D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 32 Citations 4,938 152 World Ranking 9238 National Ranking 441

Overview

What is he best known for?

The fields of study he is best known for:

  • The Internet
  • Operating system
  • Computer network

Matthew Smith spends much of his time researching Computer security, Internet privacy, Usability, Android and RNA-dependent RNA polymerase. The Password research Matthew Smith does as part of his general Computer security study is frequently linked to other disciplines of science, such as Priming, therefore creating a link between diverse domains of science. In his work, Upload and Mobile phone is strongly intertwined with Social web, which is a subfield of Internet privacy.

The concepts of his Usability study are interwoven with issues in Cryptography, Encryption and Authentication. His work carried out in the field of Android brings together such families of science as Certificate, The Internet and Security privacy. His work on RNA polymerase I and Transcription factor II D as part of general RNA-dependent RNA polymerase research is frequently linked to Virology, Molecular biology and Viral entry, thereby connecting diverse disciplines of science.

His most cited work include:

  • Why eve and mallory love android: an analysis of android SSL (in)security (393 citations)
  • Association of the Influenza A Virus RNA-Dependent RNA Polymerase with Cellular RNA Polymerase II (172 citations)
  • NS2/NEP protein regulates transcription and replication of the influenza virus RNA genome. (168 citations)

What are the main themes of his work throughout his whole career to date?

His main research concerns Computer security, Internet privacy, Grid computing, Distributed computing and Usability. He has included themes like Android and Computer network in his Computer security study. His studies in Android integrate themes in fields like Certificate and Software.

His research integrates issues of Service provider, Private information retrieval and Social network in his study of Internet privacy. His work in the fields of Grid computing, such as DRMAA, intersects with other areas such as Web service, Virtualization and Utility computing. His Usability research integrates issues from Information security, Data security, World Wide Web and Authentication.

He most often published in these fields:

  • Computer security (36.31%)
  • Internet privacy (20.11%)
  • Grid computing (15.08%)

What were the highlights of his more recent work (between 2017-2021)?

  • USable (7.82%)
  • Internet privacy (20.11%)
  • Computer security (36.31%)

In recent papers he was focusing on the following fields of study:

His scientific interests lie mostly in USable, Internet privacy, Computer security, Password and Metadata. His Internet privacy research is multidisciplinary, relying on both Replication, Threat model, Cryptography, End user and Encryption. His research in Encryption intersects with topics in Set and Usability.

His multidisciplinary approach integrates Computer security and Ground proximity warning system in his work. His Password research includes elements of Field and Task. Matthew Smith works mostly in the field of Metadata, limiting it down to concerns involving Open data and, occasionally, Database and Data mining.

Between 2017 and 2021, his most popular works were:

  • "If HTTPS Were Secure, I Wouldn't Need 2FA" - End User and Administrator Mental Models of HTTPS (17 citations)
  • "If you want, I can store the encrypted password": A Password-Storage Field Study with Freelance Developers (15 citations)
  • Deception Task Design in Developer Password Studies: Exploring a Student Sample (13 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • The Internet
  • Computer network

Matthew Smith focuses on Encryption, Internet privacy, Password, Computer security and Threat model. His biological study spans a wide range of topics, including Cryptography, User interface, Delegation and Authentication. His Internet privacy study incorporates themes from Protocol, Task, End user and Code.

His Password research incorporates themes from Field and Human–computer interaction. Matthew Smith combines subjects such as Wireless sensor network and Cockpit with his study of Computer security. His Threat model study combines topics in areas such as User perception, Perception, End-to-end encryption and Secure messaging.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Why eve and mallory love android: an analysis of android SSL (in)security

Sascha Fahl;Marian Harbach;Thomas Muders;Lars Baumgärtner.
computer and communications security (2012)

646 Citations

It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception

Marian Harbach;Emanuel von Zezschwitz;Andreas Fichtner;Alexander De Luca.
symposium on usable privacy and security (2014)

318 Citations

Big data privacy issues in public social media

Matthew Smith;Christian Szongott;Benjamin Henne;Gabriele von Voigt.
ieee international conference on digital ecosystems and technologies (2012)

244 Citations

SoK: Secure Messaging

Nik Unger;Sergej Dechand;Joseph Bonneau;Sascha Fahl.
ieee symposium on security and privacy (2015)

219 Citations

Rethinking SSL development in an appified world

Sascha Fahl;Marian Harbach;Henning Perl;Markus Koetter.
computer and communications security (2013)

206 Citations

Using personal examples to improve risk communication for security & privacy decisions

Marian Harbach;Markus Hettig;Susanne Weber;Matthew Smith.
human factors in computing systems (2014)

190 Citations

VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits

Henning Perl;Sergej Dechand;Matthew Smith;Daniel Arp.
computer and communications security (2015)

171 Citations

Developers are Not the Enemy!: The Need for Usable Security APIs

Matthew Green;Matthew Smith.
ieee symposium on security and privacy (2016)

167 Citations

Now you see me, now you don't: protecting smartphone authentication from shoulder surfers

Alexander De Luca;Marian Harbach;Emanuel von Zezschwitz;Max-Emanuel Maurer.
human factors in computing systems (2014)

145 Citations

Xen and the Art of Cluster Scheduling

Niels Fallenbeck;Hans-Joachim Picht;Matthew Smith;Bernd Freisleben.
First International Workshop on Virtualization Technology in Distributed Computing (VTDC 2006) (2006)

138 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Matthew Smith

Bernd Freisleben

Bernd Freisleben

Philipp University of Marburg

Publications: 42

Michelle L. Mazurek

Michelle L. Mazurek

University of Maryland, College Park

Publications: 41

Lorrie Faith Cranor

Lorrie Faith Cranor

Carnegie Mellon University

Publications: 26

Blase Ur

Blase Ur

University of Chicago

Publications: 25

Florian Alt

Florian Alt

Bundeswehr University Munich

Publications: 17

Michael Backes

Michael Backes

University of Oxford

Publications: 16

Nicolas Christin

Nicolas Christin

Carnegie Mellon University

Publications: 15

Alexander De Luca

Alexander De Luca

Ludwig-Maximilians-Universität München

Publications: 15

Lujo Bauer

Lujo Bauer

Carnegie Mellon University

Publications: 15

Florian Schaub

Florian Schaub

University of Michigan–Ann Arbor

Publications: 14

Serge Egelman

Serge Egelman

International Computer Science Institute

Publications: 14

Konstantin Beznosov

Konstantin Beznosov

University of British Columbia

Publications: 12

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 12

Edgar R. Weippl

Edgar R. Weippl

University of Vienna

Publications: 12

Yang Xiang

Yang Xiang

Swinburne University of Technology

Publications: 10

Eric Bodden

Eric Bodden

University of Paderborn

Publications: 10

Trending Scientists

Hoay Beng Gooi

Hoay Beng Gooi

Nanyang Technological University

Jia-Sheng Hong

Jia-Sheng Hong

Heriot-Watt University

Mohamed E. El-Khouly

Mohamed E. El-Khouly

Egypt-Japan University of Science and Technology

Antonio Claudio Tedesco

Antonio Claudio Tedesco

Universidade de São Paulo

Yu Seok Youn

Yu Seok Youn

Sungkyunkwan University

Joost J. Vlassak

Joost J. Vlassak

Harvard University

Kurt E. Sickafus

Kurt E. Sickafus

University of Tennessee at Knoxville

David C. Chan

David C. Chan

California Institute of Technology

Renée M. Bekker

Renée M. Bekker

University of Groningen

Paul A. Fuerst

Paul A. Fuerst

The Ohio State University

Igor Tamm

Igor Tamm

Rockefeller University

Mohamad Hejazi

Mohamad Hejazi

Pacific Northwest National Laboratory

Andrea Varrone

Andrea Varrone

Karolinska Institute

Chiang-shan R. Li

Chiang-shan R. Li

Yale University

A. Karolina Palucka

A. Karolina Palucka

Baylor University

A. Thomas McLellan

A. Thomas McLellan

University of Pennsylvania

Something went wrong. Please try again later.