Artykuły udostępnione publicznie: - Matthew GreenWięcej informacji
Niedostępny w żadnym miejscu: 1
Modeling the cybersecurity of hospitals in natural and man-made hazards
X Zhao, I Miers, M Green, J Mitrani-Reiser
Sustainable and Resilient Infrastructure 4 (1), 36-49, 2019
Upoważnienia: US National Science Foundation
Dostępne w jakimś miejscu: 34
Imperfect forward secrecy: How Diffie-Hellman fails in practice
D Adrian, K Bhargavan, Z Durumeric, P Gaudry, M Green, JA Halderman, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Upoważnienia: European Commission
Bolt: Anonymous payment channels for decentralized currencies
M Green, I Miers
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
Upoważnienia: US National Science Foundation, US Department of Defense
On the practical exploitability of dual {EC} in {TLS} implementations
S Checkoway, R Niederhagen, A Everspaugh, M Green, T Lange, ...
23rd USENIX security symposium (USENIX security 14), 319-335, 2014
Upoważnienia: European Commission
Fairness in an unfair world: Fair multiparty computation from public bulletin boards
AR Choudhuri, M Green, A Jain, G Kaptchuk, I Miers
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Upoważnienia: US National Science Foundation, US Department of Defense
Accountable privacy for decentralized anonymous payments
C Garman, M Green, I Miers
International conference on financial cryptography and data security, 81-98, 2016
Upoważnienia: US National Science Foundation
A systematic analysis of the Juniper Dual EC incident
S Checkoway, J Maskiewicz, C Garman, J Fried, S Cohney, M Green, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
Upoważnienia: US National Science Foundation
Verified correctness and security of mbedTLS HMAC-DRBG
KQ Ye, M Green, N Sanguansin, L Beringer, A Petcher, AW Appel
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Upoważnienia: US National Science Foundation, US Department of Defense
A protocol for privately reporting ad impressions at scale
M Green, W Ladd, I Miers
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
Upoważnienia: US National Science Foundation
Fluid MPC: secure multiparty computation with dynamic participants
AR Choudhuri, A Goel, M Green, A Jain, G Kaptchuk
Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021
Upoważnienia: US National Science Foundation, US Department of Defense
Downgrade resilience in key-exchange protocols
K Bhargavan, C Brzuska, C Fournet, M Green, M Kohlweiss, ...
2016 IEEE Symposium on Security and Privacy (SP), 506-525, 2016
Upoważnienia: US National Science Foundation
Dancing on the lip of the volcano: Chosen ciphertext attacks on apple {iMessage}
C Garman, M Green, G Kaptchuk, I Miers, M Rushanan
25th USENIX Security Symposium (USENIX Security 16), 655-672, 2016
Upoważnienia: US National Science Foundation
Meteor: Cryptographically secure steganography for realistic distributions
G Kaptchuk, TM Jois, M Green, AD Rubin
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
Upoważnienia: US National Science Foundation, US Department of Defense
Stacking Sigmas: A Framework to Compose -Protocols for Disjunctions
A Goel, M Green, M Hall-Andersen, G Kaptchuk
Annual International Conference on the Theory and Applications of …, 2022
Upoważnienia: US National Science Foundation, US Department of Defense
Squint hard enough: Evaluating perceptual hashing with machine learning
J Prokos, TM Jois, N Fendley, R Schuster, M Green, E Tromer, Y Cao
Cryptology ePrint Archive, 2021
Upoważnienia: US National Science Foundation, US Department of Defense
Abuse resistant law enforcement access systems
M Green, G Kaptchuk, G Van Laer
Annual International Conference on the Theory and Applications of …, 2021
Upoważnienia: US National Science Foundation, US Department of Defense
{KeyForge}:{Non-Attributable} email from {Forward-Forgeable} signatures
MA Specter, S Park, M Green
30th USENIX Security Symposium (USENIX Security 21), 1755-1773, 2021
Upoważnienia: US National Science Foundation, Hewlett Foundation
Practical state recovery attacks against legacy RNG implementations
SN Cohney, MD Green, N Heninger
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
Upoważnienia: US National Science Foundation, US Department of Defense
Fuzzy message detection
G Beck, J Len, I Miers, M Green
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
Upoważnienia: US National Science Foundation, US Department of Defense
Efficient proofs of software exploitability for real-world processors
M Green, M Hall-Andersen, E Hennenfent, G Kaptchuk, B Perez, ...
Proceedings on Privacy Enhancing Technologies, 2023
Upoważnienia: US National Science Foundation, US Department of Defense
Informacje na temat publikacji i finansowania automatycznie określa program komputerowy