default‎ > ‎


Computer and Network Security

P. Kwan and G. Durfee.  Vault: Practical Uses of Virtual Machines for Protection of Sensitive User Data.  In proceedings of The 3rd Information Security Practice and Experience Conference (ISPEC 2007), May 2007, Hong Kong, China.

D. K. Smetters, D. Balfanz, G. Durfee, T. F. Smith, and K. H. Lee.  Instant Matchmaking: Simple and Secure Integrated Ubiquitous Computing Environments.  In proceedings of The 8th International Conference of Ubiquitous Computing (Ubicomp 2006), Irvine, CA, September 2006.

D. Balfanz, G. Durfee, and D. K. Smetters. Making the Impossible Easy: Usable PKI.  In Security and Usability, L. Crannor and S. Garfinkel, editors.  Chapter 16, pp. 319--333. O'Reilly Media, Inc., August 2005. 

A. Oprea, D. Balfanz, G. Durfee, and D. K. Smetters. Securing a Remote Terminal Application with a Mobile Trusted Device. In proceedings Annual Computer Security Applications Conference (ACSAC 2004), Tucson, AZ, December 2004.

D. Balfanz, G. Durfee, R. Grinter, and D. K. Smetters. In Search of Usable Security: Five Lessons from the Field.  IEEE Security and Privacy: 2 (5): pp. 19--24.  September/October 2004.

D. Balfanz, G. Durfee, R. Grinter, D. K. Smetters, and P. Stewart. Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute. In proceedings 13th USENIX Security Symposium, pp. 207--221, San Diego, CA, 2004.

B. Waters, D. Balfanz, G. Durfee, and D. K. Smetters. Building an Encrypted and Searchable Audit Log. In proceedings Network and Distributed Security Symposium (NDSS) '04, San Diego, California, 2004.

D. K. Smetters and G. Durfee. Domain-Based Administration of Identity-Based Cryptosystems for Secure Email and IPSEC. In proceedings 12th USENIX Security Symposium, pp. 215-229, Washington, DC, 2003.

D. Balfanz, G. Durfee, N. Shankar, D. K. Smetters, J. Staddon, and H. C. Wong. Secret Handshakes from Pairing-Based Key Agreements. In proceedings IEEE Symposium on Security and Privacy, pp. 180--196, Oakland, CA, 2003.

D. Balfanz, G. Durfee, and J. Staddon.  Efficient tracing of failed nodes in sensor networks. In WSNA `02: First ACM International Workshop on Wireless Sensor Networks and Applications, Atlanta, GA, 2002.

Applied Cryptography

G. Durfee.  Public Key Cryptanalysis Using Algebraic and Lattice Methods. Ph.D. Thesis, Stanford University, January 2002.

D. BonehG. Durfee, and M. FranklinLower Bounds for Multicast Message AuthenticationIn proceedings Eurocrypt 2001, Lecture Notes in Computer Science, Vol. 2045, Springer, pp. 437--452, 2001.

G. Durfee and P. NguyenCryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt '99In proceedings Asiacrypt 2000, Lecture Notes in Computer Science, Vol. 1976, Springer, pp. 14--29, 2000.

G. Durfee and M. FranklinDistribution Chain SecurityIn proceedings ACM CCS '00, Proceedings of the 7th ACM Conference on Computer and Communication Security, November 1-4, 2000, Athens, Greece, pp. 63--70.

D. Boneh and G. DurfeeCryptanalysis of RSA with Private Key d Less Than N0.292IEEE Transactions on Information Theory, vol. 46, no. 4, pp. 1339--1349, July 2000.

D. BonehG. Durfee, and N. Howgrave-GrahamFactoring N = prq for Large rIn proceedings Crypto '99, Lecture Notes in Computer Science, Vol. 1666, Springer, pp. 326--337, 1999.

D. BonehG. Durfee, and Y. FrankelExposing an RSA Private Key Given a Small Fraction of its BitsIn proceedings Asiacrypt '98, Lecture Notes in Computer Science, Vol. 1514, Springer, pp. 25--34, 1998.