You are here

Bibliography

Export 23 results:
Author Title Type [ Year(Asc)]
Filters: Author is Ian Goldberg  [Clear All Filters]
2012
Wang T, Bauer K, Forero C, Goldberg I. Congestion-aware Path Selection for Tor. In: FC'12 - Proceedings of the 16th International Conference in Financial Cryptography and Data Security . FC'12 - Proceedings of the 16th International Conference in Financial Cryptography and Data Security . Bonaire; 2012.
2011
Smits R, Jain D, Pidcock S, Goldberg I, Hengartner U. BridgeSPA: Improving Tor Bridges with Single Packet Authorization. In: WPES'11 - Proceedings of the Workshop on Privacy in the Electronic Society . WPES'11 - Proceedings of the Workshop on Privacy in the Electronic Society . Chicago, IL, United States: ACM; 2011.
AlSabah M, Bauer K, Goldberg I, Grunwald D, McCoy D, Savage S, Voelker GM. DefenestraTor: Throwing out Windows in Tor. In: PETS'11 - Proceedings of the 11th Privacy Enhancing Technologies Symposium . PETS'11 - Proceedings of the 11th Privacy Enhancing Technologies Symposium . Waterloo, Canada; 2011.
Henry R, Goldberg I. Formalizing Anonymous Blacklisting Systems. In: Proceedings of the 2011 IEEE Symposium on Security and Privacy. Proceedings of the 2011 IEEE Symposium on Security and Privacy. San Francisco, CA, USA; 2011.
Mittal P, Olumofin F, Troncoso C, Borisov N, Goldberg I. PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval. In: Proceedings of the 20th USENIX Security Symposium. Proceedings of the 20th USENIX Security Symposium. San Francisco, CA, USA; 2011.
Wustrow E, Wolchok S, Goldberg I, Halderman AJ. Telex: Anticensorship in the Network Infrastructure. In: Proceedings of the 20th USENIX Security Symposium. Proceedings of the 20th USENIX Security Symposium. San Francisco, CA, USA; 2011.
2009
Danezis G, Goldberg I. Sphinx: A Compact and Provably Secure Mix Format. In: Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), 17-20 May, Oakland, California, USA. Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), 17-20 May, Oakland, California, USA. IEEE Computer Society; 2009. pp. 269–282. Available from: http://portal.acm.org/citation.cfm?id=1607723.1608138
2008
Danezis G, Syverson P. Bridging and Fingerprinting: Epistemic Attacks on Route Selection. In: Borisov N, Goldberg I Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 133–150. Available from: http://www.springerlink.com/content/q2r7g81286026576/
Danezis G, Sassaman L. How to Bypass Two Anonymity Revocation Systems. In: Borisov N, Goldberg I Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 187–201. Available from: http://www.springerlink.com/content/179453h161722821/
Diaz C, Troncoso C, Serjantov A. On the Impact of Social Network Profiling on Anonymity. In: Borisov N, Goldberg I Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 44–62. Available from: http://portal.acm.org/citation.cfm?id=1428263
Murdoch SJ, Watson RNM. Metrics for Security and Performance in Low-Latency Anonymity Networks. In: Borisov N, Goldberg I Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 115–132. Available from: http://portal.acm.org/citation.cfm?id=1428259.1428267
Androulaki E, Raykova M, Srivatsan S, Stavrou A, Bellovin SM. PAR: Payment for Anonymous Routing. In: Borisov N, Goldberg I Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 219–236. Available from: http://www.springerlink.com/content/r1h1046823587382/
Troncoso C, Gierlichs B, Preneel B, Verbauwhede I. Perfect Matching Statistical Disclosure Attacks. In: Borisov N, Goldberg I Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 2–23. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.4953
Androulaki E, Choi SG, Bellovin SM, Malkin T. Reputation Systems for Anonymous Networks. In: Borisov N, Goldberg I Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 202–218. Available from: http://portal.acm.org/citation.cfm?id=1428259.1428272
McCoy D, Bauer K, Grunwald D, Kohno T, Sicker D. Shining Light in Dark Places: Understanding the Tor Network. In: Borisov N, Goldberg I Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 63–76. Available from: http://portal.acm.org/citation.cfm?id=1428264
2007
Goldberg I. Improving the Robustness of Private Information Retrieval. In: Proceedings of the 2007 IEEE Symposium on Security and Privacy. Proceedings of the 2007 IEEE Symposium on Security and Privacy. IEEE Computer Society Washington, DC, USA; 2007. Available from: http://portal.acm.org/citation.cfm?id=1264203
2006
Goldberg I. On the Security of the Tor Authentication Protocol. In: Danezis G, Golle P Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Cambridge, UK: Springer; 2006. pp. 316–331. Available from: http://www.springerlink.com/content/n77w19002743xu51/
2002
Goldberg I. Privacy-enhancing technologies for the Internet, II: Five years later. In: Dingledine R, Syverson P Proceedings of Privacy Enhancing Technologies workshop (PET 2002). Proceedings of Privacy Enhancing Technologies workshop (PET 2002). Springer-Verlag, LNCS 2482; 2002. Available from: http://www.springerlink.com/content/740p21gl5a9f640m/