society, Inc..
BibTeX:
@inproceedings{scriven2008resource,
  author = {Scriven, Ian and Lewis, Andrew and Smith, Matthew and Friese, Thomas},
  editor = {Wayne Kelly and Paul Roe},
  title = {Resource evaluation and node monitoring in service oriented ad-hoc grids},
  booktitle = {Proceedings of the sixth Australasian workshop on Grid computing and e-research-Volume 82},
  publisher = {Australian Computer Society, Inc.},
  year = {2008},
  pages = {65--71}
}
Smith M (2008), "Security for Service-Oriented On-Demand Grid Computing"Thesis at: Universitätsbibliothek Marburg.
BibTeX:
@phdthesis{smith2008security,
  author = {Smith, Matthew},
  title = {Security for Service-Oriented On-Demand Grid Computing},
  school = {Universitätsbibliothek Marburg},
  year = {2008}
}
Smith M, Schridde C and Freisleben B (2008), "Securing stateful grid servers through virtual server rotation", In Proceedings of the 17th international symposium on High performance distributed computing. , pp. 11-22.
BibTeX:
@inproceedings{smith2008securing,
  author = {Smith, Matthew and Schridde, Christian and Freisleben, Bernd},
  title = {Securing stateful grid servers through virtual server rotation},
  booktitle = {Proceedings of the 17th international symposium on High performance distributed computing},
  year = {2008},
  pages = {11--22}
}
2007
Barth T, Dörnemann K, Dörnemann T, Freisleben B, Friese T, Grauer M, Jakumeit J, Entrup CL, Müller U, Reichwald J and others (2007), "Supporting Engineering Processes Utilizing Service-Oriented Grid Technology", In Proceedings of the German e-Science Conference 2007., May, 2007. , pp. 1-10.
BibTeX:
@inproceedings{barth2007supporting,
  author = {Barth, Thomas and Dörnemann, Kay and Dörnemann, Tim and Freisleben, Bernd and Friese, Thomas and Grauer, Manfred and Jakumeit, Jürgen and Entrup, C Lütke and Müller, Ulf and Reichwald, Julian and others},
  title = {Supporting Engineering Processes Utilizing Service-Oriented Grid Technology},
  booktitle = {Proceedings of the German e-Science Conference 2007},
  year = {2007},
  pages = {1--10}
}
Canisius S, Ploch T, Kesper K, Smith M, Freisleben B and Penzel T (2007), "Sleep Medicine as a Scenario for Medical Grid Application", Studies in Health Technology and Informatics. Vol. 126, pp. 37. IOS Press; 1999.
BibTeX:
@article{canisius2007sleep,
  author = {Canisius, Sebastian and Ploch, Thomas and Kesper, Karl and Smith, Matthew and Freisleben, Bernd and Penzel, Thomas},
  title = {Sleep Medicine as a Scenario for Medical Grid Application},
  journal = {Studies in Health Technology and Informatics},
  publisher = {IOS Press; 1999},
  year = {2007},
  volume = {126},
  pages = {37}
}
Dornemann T, Heinzl S, Dornemann K, Mathes M, Smith M and Freisleben B (2007), "Secure Grid Service Engineering for Industrial Optimization Problems", FRONTIERS SCIENCE SERIES. Vol. 49, pp. 371. UNIVERSAL ACADEMY PRESS, INC..
BibTeX:
@article{dornemann2007secure,
  author = {Dornemann, T and Heinzl, Steffen and Dornemann, K and Mathes, Markus and Smith, Matthew and Freisleben, Bernd},
  title = {Secure Grid Service Engineering for Industrial Optimization Problems},
  journal = {FRONTIERS SCIENCE SERIES},
  publisher = {UNIVERSAL ACADEMY PRESS, INC.},
  year = {2007},
  volume = {49},
  pages = {371}
}
Freisleben B, Kewitz A, Schridde C and Smith M (2007), "Cryptographic key generating method for encrypted digital communication between communication devices, involves converting end product address of communication device into part of key, and utilizing address for key agreement", Jul, 2007. (DE Patent App. 200,710,033,846)
BibTeX:
@patent{freisleben2007cryptographic,
  author = {Freisleben, Bernd and Kewitz, Ansgar and Schridde, Christian and Smith, Matthew},
  title = {Cryptographic key generating method for encrypted digital communication between communication devices, involves converting end product address of communication device into part of key, and utilizing address for key agreement},
  year = {2007},
  number = {DE Patent App. 200,710,033,846},
  note = {DE Patent App. 200,710,033,846}
}
Freisleben BPD, Schridde C and Smith M (2007), "Method for cryptographic key agreement between two communication devices in Internet protocol communications networks, involves arranging one or multiple Network address translation routers between two communication devices", Jul, 2007. (DE Patent App. 200,710,033,847)
BibTeX:
@patent{freisleben2007method,
  author = {Freisleben, Bernd Prof Dr and Schridde, Christian and Smith, Matthew},
  title = {Method for cryptographic key agreement between two communication devices in Internet protocol communications networks, involves arranging one or multiple Network address translation routers between two communication devices},
  year = {2007},
  number = {DE Patent App. 200,710,033,847},
  note = {DE Patent App. 200,710,033,847}
}
Freisleben BPD, Schridde C and Smith M (2007), "Public/private cryptographic key producing method for executing key agreement in digital data carrier, involves converting terminal end point address into key portion by applying inverse function of trap door one-way function for agreement", Jul, 2007. (DE Patent App. 200,710,033,845)
BibTeX:
@patent{freisleben2007public,
  author = {Freisleben, Bernd Prof Dr and Schridde, Christian and Smith, Matthew},
  title = {Public/private cryptographic key producing method for executing key agreement in digital data carrier, involves converting terminal end point address into key portion by applying inverse function of trap door one-way function for agreement},
  year = {2007},
  number = {DE Patent App. 200,710,033,845},
  note = {DE Patent App. 200,710,033,845}
}
Friese T, Smith M and Freisleben B (2007), "Native Code Security for Java Grid Services", In 8. Internationale Tagung Wirtschaftsinformatik 2007-Band 1., Feb, 2007. , pp. 513.
BibTeX:
@inproceedings{friese2007native,
  author = {Friese, Thomas and Smith, Matthew and Freisleben, Bernd},
  title = {Native Code Security for Java Grid Services},
  booktitle = {8. Internationale Tagung Wirtschaftsinformatik 2007-Band 1},
  year = {2007},
  pages = {513}
}
Schmidt M, Smith M, Fallenbeck N, Picht H and Freisleben B (2007), "Building a demilitarized zone with data encryption for grid environments", In Proceedings of the first international conference on Networks for grid applications. , pp. 17.
BibTeX:
@inproceedings{schmidt2007building,
  author = {Schmidt, Matthias and Smith, Matthew and Fallenbeck, Niels and Picht, Hans and Freisleben, Bernd},
  title = {Building a demilitarized zone with data encryption for grid environments},
  booktitle = {Proceedings of the first international conference on Networks for grid applications},
  year = {2007},
  pages = {17}
}
Schridde C, Picht H-J, Heidt M, Smith M and Freisleben B (2007), "Secure Integration of Desktop Grids and Compute Clusters Based on Virtualization and Meta-Scheduling", In Proceedings of the German e-Science Conference 2007., May, 2007. , pp. 1–9. Citeseer.
BibTeX:
@inproceedings{schridde2007secure,
  author = {Schridde, Christian and Picht, Hans-Joachim and Heidt, Michael and Smith, Matthew and Freisleben, B},
  title = {Secure Integration of Desktop Grids and Compute Clusters Based on Virtualization and Meta-Scheduling},
  booktitle = {Proceedings of the German e-Science Conference 2007},
  publisher = {Citeseer},
  year = {2007},
  pages = {1–9},
  url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.90.1362&rep=rep1&type=pdf}
}
Smith M, Schmidt M, Fallenbeck N, Schridde C and Freisleben B (2007), "Optimising Security Configurations with Service Level Agreements", FRONTIERS SCIENCE SERIES. Vol. 49, pp. 367. Citeseer.
BibTeX:
@article{smith2007optimising,
  author = {Smith, M and Schmidt, M and Fallenbeck, N and Schridde, C and Freisleben, B},
  title = {Optimising Security Configurations with Service Level Agreements},
  journal = {FRONTIERS SCIENCE SERIES},
  publisher = {Citeseer},
  year = {2007},
  volume = {49},
  pages = {367}
}
2006
Fallenbeck N, Picht H-J, Smith M and Freisleben B (2006), "Xen and the art of cluster scheduling", In Proceedings of the 2nd International Workshop on Virtualization Technology in Distributed Computing. , pp. 4.
BibTeX:
@inproceedings{fallenbeck2006xen,
  author = {Fallenbeck, Niels and Picht, Hans-Joachim and Smith, Matthew and Freisleben, Bernd},
  title = {Xen and the art of cluster scheduling},
  booktitle = {Proceedings of the 2nd International Workshop on Virtualization Technology in Distributed Computing},
  year = {2006},
  pages = {4}
}
Friese T, Smith M and Freisleben B (2006), "Grid development tools for eclipse", In Eclipse Technology eXchange workshop (eTX) at ECOOP 2006., July, 2006.
BibTeX:
@inproceedings{friese2006grid,
  author = {Friese, Thomas and Smith, Matthew and Freisleben, Bernd},
  title = {Grid development tools for eclipse},
  booktitle = {Eclipse Technology eXchange workshop (eTX) at ECOOP 2006},
  year = {2006}
}
Friese T, Smith M and Freisleben B (2006), "GDT: A toolkit for grid service development", In Proc. of the 3rd International Conference on Grid Service Engineering and Management. , pp. 131-148.
BibTeX:
@inproceedings{friese2006gdt,
  author = {Friese, Thomas and Smith, Matthew and Freisleben, Bernd},
  title = {GDT: A toolkit for grid service development},
  booktitle = {Proc. of the 3rd International Conference on Grid Service Engineering and Management},
  year = {2006},
  pages = {131--148}
}
Friese T, Smith M and Freisleben B (2006), "Service-Oriented Ad hoc Grids", Grid Computing., In Grid Computing. , pp. 143-190. Vieweg.
BibTeX:
@incollection{friese2006service,
  author = {Friese, T. and Smith, M. and Freisleben, B.},
  editor = {Barth, Thomas and Schüll, Anke},
  title = {Service-Oriented Ad hoc Grids},
  booktitle = {Grid Computing},
  journal = {Grid Computing},
  publisher = {Vieweg},
  year = {2006},
  pages = {143--190},
  doi = {10.1007/978-3-8348-9101-3_8}
}
Friese T, Smith M, Freisleben B, Reichwald J, Barth T and Grauer M (2006), "Collaborative Grid process creation support in an engineering domain", In High Performance Computing-HiPC 2006. Vol. 4297, pp. 263-276. Springer.
BibTeX:
@inproceedings{friese2006collaborative,
  author = {Friese, Thomas and Smith, Matthew and Freisleben, Bernd and Reichwald, Julian and Barth, Thomas and Grauer, Manfred},
  editor = {Robert, Yves and Parashar, Manish and Badrinath, Ramamurthy and Prasanna, ViktorK.},
  title = {Collaborative Grid process creation support in an engineering domain},
  booktitle = {High Performance Computing-HiPC 2006},
  publisher = {Springer},
  year = {2006},
  volume = {4297},
  pages = {263--276},
  doi = {10.1007/11945918_29}
}
Heinzl S, Mathes M, Friese T, Smith M and Freisleben B (2006), "Flex-swa: Flexible exchange of binary data based on soap messages with attachments", In Web Services, 2006. ICWS'06. International Conference on. , pp. 3-10.
BibTeX:
@inproceedings{heinzl2006flex,
  author = {Heinzl, Steffen and Mathes, Markus and Friese, Thomas and Smith, Matthew and Freisleben, Bernd},
  title = {Flex-swa: Flexible exchange of binary data based on soap messages with attachments},
  booktitle = {Web Services, 2006. ICWS'06. International Conference on},
  year = {2006},
  pages = {3--10}
}
Jakumeit J, Barth T, Reichwald J, Grauer M, Friese T, Smith M and Freisleben B (2006), "A Grid-Based Parallel Optimization Algorithm Applied to a Problem in Metal Casting Industry", In International Conference on Bioinspired Optimization Methods and their Applications (BIOMA)., Oct, 2006. , pp. 131-146.
BibTeX:
@inproceedings{jakumeit2006grid,
  author = {Jakumeit, Jürgen and Barth, Thomas and Reichwald, Julian and Grauer, Manfred and Friese, T and Smith, M and Freisleben, B},
  title = {A Grid-Based Parallel Optimization Algorithm Applied to a Problem in Metal Casting Industry},
  booktitle = {International Conference on Bioinspired Optimization Methods and their Applications (BIOMA)},
  year = {2006},
  pages = {131-146}
}
Smith M, Engel M, Friese T and Freisleben B (2006), "Security issues in on-demand grid and cluster computing", In Cluster Computing and the Grid Workshops, 2006. Sixth IEEE International Symposium on. Vol. 2, pp. 14-pp.
BibTeX:
@inproceedings{smith2006security,
  author = {Smith, Matthew and Engel, Michael and Friese, Thomas and Freisleben, Bernd},
  title = {Security issues in on-demand grid and cluster computing},
  booktitle = {Cluster Computing and the Grid Workshops, 2006. Sixth IEEE International Symposium on},
  year = {2006},
  volume = {2},
  pages = {14--pp}
}
Smith M, Engel M, Hanemann S and Freisleben B (2006), "Towards a Roadcasting Communications Infrastructure", In Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, 2006. ICN/ICONS/MCL 2006. International Conference on. , pp. 213-213.
BibTeX:
@inproceedings{smith2006towards,
  author = {Smith, Matthew and Engel, Michael and Hanemann, Sven and Freisleben, Bernd},
  title = {Towards a Roadcasting Communications Infrastructure},
  booktitle = {Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, 2006. ICN/ICONS/MCL 2006. International Conference on},
  year = {2006},
  pages = {213--213}
}
Smith M, Friese T, Engel M and Freisleben B (2006), "Countering security threats in service-oriented on-demand grid computing using sandboxing and trusted computing techniques", Journal of Parallel and Distributed Computing. Vol. 66(9), pp. 1189-1204. Elsevier.
BibTeX:
@article{smith2006countering,
  author = {Smith, Matthew and Friese, Thomas and Engel, Michael and Freisleben, Bernd},
  title = {Countering security threats in service-oriented on-demand grid computing using sandboxing and trusted computing techniques},
  journal = {Journal of Parallel and Distributed Computing},
  publisher = {Elsevier},
  year = {2006},
  volume = {66},
  number = {9},
  pages = {1189--1204}
}
Smith M, Friese T and Freisleben B (2006), "Model Driven Service-Oriented Grid Application", In Grid Computing. , pp. 191-210. Vieweg.
BibTeX:
@incollection{Smith2006,
  author = {Smith, M and Friese, T and Freisleben, B},
  title = {Model Driven Service-Oriented Grid Application},
  booktitle = {Grid Computing},
  publisher = {Vieweg},
  year = {2006},
  pages = {191--210}
}
Smith M, Friese T and Freisleben B (2006), "Model driven development of service-oriented grid applications", In Telecommunications, 2006. AICT-ICIW'06. International Conference on Internet and Web Applications and Services/Advanced International Conference on. , pp. 139-139.
BibTeX:
@inproceedings{smith2006model,
  author = {Smith, Matthew and Friese, Thomas and Freisleben, Bernd},
  title = {Model driven development of service-oriented grid applications},
  booktitle = {Telecommunications, 2006. AICT-ICIW'06. International Conference on Internet and Web Applications and Services/Advanced International Conference on},
  year = {2006},
  pages = {139--139}
}
Smith M, Klose B, Ewerth R, Friese T, Engel M and Freisleben B (2006), "Runtime Integration of Reconfigurable Hardware in Service-Oriented Grids", In Web Services, 2006. ICWS'06. International Conference on. , pp. 945-948.
BibTeX:
@inproceedings{smith2006runtime,
  author = {Smith, Matthew and Klose, B and Ewerth, Ralph and Friese, Thomas and Engel, Michael and Freisleben, Bernd},
  title = {Runtime Integration of Reconfigurable Hardware in Service-Oriented Grids},
  booktitle = {Web Services, 2006. ICWS'06. International Conference on},
  year = {2006},
  pages = {945--948}
}
Zhang J, Borisov N, Yurcik W, Slagell AJ and Smith M (2006), "Future Internet Security Services Enabled by Sharing of Anonymized Logs", In Workshop on Security and Privacy in Future Business Services held in conjunction with International Conference on Emerging Trends in Information and Communication Security (ETRICS)., June, 2006.
BibTeX:
@inproceedings{zhang2006future,
  author = {Zhang, Jianqing and Borisov, Nikita and Yurcik, William and Slagell, Adam J and Smith, Matthew},
  title = {Future Internet Security Services Enabled by Sharing of Anonymized Logs},
  booktitle = {Workshop on Security and Privacy in Future Business Services held in conjunction with International Conference on Emerging Trends in Information and Communication Security (ETRICS)},
  year = {2006}
}
2005
Battenfeld O, Smith M, Reinhardt P, Friese T and Freisleben B (2005), "A modular architecture for hot swappable mobile ad hoc routing algorithms", In Embedded Software and Systems, 2005. Second International Conference on. , pp. 8-pp.
BibTeX:
@inproceedings{battenfeld2005modular,
  author = {Battenfeld, Oliver and Smith, Matthew and Reinhardt, Patrick and Friese, Thomas and Freisleben, Bernd},
  title = {A modular architecture for hot swappable mobile ad hoc routing algorithms},
  booktitle = {Embedded Software and Systems, 2005. Second International Conference on},
  year = {2005},
  pages = {8--pp}
}
Friese T, Muller JP, Smith M and Freisleben B (2005), "A robust business resource management framework based on a peer-to-peer infrastructure", In E-Commerce Technology, 2005. CEC 2005. Seventh IEEE International Conference on. , pp. 215-222.
BibTeX:
@inproceedings{friese2005robust,
  author = {Friese, Thomas and Muller, Jorg P and Smith, Matthew and Freisleben, Bernd},
  title = {A robust business resource management framework based on a peer-to-peer infrastructure},
  booktitle = {E-Commerce Technology, 2005. CEC 2005. Seventh IEEE International Conference on},
  year = {2005},
  pages = {215--222}
}
Papalilo E, Friese T, Smith M and Freisleben B (2005), "Trust shaping: Adapting trust establishment and management to application requirements in a service-oriented grid environment", In Grid and Cooperative Computing -- GCC 2005., Nov, 2005. Vol. 3795, pp. 47-58. Springer.
BibTeX:
@incollection{papalilo2005trust,
  author = {Papalilo, E and Friese, T and Smith, M and Freisleben, B},
  title = {Trust shaping: Adapting trust establishment and management to application requirements in a service-oriented grid environment},
  booktitle = {Grid and Cooperative Computing -- GCC 2005},
  publisher = {Springer},
  year = {2005},
  volume = {3795},
  pages = {47--58},
  doi = {10.1007/11590354_6}
}
Smith M, Friese T and Freisleben B (2005), "Intra-engine service security for grids based on WSRF", In Cluster Computing and the Grid, 2005. CCGrid 2005. IEEE International Symposium on. Vol. 2, pp. 644-653.
BibTeX:
@inproceedings{smith2005intra,
  author = {Smith, Matthew and Friese, Thomas and Freisleben, Bernd},
  title = {Intra-engine service security for grids based on WSRF},
  booktitle = {Cluster Computing and the Grid, 2005. CCGrid 2005. IEEE International Symposium on},
  year = {2005},
  volume = {2},
  pages = {644--653}
}
Smith M, Hanemann S and Freisleben B (2005), "Coupled simulation/emulation for cross-layer enabled mobile wireless computing", In Embedded Software and Systems, 2005. Second International Conference on. , pp. 9-pp.
BibTeX:
@inproceedings{smith2005coupled,
  author = {Smith, Matthew and Hanemann, Sven and Freisleben, Bernd},
  title = {Coupled simulation/emulation for cross-layer enabled mobile wireless computing},
  booktitle = {Embedded Software and Systems, 2005. Second International Conference on},
  year = {2005},
  pages = {9--pp}
}
2004
Engel M, Smith M, Hanemann S and Freisleben B (2004), "Wireless ad-hoc network emulation using microkernel-based virtual linux systems", In Proceedings of the 5th EUROSIM Congress on Modeling and Simulation. , pp. 198-203. Citeseer.
BibTeX:
@inproceedings{engel2004wireless,
  author = {Engel, Michael and Smith, Matthew and Hanemann, Sven and Freisleben, Bernd},
  title = {Wireless ad-hoc network emulation using microkernel-based virtual linux systems},
  booktitle = {Proceedings of the 5th EUROSIM Congress on Modeling and Simulation},
  publisher = {Citeseer},
  year = {2004},
  pages = {198--203},
  url = {http://www.rrzn.uni-hannover.de/uploads/tx_tkpublikationen/1.pdf}
}
Friese T, Smith M and Freisleben B (2004), "Hot service deployment in an ad hoc grid environment", In Proceedings of the 2nd international conference on Service oriented computing. , pp. 75-83.
BibTeX:
@inproceedings{friese2004hot,
  author = {Friese, Thomas and Smith, Matthew and Freisleben, Bernd},
  title = {Hot service deployment in an ad hoc grid environment},
  booktitle = {Proceedings of the 2nd international conference on Service oriented computing},
  year = {2004},
  pages = {75--83}
}
Smith M and Freisleben B (2004), "Self-healing wireless ad hoc networks based on adaptive node mobility", In Proc. IFIP Conf. on Wireless and Optical Communications Networks. , pp. 121-124. Citeseer.
BibTeX:
@inproceedings{smith2004self,
  author = {Smith, Matthew and Freisleben, Bernd},
  title = {Self-healing wireless ad hoc networks based on adaptive node mobility},
  booktitle = {Proc. IFIP Conf. on Wireless and Optical Communications Networks},
  publisher = {Citeseer},
  year = {2004},
  pages = {121-124},
  url = {http://www.rrzn.uni-hannover.de/uploads/tx_tkpublikationen/2.pdf}
}
Smith M, Friese T and Freisleben B (2004), "Towards a service-oriented ad hoc grid", In Parallel and Distributed Computing, 2004. Third International Symposium on/Algorithms, Models and Tools for Parallel Computing on Heterogeneous Networks, 2004. Third International Workshop on. , pp. 201-208.
BibTeX:
@inproceedings{smith2004towards,
  author = {Smith, Matthew and Friese, Thomas and Freisleben, Bernd},
  title = {Towards a service-oriented ad hoc grid},
  booktitle = {Parallel and Distributed Computing, 2004. Third International Symposium on/Algorithms, Models and Tools for Parallel Computing on Heterogeneous Networks, 2004. Third International Workshop on},
  year = {2004},
  pages = {201--208}
}

Created by JabRef on 31/12/2021.