Search the dblp DataBase
Glenn Durfee :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Alina Oprea , Dirk Balfanz , Glenn Durfee , Diana K. Smetters Securing a Remote Terminal Application with a Mobile Trusted Device. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:438-447 [Conf ] Dan Boneh , Glenn Durfee , Yair Frankel An Attack on RSA Given a Small Fraction of the Private Key Bits. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:25-34 [Conf ] Glenn Durfee , Phong Q. Nguyen Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt '99. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:14-29 [Conf ] Glenn Durfee , Matthew K. Franklin Distribution chain security. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2000, pp:63-70 [Conf ] Dan Boneh , Glenn Durfee , Nick Howgrave-Graham Factoring N = pr q for Large r. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:326-337 [Conf ] Dan Boneh , Glenn Durfee Cryptanalysis of RSA with Private Key d Less than N 0.292 . [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:1-11 [Conf ] Dan Boneh , Glenn Durfee , Matthew K. Franklin Lower Bounds for Multicast Message Authentication. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2001, pp:437-452 [Conf ] Diana K. Smetters , Dirk Balfanz , Glenn Durfee , Trevor F. Smith , Kyung-Hee Lee Instant Matchmaking: Simple and Secure Integrated Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP ] Ubicomp, 2006, pp:477-494 [Conf ] Peter C. S. Kwan , Glenn Durfee Practical Uses of Virtual Machines for Protection of Sensitive User Data. [Citation Graph (0, 0)][DBLP ] ISPEC, 2007, pp:145-161 [Conf ] Jessica Staddon , Dirk Balfanz , Glenn Durfee Efficient tracing of failed nodes in sensor networks. [Citation Graph (0, 0)][DBLP ] WSNA, 2002, pp:122-130 [Conf ] Brent R. Waters , Dirk Balfanz , Glenn Durfee , Diana K. Smetters Building an Encrypted and Searchable Audit Log. [Citation Graph (0, 0)][DBLP ] NDSS, 2004, pp:- [Conf ] Dirk Balfanz , Glenn Durfee , Narendar Shankar , Diana K. Smetters , Jessica Staddon , Hao-Chi Wong Secret Handshakes from Pairing-Based Key Agreements. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2003, pp:180-196 [Conf ] Dirk Balfanz , Glenn Durfee , Rebecca E. Grinter , Diana K. Smetters , Paul Stewart Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:207-222 [Conf ] Dirk Balfanz , Glenn Durfee , Rebecca E. Grinter , Diana K. Smetters In Search of Usable Security: Five Lessons from the Field. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2004, v:2, n:5, pp:19-24 [Journal ] Dan Boneh , Glenn Durfee Cryptanalysis of RSA with private key d less than N0.292 . [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2000, v:46, n:4, pp:1339- [Journal ] Search in 0.002secs, Finished in 0.002secs