2007 |
16 | EE | Peter C. S. Kwan,
Glenn Durfee:
Practical Uses of Virtual Machines for Protection of Sensitive User Data.
ISPEC 2007: 145-161 |
2006 |
15 | EE | Diana K. Smetters,
Dirk Balfanz,
Glenn Durfee,
Trevor F. Smith,
Kyung-Hee Lee:
Instant Matchmaking: Simple and Secure Integrated Ubiquitous Computing Environments.
Ubicomp 2006: 477-494 |
2005 |
14 | EE | Glenn Durfee:
Wiener, Boneh-Durfee, and May Attacks on the RSA Public Key Cryptosystem.
Encyclopedia of Cryptography and Security 2005 |
2004 |
13 | EE | Alina Oprea,
Dirk Balfanz,
Glenn Durfee,
Diana K. Smetters:
Securing a Remote Terminal Application with a Mobile Trusted Device.
ACSAC 2004: 438-447 |
12 | EE | Brent R. Waters,
Dirk Balfanz,
Glenn Durfee,
Diana K. Smetters:
Building an Encrypted and Searchable Audit Log.
NDSS 2004 |
11 | EE | Dirk Balfanz,
Glenn Durfee,
Rebecca E. Grinter,
Diana K. Smetters,
Paul Stewart:
Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute.
USENIX Security Symposium 2004: 207-222 |
10 | EE | Dirk Balfanz,
Glenn Durfee,
Rebecca E. Grinter,
Diana K. Smetters:
In Search of Usable Security: Five Lessons from the Field.
IEEE Security & Privacy 2(5): 19-24 (2004) |
2003 |
9 | EE | Dirk Balfanz,
Glenn Durfee,
Narendar Shankar,
Diana K. Smetters,
Jessica Staddon,
Hao-Chi Wong:
Secret Handshakes from Pairing-Based Key Agreements.
IEEE Symposium on Security and Privacy 2003: 180-196 |
2002 |
8 | EE | Jessica Staddon,
Dirk Balfanz,
Glenn Durfee:
Efficient tracing of failed nodes in sensor networks.
WSNA 2002: 122-130 |
2001 |
7 | EE | Dan Boneh,
Glenn Durfee,
Matthew K. Franklin:
Lower Bounds for Multicast Message Authentication.
EUROCRYPT 2001: 437-452 |
2000 |
6 | EE | Glenn Durfee,
Matthew K. Franklin:
Distribution chain security.
ACM Conference on Computer and Communications Security 2000: 63-70 |
5 | EE | Glenn Durfee,
Phong Q. Nguyen:
Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt '99.
ASIACRYPT 2000: 14-29 |
4 | | Dan Boneh,
Glenn Durfee:
Cryptanalysis of RSA with private key d less than N0.292.
IEEE Transactions on Information Theory 46(4): 1339 (2000) |
1999 |
3 | EE | Dan Boneh,
Glenn Durfee,
Nick Howgrave-Graham:
Factoring N = prq for Large r.
CRYPTO 1999: 326-337 |
2 | EE | Dan Boneh,
Glenn Durfee:
Cryptanalysis of RSA with Private Key d Less than N0.292.
EUROCRYPT 1999: 1-11 |
1998 |
1 | EE | Dan Boneh,
Glenn Durfee,
Yair Frankel:
An Attack on RSA Given a Small Fraction of the Private Key Bits.
ASIACRYPT 1998: 25-34 |