Dirk Balfanz
Dirk Balfanz
Verified email at google.com - Homepage
TitleCited byYear
Talking to Strangers: Authentication in Ad-Hoc Wireless Networks.
D Balfanz, DK Smetters, P Stewart, HC Wong
NDSS, 2002
8372002
Building an Encrypted and Searchable Audit Log.
BR Waters, D Balfanz, G Durfee, DK Smetters
NDSS 4, 5-6, 2004
4432004
Extensible security architectures for Java
DS Wallach, D Balfanz, D Dean, EW Felten
SOSP 97, 116-128, 1997
3811997
Secret handshakes from pairing-based key agreements
D Balfanz, G Durfee, N Shankar, D Smetters, J Staddon, HC Wong
2003 Symposium on Security and Privacy, 2003., 180-196, 2003
3162003
Self-healing key distribution with revocation
J Staddon, S Miner, M Franklin, D Balfanz, M Malkin, D Dean
Proceedings 2002 IEEE Symposium on Security and Privacy, 241-257, 2002
2842002
Web spoofing: An internet con game
EW Felten, D Balfanz, D Dean, DS Wallach
Software World 28 (2), 6-8, 1997
2761997
Efficient tracing of failed nodes in sensor networks
J Staddon, D Balfanz, G Durfee
Proceedings of the 1st ACM international workshop on Wireless sensor …, 2002
2382002
Json web token (jwt)
M Jones, P Tarjan, Y Goland, N Sakimura, J Bradley, J Panzer, D Balfanz
1782012
In search of usable security: Five lessons from the field
D Balfanz, G Durfee, DK Smetters, RE Grinter
IEEE Security & Privacy 2 (5), 19-24, 2004
1612004
Using speakeasy for ad hoc peer-to-peer collaboration
WK Edwards, MW Newman, JZ Sedivy, TF Smith, D Balfanz, DK Smetters, ...
Proceedings of the 2002 ACM conference on Computer supported cooperative …, 2002
1242002
HAND-HELDCOMPUTERSCANBE BETTERSMARTCARDS
D Balfanz, EW Felten
1051999
Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute.
D Balfanz, G Durfee, RE Grinter, DK Smetters, P Stewart
USENIX Security Symposium 207, 222, 2004
1032004
Origin-bound certificates: A fresh approach to strong client authentication for the web
M Dietz, A Czeskis, D Balfanz, DS Wallach
Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security …, 2012
962012
Strengthening user authentication through opportunistic cryptographic identity assertions
A Czeskis, M Dietz, T Kohno, D Wallach, D Balfanz
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
942012
Experience with secure multi-processing in Java
D Balfanz, L Gong
Proceedings. 18th International Conference on Distributed Computing Systems …, 1998
761998
Securing a remote terminal application with a mobile trusted device
A Oprea, D Balfanz, G Durfee, DK Smetters
20th Annual Computer Security Applications Conference, 438-447, 2004
752004
Sliding-window self-healing key distribution
SM More, M Malkin, J Staddon, D Balfanz
Proceedings of the 2003 ACM workshop on Survivable and self-regenerative …, 2003
732003
Java security: Web browsers and beyond
D Dean, EW Felten, DS Wallach, D Balfanz, PJ Denning
Internet besieged: countering cyberspace scofflaws, 241-269, 1997
621997
A security infrastructure for distributed Java applications
D Balfanz, D Dean, M Spreitzer
Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 15-26, 2000
612000
Windowbox: A simple security model for the connected desktop
D Balfanz, DR Simon
Proceedings of the 4th USENIX Windows Systems Symposium 6, 143-155, 2000
572000
The system can't perform the operation now. Try again later.
Articles 1–20