The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Diana K. Smetters: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Alina Oprea, Dirk Balfanz, Glenn Durfee, Diana K. Smetters
    Securing a Remote Terminal Application with a Mobile Trusted Device. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:438-447 [Conf]
  2. Tara Whalen, Diana K. Smetters, Elizabeth F. Churchill
    User experiences with sharing and access control. [Citation Graph (0, 0)][DBLP]
    CHI Extended Abstracts, 2006, pp:1517-1522 [Conf]
  3. W. Keith Edwards, Mark W. Newman, Jana Z. Sedivy, Trevor F. Smith, Dirk Balfanz, Diana K. Smetters, H. Chi Wong, Shahram Izadi
    Using speakeasy for ad hoc peer-to-peer collaboration. [Citation Graph (0, 0)][DBLP]
    CSCW, 2002, pp:256-265 [Conf]
  4. Diana K. Smetters, Dirk Balfanz, Glenn Durfee, Trevor F. Smith, Kyung-Hee Lee
    Instant Matchmaking: Simple and Secure Integrated Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP]
    Ubicomp, 2006, pp:477-494 [Conf]
  5. Dirk Balfanz, Diana K. Smetters, Paul Stewart, H. Chi Wong
    Talking to Strangers: Authentication in Ad-Hoc Wireless Networks. [Citation Graph (0, 0)][DBLP]
    NDSS, 2002, pp:- [Conf]
  6. Tom Berson, Drew Dean, Matthew K. Franklin, Diana K. Smetters, Mike Spreitzer
    Cryptology As a Network Service. [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  7. Brent R. Waters, Dirk Balfanz, Glenn Durfee, Diana K. Smetters
    Building an Encrypted and Searchable Audit Log. [Citation Graph (0, 0)][DBLP]
    NDSS, 2004, pp:- [Conf]
  8. Dirk Balfanz, Glenn Durfee, Narendar Shankar, Diana K. Smetters, Jessica Staddon, Hao-Chi Wong
    Secret Handshakes from Pairing-Based Key Agreements. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:180-196 [Conf]
  9. Dirk Balfanz, Glenn Durfee, Rebecca E. Grinter, Diana K. Smetters, Paul Stewart
    Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:207-222 [Conf]
  10. Dirk Balfanz, Glenn Durfee, Rebecca E. Grinter, Diana K. Smetters
    In Search of Usable Security: Five Lessons from the Field. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:5, pp:19-24 [Journal]

  11. Breaking out of the Browser to Defend Against Phishing Attacks. [Citation Graph (, )][DBLP]


  12. Keyholes: selective sharing in close collaboration. [Citation Graph (, )][DBLP]


  13. Ad-hoc Guesting: When Exceptions Are the Rule. [Citation Graph (, )][DBLP]


  14. Networking named content. [Citation Graph (, )][DBLP]


  15. How users use access control. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002