Talking to strangers: Authentication in ad-hoc wireless networks. D Balfanz, DK Smetters, P Stewart, HC Wong NDSS, 2002 | 966 | 2002 |
Building an encrypted and searchable audit log. BR Waters, D Balfanz, G Durfee, DK Smetters NDSS 4, 5-6, 2004 | 553 | 2004 |
Extensible security architectures for Java DS Wallach, D Balfanz, D Dean, EW Felten Proceedings of the sixteenth ACM symposium on Operating systems principles …, 1997 | 409 | 1997 |
Secret handshakes from pairing-based key agreements D Balfanz, G Durfee, N Shankar, D Smetters, J Staddon, HC Wong 2003 Symposium on Security and Privacy, 2003., 180-196, 2003 | 381 | 2003 |
Web spoofing: An internet con game EW Felten, D Balfanz, D Dean, DS Wallach Software World 28 (2), 6-8, 1997 | 323 | 1997 |
Self-healing key distribution with revocation J Staddon, S Miner, M Franklin, D Balfanz, M Malkin, D Dean Proceedings 2002 IEEE Symposium on Security and Privacy, 241-257, 2002 | 306 | 2002 |
Efficient tracing of failed nodes in sensor networks J Staddon, D Balfanz, G Durfee Proceedings of the 1st ACM international workshop on Wireless sensor …, 2002 | 282 | 2002 |
In search of usable security: Five lessons from the field D Balfanz, G Durfee, DK Smetters, RE Grinter IEEE Security & Privacy 2 (5), 19-24, 2004 | 200 | 2004 |
Strengthening user authentication through opportunistic cryptographic identity assertions A Czeskis, M Dietz, T Kohno, D Wallach, D Balfanz Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 156 | 2012 |
Using speakeasy for ad hoc peer-to-peer collaboration WK Edwards, MW Newman, JZ Sedivy, TF Smith, D Balfanz, DK Smetters, ... Proceedings of the 2002 ACM conference on Computer supported cooperative …, 2002 | 139 | 2002 |
Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute. D Balfanz, G Durfee, RE Grinter, DK Smetters, P Stewart USENIX Security Symposium 207, 222, 2004 | 119 | 2004 |
{Origin-Bound} Certificates: A Fresh Approach to Strong Client Authentication for the Web M Dietz, A Czeskis, D Balfanz, DS Wallach 21st USENIX Security Symposium (USENIX Security 12), 317-331, 2012 | 108 | 2012 |
{Hand-Held} Computers Can Be Better Smart Cards D Balfanz, EW Felten 8th USENIX Security Symposium (USENIX Security 99), 1999 | 108 | 1999 |
Experience with secure multi-processing in Java D Balfanz, L Gong Proceedings. 18th International Conference on Distributed Computing Systems …, 1998 | 84 | 1998 |
Securing a remote terminal application with a mobile trusted device A Oprea, D Balfanz, G Durfee, DK Smetters 20th Annual Computer Security Applications Conference, 438-447, 2004 | 78 | 2004 |
Sliding-window self-healing key distribution SM More, M Malkin, J Staddon, D Balfanz Proceedings of the 2003 ACM workshop on Survivable and self-regenerative …, 2003 | 78 | 2003 |
Java security: Web browsers and beyond D Dean, EW Felten, DS Wallach, D Balfanz, PJ Denning Internet besieged: countering cyberspace scofflaws, 241-269, 1997 | 68 | 1997 |
A security infrastructure for distributed Java applications D Balfanz, D Dean, M Spreitzer Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 15-26, 2000 | 63 | 2000 |
Windowbox: A simple security model for the connected desktop D Balfanz, DR Simon Proceedings of the 4th USENIX Windows Systems Symposium, 37-48, 2000 | 56 | 2000 |
Usable access control for the world wide web D Balfanz 19th Annual Computer Security Applications Conference, 2003. Proceedings …, 2003 | 41 | 2003 |