Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Diana K. Smetters is active.

Publication


Featured researches published by Diana K. Smetters.


ieee symposium on security and privacy | 2003

Secret handshakes from pairing-based key agreements

Dirk Balfanz; Glenn Durfee; Narendar Shankar; Diana K. Smetters; Jessica Staddon; Hao Chi Wong

Consider a CIA agent who wants to authenticate herself to a server but does not want to reveal her CIA credentials unless the server is a genuine CIA outlet. Consider also that the CIA server does not want to reveal its CIA credentials to anyone but CIA agents - not even to other CIA servers. We first show how pairing-based cryptography can be used to implement such secret handshakes. We then propose a formal definition for secure secret handshakes, and prove that our pairing-based schemes are secure under the Bilinear Diffie-Hellman assumption. Our protocols support role-based group membership authentication, traceability, indistinguishability to eavesdroppers, unbounded collusion resistance, and forward repudiability. Our secret-handshake scheme can be implemented as a TLS cipher suite. We report on the performance of our preliminary Java implementation.


new security paradigms workshop | 2002

Moving from the design of usable security technologies to the design of useful secure applications

Diana K. Smetters; Rebecca E. Grinter

Recent results from usability studies of security systems have shown that end-users find them difficult to adopt and use. In this paper we argue that improving the usability of security technology is only one part of the problem, and that what is missed is the need to design usable and useful systems that provide security to end-users in terms of the applications that they use and the tasks they want to achieve. We propose alternate ways of building and integrating security technologies into applications and usability methods for evaluating how successful our prototypes are. We believe that the end results of designing usable and useful (from the end-user perspective) systems will be secure applications which will reflect the needs of users who are increasingly using computers away from the office and in a wider variety of networked configurations.


network and distributed system security symposium | 2004

Building an Encrypted and Searchable Audit Log.

Brent Waters; Dirk Balfanz; Glenn Durfee; Diana K. Smetters


Archive | 2009

Systems and methods for authenticating communications in a network medium

Dirk Balfanz; Cristina V. Lopes; Diana K. Smetters; Hao-Chi Wong


Archive | 2002

Method and system for securely Sharing files

Dirk Balfanz; Teresa F. Lunt; Diana K. Smetters; Ken Conley; Steve B. Cousins; Bryan Pendleton


Archive | 2002

Ad hoc secure access to documents and services

Mark Stringer; Elisabeth Soutloglou; Diana K. Smetters


Archive | 2003

Method and apparatus for establishing and using a secure credential infrastructure

Dirk Balfanz; Diana K. Smetters; Glenn E. Durfee; Rebecca E. Grinter; Hao-Chi Wong


Archive | 2007

Apparatus and methods for providing secured communication

Dirk Balfanz; Diana K. Smetters; Paul S. Stewart; Daniel C. Swinehart


Archive | 2003

Method, apparatus, and program product for automatically provisioning secure network elements

Dirk Balfanz; Diana K. Smetters; Glenn E. Durfee; Rebecca E. Grinter; Hao-Chi Wong


Archive | 2000

System, method and article of manufacture for a cryptographic key infrastructure for networked devices

Thomas A. Berson; R. Drews Dean; Matthew K. Franklin; Teresa F. Lunt; Diana K. Smetters

Collaboration


Dive into the Diana K. Smetters's collaboration.

Researchain Logo
Decentralizing Knowledge