Matthew Green
Matthew Green
Verified email at cs.jhu.edu
Title
Cited by
Cited by
Year
Improved proxy re-encryption schemes with applications to secure distributed storage
G Ateniese, K Fu, M Green, S Hohenberger
ACM Transactions on Information and System Security (TISSEC) 9 (1), 1-30, 2006
16032006
Zerocash: Decentralized anonymous payments from bitcoin
EB Sasson, A Chiesa, C Garman, M Green, I Miers, E Tromer, M Virza
2014 IEEE Symposium on Security and Privacy, 459-474, 2014
10152014
Identity-based proxy re-encryption
M Green, G Ateniese
International Conference on Applied Cryptography and Network Security, 288-306, 2007
7692007
Zerocoin: Anonymous distributed e-cash from bitcoin
I Miers, C Garman, M Green, AD Rubin
2013 IEEE Symposium on Security and Privacy, 397-411, 2013
7302013
Outsourcing the decryption of abe ciphertexts.
M Green, S Hohenberger, B Waters
USENIX security symposium 2011 (3), 2011
6572011
Imperfect forward secrecy: How Diffie-Hellman fails in practice
D Adrian, K Bhargavan, Z Durumeric, P Gaudry, M Green, JA Halderman, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
4342015
Security Analysis of a Cryptographically-Enabled RFID Device.
S Bono, M Green, A Stubblefield, A Juels, AD Rubin, M Szydlo
USENIX Security Symposium 31, 1-16, 2005
3662005
Charm: a framework for rapidly prototyping cryptosystems
JA Akinyele, C Garman, I Miers, MW Pagano, M Rushanan, M Green, ...
Journal of Cryptographic Engineering 3 (2), 111-128, 2013
3292013
Practical short signature batch verification
AL Ferrara, M Green, S Hohenberger, MØ Pedersen
Cryptographers’ Track at the RSA Conference, 309-324, 2009
2392009
Method for content-aware redirection and content renaming
CD Cranor, R Gopalakrishnan, MD Green, CR Kalmanek Jr, DH Shur, ...
US Patent 6,954,456, 2005
2272005
Securing electronic medical records using attribute-based encryption on mobile devices
JA Akinyele, MW Pagano, MD Green, CU Lehmann, ZNJ Peterson, ...
Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011
2072011
Blind identity-based encryption and simulatable oblivious transfer
M Green, S Hohenberger
International Conference on the Theory and Application of Cryptology and …, 2007
1552007
A General and Flexible Access-Control System for the Web.
L Bauer, MA Schneider, EW Felten
USENIX Security Symposium, 93-108, 2002
146*2002
Keys under doormats: mandating insecurity by requiring government access to all data and communications
H Abelson, R Anderson, SM Bellovin, J Benaloh, M Blaze, W Diffie, ...
Journal of Cybersecurity 1 (1), 69-79, 2015
1402015
Bolt: Anonymous payment channels for decentralized currencies
M Green, I Miers
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1362017
Enhanced streaming services in a content distribution network
CD Cranor, M Green, C Kalmanek, D Shur, S Sibal, JE Van der Merwe, ...
IEEE Internet Computing 5 (4), 66-75, 2001
1272001
Universally composable adaptive oblivious transfer
M Green, S Hohenberger
International Conference on the Theory and Application of Cryptology and …, 2008
1212008
On the practical exploitability of dual {EC} in {TLS} implementations
S Checkoway, R Niederhagen, A Everspaugh, M Green, T Lange, ...
23rd {USENIX} Security Symposium ({USENIX} Security 14), 319-335, 2014
1182014
Secure sampling of public parameters for succinct zero knowledge proofs
E Ben-Sasson, A Chiesa, M Green, E Tromer, M Virza
2015 IEEE Symposium on Security and Privacy, 287-304, 2015
1072015
Developers are not the enemy!: The need for usable security apis
M Green, M Smith
IEEE Security & Privacy 14 (5), 40-46, 2016
952016
The system can't perform the operation now. Try again later.
Articles 1–20