Publications

All publications by year

[2020] [2019] [2018] [2017] [2016] [2015] [2014] [2013] [2012] [2011]

2020

  • Naiakshina, Alena ; Danilova, Anastasia ; Gerlitz, Eva ; Smith, Matthew: On Conducting Security Developer Studies with CS Students: Examining a Password-Storage Study with CS Students, Freelancers, and Company Developers.. In: Bernhaupt, R. ; Mueller, F. ’Floyd’ ; Verweij, D. ; Andres, J. ; McGrenere, J. ; Cockburn, A. ; Avellino, I. ; Goguey, A. ; Bjøn, P. ; Zhao, S. ; Samson, B. P. ; Kocielnik, R. (eds.): CHI : ACM, 2020 — ISBN 978-1-4503-6708-0, pp. 1–13
    URLBibTeXEndNoteBibSonomy
  • Danilova, Anastasia ; Naiakshina, Alena ; Smith, Matthew: One size does not fit all: a grounded theory and online survey study of developer preferences for security warning types.. In: Rothermel, G. ; Bae, D.-H. (eds.): ICSE : ACM, 2020 — ISBN 978-1-4503-7121-6, pp. 136–148
    URLBibTeXEndNoteBibSonomy
  • Danilova, Anastasia ; Naiakshina, Alena ; Deuter, Johanna ; Smith, Matthew: Replication: On the Ecological Validity of Online Security Developer Studies: Exploring Deception in a Password-Storage Study with Freelancers.. In: Lipford, H. R. ; Chiasson, S. (eds.): SOUPS @ USENIX Security Symposium : USENIX Association, 2020, pp. 165–183
    URLBibTeXEndNoteBibSonomy

2019

  • Tiefenau, Christian ; von Zezschwitz, Emanuel ; Häring, Maximilian ; Krombholz, Katharina ; Smith, Matthew: A Usability Evaluation of Let’s Encrypt and Certbot: Usable Security Done Right.. In: ACM Conference on Computer and Communications Security : ACM, 2019 — ISBN 978-1-4503-6747-9, pp. 1971–1988
    URLBibTeXEndNoteBibSonomy
  • Busse, Karoline ; Schäfer, Julia ; Smith, Matthew: Replication: No One Can Hack My Mind Revisiting a Study on Expert and Non-Expert Security Practices and Advice.. In: Lipford, H. R. (ed.): Fifteenth Symposium on Usable Privacy and Security : USENIX Association, 2019
    URLBibTeXEndNoteBibSonomy
  • Shostack, Adam ; Smith, Matthew ; Weber, Sam ; Zurko, Mary Ellen: Empirical Evaluation of Secure Development Processes (Dagstuhl Seminar 19231).. In: Dagstuhl Reports vol. 9 (2019), Nr. 6, pp. 1–25
    URLBibTeXEndNoteBibSonomy
  • Naiakshina, Alena ; Danilova, Anastasia ; Gerlitz, Eva ; von Zezschwitz, Emanuel ; Smith, Matthew: "If you want, I can store the encrypted password": A Password-Storage Field Study with Freelance Developers.. In: Brewster, S. A. ; Fitzpatrick, G. ; Cox, A. L. ; Kostakos, V. (eds.): Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems : ACM, 2019 — ISBN 978-1-4503-5970-2, p. 140
    URLBibTeXEndNoteBibSonomy
  • Dechand, Sergej ; Naiakshina, Alena ; Danilova, Anastasia ; Smith, Matthew: In Encryption We Don’t Trust: The Effect of End-to-End Encryption to the Masses on User Perception.. In: 2019 IEEE European Symposium on Security and Privacy : IEEE, 2019 — ISBN 978-1-7281-1148-3, pp. 401–415
    URLBibTeXEndNoteBibSonomy
  • Krombholz, Katharina ; Busse, Karoline ; Pfeffer, Katharina ; Smith, Matthew ; von Zezschwitz, Emanuel: "If HTTPS Were Secure, I Wouldn’t Need 2FA" - End User and Administrator Mental Models of HTTPS.. In: IEEE Symposium on Security and Privacy : IEEE, 2019 — ISBN 978-1-5386-6660-9, pp. 246–263
    URLBibTeXEndNoteBibSonomy

2018

  • Naiakshina, Alena ; Danilova, Anastasia ; Tiefenau, Christian ; Smith, Matthew: Deception Task Design in Developer Password Studies: Exploring a Student Sample.. In: Fourteenth Symposium on Usable Privacy and Security : USENIX Association, 2018, pp. 297–313
    URLBibTeXEndNoteBibSonomy

2017

  • Naiakshina, Alena ; Danilova, Anastasia ; Tiefenau, Christian ; Herzog, Marco ; Dechand, Sergej ; Smith, Matthew: Why Do Developers Get Password Storage Wrong?: A Qualitative Usability Study.. In: CCS : ACM, 2017 — ISBN 978-1-4503-4946-8, pp. 311–328
    URLBibTeXEndNoteBibSonomy
  • Abu-Salma, Ruba ; Sasse, M. Angela ; Bonneau, Joseph ; Danilova, Anastasia ; Naiakshina, Alena ; Smith, Matthew: Obstacles to the Adoption of Secure Communication Tools.. In: IEEE Symposium on Security and Privacy : IEEE Computer Society, 2017 — ISBN 978-1-5090-5533-3, pp. 137–153
    URLBibTeXEndNoteBibSonomy
  • Krombholz, Katharina ; Dabrowski, Adrian ; Smith, Matthew ; Weippl, Edgar: Exploring Design Directions for Wearable Privacy.. In: , 2017
    BibTeXEndNoteDOIBibSonomy
  • Naiakshina, Alena ; Danilova, Anastasia ; Tiefenau, Christian ; Herzog, Marco ; Dechand, Sergej ; Smith, Matthew: Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study.. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications vol. abs/1708.08759 (2017)
    URLBibTeXEndNoteBibSonomy

2016

  • Green, Matthew ; Smith, Matthew: Developers are Not the Enemy!: The Need for Usable Security APIs. In: IEEE Security & Privacy vol. 14, IEEE (2016), Nr. 5, pp. 40–46
    BibTeXEndNoteBibSonomy
  • Acar, Y. ; Backes, M. ; Bugiel, S. ; Fahl, S. ; McDaniel, P. ; Smith, M.: SoK: Lessons Learned from Android Security Research for Appified Software Platforms.. In: 2016 IEEE Symposium on Security and Privacy (SP), 2016, pp. 433–451
    BibTeXEndNoteDOIBibSonomy
  • Yakdan, K. ; Dechand, S. ; Gerhards-Padilla, E. ; Smith, M.: Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study.. In: 2016 IEEE Symposium on Security and Privacy (SP), 2016, pp. 158–177
    BibTeXEndNoteDOIBibSonomy
  • Sasse, M Angela ; Smith, Matthew ; Herley, Cormac ; Lipford, Heather ; Vaniea, Kami: Debunking Security-Usability Tradeoff Myths. In: IEEE Security & Privacy vol. 14, IEEE (2016), Nr. 5, pp. 33–39
    BibTeXEndNoteBibSonomy
  • Sasse, M Angela ; Smith, Matthew: The Security-Usability Tradeoff Myth [Guest editors’ introduction]. In: IEEE Security & Privacy vol. 14, IEEE (2016), Nr. 5, pp. 11–13
    BibTeXEndNoteBibSonomy
  • Green, Matthew ; Smith, Matthew: Developers are Not the Enemy!: The Need for Usable Security APIs.. In: IEEE Secur. Priv. vol. 14 (2016), Nr. 5, pp. 40–46
    URLBibTeXEndNoteBibSonomy
  • Acar, Yasemin ; Backes, Michael ; Bugiel, Sven ; Fahl, Sascha ; McDaniel, Patrick Drew ; Smith, Matthew: SoK: Lessons Learned from Android Security Research for Appified Software Platforms.. In: IEEE Symposium on Security and Privacy : IEEE Computer Society, 2016 — ISBN 978-1-5090-0824-7, pp. 433–451
    URLBibTeXEndNoteBibSonomy

2015

  • Yakdan, Khaled ; Eschweiler, Sebastian ; Gerhards-Padilla, Elmar ; Smith, Matthew: No More Gotos: Decompilation Using Pattern-Independent Control-Flow Structuring and Semantics-Preserving Transformations.. In: Network and Distributed System Security (NDSS), ISOC, 2015
    AbstractURLBibTeXEndNoteBibSonomy
  • Abu-Salma, Ruba ; Sasse, M. Angela ; Bonneau, Joseph ; Smith, Matthew: POSTER: Secure Chat for the Masses? User-centered Security to the Rescue.. In: Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security, CCS ’15. Denver, Colorado, USA : ACM, 2015 — ISBN 978-1-4503-3832-5, pp. 1623–1625
    URLBibTeXEndNoteDOIBibSonomy
  • Oltrogge, Marten ; Acar, Yasemin ; Dechand, Sergej ; Smith, Matthew ; Fahl, Sascha: To Pin or Not to Pin—Helping App Developers Bullet Proof Their TLS Connections.. In: 24th USENIX Security Symposium (USENIX Security 15). Washington, D.C. : USENIX Association, 2015 — ISBN 978-1-931971-232, pp. 239–254
    AbstractURLBibTeXEndNoteBibSonomy
  • Unger, Nik ; Dechand, Sergej ; Bonneau, Joseph ; Fahl, Sascha ; Perl, Henning ; Goldberg, Ian ; Smith, Matthew: SoK: Secure Messaging.. In: IEEE Symposium on Security and Privacy : IEEE Computer Society, 2015, pp. 232–249
    AbstractURLBibTeXEndNoteDOIBibSonomy
  • Hang, Alina ; Luca, Alexander De ; Smith, Matthew ; Richter, Michael ; Hussmann, Heinrich: Where Have You Been? Using Location-Based Security Questions for Fallback Authentication.. In: Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). Ottawa : USENIX Association, 2015 — ISBN 978-1-931971-249, pp. 169–183
    AbstractURLBibTeXEndNoteBibSonomy
  • Krombholz, Katharina ; Dabrowski, Adrian ; Smith, Matthew ; Weippl, Edgar: Ok Glass, Leave Me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing.. In: Brenner, M. ; Christin, N. ; Johnson, B. ; Rohloff, K. (eds.): Financial Cryptography and Data Security, Lecture Notes in Computer Science. vol. 8976 : Springer Berlin Heidelberg, 2015 — ISBN 978-3-662-48050-2, pp. 274–280
    URLBibTeXEndNoteDOIBibSonomy
  • Weber, Susanne ; Harbach, Marian ; Smith, Matthew: Participatory Design for Security-Related User Interfaces.. In: 22nd Annual Network and Distributed System Security Symposium. San Diego, California, USA : The Internet Society, 2015
    AbstractURLBibTeXEndNoteBibSonomy
  • Perl, Henning ; Dechand, Sergej ; Smith, Matthew ; Arp, Daniel ; Yamaguchi, Fabian ; Rieck, Konrad ; Fahl, Sascha ; Acar, Yasemin: VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits.. In: Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security, CCS ’15. New York, NY, USA : ACM, 2015, pp. 426–437
    AbstractURLBibTeXEndNoteBibSonomy
  • Unger, Nik ; Dechand, Sergej ; Bonneau, Joseph ; Fahl, Sascha ; Perl, Henning ; Goldberg, Ian ; Smith, Matthew: SoK: Secure Messaging.. In: IEEE Symposium on Security and Privacy : IEEE Computer Society, 2015 — ISBN 978-1-4673-6949-7, pp. 232–249
    URLBibTeXEndNoteBibSonomy
  • Green, Matthew ; Smith, Matthew: Developers Are Users Too: Designing Crypto and Security APIs That Busy Engineers and Sysadmins Can Use Securely.. In: . Washington, D.C. : USENIX Association, 2015
    BibTeXEndNoteBibSonomy

2014

  • Henne, Benjamin ; Koch, Maximilian ; Smith, Matthew: On the Awareness, Control and Privacy of Shared Photo Metadata.. In: Christin, N. ; Safavi-Naini, R. (eds.): Financial Cryptography, Lecture Notes in Computer Science. vol. 8437 : Springer, 2014 — ISBN 978-3-662-45471-8, pp. 77–88
    URLBibTeXEndNoteBibSonomy
  • Henne, Benjamin ; Kater, Christian ; Smith, Matthew: On Usable Location Privacy for Android with Crowd-Recommendations.. In: Holz, T. ; Ioannidis, S. (eds.): 7th International Conference on Trust and Trustworthy Computing, Lecture Notes in Computer Science. vol. 8564 : Springer, 2014 — ISBN 978-3-319-08592-0, pp. 74–82
    URLBibTeXEndNoteBibSonomy
  • Perl, Henning ; Fahl, Sascha ; Smith, Matthew: You Won’t Be Needing These Any More: On Removing Unused Certificates from Trust Stores.. In: Christin, N. ; Safavi-Naini, R. (eds.): Financial Cryptography, Lecture Notes in Computer Science. vol. 8437 : Springer, 2014 — ISBN 978-3-662-45471-8, pp. 307–315
    URLBibTeXEndNoteBibSonomy
  • Fahl, Sascha ; Dechand, Sergej ; Perl, Henning ; Fischer, Felix ; Smrcek, Jaromir ; Smith, Matthew: Hey, NSA: Stay Away from my Market! Future Proofing App Markets against Powerful Attackers.. In: CCS ’14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
    AbstractBibTeXEndNoteBibSonomy
  • Perl, Henning ; Mohammed, Yassene ; Brenner, Michael ; Smith, Matthew: Privacy/Performance Trade-off in Private Search on Bio-Medical Data. In: Sloot, P. (ed.) Future Generation Computer Systems vol. 36 (2014), pp. 441–452
    BibTeXEndNoteBibSonomy
  • Harbach, Marian ; Fahl, Sascha ; Smith, Matthew: Who’s Afraid of Which Bad Wolf? A Survey of IT Security Risk Awareness.. In: CSF, 2014
    BibTeXEndNoteBibSonomy
  • Harbach, Marian ; von Zezschwitz, Emanuel ; Fichtner, Andreas ; Luca, Alexander De ; Smith, Matthew: It’s a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception.. In: Symposium On Usable Privacy and Security (SOUPS 2014). Menlo Park, CA : USENIX Association, 2014 — ISBN 978-1-931971-13-3, pp. 213–230
    URLBibTeXEndNoteBibSonomy
  • Fahl, Sascha ; Acar, Yasemin ; Perl, Henning ; Smith, Matthew: Why eve and mallory (also) love webmasters: a study on the root causes of SSL misconfigurations.. In: ASIA CCS ’14 Proceedings of the 9th ACM symposium on Information, computer and communications security : ACM, 2014
    AbstractBibTeXEndNoteBibSonomy
  • De Luca, Alexander ; Harbach, Marian ; von Zezschwitz, Emanuel ; Maurer, Max-Emanuel ; Slawik, Bernhard Ewald ; Hussmann, Heinrich ; Smith, Matthew: Now You See Me, Now You Don’t: Protecting Smartphone Authentication from Shoulder Surfers.. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’14. Toronto, Ontario, Canada : ACM, 2014 — ISBN 978-1-4503-2473-1, pp. 2937–2946
    URLBibTeXEndNoteDOIBibSonomy
  • Harbach, Marian ; Hettig, Markus ; Weber, Susanne ; Smith, Matthew: Using personal examples to improve risk communication for security & privacy decisions.. In: Jones, M. ; Palanque, P. A. ; Schmidt, A. ; Grossman, T. (eds.): CHI : ACM, 2014 — ISBN 978-1-4503-2473-1, pp. 2647–2656
    URLBibTeXEndNoteBibSonomy

2013

  • Hettig, M. ; Kiss, E. ; f. Kassel, J. ; Weber, S. ; Harbach, M. ; Smith, M.: Visualizing Risk by Example: Demonstrating Threats Arising From Android Apps (2013)
    BibTeXEndNoteBibSonomy
  • Harbach, Marian ; Fahl, Sascha ; Smith, Matthew: Position Statement: Risk Perception and the Acceptance of New Security Technology.. In: Symposium on Usable Privacy and Security (SOUPS), Workshop on Risk Perception in IT Security and Privacy, 2013
    BibTeXEndNoteBibSonomy
  • Fahl, Sascha ; Harbach, Marian ; Acar, Yasemin ; Smith, Matthew: On the Ecological Validity of a Password Study.. In: Proceedings of the Ninth Symposium on Usable Privacy and Security, SOUPS ’13. Newcastle, United Kingdom : ACM, 2013 — ISBN 978-1-4503-2319-2, pp. 13:1–13:13
    AbstractURLBibTeXEndNoteDOIBibSonomy
  • Harbach, Marian ; Fahl, Sascha ; Yakovleva, Polina ; Smith, Matthew: Sorry, I Don’t Get It: An Analysis of Warning Message Texts.. In: Adams, A. A. ; Brenner, M. ; Smith, M. (eds.): Financial Cryptography Workshops, Lecture Notes in Computer Science. vol. 7862 : Springer, 2013 — ISBN 978-3-642-41319-3, pp. 94–111
    URLBibTeXEndNoteBibSonomy
  • Fahl, Sascha ; Harbach, Marian ; Oltrogge, Marten ; Muders, Thomas ; Smith, Matthew: Hey, You, Get Off of My Clipboard.. In: Sadeghi, A.-R. (ed.): Financial Cryptography and Data Security, Lecture Notes in Computer Science. vol. 7859 : Springer Berlin Heidelberg, 2013 — ISBN 978-3-642-39883-4, pp. 144–161
    AbstractURLBibTeXEndNoteDOIBibSonomy
  • Fahl, Sascha ; Harbach, Marian ; Perl, Henning ; Koetter, Markus ; Smith, Matthew: Rethinking SSL development in an appified world.. In: Sadeghi, A.-R. ; Gligor, V. D. ; Yung, M. (eds.): Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, CCS ’13. New York, NY, USA : ACM, 2013 — ISBN 978-1-4503-2477-9, pp. 49–60
    AbstractURLBibTeXEndNoteBibSonomy
  • Henne, Benjamin ; Kater, Christian ; Smith, Matthew ; Brenner, Michael: Selective Cloaking: Need-to-know for Location-based Apps.. In: Privacy, Security and Trust PST, 2013 Eleventh Annual International Conference on : IEEE, 2013. — Implementation: http://bhenne.github.io/android-location-privacy/
    URLBibTeXEndNoteDOIBibSonomy
  • Harbach, Marian ; Fahl, Sascha ; Rieger, Matthias ; Smith, Matthew: On the Acceptance of Privacy-Preserving Authentication Technology: The Curious Case of National Identity Cards.. In: Cristofaro, E. ; Wright, M. (eds.): International Symposium on Privacy Enhancing Technologies Symposium, Lecture Notes in Computer Science : Springer Berlin Heidelberg, 2013 — ISBN 978-3-642-39076-0, pp. 245–264
    AbstractURLBibTeXEndNoteDOIBibSonomy
  • Henne, Benjamin ; Harbach, Marian ; Smith, Matthew: Location privacy revisited: factors of privacy decisions.. In: Mackay, W. E. ; Brewster, S. A. ; Bødker, S. (eds.): CHI ’13 Extended Abstracts on Human Factors in Computing Systems, CHI EA ’13. New York, NY, USA : ACM, 2013 — ISBN 978-1-4503-1952-2, pp. 805–810
    URLBibTeXEndNoteBibSonomy
  • Henne, Benjamin ; Smith, Matthew: Awareness about photos on the Web and how privacy-privacy-tradeoffs could help.. In: Proceedings of the 2013 International Conference on Financial Cryptography and Data Security (FC13), Workshop on Usable Security, LNCS : Springer, 2013, pp. 131–148
    URLBibTeXEndNoteDOIBibSonomy
  • Henne, Benjamin ; Szongott, Christian ; Smith, Matthew: SnapMe if You Can: Privacy Threats of Other Peoples’ Geo-tagged Media and What We Can Do About It.. In: Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks, WiSec ’13. New York, NY, USA : ACM, 2013, pp. 95–106
    URLBibTeXEndNoteDOIBibSonomy

2012

  • Fahl, Sascha ; Harbach, Marian ; Muders, Thomas ; Smith, Matthew ; Sander, Uwe: Helping Johnny 2.0 to Encrypt His Facebook Conversations.. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS ’12. Washington, D.C. : Association for Computing Machinery, 2012 — ISBN 9781450315326, p. 11
    AbstractURLBibTeXEndNoteDOIBibSonomy
  • Brenner, Michael ; Perl, Henning ; Smith, Matthew: Practical Applications of Homomorphic Encryption.. In: SECRYPT, 2012, pp. 5–14
    BibTeXEndNoteBibSonomy
  • Sofean, Mustafa ; Smith, Matthew: A real-time disease surveillance architecture using social networks. In: Studies in health technology and informatics vol. 180 (2012), pp. 823–7
    BibTeXEndNoteDOIBibSonomy
  • Brenner, M. ; Perl, H. ; Smith, M.: How Practical is Homomorphically Encrypted Program Execution? An Implementation and Performance Evaluation.. In: Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on, 2012, pp. 375–382
    BibTeXEndNoteDOIBibSonomy
  • Sofean, Mustafa ; Smith, Matthew: A real-time architecture for detection of diseases using social networks: design, implementation and evaluation.. In: Munson, E. V. ; Strohmaier, M. (eds.): Proceedings of the 23rd ACM conference on Hypertext and social media : ACM, 2012 — ISBN 978-1-4503-1335-3, pp. 309–310
    URLBibTeXEndNoteBibSonomy
  • Harbach, Marian ; Fahl, Sascha ; Muders, Thomas ; Smith, Matthew: Towards measuring warning readability.. In: Proceedings of the 2012 ACM conference on Computer and communications security, CCS ’12. Raleigh, North Carolina, USA : ACM, 2012 — ISBN 978-1-4503-1651-4, pp. 989–991
    AbstractURLBibTeXEndNoteDOIBibSonomy
  • Fahl, Sascha ; Harbach, Marian ; Muders, Thomas ; Baumgärtner, Lars ; Freisleben, Bernd ; Smith, Matthew: Why eve and mallory love android: an analysis of android SSL (in)security.. In: Proceedings of the 2012 ACM conference on Computer and communications security, CCS ’12. Raleigh, North Carolina, USA : ACM, 2012 — ISBN 978-1-4503-1651-4, pp. 50–61
    BibTeXEndNoteDOIBibSonomy
  • Perl, Henning ; Mohammed, Yassene ; Brenner, Michael ; Smith, Matthew: Fast confidential search for bio-medical data using Bloom filters and Homomorphic Cryptography.. In: eScience : IEEE Computer Society, 2012 — ISBN 978-1-4673-4467-8, pp. 1–8
    URLBibTeXEndNoteBibSonomy
  • Harbach, Marian ; Fahl, Sascha ; Brenner, Michael ; Muders, Thomas ; Smith, Matthew: Towards privacy-preserving access control with hidden policies, hidden credentials and hidden decisions.. In: Cuppens-Boulahia, N. ; Fong, P. ; García-Alfaro, J. ; Marsh, S. ; Steghöfer, J.-P. (eds.): Privacy, Security and Trust (PST), 2012 Tenth Annual International Conference on : IEEE Computer Society, 2012 — ISBN 978-1-4673-2323-9, pp. 17–24
    URLBibTeXEndNoteBibSonomy
  • Smith, Matthew ; Henne, Benjamin ; Szongott, Christian ; von Voigt, Gabriele: Big data privacy issues in public social media.. In: Digital Ecosystems Technologies (DEST), 2012 6th IEEE International Conference on, 2012, pp. 1–6
    BibTeXEndNoteDOIBibSonomy
  • Fahl, S ; Harbach, M ; Smith, M: Towards human-centric visual access control for clinical data management. In: Stud Health Technol Inform vol. 180 (2012), pp. 756–760
    AbstractURLBibTeXEndNoteBibSonomy

2011

  • Brenner, Michael ; Wiebelitz, Jan ; Voigt, Gabriele ; Smith, Matthew: Secret Program Execution in the Cloud applying Homomorphic Encryption.. In: Proc. of 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011), pp. 114-119, 2011
    BibTeXEndNoteBibSonomy
  • Stewart, Avaré ; Smith, Matthew ; Nejdl, Wolfgang: A transfer approach to detecting disease reporting events in blog social media (Nelson Award Nominee).. In: Proc. of 22nd ACM Conference on Hypertext and Hypermedia, Eindhoven, The Netherlands, 2011
    BibTeXEndNoteBibSonomy