Matthew Smith
Orcid: 0000-0002-2724-1379Affiliations:
- University of Bonn, Institute of Computer Science, Germany
- Leibniz University of Hannover, Institute of Distributed Systems, Germany
- University of Marburg, Department of Mathematics and Computer Science, Marburg, Germany (PhD)
According to our database1,
Matthew Smith
authored at least 128 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on linkedin.com
-
on orcid.org
-
on mattsmith.de
On csauthors.net:
Bibliography
2024
Can Johnny be a whistleblower? A qualitative user study of a social authentication Signal extension in an adversarial scenario.
Proceedings of the Twentieth Symposium on Usable Privacy and Security, 2024
2023
Attitudes towards Client-Side Scanning for CSAM, Terrorism, Drug Trafficking, Drug Use and Tax Evasion in Germany.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
SoK: I Have the (Developer) Power! Sample Size Estimation for Fisher's Exact, Chi-Squared, McNemar's, Wilcoxon Rank-Sum, Wilcoxon Signed-Rank and t-tests in Developer-Centered Usable Security.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023
Adventures in Recovery Land: Testing the Account Recovery of Popular Websites When the Second Factor is Lost.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023
Evolution of Password Expiry in Companies: Measuring the Adoption of Recommendations by the German Federal Office for Information Security.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
Different Researchers, Different Results? Analyzing the Influence of Researcher Experience and Data Type During Qualitative Analysis of an Interview and Survey Study on Security Advice.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
Less About Privacy: Revisiting a Survey about the German COVID-19 Contact Tracing App.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
2022
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
2021
A Qualitative Usability Evaluation of the Clang Static Analyzer and libFuzzer with CS Students and CTF Players.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021
Never ever or no matter what: Investigating Adoption Intentions and Misconceptions about the Corona-Warn-App in Germany.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021
Please do not use !?_ or your License Plate Number: Analyzing Password Policies in German Companies.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021
Code Reviewing as Methodology for Online Security Studies with Developers - A Case Study with Freelancers on Password Storage.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021
Do you really code? Designing and Evaluating Screening Questions for Online Surveys with Programmers.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021
Replication: Measuring User Perceptions in Smartphone Security and Privacy in Germany.
Proceedings of the EuroUSEC '21: European Symposium on Usable Security 2021, Karlsruhe, Germany, October 11, 2021
2020
Replication: On the Ecological Validity of Online Security Developer Studies: Exploring Deception in a Password-Storage Study with Freelancers.
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020
One size does not fit all: a grounded theory and online survey study of developer preferences for security warning types.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
On Conducting Security Developer Studies with CS Students: Examining a Password-Storage Study with CS Students, Freelancers, and Company Developers.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020
2019
Dagstuhl Reports, 2019
"If HTTPS Were Secure, I Wouldn't Need 2FA" - End User and Administrator Mental Models of HTTPS.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Replication: No One Can Hack My Mind Revisiting a Study on Expert and Non-Expert Security Practices and Advice.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019
In Encryption We Don't Trust: The Effect of End-to-End Encryption to the Masses on User Perception.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
"If you want, I can store the encrypted password": A Password-Storage Field Study with Freelance Developers.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018
2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
IEEE Secur. Priv., 2016
IEEE Secur. Priv., 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Where Have You Been? Using Location-Based Security Questions for Fallback Authentication.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015
No More Gotos: Decompilation Using Pattern-Independent Control-Flow Structuring and Semantic-Preserving Transformations.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
METDS - A Self-contained, Context-Based Detection System for Evil Twin Access Points.
Proceedings of the Financial Cryptography and Data Security, 2015
Ok Glass, Leave Me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing.
Proceedings of the Financial Cryptography and Data Security, 2015
VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Future Gener. Comput. Syst., 2014
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014
It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014
You Won't Be Needing These Any More: On Removing Unused Certificates from Trust Stores.
Proceedings of the Financial Cryptography and Data Security, 2014
Proceedings of the Financial Cryptography and Data Security, 2014
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014
Now you see me, now you don't: protecting smartphone authentication from shoulder surfers.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014
Using personal examples to improve risk communication for security & privacy decisions.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014
Hey, NSA: Stay Away from my Market! Future Proofing App Markets against Powerful Attackers.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Why eve and mallory (also) love webmasters: a study on the root causes of SSL misconfigurations.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
SnapMe if you can: privacy threats of other peoples' geo-tagged media and what we can do about it.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013
Proceedings of the Symposium On Usable Privacy and Security, 2013
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
On the Acceptance of Privacy-Preserving Authentication Technology: The Curious Case of National Identity Cards.
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013
Proceedings of the MEDINFO 2013, 2013
Proceedings of the Financial Cryptography and Data Security, 2013
Proceedings of the Financial Cryptography and Data Security, 2013
Hey, You, Get Off of My Clipboard - On How Usability Trumps Security in Android Password Managers.
Proceedings of the Financial Cryptography and Data Security, 2013
Proceedings of the 7th IEEE International Conference on Digital Ecosystems and Technologies, 2013
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Proceedings of the 21st World Wide Web Conference, 2012
Proceedings of the 8th IEEE International Conference on Wireless and Mobile Computing, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
How Practical is Homomorphically Encrypted Program Execution? An Implementation and Performance Evaluation.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the Symposium On Usable Privacy and Security, 2012
Practical Applications of Homomorphic Encryption.
Proceedings of the SECRYPT 2012, 2012
Towards privacy-preserving access control with hidden policies, hidden credentials and hidden decisions.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012
Proceedings of the ACM International Health Informatics Symposium, 2012
A real-time architecture for detection of diseases using social networks: design, implementation and evaluation.
Proceedings of the 23rd ACM Conference on Hypertext and Social Media, 2012
Proceedings of the 23rd ACM Conference on Hypertext and Social Media, 2012
Fast confidential search for bio-medical data using Bloom filters and Homomorphic Cryptography.
Proceedings of the 8th IEEE International Conference on E-Science, 2012
Proceedings of the 6th IEEE International Conference on Digital Ecosystems and Technologies, 2012
Proceedings of the 6th IEEE International Conference on Digital Ecosystems and Technologies, 2012
Proceedings of the 6th IEEE International Conference on Digital Ecosystems and Technologies, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012
2011
Secure mobile communication via identity-based cryptography and server-aided computations.
J. Supercomput., 2011
A Smart-gentry based Software System for Secret Program Execution.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Proceedings of the HT'11, 2011
Proceedings of the 12th IEEE/ACM International Conference on Grid Computing, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the Advanced Information Systems Engineering, 2011
2010
Proceedings of the IEEE International Conference on Wireless Communications, 2010
Proceedings of the IEEE International Conference on Wireless Communications, 2010
Proceedings of the 18th Euromicro Conference on Parallel, 2010
Reaching for the Cloud: On the Lessons Learned from Grid Computing Technology Transfer Process to the Biomedical Community.
Proceedings of the MEDINFO 2010, 2010
Proceedings of the 20th International Conference on Pattern Recognition, 2010
Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing, 2010
Proceedings of the Healthgrid Applications and Core Technologies, 2010
Proceedings of the Sixth International Conference on e-Science, 2010
2009
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009
Proceedings of the Advances in Information Security and Assurance, 2009
Proceedings of the 11th IEEE International Conference on High Performance Computing and Communications, 2009
Proceedings of the 35th Euromicro Conference on Software Engineering and Advanced Applications, 2009
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009
2008
Proceedings of the 34th Euromicro Conference on Software Engineering and Advanced Applications, 2008
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008
Proceedings of the 17th International Symposium on High-Performance Distributed Computing (HPDC-17 2008), 2008
Proceedings of the 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2008), 2008
Proceedings of the Sixth Australasian Symposium on Grid Computing and e-Research, 2008
2007
Proceedings of the eOrganisation: Service-, Prozess-, Market-Engineering: 8. Internationale Tagung Wirtschaftsinformatik, 2007
Proceedings of the From Genes to Personalized HealthCare: Grid Solutions for the Life Sciences, 2007
Proceedings of the 1st International ICST Conference on Networks for Grid Applications, 2007
2006
Countering security threats in service-oriented on-demand grid computing using sandboxing and trusted computing techniques.
J. Parallel Distributed Comput., 2006
Proceedings of the First International Workshop on Virtualization Technology in Distributed Computing, 2006
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006
Proceedings of the High Performance Computing, 2006
Proceedings of the Conference Proceedings NODe 2006, 2006
Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 2006
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006
2005
A Robust Business Resource Management Framework Based on a Peer-to-Peer Infrastructure.
Proceedings of the 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 2005
Trust Shaping: Adapting Trust Establishment and Management to Application Requirements in a Service-Oriented Grid Environment.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005
Proceedings of the 5th International Symposium on Cluster Computing and the Grid (CCGrid 2005), 2005
2004
Proceedings of the 3rd International Symposium on Parallel and Distributed Computing (ISPDC 2004), 2004
Proceedings of the Service-Oriented Computing, 2004