Dirk Balfanz

Orcid: 0009-0003-5497-2729

Affiliations:
  • Palo Alto Research Center Incorporated, PARC, California, USA


According to our database1, Dirk Balfanz authored at least 38 papers between 1994 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Situational Adaptive Autonomy in Human-AI Cooperation.
Proceedings of the Workshop on Intervening, 2023

2018
Token Binding over HTTP.
RFC, October, 2018

Transport Layer Security (TLS) Extension for Token Binding Protocol Negotiation.
RFC, October, 2018

The Token Binding Protocol Version 1.0.
RFC, October, 2018

2016
Security Keys: Practical Cryptographic Second Factors for the Modern Web.
Proceedings of the Financial Cryptography and Data Security, 2016

2012
The Future of Authentication.
IEEE Secur. Priv., 2012

Origin-Bound Certificates: A Fresh Approach to Strong Client Authentication for the Web.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Protected Login.
Proceedings of the Financial Cryptography and Data Security, 2012

Strengthening user authentication through opportunistic cryptographic identity assertions.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2006
Ubiquitous Multimedia Access with a Multidimensional Information Browser.
Proceedings of the Ubiquitous Computing Systems, Third International Symposium, 2006

User-Centric Multimedia Information Visualization for Mobile Devices in the Ubiquitous Environment.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

Instant Matchmaking: Simple and Secure Integrated Ubiquitous Computing Environments.
Proceedings of the UbiComp 2006: Ubiquitous Computing, 2006

2005
A Reference Architecture for Mobile Knowledge Management.
Proceedings of the Mobile Computing and Ambient Intelligence: The Challenge of Multimedia, 2005

2004
In Search of Usable Security: Five Lessons from the Field.
IEEE Secur. Priv., 2004

A reference architecture supporting hypervideo content for ITV and the internet domain.
Comput. Graph., 2004

Editorial video technology and interactive broadcasting.
Comput. Graph., 2004

Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute.
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004

Building an Encrypted and Searchable Audit Log.
Proceedings of the Network and Distributed System Security Symposium, 2004

Mobile Liquid 2D Scatter Space (ML2DSS).
Proceedings of the 8th International Conference on Information Visualisation, 2004

Securing a Remote Terminal Application with a Mobile Trusted Device.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

2003
Mobile situation-awareness within the project map.
Comput. Graph., 2003

Secret Handshakes from Pairing-Based Key Agreements.
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003

Mobile Liquid Information Spaces - Maximierung der Informationsdichte für visuelle Echtzeitsuche auf kleinen Screenflächen mit Hilfe von Transparenz und Wühlfunktionalität.
Proceedings of the Mensch & Computer 2003: Interaktion in Bewegung, 2003

Sliding-window self-healing key distribution.
Proceedings of the 2003 ACM Workshop on Survivable and Self-Regenerative Systems, 2003

Usable Access Control for the World Wide Web.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003

2002
Interaction with Content-Augmented Video via Off-Screen Hyperlinks for Direct Information Retrieval.
Proceedings of the 10-th International Conference in Central Europe on Computer Graphics, 2002

Automated geodata analysis and metadata generation.
Proceedings of the Visualization and Data Analysis 2002, 2002

Self-Healing Key Distribution with Revocation.
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002

Towards a Framework for Mobile Knowledge Management.
Proceedings of the Practical Aspects of Knowledge Management, 4th International Conference, 2002

Talking to Strangers: Authentication in Ad-Hoc Wireless Networks.
Proceedings of the Network and Distributed System Security Symposium, 2002

Efficient tracing of failed nodes in sensor networks.
Proceedings of the First ACM International Workshop on Wireless Sensor Networks and Applications, 2002

Using speakeasy for ad hoc peer-to-peer collaboration.
Proceedings of the CSCW 2002, 2002

2000
A Security Infrastructure for Distributed Java Applications.
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000

1999
Hand-Held Computers Can Be Better Smart Cards.
Proceedings of the 8th USENIX Security Symposium, Washington, DC, USA, August 23-26, 1999, 1999

Bridging Geospatial Meta-data Standards Towards Distributed Meta-data Information Systems.
Proceedings of the 3rd IEEE Metadata Conference 1999, MD 1999, Bethesda, 1999

1998
Experience with Secure Multi-Processing in Java.
Proceedings of the 18th International Conference on Distributed Computing Systems, 1998

1997
Extensible Security Architecture for Java.
Proceedings of the Sixteenth ACM Symposium on Operating System Principles, 1997

1994
Concepts for a Flexible Service Architecture.
Proceedings of the Towards a Pan-European Telecommunication Service Infrastructure, 1994


  Loading...