Publications (complete list at Google Scholar)
Jacobson, V.; Smetters, D. K.; Thornton, J. D.; Plass, M. F.; Briggs, N.; Braynard, R. (2009) Networking named content. Proceedings of the 5th ACM International Conference on Emerging Networking Experiments and Technologies (CoNEXT 2009)
Jacobson, V.; Smetters, D. K.; Briggs, N.; Plass, M. F.; Stewart, P.; Thornton, J. D.; Braynard, R. (2009) VoCCN: voice over content-centric networks. Proceedings of the 2009 Workshop on Re-architecting the Internet (ReArch 2009).
Smetters, D. K.; Jacobson, V. (2009) Securing network content. PARC technical report TR-06-11; October 2009.
Smetters, D. K.; Good, N. (2009) How users use access control. Symposium on Usable Privacy and Security (SOUPS 2009).
Smetters, Diana. (2008) Cyber Security Technology Usability and Management. In Wiley Handbook of Science and Technology for Homeland Security (2008).
Dalal, B.; Nelson, L.; Smetters, D. K.; Good, N.; Elliott, A. (2008) Ad hoc guesting: when exceptions are the rule. Workshop on Usability, Psychology and Security (UPSEC 2008).
Nelson, L.; Smetters, D. K.; Churchill, E. F. (2008) Keyholes: selective sharing in close collaboration. CHI 2008 Extended Abstracts on Human Factors in Computing Systems.
Smetters, D. K. (2008) Building secure mashups. Workshop on Web 2.0 Security and Privacy 2008.
Smetters, D. K.; Stewart, P. (2008) Breaking out of the browser to defend against phishing attacks. Fifth Conference on Email and Anti-Spam (CEAS 2008).
Smetters, D. K.; Dalal, B.; Nelson, L.; Good, N.; Elliott, A.(2008) Ad-hoc guesting: when exceptions are the rule. ;login: the USENIX Magazine. 2008 August; 33 (4).
Smetters, D. K. (2007) Usable security: oxymoron or challenge?. National Academy of Engineering Frontiers of Engineering Symposium; 2007 September 24-26; Seattle; WA; USA.
Durfee, G. E.; Smetters, D. K.; Balfanz, D. (2006) Posture-based data protection. Palo Alto Research Center Technical Report. 2006.
Whalen, T.; Smetters, D. K.; Churchill, E. F. (2006) User experiences with sharing and access control. Extended Abstracts of the ACM Conference on Human Factors in Computing Systems (CHI 2006).
Smetters, D. K.; Balfanz, D.; Durfee, G. E.; Smith, T.; Lee, K. (2006) Instant matchmaking: simple, secure virtual extensions to ubiquitous computing environments. Ubicomp 2006.
Balfanz, D.; Durfee, G. E.; Smetters, D. K. (2005) Making the impossible easy: usable PKI. In "Security and Usability: Designing Secure Systems that People Can Use", Cranor, L. F. and Garfinkel, S., eds., O’Reilly.
Waters, B.; Balfanz, D.; Durfee, G. E.; Smetters, D. K. (2004) Building an encrypted and searchable audit log. 11th Annual Network and Distributed Security Symposium (NDSS 2004).
Balfanz, D.; Durfee, G. E.; Grinter, R. E.; Smetters, D. K.; Stewart, P. (2004) Network-in-a-box: how to set up a secure wireless network in under a minute. Proceedings of 13th USENIX Security Symposium; 2004.
Balfanz, D.; Durfee, G. E.; Smetters, D. K.; Grinter, R. E. (2004) In search of usable security - five lessons from the field. IEEE Security & Privacy. 2004 September/October; 2 (5).
Balfanz, D.; Oprea, A.; Durfee, G. E.; Smetters, D. K. (2004) Securing a remote terminal application with a mobile trusted device. 20th Annual Computer Security Applications Conference (ACSAC 2004).
Balfanz, D.; Durfee, G. E.; Shankar, N.; Smetters, D. K.; Staddon, J.; Wong, H. C. (2003) Secret handshakes from pairing-based key agreements. Proceedings of 2003 IEEE Symposium on Security and Privacy.
Smetters, D. K.; Grinter, R. E. (2003) Three challenges for embedding security into applications. CHI 2003 Workshop on Human-Computer Interaction and Security Systems.
Smetters, D. K.; Durfee, G. E. (2003) Domain-based administration of identity-based cryptosystems for secure email and IPSEC. 12th Usenix Security Symposium; 2003.
Balfanz, D.; Smetters, D. K.; Stewart, P.; Wong, H. C. (2006) Talking to strangers: authentication in ad-hoc wireless networks. 9th Annual Network and Distributed System Security Symposium (NDSS 2002).
Edwards, W. K.; Newman, M.; Sedivy, J.; Smith, T.; Balfanz, D.; Smetters, D. K.; Wong, H. C.; Izadi, S. (2002) Using Speakeasy for ad hoc peer-to-peer collaboration. ACM 2002 Conference on Computer Supported Cooperative Work (CSCW 2002).
Smetters, D. K.; Grinter, R. E. (2002) Moving from the design of usable security technologies to the design of useful secure applications. ACM New Security Paradigms Workshop (NSPW 2002).
Berson, T. A.; Smetters, D. K.; Dean, D.; Franklin, M. K.; Spreitzer, M. J. (2001) Cryptography as a network service. Network and Distributed System Security Symposium; (NDSS 2001).
Patents (up-to-date list here)
7,937,752 Systems and methods for authenticating communications in a network medium
7,937,089 Method, apparatus, and program product for provisioning secure wireless sensors
7,933,889 Method and system for metadata-driven document management and access control
7,916,861 System and method for establishing secondary channels
7,904,720 System and method for providing secure resource management
7,873,983 Method and apparatus for controlling an experiential data stream in a social space
7,822,863 Personal domain controller
7,818,770 Methods, apparatus, and program products to support a shared viewing experience from remote locations
7,793,110 Posture-based data protection
7,757,076 Method and apparatus for using a secure credential infrastructure to access vehicle components
7,725,928 System and method for establishing temporary and permanent credentials for secure online commerce
7,581,096 Method, apparatus, and program product for automatically provisioning secure network elements
7,552,322 Using a portable security token to facilitate public key certification for devices in a network
7,549,047 Method and system for securely sharing files
7,454,619 Method, apparatus, and program product for securely presenting situation information
7,426,271 System and method for establishing secondary channels
7,425,899 Electromagnetic tags
7,421,583 System, method and article of manufacture for determining a price of cryptographic services based on a computational burden thereof
7,392,387 Apparatus and methods for providing secured communication
7,376,834 System and method for securely controlling communications
7,363,508 System and method for dynamically enabling components to implement data transfer security mechanisms
7,275,156 Method and apparatus for establishing and using a secure credential infrastructure
7,185,199 Apparatus and methods for providing secured communication
7,130,998 Using a portable security token to facilitate cross-certification between certification authorities
7,051,199 System, method and article of manufacture for providing cryptographic services utilizing a network
6,990,468 System, method and article of manufacture for cryptoserver-based auction
6,971,017 Ad hoc secure access to documents and services
6,938,154 System, method and article of manufacture for a cryptographic key infrastructure for networked devices
6,754,821 System, method and article of manufacture for transition state-based cryptography