Glenn Durfee

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

16EEPeter C. S. Kwan, Glenn Durfee: Practical Uses of Virtual Machines for Protection of Sensitive User Data. ISPEC 2007: 145-161
15EEDiana K. Smetters, Dirk Balfanz, Glenn Durfee, Trevor F. Smith, Kyung-Hee Lee: Instant Matchmaking: Simple and Secure Integrated Ubiquitous Computing Environments. Ubicomp 2006: 477-494
14EEGlenn Durfee: Wiener, Boneh-Durfee, and May Attacks on the RSA Public Key Cryptosystem. Encyclopedia of Cryptography and Security 2005
13EEAlina Oprea, Dirk Balfanz, Glenn Durfee, Diana K. Smetters: Securing a Remote Terminal Application with a Mobile Trusted Device. ACSAC 2004: 438-447
12EEBrent R. Waters, Dirk Balfanz, Glenn Durfee, Diana K. Smetters: Building an Encrypted and Searchable Audit Log. NDSS 2004
11EEDirk Balfanz, Glenn Durfee, Rebecca E. Grinter, Diana K. Smetters, Paul Stewart: Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute. USENIX Security Symposium 2004: 207-222
10EEDirk Balfanz, Glenn Durfee, Rebecca E. Grinter, Diana K. Smetters: In Search of Usable Security: Five Lessons from the Field. IEEE Security & Privacy 2(5): 19-24 (2004)
9EEDirk Balfanz, Glenn Durfee, Narendar Shankar, Diana K. Smetters, Jessica Staddon, Hao-Chi Wong: Secret Handshakes from Pairing-Based Key Agreements. IEEE Symposium on Security and Privacy 2003: 180-196
8EEJessica Staddon, Dirk Balfanz, Glenn Durfee: Efficient tracing of failed nodes in sensor networks. WSNA 2002: 122-130
7EEDan Boneh, Glenn Durfee, Matthew K. Franklin: Lower Bounds for Multicast Message Authentication. EUROCRYPT 2001: 437-452
6EEGlenn Durfee, Matthew K. Franklin: Distribution chain security. ACM Conference on Computer and Communications Security 2000: 63-70
5EEGlenn Durfee, Phong Q. Nguyen: Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt '99. ASIACRYPT 2000: 14-29
4 Dan Boneh, Glenn Durfee: Cryptanalysis of RSA with private key d less than N0.292. IEEE Transactions on Information Theory 46(4): 1339 (2000)
3EEDan Boneh, Glenn Durfee, Nick Howgrave-Graham: Factoring N = prq for Large r. CRYPTO 1999: 326-337
2EEDan Boneh, Glenn Durfee: Cryptanalysis of RSA with Private Key d Less than N0.292. EUROCRYPT 1999: 1-11
1EEDan Boneh, Glenn Durfee, Yair Frankel: An Attack on RSA Given a Small Fraction of the Private Key Bits. ASIACRYPT 1998: 25-34

Coauthor Index

1Dirk Balfanz [8] [9] [10] [11] [12] [13] [15]
2Dan Boneh [1] [2] [3] [4] [7]
3Yair Frankel [1]
4Matthew K. Franklin [6] [7]
5Rebecca E. Grinter [10] [11]
6Nick Howgrave-Graham [3]
7Peter C. S. Kwan [16]
8Kyung-Hee Lee [15]
9Phong Q. Nguyen [5]
10Alina Oprea [13]
11Narendar Shankar [9]
12Diana K. Smetters [9] [10] [11] [12] [13] [15]
13Trevor F. Smith [15]
14Jessica Staddon [8] [9]
15Paul Stewart [11]
16Brent Waters (Brent R. Waters) [12]
17Hao-Chi Wong [9]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)