|
Search the dblp DataBase
Diana K. Smetters:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Alina Oprea, Dirk Balfanz, Glenn Durfee, Diana K. Smetters
Securing a Remote Terminal Application with a Mobile Trusted Device. [Citation Graph (0, 0)][DBLP] ACSAC, 2004, pp:438-447 [Conf]
- Tara Whalen, Diana K. Smetters, Elizabeth F. Churchill
User experiences with sharing and access control. [Citation Graph (0, 0)][DBLP] CHI Extended Abstracts, 2006, pp:1517-1522 [Conf]
- W. Keith Edwards, Mark W. Newman, Jana Z. Sedivy, Trevor F. Smith, Dirk Balfanz, Diana K. Smetters, H. Chi Wong, Shahram Izadi
Using speakeasy for ad hoc peer-to-peer collaboration. [Citation Graph (0, 0)][DBLP] CSCW, 2002, pp:256-265 [Conf]
- Diana K. Smetters, Dirk Balfanz, Glenn Durfee, Trevor F. Smith, Kyung-Hee Lee
Instant Matchmaking: Simple and Secure Integrated Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP] Ubicomp, 2006, pp:477-494 [Conf]
- Dirk Balfanz, Diana K. Smetters, Paul Stewart, H. Chi Wong
Talking to Strangers: Authentication in Ad-Hoc Wireless Networks. [Citation Graph (0, 0)][DBLP] NDSS, 2002, pp:- [Conf]
- Tom Berson, Drew Dean, Matthew K. Franklin, Diana K. Smetters, Mike Spreitzer
Cryptology As a Network Service. [Citation Graph (0, 0)][DBLP] NDSS, 2001, pp:- [Conf]
- Brent R. Waters, Dirk Balfanz, Glenn Durfee, Diana K. Smetters
Building an Encrypted and Searchable Audit Log. [Citation Graph (0, 0)][DBLP] NDSS, 2004, pp:- [Conf]
- Dirk Balfanz, Glenn Durfee, Narendar Shankar, Diana K. Smetters, Jessica Staddon, Hao-Chi Wong
Secret Handshakes from Pairing-Based Key Agreements. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2003, pp:180-196 [Conf]
- Dirk Balfanz, Glenn Durfee, Rebecca E. Grinter, Diana K. Smetters, Paul Stewart
Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute. [Citation Graph (0, 0)][DBLP] USENIX Security Symposium, 2004, pp:207-222 [Conf]
- Dirk Balfanz, Glenn Durfee, Rebecca E. Grinter, Diana K. Smetters
In Search of Usable Security: Five Lessons from the Field. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:5, pp:19-24 [Journal]
Breaking out of the Browser to Defend Against Phishing Attacks. [Citation Graph (, )][DBLP]
Keyholes: selective sharing in close collaboration. [Citation Graph (, )][DBLP]
Ad-hoc Guesting: When Exceptions Are the Rule. [Citation Graph (, )][DBLP]
Networking named content. [Citation Graph (, )][DBLP]
How users use access control. [Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.004secs
|