Privacy

  • In Encryption We Don’t Trust: The Effect of End-to-End Encryption to the Masses on User Perception. Dechand, Sergej; Naiakshina, Alena; Danilova, Anastasia; Smith, Matthew (2019). 401–415.
    URLBibTeXEndNoteBibSonomy
  • A Usability Evaluation of Let’s Encrypt and Certbot: Usable Security Done Right. Tiefenau, Christian; von Zezschwitz, Emanuel; Häring, Maximilian; Krombholz, Katharina; Smith, Matthew (2019). 1971–1988.
    URLBibTeXEndNoteBibSonomy
  • "If you want, I can store the encrypted password": A Password-Storage Field Study with Freelance Developers. Naiakshina, Alena; Danilova, Anastasia; Gerlitz, Eva; von Zezschwitz, Emanuel; Smith, Matthew S. A. Brewster, G. Fitzpatrick, A. L. Cox, V. Kostakos (eds.) (2019). 140.
    URLBibTeXEndNoteBibSonomy
  • Empirical Evaluation of Secure Development Processes (Dagstuhl Seminar 19231). Shostack, Adam; Smith, Matthew; Weber, Sam; Zurko, Mary Ellen (2019). 9(6) 1–25.
    URLBibTeXEndNoteBibSonomy
  • "If HTTPS Were Secure, I Wouldn’t Need 2FA" - End User and Administrator Mental Models of HTTPS. Krombholz, Katharina; Busse, Karoline; Pfeffer, Katharina; Smith, Matthew; von Zezschwitz, Emanuel (2019). 246–263.
    URLBibTeXEndNoteBibSonomy
  • Replication: No One Can Hack My Mind Revisiting a Study on Expert and Non-Expert Security Practices and Advice. Busse, Karoline; Schäfer, Julia; Smith, Matthew H. R. Lipford (ed.) (2019).
    URLBibTeXEndNoteBibSonomy
  • Deception Task Design in Developer Password Studies: Exploring a Student Sample. Naiakshina, Alena; Danilova, Anastasia; Tiefenau, Christian; Smith, Matthew (2018). 297–313.
    URLBibTeXEndNoteBibSonomy
  • Exploring Design Directions for Wearable Privacy. Krombholz, Katharina; Dabrowski, Adrian; Smith, Matthew; Weippl, Edgar (2017).
    BibTeXEndNoteDOIBibSonomy
  • Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study. Naiakshina, Alena; Danilova, Anastasia; Tiefenau, Christian; Herzog, Marco; Dechand, Sergej; Smith, Matthew (2017). abs/1708.08759
    URLBibTeXEndNoteBibSonomy
  • SoK: Lessons Learned from Android Security Research for Appified Software Platforms. Acar, Yasemin; Backes, Michael; Bugiel, Sven; Fahl, Sascha; McDaniel, Patrick Drew; Smith, Matthew (2016). 433–451.
    URLBibTeXEndNoteBibSonomy
  • Ok Glass, Leave Me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing. Krombholz, Katharina; Dabrowski, Adrian; Smith, Matthew; Weippl, Edgar M. Brenner, N. Christin, B. Johnson, K. Rohloff (eds.) (2015). (Vol. 8976) 274–280.
    URLBibTeXEndNoteDOIBibSonomy
  • Developers Are Users Too: Designing Crypto and Security APIs That Busy Engineers and Sysadmins Can Use Securely. Green, Matthew; Smith, Matthew (2015).
    BibTeXEndNoteBibSonomy
  • SoK: Secure Messaging. Unger, Nik; Dechand, Sergej; Bonneau, Joseph; Fahl, Sascha; Perl, Henning; Goldberg, Ian; Smith, Matthew (2015). 232–249.
    URLBibTeXEndNoteBibSonomy
  • SoK: Secure Messaging. Unger, Nik; Dechand, Sergej; Bonneau, Joseph; Fahl, Sascha; Perl, Henning; Goldberg, Ian; Smith, Matthew (2015). 232–249.
    AbstractURLBibTeXEndNoteDOIBibSonomy
  • Using personal examples to improve risk communication for security & privacy decisions. Harbach, Marian; Hettig, Markus; Weber, Susanne; Smith, Matthew M. Jones, P. A. Palanque, A. Schmidt, T. Grossman (eds.) (2014). 2647–2656.
    URLBibTeXEndNoteBibSonomy
  • Privacy/Performance Trade-off in Private Search on Bio-Medical Data. Perl, Henning; Mohammed, Yassene; Brenner, Michael; Smith, Matthew (P. Sloot, ed.) (2014). 36 441–452.
    BibTeXEndNoteBibSonomy
  • Who’s Afraid of Which Bad Wolf? A Survey of IT Security Risk Awareness. Harbach, Marian; Fahl, Sascha; Smith, Matthew (2014).
    BibTeXEndNoteBibSonomy
  • It’s a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception. Harbach, Marian; von Zezschwitz, Emanuel; Fichtner, Andreas; Luca, Alexander De; Smith, Matthew (2014). 213–230.
    URLBibTeXEndNoteBibSonomy
  • Why eve and mallory (also) love webmasters: a study on the root causes of SSL misconfigurations. Fahl, Sascha; Acar, Yasemin; Perl, Henning; Smith, Matthew (2014).
    AbstractBibTeXEndNoteBibSonomy
  • Now You See Me, Now You Don’t: Protecting Smartphone Authentication from Shoulder Surfers. De Luca, Alexander; Harbach, Marian; von Zezschwitz, Emanuel; Maurer, Max-Emanuel; Slawik, Bernhard Ewald; Hussmann, Heinrich; Smith, Matthew in CHI ’14 (2014). 2937–2946.
    URLBibTeXEndNoteDOIBibSonomy
  • You Won’t Be Needing These Any More: On Removing Unused Certificates from Trust Stores. Perl, Henning; Fahl, Sascha; Smith, Matthew in Lecture Notes in Computer Science, N. Christin, R. Safavi-Naini (eds.) (2014). (Vol. 8437) 307–315.
    URLBibTeXEndNoteBibSonomy
  • On the Awareness, Control and Privacy of Shared Photo Metadata. Henne, Benjamin; Koch, Maximilian; Smith, Matthew in Lecture Notes in Computer Science, N. Christin, R. Safavi-Naini (eds.) (2014). (Vol. 8437) 77–88.
    URLBibTeXEndNoteBibSonomy
  • On Usable Location Privacy for Android with Crowd-Recommendations. Henne, Benjamin; Kater, Christian; Smith, Matthew in Lecture Notes in Computer Science, T. Holz, S. Ioannidis (eds.) (2014). (Vol. 8564) 74–82.
    URLBibTeXEndNoteBibSonomy
  • Hey, NSA: Stay Away from my Market! Future Proofing App Markets against Powerful Attackers. Fahl, Sascha; Dechand, Sergej; Perl, Henning; Fischer, Felix; Smrcek, Jaromir; Smith, Matthew (2014).
    AbstractBibTeXEndNoteBibSonomy
  • SnapMe if You Can: Privacy Threats of Other Peoples’ Geo-tagged Media and What We Can Do About It. Henne, Benjamin; Szongott, Christian; Smith, Matthew in WiSec ’13 (2013). 95–106.
    URLBibTeXEndNoteDOIBibSonomy
  • Visualizing Risk by Example: Demonstrating Threats Arising From Android Apps. Hettig, M.; Kiss, E.; f. Kassel, J.; Weber, S.; Harbach, M.; Smith, M. (2013).
    BibTeXEndNoteBibSonomy
  • Awareness about photos on the Web and how privacy-privacy-tradeoffs could help. Henne, Benjamin; Smith, Matthew in LNCS (2013). 131–148.
    URLBibTeXEndNoteDOIBibSonomy
  • Sorry, I Don’t Get It: An Analysis of Warning Message Texts. Harbach, Marian; Fahl, Sascha; Yakovleva, Polina; Smith, Matthew in Lecture Notes in Computer Science, A. A. Adams, M. Brenner, M. Smith (eds.) (2013). (Vol. 7862) 94–111.
    URLBibTeXEndNoteBibSonomy
  • Hey, You, Get Off of My Clipboard. Fahl, Sascha; Harbach, Marian; Oltrogge, Marten; Muders, Thomas; Smith, Matthew A.-R. Sadeghi (ed.) (2013). (Vol. 7859) 144–161.
    AbstractURLBibTeXEndNoteDOIBibSonomy
  • On the Acceptance of Privacy-Preserving Authentication Technology: The Curious Case of National Identity Cards. Harbach, Marian; Fahl, Sascha; Rieger, Matthias; Smith, Matthew E. Cristofaro, M. Wright (eds.) (2013). 245–264.
    AbstractURLBibTeXEndNoteDOIBibSonomy
  • Location privacy revisited: factors of privacy decisions. Henne, Benjamin; Harbach, Marian; Smith, Matthew in CHI EA ’13, W. E. Mackay, S. A. Brewster, S. Bødker (eds.) (2013). 805–810.
    URLBibTeXEndNoteBibSonomy
  • Selective Cloaking: Need-to-know for Location-based Apps. Henne, Benjamin; Kater, Christian; Smith, Matthew; Brenner, Michael (2013).
    URLBibTeXEndNoteDOIBibSonomy
  • On the Ecological Validity of a Password Study. Fahl, Sascha; Harbach, Marian; Acar, Yasemin; Smith, Matthew in SOUPS ’13 (2013). 13:1–13:13.
    AbstractURLBibTeXEndNoteDOIBibSonomy
  • Rethinking SSL development in an appified world. Fahl, Sascha; Harbach, Marian; Perl, Henning; Koetter, Markus; Smith, Matthew in CCS ’13, A.-R. Sadeghi, V. D. Gligor, M. Yung (eds.) (2013). 49–60.
    AbstractURLBibTeXEndNoteBibSonomy
  • Position Statement: Risk Perception and the Acceptance of New Security Technology. Harbach, Marian; Fahl, Sascha; Smith, Matthew (2013).
    BibTeXEndNoteBibSonomy
  • Towards measuring warning readability. Harbach, Marian; Fahl, Sascha; Muders, Thomas; Smith, Matthew in CCS ’12 (2012). 989–991.
    AbstractURLBibTeXEndNoteDOIBibSonomy
  • Fast confidential search for bio-medical data using Bloom filters and Homomorphic Cryptography. Perl, Henning; Mohammed, Yassene; Brenner, Michael; Smith, Matthew (2012). 1–8.
    URLBibTeXEndNoteBibSonomy
  • Towards privacy-preserving access control with hidden policies, hidden credentials and hidden decisions. Harbach, Marian; Fahl, Sascha; Brenner, Michael; Muders, Thomas; Smith, Matthew N. Cuppens-Boulahia, P. Fong, J. García-Alfaro, S. Marsh, J.-P. Steghöfer (eds.) (2012). 17–24.
    URLBibTeXEndNoteBibSonomy
  • How Practical is Homomorphically Encrypted Program Execution? An Implementation and Performance Evaluation. Brenner, M.; Perl, H.; Smith, M. (2012). 375–382.
    BibTeXEndNoteDOIBibSonomy
  • A real-time architecture for detection of diseases using social networks: design, implementation and evaluation. Sofean, Mustafa; Smith, Matthew E. V. Munson, M. Strohmaier (eds.) (2012). 309–310.
    URLBibTeXEndNoteBibSonomy
  • A real-time disease surveillance architecture using social networks. Sofean, Mustafa; Smith, Matthew (2012). 180 823–7.
    BibTeXEndNoteDOIBibSonomy
  • A transfer approach to detecting disease reporting events in blog social media (Nelson Award Nominee). Stewart, Avaré; Smith, Matthew; Nejdl, Wolfgang (2011).
    BibTeXEndNoteBibSonomy