Talking to strangers: Authentication in ad-hoc wireless networks. D Balfanz, DK Smetters, P Stewart, HC Wong NDSS, 2002 | 902 | 2002 |
Building an Encrypted and Searchable Audit Log. BR Waters, D Balfanz, G Durfee, DK Smetters NDSS 4, 5-6, 2004 | 479 | 2004 |
Extensible security architectures for Java DS Wallach, D Balfanz, D Dean, EW Felten Proceedings of the sixteenth ACM symposium on Operating systems principles …, 1997 | 396 | 1997 |
Secret handshakes from pairing-based key agreements D Balfanz, G Durfee, N Shankar, D Smetters, J Staddon, HC Wong 2003 Symposium on Security and Privacy, 2003., 180-196, 2003 | 333 | 2003 |
Self-healing key distribution with revocation J Staddon, S Miner, M Franklin, D Balfanz, M Malkin, D Dean Proceedings 2002 IEEE Symposium on Security and Privacy, 241-257, 2002 | 295 | 2002 |
Web spoofing: An internet con game EW Felten, D Balfanz, D Dean, DS Wallach Software World 28 (2), 6-8, 1997 | 279 | 1997 |
Efficient tracing of failed nodes in sensor networks J Staddon, D Balfanz, G Durfee Proceedings of the 1st ACM international workshop on Wireless sensor …, 2002 | 255 | 2002 |
Json web token (jwt) M Jones, J Bradley, N Sakimura Tech. Rep., 2015 | 254 | 2015 |
In search of usable security: Five lessons from the field D Balfanz, G Durfee, DK Smetters, RE Grinter IEEE Security & Privacy 2 (5), 19-24, 2004 | 175 | 2004 |
Using speakeasy for ad hoc peer-to-peer collaboration WK Edwards, MW Newman, JZ Sedivy, TF Smith, D Balfanz, DK Smetters, ... Proceedings of the 2002 ACM conference on Computer supported cooperative …, 2002 | 132 | 2002 |
Strengthening user authentication through opportunistic cryptographic identity assertions A Czeskis, M Dietz, T Kohno, D Wallach, D Balfanz Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 112 | 2012 |
Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute. D Balfanz, G Durfee, RE Grinter, DK Smetters, P Stewart USENIX Security Symposium 207, 222, 2004 | 109 | 2004 |
HAND-HELDCOMPUTERSCANBE BETTERSMARTCARDS D Balfanz, EW Felten | 107 | 1999 |
Origin-bound certificates: A fresh approach to strong client authentication for the web M Dietz, A Czeskis, D Balfanz, DS Wallach 21st {USENIX} Security Symposium ({USENIX} Security 12), 317-331, 2012 | 104 | 2012 |
Experience with secure multi-processing in Java D Balfanz, L Gong Proceedings. 18th International Conference on Distributed Computing Systems …, 1998 | 79 | 1998 |
Securing a remote terminal application with a mobile trusted device A Oprea, D Balfanz, G Durfee, DK Smetters 20th Annual Computer Security Applications Conference, 438-447, 2004 | 76 | 2004 |
Sliding-window self-healing key distribution SM More, M Malkin, J Staddon, D Balfanz Proceedings of the 2003 ACM workshop on Survivable and self-regenerative …, 2003 | 75 | 2003 |
JSON web signature (JWS) M Jones, J Bradley, N Sakimura Internet Requests for Comments, RFC 7515, 2015 | 73 | 2015 |
Java security: Web browsers and beyond D Dean, EW Felten, DS Wallach, D Balfanz, PJ Denning Internet besieged: countering cyberspace scofflaws, 241-269, 1997 | 67 | 1997 |
A security infrastructure for distributed Java applications D Balfanz, D Dean, M Spreitzer Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 15-26, 2000 | 61 | 2000 |