Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Ian
    Last name: Goldberg
    DBLP: 04/6434
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 95 of 95  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Navid Nasr Esfahani, Ian Goldberg, Douglas R. Stinson.
    Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets.
    CoRR 2017, Volume 0 (0) 2017
    Conference paper
    Navid Nasr Esfahani, Ian Goldberg, Douglas R. Stinson.
    Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets.
    IACR Cryptology ePrint Archive 2017, Volume 2017 (0) 2017
    Conference paper
    Tao Wang, Ian Goldberg.
    Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks.
    26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, August 16-18, 2017. 2017 (0) 2017
    Conference paper
    Erinn Atwater, Cecylia Bocovich, Urs Hengartner, Ian Goldberg.
    Live Lesson: Netsim: Network simulation and hacking for high schoolers.
    2017 USENIX Workshop on Advances in Security Education, ASE 2017, Vancouver, BC, Canada, August 15, 2017. 2017 (0) 2017
    Journal article
    Stefanie Roos, Pedro Moreno-Sanchez, Aniket Kate, Ian Goldberg.
    Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions.
    CoRR 2017, Volume 0 (0) 2017
    Conference paper
    Raphael R. Toledo, George Danezis, Ian Goldberg.
    Lower-Cost epsilon-Private Information Retrieval.
    CoRR 2016, Volume 0 (0) 2016
    Conference paper
    Ian Goldberg, Graeme Jenkinson, Frank Stajano.
    Low-Cost Mitigation Against Cold Boot Attacks for an Authentication Token.
    Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings 2016 (0) 2016
    Conference paper
    Cecylia Bocovich, Ian Goldberg.
    Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement.
    Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016 2016 (0) 2016
    Conference paper
    Raphael R. Toledo, George Danezis, Ian Goldberg.
    Lower-Cost -Private Information Retrieval.
    PoPETs 2016, Volume 2016 (0) 2016
    Conference paper
    Mashael AlSabah, Ian Goldberg.
    Performance and Security Improvements for Tor: A Survey.
    ACM Comput. Surv. 2016, Volume 49 (0) 2016
    Conference paper
    Nik Unger, Sahithi Thandra, Ian Goldberg.
    Elxa: Scalable Privacy-Preserving Plagiarism Detection.
    Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, WPES@CCS 2016, Vienna, Austria, October 24 - 28, 2016 2016 (0) 2016
    Conference paper
    Tao Wang 0012, Ian Goldberg.
    On Realistically Attacking Tor with Website Fingerprinting.
    PoPETs 2016, Volume 2016 (0) 2016
    Conference paper
    Sheharbano Khattak, Tariq Elahi, Laurent Simon, Colleen Swanson, Steven J. Murdoch, Ian Goldberg.
    SoK: Making Sense of Censorship Resistance Systems.
    PoPETs 2016, Volume 2016 (0) 2016
    Conference paper
    Tariq Elahi, John A. Doucette, Hadi Hosseini, Steven J. Murdoch, Ian Goldberg.
    A Framework for the Game-theoretic Analysis of Censorship Resistance.
    PoPETs 2016, Volume 2016 (0) 2016
    Conference paper
    Ian Goldberg, Graeme Jenkinson, David Llewellyn-Jones, Frank Stajano.
    Red Button and Yellow Button: Usable Security for Lost Security Tokens.
    Security Protocols XXIV - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers 2017 (0) 2016
    Conference paper
    Mashael AlSabah, Ian Goldberg.
    Performance and Security Improvements for Tor: A Survey.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Wouter Lueks, Ian Goldberg.
    Sublinear Scaling for Multi-Client Private Information Retrieval.
    Financial Cryptography and Data Security - 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers 2015 (0) 2015
    Conference paper
    Nik Unger, Sergej Dechand, Joseph Bonneau, Sascha Fahl, Henning Perl, Ian Goldberg, Matthew Smith 0001.
    SoK: Secure Messaging.
    2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015 2015 (0) 2015
    Conference paper
    Nik Unger, Ian Goldberg.
    Deniable Key Exchanges for Secure Messaging.
    Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-6, 2015 2015 (0) 2015
    Journal article
    Nikita Borisov, George Danezis, Ian Goldberg.
    DP5: A Private Presence Service.
    PoPETs 2015, Volume 2015 (0) 2015
    Conference paper
    Erinn Atwater, Cecylia Bocovich, Urs Hengartner, Ed Lank, Ian Goldberg.
    Leading Johnny to Water: Designing for Usability and Trust.
    Eleventh Symposium On Usable Privacy and Security, SOUPS 2015, Ottawa, Canada, July 22-24, 2015. 2015 (0) 2015
    Conference paper
    Casey Devet, Ian Goldberg.
    The Best of Both Worlds: Combining Information-Theoretic and Computational PIR for Communication Efficiency.
    Privacy Enhancing Technologies - 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, Ian Goldberg.
    Effective Attacks and Provable Defenses for Website Fingerprinting.
    Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014. 2014 (0) 2014
    Conference paper
    Tariq Elahi, George Danezis, Ian Goldberg.
    PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks.
    Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014 2014 (0) 2014
    Conference paper
    Xiang Cai, Rishab Nithyanand, Tao Wang, Rob Johnson, Ian Goldberg.
    A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses.
    Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014 2014 (0) 2014
    Journal article
    Tariq Elahi, Steven J. Murdoch, Ian Goldberg.
    Censorship Resistance: Let a Thousand Flowers Bloom?
    CoRR 2014, Volume 0 (0) 2014
    Conference paper
    Juan Pablo Hourcade, Ann Cavoukian, Ronald J. Deibert, Lorrie Faith Cranor, Ian Goldberg.
    Electronic privacy and surveillance.
    CHI Conference on Human Factors in Computing Systems, CHI'14, Toronto, ON, Canada - April 26 - May 01, 2014, Extended Abstracts 2014 (0) 2014
    Journal article
    Maxwell Young, Aniket Kate, Ian Goldberg, Martin Karsten.
    Towards Practical Communication in Byzantine-Resistant DHTs.
    IEEE/ACM Trans. Netw. 2013, Volume 21 (0) 2013
    Conference paper
    Ian Goldberg, Douglas Stebila, Berkant Ustaoglu.
    Anonymity and one-way authentication in key exchange protocols.
    Des. Codes Cryptography 2013, Volume 67 (0) 2013
    Conference paper
    Mashael AlSabah, Kevin S. Bauer, Tariq Elahi, Ian Goldberg.
    The Path Less Travelled: Overcoming Tor's Bottlenecks with Traffic Splitting.
    Privacy Enhancing Technologies - 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings 2013 (0) 2013
    Conference paper
    Ryan Henry, Ian Goldberg.
    Batch Proofs of Partial Knowledge.
    Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings 2013 (0) 2013
    Conference paper
    Ryan Henry, Yizhou Huang, Ian Goldberg.
    One (Block) Size Fits All: PIR and SPIR with Variable-Length Records via Multi-Block Queries.
    20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013 2013 (0) 2013
    Conference paper
    Mashael AlSabah, Ian Goldberg.
    PCTCP: per-circuit TCP-over-IPsec transport for anonymous communication overlay networks.
    2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013 2013 (0) 2013
    Conference paper
    Ryan Henry, Ian Goldberg.
    Thinking inside the BLAC box: smarter protocols for faster anonymous blacklisting.
    Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, WPES 2013, Berlin, Germany, November 4, 2013 2013 (0) 2013
    Conference paper
    Tao Wang, Ian Goldberg.
    Improved website fingerprinting on Tor.
    Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, WPES 2013, Berlin, Germany, November 4, 2013 2013 (0) 2013
    Conference paper
    Yizhou Huang, Ian Goldberg.
    Outsourced private information retrieval.
    Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, WPES 2013, Berlin, Germany, November 4, 2013 2013 (0) 2013
    Conference paper
    Tao Wang, Kevin S. Bauer, Clara Forero, Ian Goldberg.
    Congestion-Aware Path Selection for Tor.
    Financial Cryptography and Data Security - 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers 2012 (0) 2012
    Conference paper
    Michael Backes, Ian Goldberg, Aniket Kate, Esfandiar Mohammadi.
    Provably Secure and Practical Onion Routing.
    25th IEEE Computer Security Foundations Symposium, CSF 2012, Cambridge, MA, USA, June 25-27, 2012 2012 (0) 2012
    Conference paper
    Mashael AlSabah, Kevin S. Bauer, Ian Goldberg.
    Enhancing Tor's performance using real-time traffic classification.
    the ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012 2012 (0) 2012
    Conference paper
    Hooman Mohajeri Moghaddam, Baiyu Li, Mohammad Derakhshani, Ian Goldberg.
    SkypeMorph: protocol obfuscation for Tor bridges.
    the ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012 2012 (0) 2012
    Conference paper
    Tariq Elahi, Kevin S. Bauer, Mashael AlSabah, Roger Dingledine, Ian Goldberg.
    Changing of the guards: a framework for understanding and improving entry guard selection in tor.
    Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, WPES 2012, Raleigh, NC, USA, October 15, 2012 2012 (0) 2012
    Conference paper
    Aniket Kate, Yizhou Huang, Ian Goldberg.
    Distributed Key Generation in the Wild.
    IACR Cryptology ePrint Archive 2012, Volume 2012 (0) 2012
    Conference paper
    Casey Devet, Ian Goldberg, Nadia Heninger.
    Optimally Robust Private Information Retrieval.
    IACR Cryptology ePrint Archive 2012, Volume 2012 (0) 2012
    Conference paper
    Michael Backes 0001, Ian Goldberg, Aniket Kate, Tomas Toft.
    Adding query privacy to robust DHTs.
    7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012 2012 (0) 2012
    Conference paper
    Casey Devet, Ian Goldberg, Nadia Heninger.
    Optimally Robust Private Information Retrieval.
    Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012 2012 (0) 2012
    Conference paper
    Aniket Kate, Ian Goldberg.
    Generalizing cryptosystems based on the subset sum problem.
    Int. J. Inf. Sec. 2011, Volume 10 (0) 2011
    Journal article
    Michael Backes, Ian Goldberg, Aniket Kate, Tomas Toft.
    Adding Query Privacy to Robust DHTs
    CoRR 2011, Volume 0 (0) 2011
    Conference paper
    Mashael AlSabah, Kevin S. Bauer, Ian Goldberg, Dirk Grunwald, Damon McCoy, Stefan Savage, Geoffrey M. Voelker.
    DefenestraTor: Throwing Out Windows in Tor.
    Privacy Enhancing Technologies - 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings 2011 (0) 2011
    Conference paper
    Ryan Henry, Ian Goldberg.
    Formalizing Anonymous Blacklisting Systems.
    32nd IEEE Symposium on Security and Privacy, SP 2011, 22-25 May 2011, Berkeley, California, USA 2011 (0) 2011
    Conference paper
    Ryan Henry, Ian Goldberg.
    Extending Nymble-like Systems.
    32nd IEEE Symposium on Security and Privacy, SP 2011, 22-25 May 2011, Berkeley, California, USA 2011 (0) 2011
    Conference paper
    Ryan Henry, Femi G. Olumofin, Ian Goldberg.
    Practical PIR for electronic commerce.
    Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011 2011 (0) 2011
    Journal article
    Michael Backes, Ian Goldberg, Aniket Kate, Esfandiar Mohammadi.
    Provably Secure and Practical Onion Routing.
    IACR Cryptology ePrint Archive 2011, Volume 2011 (0) 2011
    Conference paper
    Femi G. Olumofin, Ian Goldberg.
    Revisiting the Computational Practicality of Private Information Retrieval.
    Financial Cryptography and Data Security - 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers 2012 (0) 2011
    Conference paper
    Prateek Mittal, Femi G. Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg.
    PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval.
    20th USENIX Security Symposium, San Francisco, CA, USA, August 8-12, 2011, Proceedings 2011 (0) 2011
    Conference paper
    Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman.
    Telex: Anticensorship in the Network Infrastructure.
    20th USENIX Security Symposium, San Francisco, CA, USA, August 8-12, 2011, Proceedings 2011 (0) 2011
    Conference paper
    Rob Smits, Divam Jain, Sarah Pidcock, Ian Goldberg, Urs Hengartner.
    BridgeSPA: improving Tor bridges with single packet authorization.
    Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, WPES 2011, Chicago, IL, USA, October 17, 2011 2011 (0) 2011
    Conference paper
    Jeremy Day, Yizhou Huang, Edward Knapp, Ian Goldberg.
    SPEcTRe: spot-checked private ecash tolling at roadside.
    Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, WPES 2011, Chicago, IL, USA, October 17, 2011 2011 (0) 2011
    Conference paper
    Femi G. Olumofin, Piotr K. Tysowski, Ian Goldberg, Urs Hengartner.
    Achieving Efficient Query Privacy for Location Based Services.
    Privacy Enhancing Technologies, 10th International Symposium, PETS 2010, Berlin, Germany, July 21-23, 2010. Proceedings 2010 (0) 2010
    Conference paper
    Ryan Henry, Kevin Henry, Ian Goldberg.
    Making a Nymbler Nymble Using VERBS.
    Privacy Enhancing Technologies, 10th International Symposium, PETS 2010, Berlin, Germany, July 21-23, 2010. Proceedings 2010 (0) 2010
    Conference paper
    Femi G. Olumofin, Ian Goldberg.
    Privacy-Preserving Queries over Relational Databases.
    Privacy Enhancing Technologies, 10th International Symposium, PETS 2010, Berlin, Germany, July 21-23, 2010. Proceedings 2010 (0) 2010
    Conference paper
    Aniket Kate, Ian Goldberg.
    Using Sphinx to Improve Onion Routing Circuit Construction.
    Financial Cryptography and Data Security, 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers 2010 (0) 2010
    Conference paper
    Maxwell Young, Aniket Kate, Ian Goldberg, Martin Karsten.
    Practical Robust Communication in DHTs Tolerating a Byzantine Adversary.
    2010 International Conference on Distributed Computing Systems, ICDCS 2010, Genova, Italy, June 21-25, 2010 2010 (0) 2010
    Conference paper
    Aniket Kate, Ian Goldberg.
    Distributed Private-Key Generators for Identity-Based Cryptography.
    Security and Cryptography for Networks, 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010. Proceedings 2010 (0) 2010
    Conference paper
    Can Tang, Ian Goldberg.
    An improved algorithm for tor circuit scheduling.
    Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010 2010 (0) 2010
    Conference paper
    Aniket Kate, Gregory M. Zaverucha, Ian Goldberg.
    Constant-Size Commitments to Polynomials and Their Applications.
    Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings 2010 (0) 2010
    Conference paper
    Aniket Kate, Gregory M. Zaverucha, Ian Goldberg.
    Pairing-Based Onion Routing with Improved Forward Secrecy.
    ACM Trans. Inf. Syst. Secur. 2010, Volume 13 (0) 2010
    Conference paper
    Ian Goldberg, Atefeh Mashatan, Douglas R. Stinson.
    On message recognition protocols: recoverability and explicit confirmation.
    IJACT 2010, Volume 2 (0) 2010
    Conference paper
    Joel Reardon, Ian Goldberg.
    Improving Tor using a TCP-over-DTLS Tunnel.
    18th USENIX Security Symposium, Montreal, Canada, August 10-14, 2009, Proceedings 2009 (0) 2009
    Conference paper
    Chris Alexander, Joel Reardon, Ian Goldberg.
    Plinko: polling with a physical implementation of a noisy channel.
    Proceedings of the 2009 ACM Workshop on Privacy in the Electronic Society, WPES 2009, Chicago, Illinois, USA, November 9, 2009 2009 (0) 2009
    Conference paper
    Aniket Kate, Ian Goldberg.
    Using Sphinx to Improve Onion Routing Circuit Construction.
    IACR Cryptology ePrint Archive 2009, Volume 2009 (0) 2009
    Conference paper
    Aniket Kate, Ian Goldberg.
    Asynchronous Distributed Private-Key Generators for Identity-Based Cryptography.
    IACR Cryptology ePrint Archive 2009, Volume 2009 (0) 2009
    Conference paper
    Ian Goldberg, Atefeh Mashatan, Douglas R. Stinson.
    A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks.
    Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings 2009 (0) 2009
    Conference paper
    Ian Goldberg, Berkant Ustaoglu, Matthew Van Gundy, Hao Chen.
    Multi-party off-the-record messaging.
    Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009 2009 (0) 2009
    Conference paper
    Aniket Kate, Ian Goldberg.
    Distributed Key Generation for the Internet.
    29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 22-26 June 2009, Montreal, Québec, Canada 2009 (0) 2009
    Conference paper
    George Danezis, Ian Goldberg.
    Sphinx: A Compact and Provably Secure Mix Format.
    30th IEEE Symposium on Security and Privacy (SP 2009), 17-20 May 2009, Oakland, California, USA 2009 (0) 2009
    Conference paper
    Aniket Kate, Gregory M. Zaverucha, Ian Goldberg.
    Pairing-Based Onion Routing with Improved Forward Secrecy.
    IACR Cryptology ePrint Archive 2008, Volume 2008 (0) 2008
    Conference paper
    George Danezis, Ian Goldberg.
    Sphinx: A Compact and Provably Secure Mix Format.
    IACR Cryptology ePrint Archive 2008, Volume 2008 (0) 2008
    Conference paper
    Ryan Stedman, Kayo Yoshida, Ian Goldberg.
    A user study of off-the-record messaging.
    Proceedings of the 4th Symposium on Usable Privacy and Security, SOUPS 2008, Pittsburgh, Pennsylvania, USA, July 23-25, 2008 2008 (0) 2008
    Conference paper
    Aniket Kate, Gregory M. Zaverucha, Ian Goldberg.
    Pairing-Based Onion Routing.
    Privacy Enhancing Technologies, 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007, Revised Selected Papers 2007 (0) 2007
    Conference paper
    Ge Zhong, Ian Goldberg, Urs Hengartner.
    Louis, Lester and Pierre: Three Protocols for Location Privacy.
    Privacy Enhancing Technologies, 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007, Revised Selected Papers 2007 (0) 2007
    Conference paper
    Ian Goldberg.
    Improving the Robustness of Private Information Retrieval.
    2007 IEEE Symposium on Security and Privacy (SP 2007), 20-23 May 2007, Oakland, California, USA 2007 (0) 2007
    Conference paper
    Chris Alexander, Ian Goldberg.
    Improved user authentication in off-the-record messaging.
    Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, WPES 2007, Alexandria, VA, USA, October 29, 2007 2007 (0) 2007
    Conference paper
    Ian Goldberg.
    On the Security of the Tor Authentication Protocol.
    Privacy Enhancing Technologies, 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers 2006 (0) 2006
    Conference paper
    Nikita Borisov, Ian Goldberg, Eric A. Brewer.
    Off-the-record communication, or, why not to use PGP.
    Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, WPES 2004, Washington, DC, USA, October 28, 2004 2004 (0) 2004
    Conference paper
    Rebecca N. Wright, L. Jean Camp, Ian Goldberg, Ronald L. Rivest, Graham Wood.
    Privacy Tradeoffs: Myth or Reality? Panel.
    Financial Cryptography, 6th International Conference, FC 2002, Southampton, Bermuda, March 11-14, 2002, Revised Papers 2003 (0) 2002
    Conference paper
    Ian Goldberg.
    Privacy-Enhancing Technologies for the Internet, II: Five Years Later.
    Privacy Enhancing Technologies, Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers 2003 (0) 2002
    Journal article
    Ariel Glenn, Ian Goldberg, Frédéric Légaré, Anton Stiglic.
    A Description of Protocols for Private Credentials.
    IACR Cryptology ePrint Archive 2001, Volume 2001 (0) 2001
    Conference paper
    Scott Crosby, Ian Goldberg, Robert Johnson, Dawn Xiaodong Song, David Wagner.
    A Cryptanalysis of the High-Bandwidth Digital Content Protection System.
    Security and Privacy in Digital Rights Management, ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers 2002 (0) 2001
    Conference paper
    Nikita Borisov, Ian Goldberg, David Wagner.
    Intercepting mobile communications: the insecurity of 802.11.
    MOBICOM 2001 (0) 2001
    Conference paper
    David Wagner, Ian Goldberg.
    Proofs of Security for the Unix Password Hashing Algorithm.
    Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings 2000 (0) 2000
    Conference paper
    Chris Hall, Ian Goldberg, Bruce Schneier.
    Reaction Attacks against several Public-Key Cryptosystems.
    Information and Communication Security, Second International Conference, ICICS'99, Sydney, Australia, November 9-11, 1999, Proceedings 1999 (0) 1999
    Conference paper
    Ian Goldberg, Steven D. Gribble, David Wagner, Eric A. Brewer.
    The Ninja Jukebox.
    USENIX Symposium on Internet Technologies and Systems 1999 (0) 1999
    Conference paper
    Ian Goldberg, David Wagner.
    TAZ Servers and the Rewebber Network: Enabling Anonymous Publishing on the World Wide Web.
    First Monday 1998, Volume 3 (0) 1998
    Conference paper
    Ian Goldberg, David Wagner, Eric A. Brewer.
    Privacy-enhancing technologies for the Internet.
    Proceedings IEEE COMPCON 97, San Jose, California, USA, February 23-26, 1997, Digest of Papers 1997 (0) 1997
    Conference paper
    Ian Goldberg, David Wagner, Randi Thomas, Eric A. Brewer.
    A Secure Environment for Untrusted Helper Applications.
    Proceedings of the 6th USENIX Security Symposium, San Jose, CA, USA, July 22-25, 1996 1996 (0) 1996
    Show item 1 to 95 of 95  

    Your query returned 95 matches in the database.