Diana K. Smetters

According to our database1, Diana K. Smetters authored at least 21 papers between 2001 and 2012.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
Custodian-based information sharing.
IEEE Commun. Mag., 2012

Networking named content.
Commun. ACM, 2012

2009
How users use access control.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

VoCCN: voice-over content-centric networks.
Proceedings of the 2009 workshop on Re-architecting the internet, ReArch@CoNEXT 2009, 2009

2008
Ad Hoc Guesting: When Exceptions Arethe Rule.
login Usenix Mag., 2008

Useful Computer Security.
IEEE Internet Comput., 2008

Ad-hoc Guesting: When Exceptions Are the Rule.
Proceedings of the Usability, Psychology, and Security, 2008

Keyholes: selective sharing in close collaboration.
Proceedings of the Extended Abstracts Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008

Breaking out of the Browser to Defend Against Phishing Attacks.
Proceedings of the CEAS 2008, 2008

2006
Instant Matchmaking: Simple and Secure Integrated Ubiquitous Computing Environments.
Proceedings of the UbiComp 2006: Ubiquitous Computing, 2006

User experiences with sharing and access control.
Proceedings of the Extended Abstracts Proceedings of the 2006 Conference on Human Factors in Computing Systems, 2006

2004
In Search of Usable Security: Five Lessons from the Field.
IEEE Secur. Priv., 2004

Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute.
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004

Building an Encrypted and Searchable Audit Log.
Proceedings of the Network and Distributed System Security Symposium, 2004

Securing a Remote Terminal Application with a Mobile Trusted Device.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

2003
Domain-Based Administration of Identity-Based Cryptosystems for Secure Email and IPSEC.
Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003, 2003

Secret Handshakes from Pairing-Based Key Agreements.
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003

2002
Moving from the design of usable security technologies to the design of useful secure applications.
Proceedings of the 2002 Workshop on New Security Paradigms, 2002

Talking to Strangers: Authentication in Ad-Hoc Wireless Networks.
Proceedings of the Network and Distributed System Security Symposium, 2002

Using speakeasy for ad hoc peer-to-peer collaboration.
Proceedings of the CSCW 2002, 2002

2001
Cryptology As a Network Service.
Proceedings of the Network and Distributed System Security Symposium, 2001


  Loading...