Search For:

Displaying 1-11 out of 11 total
The Threat in the Cloud
Found in: IEEE Security & Privacy
By Matthew Green
Issue Date:January 2013
pp. 86-89
If we're going to stick all the cryptographic services in cloud-based virtual machines, how secure can we expect them to be? The answer is—unfortunately—not very.
 
Enhanced Streaming Services in a Content Distribution Network
Found in: IEEE Internet Computing
By Charles D. Cranor, Matthew Green, Chuck Kalmanek, David Shur, Sandeep Sibal, Jacobus E. Van der Merwe, Cormac J. Sreenan
Issue Date:July 2001
pp. 66-75
<p>Prism's content naming, management, discovery, and redirection mechanisms support high-quality streaming media services in an IP-based content distribution network.</p>
 
MoodRhythm: tracking and supporting daily rhythms
Found in: Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication (UbiComp '13 Adjunct)
By Donald Hu, Ellen Frank, Geri Gay, John Weinrich, Mark Matthews, Mashfiqui Rabbi, Matthew Green, Mengxi (Chrissie) Xi, Prashama Patil, Saeed Abdullah, Stephen Voida, Tanzeem Choudhury, Tauhidur Rahman, Won Jun Jang
Issue Date:September 2013
pp. 67-70
Rhythms guide our lives. Our biological clocks tell us when we need to sleep, eat and wake. But our use of technology can interrupt and obstruct these rhythms, making it difficult for our bodies to get what they need to stay healthy and balanced. Our MoodR...
     
Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes
Found in: Proceedings of the 2012 ACM conference on Computer and communications security (CCS '12)
By Joseph A. Akinyele, Matthew Green, Matthew W. Pagano, Susan Hohenberger
Issue Date:October 2012
pp. 474-487
As devices everywhere increasingly communicate with each other, many security applications will require low-bandwidth signatures that can be processed quickly. Pairing-based signatures can be very short, but are often costly to verify. Fortunately, they al...
     
Airborne geo-location for search and rescue applications
Found in: Proceedings of the 3rd International Conference on Computing for Geospatial Research and Applications (COM.Geo '12)
By Hannah Burgess, Matthew Greene, Matthew Luehrmann, Maxwell Love, Scott Mead, Thomas Babbitt
Issue Date:July 2012
pp. 1-6
Radio direction finding is used in many search and rescue applications. The ability to accurately reduce a search area helps focus limited resources properly, which increases the probability of a search and rescue operations success. This paper examines th...
     
Securing medical records on smart phones
Found in: Proceedings of the first ACM workshop on Security and privacy in medical and home-care systems (SPIMACS '09)
By Aviel D. Rubin, Matthew Green, Matthew W. Pagano, Ryan W. Gardner, Sujata Garera
Issue Date:November 2009
pp. 31-40
There is an inherent conflict between the desire to maintain privacy of one's medical records and the need to make those records available during an emergency. To satisfy both objectives, we introduce a flexible architecture for the secure storage of medic...
     
Using SMT solvers to automate design tasks for encryption and signature schemes
Found in: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security (CCS '13)
By Joseph A. Akinyele, Matthew Green, Susan Hohenberger
Issue Date:November 2013
pp. 399-410
Cryptographic design tasks are primarily performed by hand today. Shifting more of this burden to computers could make the design process faster, more accurate and less expensive. In this work, we investigate tools for programmatically altering existing cr...
     
Access controls for oblivious and anonymous systems
Found in: ACM Transactions on Information and System Security (TISSEC)
By Matthew Green, Scott E. Coull, Susan Hohenberger
Issue Date:May 2011
pp. 1-28
The use of privacy-enhancing cryptographic protocols, such as anonymous credentials and oblivious transfer, could have a detrimental effect on the ability of providers to effectively implement access controls on their content. In this article, we propose a...
     
Synchronized aggregate signatures: new definitions, constructions and applications
Found in: Proceedings of the 17th ACM conference on Computer and communications security (CCS '10)
By Jae Hyun Ahn, Matthew Green, Susan Hohenberger
Issue Date:October 2010
pp. 473-484
An aggregate signature scheme is a digital signature scheme where anyone given n signatures on n messages from n users can aggregate all these signatures into a single short signature. Unfortunately, no "fully non-interactive" aggregate signature schemes a...
     
Security through legality
Found in: Communications of the ACM
By Adam Stubblefield, Aviel Rubin, Matthew Green, Stephen Bono
Issue Date:June 2006
pp. 41-43
The law alone won't prevent an unauthorized visit or even a deliberate attack. Security depends on being able to think like an attacker.
     
Improved proxy re-encryption schemes with applications to secure distributed storage
Found in: ACM Transactions on Information and System Security (TISSEC)
By Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger
Issue Date:February 2006
pp. 1-30
In 1998, Blaze, Bleumer, and Strauss (BBS) proposed an application called atomic proxy re-encryption, in which a semitrusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. We predict that fast and s...
     
 1