Dirk Balfanz
Dirk Balfanz
Verified email at - Homepage
Cited by
Cited by
Talking to strangers: Authentication in ad-hoc wireless networks.
D Balfanz, DK Smetters, P Stewart, HC Wong
NDSS, 2002
Building an encrypted and searchable audit log.
BR Waters, D Balfanz, G Durfee, DK Smetters
NDSS 4, 5-6, 2004
Extensible security architectures for Java
DS Wallach, D Balfanz, D Dean, EW Felten
Proceedings of the sixteenth ACM symposium on Operating systems principles …, 1997
Secret handshakes from pairing-based key agreements
D Balfanz, G Durfee, N Shankar, D Smetters, J Staddon, HC Wong
2003 Symposium on Security and Privacy, 2003., 180-196, 2003
Web spoofing: An internet con game
EW Felten, D Balfanz, D Dean, DS Wallach
Software World 28 (2), 6-8, 1997
Self-healing key distribution with revocation
J Staddon, S Miner, M Franklin, D Balfanz, M Malkin, D Dean
Proceedings 2002 IEEE Symposium on Security and Privacy, 241-257, 2002
Efficient tracing of failed nodes in sensor networks
J Staddon, D Balfanz, G Durfee
Proceedings of the 1st ACM international workshop on Wireless sensor …, 2002
In search of usable security: Five lessons from the field
D Balfanz, G Durfee, DK Smetters, RE Grinter
IEEE Security & Privacy 2 (5), 19-24, 2004
Strengthening user authentication through opportunistic cryptographic identity assertions
A Czeskis, M Dietz, T Kohno, D Wallach, D Balfanz
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
Using speakeasy for ad hoc peer-to-peer collaboration
WK Edwards, MW Newman, JZ Sedivy, TF Smith, D Balfanz, DK Smetters, ...
Proceedings of the 2002 ACM conference on Computer supported cooperative …, 2002
Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute.
D Balfanz, G Durfee, RE Grinter, DK Smetters, P Stewart
USENIX Security Symposium 207, 222, 2004
{Origin-Bound} Certificates: A Fresh Approach to Strong Client Authentication for the Web
M Dietz, A Czeskis, D Balfanz, DS Wallach
21st USENIX Security Symposium (USENIX Security 12), 317-331, 2012
{Hand-Held} Computers Can Be Better Smart Cards
D Balfanz, EW Felten
8th USENIX Security Symposium (USENIX Security 99), 1999
Experience with secure multi-processing in Java
D Balfanz, L Gong
Proceedings. 18th International Conference on Distributed Computing Systems …, 1998
Securing a remote terminal application with a mobile trusted device
A Oprea, D Balfanz, G Durfee, DK Smetters
20th Annual Computer Security Applications Conference, 438-447, 2004
Sliding-window self-healing key distribution
SM More, M Malkin, J Staddon, D Balfanz
Proceedings of the 2003 ACM workshop on Survivable and self-regenerative …, 2003
Java security: Web browsers and beyond
D Dean, EW Felten, DS Wallach, D Balfanz, PJ Denning
Internet besieged: countering cyberspace scofflaws, 241-269, 1997
A security infrastructure for distributed Java applications
D Balfanz, D Dean, M Spreitzer
Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 15-26, 2000
Windowbox: A simple security model for the connected desktop
D Balfanz, DR Simon
Proceedings of the 4th USENIX Windows Systems Symposium, 37-48, 2000
Usable access control for the world wide web
D Balfanz
19th Annual Computer Security Applications Conference, 2003. Proceedings …, 2003
The system can't perform the operation now. Try again later.
Articles 1–20