Search
for Author
All Reviews
Green, Matthew
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
Date Reviewed
1
-
5
of
7
reviews
Imperfect forward secrecy: how Diffie-Hellman fails in practice
Adrian D., Bhargavan K., Durumeric Z., Gaudry P., Green M., Halderman J., Heninger N., Springall D., Thomé E., Valenta L., VanderSloot B., Wustrow E., Zanella-Béguelin S., Zimmermann P. Communications of the ACM 62(1): 106-114, 2019. Type: Article
Prevalent Internet protocols require reliable cryptographic algorithms for approving mutual keys to use for bargaining safe connections. Internet protocols such as secure shell (SSH) and hypertext transfer protocol secure (HTTPS) frequ...
...
Mar 27 2019
Where did I leave my keys?: Lessons from the Juniper dual EC incident
Checkoway S., Maskiewicz J., Garman C., Fried J., Cohney S., Green M., Heninger N., Weinmann R., Rescorla E., Shacham H. Communications of the ACM 61(11): 148-155, 2018. Type: Article
Safe networks require reliable operating systems free from security vulnerabilities. Trustworthy routers ought to use dependable cryptographic algorithms to protect data transmitted over insecure networks. But how should effective guid...
...
Dec 27 2018
Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes
Akinyele J., Green M., Hohenberger S., Pagano M. Journal of Computer Security 22(6): 867-912, 2014. Type: Article
With the Internet of Things (IoT) quickly becoming a reality, the importance of secure communications between devices cannot be overstated. Since there are many small devices involved in such networks, the algorithms needed for authent...
...
Aug 20 2015
Zerocash: decentralized anonymous payments from Bitcoin
Ben Sasson E., Chiesa A., Garman C., Green M., Miers I., Tromer E., Virza M. SP 2014 (Proceedings of the 2014 IEEE Symposium on Security and Privacy,May 18-21, 2014) 459-474, 2014. Type: Proceedings
Bitcoin and its underlying blockchain technology have solved the Byzantine generals problem [1]. However, blockchain associated with the Bitcoin currency is a public ledger, and it does not provide the basic privacy offered by financia...
...
Jun 22 2015
Securing medical records on smart phones
Gardner R., Garera S., Pagano M., Green M., Rubin A. SPIMACS 2009 (Proceedings of the 1st ACM Workshop on Security and Privacy in Medical and Home-Care Systems, Chicago, Illinois, Nov 13, 2009) 31-40, 2009. Type: Proceedings
One major concern of emergency medical technicians (EMTs) is having ready access to a patient’s medical records, especially when the patient is unconscious. Lacking such access, significant delays in providing appropriate car...
...
Jan 28 2010
Display
5
10
15
25
50
100
per column
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy