Dirk Balfanz

Orcid: 0009-0003-5497-2729

  • Palo Alto Research Center Incorporated, PARC, California, USA

According to our database1, Dirk Balfanz authored at least 39 papers between 1994 and 2024.

Collaborative distances:



In proceedings 
PhD thesis 


Online presence:

On csauthors.net:


An Evaluation of Situational Autonomy for Human-AI Collaboration in a Shared Workspace Setting.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024

Situational Adaptive Autonomy in Human-AI Cooperation.
Proceedings of the Workshop on Intervening, 2023

Token Binding over HTTP.
RFC, October, 2018

Transport Layer Security (TLS) Extension for Token Binding Protocol Negotiation.
RFC, October, 2018

The Token Binding Protocol Version 1.0.
RFC, October, 2018

Security Keys: Practical Cryptographic Second Factors for the Modern Web.
Proceedings of the Financial Cryptography and Data Security, 2016

The Future of Authentication.
IEEE Secur. Priv., 2012

Origin-Bound Certificates: A Fresh Approach to Strong Client Authentication for the Web.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Protected Login.
Proceedings of the Financial Cryptography and Data Security, 2012

Strengthening user authentication through opportunistic cryptographic identity assertions.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Ubiquitous Multimedia Access with a Multidimensional Information Browser.
Proceedings of the Ubiquitous Computing Systems, Third International Symposium, 2006

User-Centric Multimedia Information Visualization for Mobile Devices in the Ubiquitous Environment.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

Instant Matchmaking: Simple and Secure Integrated Ubiquitous Computing Environments.
Proceedings of the UbiComp 2006: Ubiquitous Computing, 2006

A Reference Architecture for Mobile Knowledge Management.
Proceedings of the Mobile Computing and Ambient Intelligence: The Challenge of Multimedia, 2005

In Search of Usable Security: Five Lessons from the Field.
IEEE Secur. Priv., 2004

A reference architecture supporting hypervideo content for ITV and the internet domain.
Comput. Graph., 2004

Editorial video technology and interactive broadcasting.
Comput. Graph., 2004

Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute.
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004

Building an Encrypted and Searchable Audit Log.
Proceedings of the Network and Distributed System Security Symposium, 2004

Mobile Liquid 2D Scatter Space (ML2DSS).
Proceedings of the 8th International Conference on Information Visualisation, 2004

Securing a Remote Terminal Application with a Mobile Trusted Device.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

Mobile situation-awareness within the project map.
Comput. Graph., 2003

Secret Handshakes from Pairing-Based Key Agreements.
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003

Mobile Liquid Information Spaces - Maximierung der Informationsdichte für visuelle Echtzeitsuche auf kleinen Screenflächen mit Hilfe von Transparenz und Wühlfunktionalität.
Proceedings of the Mensch & Computer 2003: Interaktion in Bewegung, 2003

Sliding-window self-healing key distribution.
Proceedings of the 2003 ACM Workshop on Survivable and Self-Regenerative Systems, 2003

Usable Access Control for the World Wide Web.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003

Interaction with Content-Augmented Video via Off-Screen Hyperlinks for Direct Information Retrieval.
Proceedings of the 10-th International Conference in Central Europe on Computer Graphics, 2002

Automated geodata analysis and metadata generation.
Proceedings of the Visualization and Data Analysis 2002, 2002

Self-Healing Key Distribution with Revocation.
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002

Towards a Framework for Mobile Knowledge Management.
Proceedings of the Practical Aspects of Knowledge Management, 4th International Conference, 2002

Talking to Strangers: Authentication in Ad-Hoc Wireless Networks.
Proceedings of the Network and Distributed System Security Symposium, 2002

Efficient tracing of failed nodes in sensor networks.
Proceedings of the First ACM International Workshop on Wireless Sensor Networks and Applications, 2002

Using speakeasy for ad hoc peer-to-peer collaboration.
Proceedings of the CSCW 2002, 2002

A Security Infrastructure for Distributed Java Applications.
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000

Hand-Held Computers Can Be Better Smart Cards.
Proceedings of the 8th USENIX Security Symposium, Washington, DC, USA, August 23-26, 1999, 1999

Bridging Geospatial Meta-data Standards Towards Distributed Meta-data Information Systems.
Proceedings of the 3rd IEEE Metadata Conference 1999, MD 1999, Bethesda, 1999

Experience with Secure Multi-Processing in Java.
Proceedings of the 18th International Conference on Distributed Computing Systems, 1998

Extensible Security Architecture for Java.
Proceedings of the Sixteenth ACM Symposium on Operating System Principles, 1997

Concepts for a Flexible Service Architecture.
Proceedings of the Towards a Pan-European Telecommunication Service Infrastructure, 1994