Glenn Durfee

According to our database1, Glenn Durfee authored at least 20 papers between 1998 and 2011.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
Wiener, Boneh-Durfee, and May Attacks on the RSA Public Key Cryptosystem.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

2010
Homogeneity as an Advantage: It Takes a Community to Protect an Application.
Proceedings of the 2010 Workshop on Collaborative Methods for Security and Privacy, 2010

2007
Practical Uses of Virtual Machines for Protection of Sensitive User Data.
Proceedings of the Information Security Practice and Experience, 2007

2006
Instant Matchmaking: Simple and Secure Integrated Ubiquitous Computing Environments.
Proceedings of the UbiComp 2006: Ubiquitous Computing, 2006

2005
Wiener, Boneh-Durfee, and May Attacks on the RSA Public Key Cryptosystem.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

2004
In Search of Usable Security: Five Lessons from the Field.
IEEE Secur. Priv., 2004

Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute.
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004

Building an Encrypted and Searchable Audit Log.
Proceedings of the Network and Distributed System Security Symposium, 2004

Securing a Remote Terminal Application with a Mobile Trusted Device.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

2003
Domain-Based Administration of Identity-Based Cryptosystems for Secure Email and IPSEC.
Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003, 2003

Secret Handshakes from Pairing-Based Key Agreements.
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003

2002
Public key cryptanalysis using algebraic and lattice methods.
PhD thesis, 2002

Efficient tracing of failed nodes in sensor networks.
Proceedings of the First ACM International Workshop on Wireless Sensor Networks and Applications, 2002

2001
Lower Bounds for Multicast Message Authentication.
Proceedings of the Advances in Cryptology, 2001

2000
Cryptanalysis of RSA with private key d less than N<sup>0.292</sup>.
IEEE Trans. Inf. Theory, 2000

Distribution chain security.
Proceedings of the CCS 2000, 2000

Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt '99.
Proceedings of the Advances in Cryptology, 2000

1999
Cryptanalysis of RSA with Private Key <i>d</i> Less than <i>N</i><sup>0.292</sup>.
Proceedings of the Advances in Cryptology, 1999

Factoring N = p<sup>r</sup>q for Large r.
Proceedings of the Advances in Cryptology, 1999

1998
An Attack on RSA Given a Small Fraction of the Private Key Bits.
Proceedings of the Advances in Cryptology, 1998


  Loading...