H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 31 Citations 4,735 114 World Ranking 7928 National Ranking 404

Overview

What is he best known for?

The fields of study he is best known for:

  • The Internet
  • Operating system
  • Computer network

Matthew Smith spends much of his time researching Computer security, Internet privacy, Usability, Android and RNA-dependent RNA polymerase. The Password research Matthew Smith does as part of his general Computer security study is frequently linked to other disciplines of science, such as Priming, therefore creating a link between diverse domains of science. In his work, Upload and Mobile phone is strongly intertwined with Social web, which is a subfield of Internet privacy.

The concepts of his Usability study are interwoven with issues in Cryptography, Encryption and Authentication. His work carried out in the field of Android brings together such families of science as Certificate, The Internet and Security privacy. His work on RNA polymerase I and Transcription factor II D as part of general RNA-dependent RNA polymerase research is frequently linked to Virology, Molecular biology and Viral entry, thereby connecting diverse disciplines of science.

His most cited work include:

  • Why eve and mallory love android: an analysis of android SSL (in)security (393 citations)
  • Association of the Influenza A Virus RNA-Dependent RNA Polymerase with Cellular RNA Polymerase II (172 citations)
  • NS2/NEP protein regulates transcription and replication of the influenza virus RNA genome. (168 citations)

What are the main themes of his work throughout his whole career to date?

His main research concerns Computer security, Internet privacy, Grid computing, Distributed computing and Usability. He has included themes like Android and Computer network in his Computer security study. His studies in Android integrate themes in fields like Certificate and Software.

His research integrates issues of Service provider, Private information retrieval and Social network in his study of Internet privacy. His work in the fields of Grid computing, such as DRMAA, intersects with other areas such as Web service, Virtualization and Utility computing. His Usability research integrates issues from Information security, Data security, World Wide Web and Authentication.

He most often published in these fields:

  • Computer security (36.31%)
  • Internet privacy (20.11%)
  • Grid computing (15.08%)

What were the highlights of his more recent work (between 2017-2021)?

  • USable (7.82%)
  • Internet privacy (20.11%)
  • Computer security (36.31%)

In recent papers he was focusing on the following fields of study:

His scientific interests lie mostly in USable, Internet privacy, Computer security, Password and Metadata. His Internet privacy research is multidisciplinary, relying on both Replication, Threat model, Cryptography, End user and Encryption. His research in Encryption intersects with topics in Set and Usability.

His multidisciplinary approach integrates Computer security and Ground proximity warning system in his work. His Password research includes elements of Field and Task. Matthew Smith works mostly in the field of Metadata, limiting it down to concerns involving Open data and, occasionally, Database and Data mining.

Between 2017 and 2021, his most popular works were:

  • "If HTTPS Were Secure, I Wouldn't Need 2FA" - End User and Administrator Mental Models of HTTPS (17 citations)
  • "If you want, I can store the encrypted password": A Password-Storage Field Study with Freelance Developers (15 citations)
  • Deception Task Design in Developer Password Studies: Exploring a Student Sample (13 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • The Internet
  • Computer network

Matthew Smith focuses on Encryption, Internet privacy, Password, Computer security and Threat model. His biological study spans a wide range of topics, including Cryptography, User interface, Delegation and Authentication. His Internet privacy study incorporates themes from Protocol, Task, End user and Code.

His Password research incorporates themes from Field and Human–computer interaction. Matthew Smith combines subjects such as Wireless sensor network and Cockpit with his study of Computer security. His Threat model study combines topics in areas such as User perception, Perception, End-to-end encryption and Secure messaging.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

Why eve and mallory love android: an analysis of android SSL (in)security

Sascha Fahl;Marian Harbach;Thomas Muders;Lars Baumgärtner.
computer and communications security (2012)

603 Citations

It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception

Marian Harbach;Emanuel von Zezschwitz;Andreas Fichtner;Alexander De Luca.
symposium on usable privacy and security (2014)

318 Citations

Big data privacy issues in public social media

Matthew Smith;Christian Szongott;Benjamin Henne;Gabriele von Voigt.
ieee international conference on digital ecosystems and technologies (2012)

236 Citations

Rethinking SSL development in an appified world

Sascha Fahl;Marian Harbach;Henning Perl;Markus Koetter.
computer and communications security (2013)

202 Citations

SoK: Secure Messaging

Nik Unger;Sergej Dechand;Joseph Bonneau;Sascha Fahl.
ieee symposium on security and privacy (2015)

184 Citations

Using personal examples to improve risk communication for security & privacy decisions

Marian Harbach;Markus Hettig;Susanne Weber;Matthew Smith.
human factors in computing systems (2014)

180 Citations

Now you see me, now you don't: protecting smartphone authentication from shoulder surfers

Alexander De Luca;Marian Harbach;Emanuel von Zezschwitz;Max-Emanuel Maurer.
human factors in computing systems (2014)

141 Citations

VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits

Henning Perl;Sergej Dechand;Matthew Smith;Daniel Arp.
computer and communications security (2015)

139 Citations

Xen and the Art of Cluster Scheduling

Niels Fallenbeck;Hans-Joachim Picht;Matthew Smith;Bernd Freisleben.
First International Workshop on Virtualization Technology in Distributed Computing (VTDC 2006) (2006)

134 Citations

On the ecological validity of a password study

Sascha Fahl;Marian Harbach;Yasemin Acar;Matthew Smith.
symposium on usable privacy and security (2013)

133 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Matthew Smith

Bernd Freisleben

Bernd Freisleben

Philipp University of Marburg

Publications: 42

Michelle L. Mazurek

Michelle L. Mazurek

University of Maryland, College Park

Publications: 41

Lorrie Faith Cranor

Lorrie Faith Cranor

Carnegie Mellon University

Publications: 26

Florian Alt

Florian Alt

Bundeswehr University Munich

Publications: 17

Alexander De Luca

Alexander De Luca

Ludwig-Maximilians-Universität München

Publications: 15

Nicolas Christin

Nicolas Christin

Carnegie Mellon University

Publications: 15

Lujo Bauer

Lujo Bauer

Carnegie Mellon University

Publications: 15

Serge Egelman

Serge Egelman

International Computer Science Institute

Publications: 14

Florian Schaub

Florian Schaub

University of Michigan–Ann Arbor

Publications: 14

Konstantin Beznosov

Konstantin Beznosov

University of British Columbia

Publications: 12

Edgar R. Weippl

Edgar R. Weippl

University of Vienna

Publications: 12

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 12

Kevin R. B. Butler

Kevin R. B. Butler

University of Florida

Publications: 10

Eric Bodden

Eric Bodden

University of Paderborn

Publications: 10

Yang Xiang

Yang Xiang

Swinburne University of Technology

Publications: 10

Something went wrong. Please try again later.