Matthew Smith spends much of his time researching Computer security, Internet privacy, Usability, Android and RNA-dependent RNA polymerase. The Password research Matthew Smith does as part of his general Computer security study is frequently linked to other disciplines of science, such as Priming, therefore creating a link between diverse domains of science. In his work, Upload and Mobile phone is strongly intertwined with Social web, which is a subfield of Internet privacy.
The concepts of his Usability study are interwoven with issues in Cryptography, Encryption and Authentication. His work carried out in the field of Android brings together such families of science as Certificate, The Internet and Security privacy. His work on RNA polymerase I and Transcription factor II D as part of general RNA-dependent RNA polymerase research is frequently linked to Virology, Molecular biology and Viral entry, thereby connecting diverse disciplines of science.
His main research concerns Computer security, Internet privacy, Grid computing, Distributed computing and Usability. He has included themes like Android and Computer network in his Computer security study. His studies in Android integrate themes in fields like Certificate and Software.
His research integrates issues of Service provider, Private information retrieval and Social network in his study of Internet privacy. His work in the fields of Grid computing, such as DRMAA, intersects with other areas such as Web service, Virtualization and Utility computing. His Usability research integrates issues from Information security, Data security, World Wide Web and Authentication.
His scientific interests lie mostly in USable, Internet privacy, Computer security, Password and Metadata. His Internet privacy research is multidisciplinary, relying on both Replication, Threat model, Cryptography, End user and Encryption. His research in Encryption intersects with topics in Set and Usability.
His multidisciplinary approach integrates Computer security and Ground proximity warning system in his work. His Password research includes elements of Field and Task. Matthew Smith works mostly in the field of Metadata, limiting it down to concerns involving Open data and, occasionally, Database and Data mining.
Matthew Smith focuses on Encryption, Internet privacy, Password, Computer security and Threat model. His biological study spans a wide range of topics, including Cryptography, User interface, Delegation and Authentication. His Internet privacy study incorporates themes from Protocol, Task, End user and Code.
His Password research incorporates themes from Field and Human–computer interaction. Matthew Smith combines subjects such as Wireless sensor network and Cockpit with his study of Computer security. His Threat model study combines topics in areas such as User perception, Perception, End-to-end encryption and Secure messaging.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Why eve and mallory love android: an analysis of android SSL (in)security
Sascha Fahl;Marian Harbach;Thomas Muders;Lars Baumgärtner.
computer and communications security (2012)
It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception
Marian Harbach;Emanuel von Zezschwitz;Andreas Fichtner;Alexander De Luca.
symposium on usable privacy and security (2014)
Big data privacy issues in public social media
Matthew Smith;Christian Szongott;Benjamin Henne;Gabriele von Voigt.
ieee international conference on digital ecosystems and technologies (2012)
SoK: Secure Messaging
Nik Unger;Sergej Dechand;Joseph Bonneau;Sascha Fahl.
ieee symposium on security and privacy (2015)
Rethinking SSL development in an appified world
Sascha Fahl;Marian Harbach;Henning Perl;Markus Koetter.
computer and communications security (2013)
Using personal examples to improve risk communication for security & privacy decisions
Marian Harbach;Markus Hettig;Susanne Weber;Matthew Smith.
human factors in computing systems (2014)
VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits
Henning Perl;Sergej Dechand;Matthew Smith;Daniel Arp.
computer and communications security (2015)
Developers are Not the Enemy!: The Need for Usable Security APIs
Matthew Green;Matthew Smith.
ieee symposium on security and privacy (2016)
Now you see me, now you don't: protecting smartphone authentication from shoulder surfers
Alexander De Luca;Marian Harbach;Emanuel von Zezschwitz;Max-Emanuel Maurer.
human factors in computing systems (2014)
Xen and the Art of Cluster Scheduling
Niels Fallenbeck;Hans-Joachim Picht;Matthew Smith;Bernd Freisleben.
First International Workshop on Virtualization Technology in Distributed Computing (VTDC 2006) (2006)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Philipp University of Marburg
University of Michigan–Ann Arbor
Johns Hopkins University
University College London
New York University
Ludwig-Maximilians-Universität München
Ludwig-Maximilians-Universität München
King's College London
University of Alberta
University of Hannover
Nanyang Technological University
Heriot-Watt University
Egypt-Japan University of Science and Technology
Universidade de São Paulo
Sungkyunkwan University
Harvard University
University of Tennessee at Knoxville
California Institute of Technology
University of Groningen
The Ohio State University
Rockefeller University
Pacific Northwest National Laboratory
Karolinska Institute
Yale University
Baylor University
University of Pennsylvania