The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Glenn Durfee: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Alina Oprea, Dirk Balfanz, Glenn Durfee, Diana K. Smetters
    Securing a Remote Terminal Application with a Mobile Trusted Device. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:438-447 [Conf]
  2. Dan Boneh, Glenn Durfee, Yair Frankel
    An Attack on RSA Given a Small Fraction of the Private Key Bits. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:25-34 [Conf]
  3. Glenn Durfee, Phong Q. Nguyen
    Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt '99. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:14-29 [Conf]
  4. Glenn Durfee, Matthew K. Franklin
    Distribution chain security. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:63-70 [Conf]
  5. Dan Boneh, Glenn Durfee, Nick Howgrave-Graham
    Factoring N = prq for Large r. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:326-337 [Conf]
  6. Dan Boneh, Glenn Durfee
    Cryptanalysis of RSA with Private Key d Less than N0.292. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1999, pp:1-11 [Conf]
  7. Dan Boneh, Glenn Durfee, Matthew K. Franklin
    Lower Bounds for Multicast Message Authentication. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2001, pp:437-452 [Conf]
  8. Diana K. Smetters, Dirk Balfanz, Glenn Durfee, Trevor F. Smith, Kyung-Hee Lee
    Instant Matchmaking: Simple and Secure Integrated Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP]
    Ubicomp, 2006, pp:477-494 [Conf]
  9. Peter C. S. Kwan, Glenn Durfee
    Practical Uses of Virtual Machines for Protection of Sensitive User Data. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:145-161 [Conf]
  10. Jessica Staddon, Dirk Balfanz, Glenn Durfee
    Efficient tracing of failed nodes in sensor networks. [Citation Graph (0, 0)][DBLP]
    WSNA, 2002, pp:122-130 [Conf]
  11. Brent R. Waters, Dirk Balfanz, Glenn Durfee, Diana K. Smetters
    Building an Encrypted and Searchable Audit Log. [Citation Graph (0, 0)][DBLP]
    NDSS, 2004, pp:- [Conf]
  12. Dirk Balfanz, Glenn Durfee, Narendar Shankar, Diana K. Smetters, Jessica Staddon, Hao-Chi Wong
    Secret Handshakes from Pairing-Based Key Agreements. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:180-196 [Conf]
  13. Dirk Balfanz, Glenn Durfee, Rebecca E. Grinter, Diana K. Smetters, Paul Stewart
    Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:207-222 [Conf]
  14. Dirk Balfanz, Glenn Durfee, Rebecca E. Grinter, Diana K. Smetters
    In Search of Usable Security: Five Lessons from the Field. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:5, pp:19-24 [Journal]
  15. Dan Boneh, Glenn Durfee
    Cryptanalysis of RSA with private key d less than N0.292. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2000, v:46, n:4, pp:1339- [Journal]

Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002