Suivre
Matthew Green
Matthew Green
Adresse e-mail validée de cs.jhu.edu
Titre
Citée par
Citée par
Année
Zerocash: Decentralized anonymous payments from bitcoin
EB Sasson, A Chiesa, C Garman, M Green, I Miers, E Tromer, M Virza
2014 IEEE symposium on security and privacy, 459-474, 2014
24282014
Improved proxy re-encryption schemes with applications to secure distributed storage
G Ateniese, K Fu, M Green, S Hohenberger
ACM Transactions on Information and System Security (TISSEC) 9 (1), 1-30, 2006
20862006
Zerocoin: Anonymous distributed e-cash from bitcoin
I Miers, C Garman, M Green, AD Rubin
2013 IEEE symposium on security and privacy, 397-411, 2013
13542013
Identity-based proxy re-encryption
M Green, G Ateniese
Applied Cryptography and Network Security: 5th International Conference …, 2007
10172007
Outsourcing the decryption of {ABE} ciphertexts
M Green, S Hohenberger, B Waters
20th USENIX Security Symposium (USENIX Security 11), 2011
10152011
Imperfect forward secrecy: How Diffie-Hellman fails in practice
D Adrian, K Bhargavan, Z Durumeric, P Gaudry, M Green, JA Halderman, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
7202015
Charm: a framework for rapidly prototyping cryptosystems
JA Akinyele, C Garman, I Miers, MW Pagano, M Rushanan, M Green, ...
Journal of Cryptographic Engineering 3, 111-128, 2013
6842013
A General and Flexible Access-Control System for the Web.
L Bauer, MA Schneider, EW Felten
USENIX Security Symposium, 93-108, 2002
434*2002
Security Analysis of a Cryptographically-Enabled RFID Device.
S Bono, M Green, A Stubblefield, A Juels, AD Rubin, M Szydlo
USENIX Security Symposium 31, 1-16, 2005
4272005
Bolt: Anonymous payment channels for decentralized currencies
M Green, I Miers
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
3162017
Method for content-aware redirection and content renaming
CD Cranor, R Gopalakrishnan, MD Green, CR Kalmanek Jr, DH Shur, ...
US Patent 6,954,456, 2005
3002005
Practical short signature batch verification
AL Ferrara, M Green, S Hohenberger, MØ Pedersen
Cryptographers’ Track at the RSA Conference, 309-324, 2009
2942009
Securing electronic medical records using attribute-based encryption on mobile devices
JA Akinyele, MW Pagano, MD Green, CU Lehmann, ZNJ Peterson, ...
Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011
287*2011
Keys under doormats
H Abelson, R Anderson, SM Bellovin, J Benaloh, M Blaze, WW Diffie, ...
Communications of the ACM 58 (10), 24-26, 2015
2742015
Developers are not the enemy!: The need for usable security apis
M Green, M Smith
IEEE Security & Privacy 14 (5), 40-46, 2016
2612016
Zexe: Enabling decentralized private computation
S Bowe, A Chiesa, M Green, I Miers, P Mishra, H Wu
2020 IEEE Symposium on Security and Privacy (SP), 947-964, 2020
2272020
Secure sampling of public parameters for succinct zero knowledge proofs
E Ben-Sasson, A Chiesa, M Green, E Tromer, M Virza
2015 IEEE Symposium on Security and Privacy, 287-304, 2015
1982015
Blind identity-based encryption and simulatable oblivious transfer
M Green, S Hohenberger
International Conference on the Theory and Application of Cryptology and …, 2007
1942007
Decentralized anonymous credentials
C Garman, M Green, I Miers
Cryptology ePrint Archive, 2013
1882013
On the practical exploitability of dual {EC} in {TLS} implementations
S Checkoway, R Niederhagen, A Everspaugh, M Green, T Lange, ...
23rd USENIX security symposium (USENIX security 14), 319-335, 2014
1862014
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20