default search action
Ian Goldberg
Person information
- affiliation: University of Waterloo, Canada
- award (2011): EFF Pioneer Award
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Sajin Sasy, Ian Goldberg:
SoK: Metadata-Protecting Communication Systems. Proc. Priv. Enhancing Technol. 2024(1): 509-524 (2024) - [j22]Sajin Sasy, Adithya Vadapalli, Ian Goldberg:
PRAC: Round-Efficient 3-Party MPC for Dynamic Data Structures. Proc. Priv. Enhancing Technol. 2024(3): 692-714 (2024) - [i31]Chelsea Komlo, Ian Goldberg:
Arctic: Lightweight and Stateless Threshold Schnorr Signatures. IACR Cryptol. ePrint Arch. 2024: 466 (2024) - [i30]Deirdre Connolly, Chelsea Komlo, Ian Goldberg, Christopher A. Wood:
The Flexible Round-Optimized Schnorr Threshold (FROST) Protocol for Two-Round Schnorr Signatures. RFC 9591: 1-47 (2024) - 2023
- [j21]Lindsey Tulloch, Ian Goldberg:
Lox: Protecting the Social Graph in Bridge Distribution. Proc. Priv. Enhancing Technol. 2023(1): 494-509 (2023) - [c92]Sajin Sasy, Aaron Johnson, Ian Goldberg:
Waks-On/Waks-Off: Fast Oblivious Offline/Online Shuffling and Sorting with Waksman Networks. CCS 2023: 3328-3342 - [c91]Thomas Humphries, Simon Oya, Lindsey Tulloch, Matthew Rafuse, Ian Goldberg, Urs Hengartner, Florian Kerschbaum:
Investigating Membership Inference Attacks under Data Dependencies. CSF 2023: 473-488 - [c90]Justin Tracey, Ian Goldberg:
Grading on a Curve: How Rust can Facilitate New Contributors while Decreasing Vulnerabilities. SecDev 2023: 26-36 - [c89]Adithya Vadapalli, Ryan Henry, Ian Goldberg:
Duoram: A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation. USENIX Security Symposium 2023: 3907-3924 - [i29]Chelsea Komlo, Ian Goldberg, Douglas Stebila:
A Formal Treatment of Distributed Key Generation, and New Constructions. IACR Cryptol. ePrint Arch. 2023: 292 (2023) - [i28]Sajin Sasy, Ian Goldberg:
SoK: Metadata-Protecting Communication Systems. IACR Cryptol. ePrint Arch. 2023: 313 (2023) - [i27]Sajin Sasy, Aaron Johnson, Ian Goldberg:
Waks-On/Waks-Off: Fast Oblivious Offline/Online Shuffling and Sorting with Waksman Networks. IACR Cryptol. ePrint Arch. 2023: 1236 (2023) - [i26]Sajin Sasy, Adithya Vadapalli, Ian Goldberg:
PRAC: Round-Efficient 3-Party MPC for Dynamic Data Structures. IACR Cryptol. ePrint Arch. 2023: 1897 (2023) - 2022
- [c88]Edward Eaton, Sajin Sasy, Ian Goldberg:
Improving the Privacy of Tor Onion Services. ACNS 2022: 273-292 - [c87]Yuhao Dong, Ian Goldberg, Sergey Gorbunov, Raouf Boutaba:
Astrape: Anonymous Payment Channels with Boring Cryptography. ACNS 2022: 748-768 - [c86]Sajin Sasy, Aaron Johnson, Ian Goldberg:
Fast Fully Oblivious Compaction and Shuffling. CCS 2022: 2565-2579 - [c85]Stan Gurtler, Ian Goldberg:
PRSONA: Private Reputation Supporting Ongoing Network Avatars. WPES@CCS 2022: 55-68 - [i25]Edward Eaton, Sajin Sasy, Ian Goldberg:
Improving the Privacy of Tor Onion Services. IACR Cryptol. ePrint Arch. 2022: 407 (2022) - [i24]Yuhao Dong, Ian Goldberg, Sergey Gorbunov, Raouf Boutaba:
Astrape: Anonymous Payment Channels with Boring Cryptography. IACR Cryptol. ePrint Arch. 2022: 450 (2022) - [i23]Sajin Sasy, Aaron Johnson, Ian Goldberg:
Fast Fully Oblivious Compaction and Shuffling. IACR Cryptol. ePrint Arch. 2022: 1333 (2022) - [i22]Adithya Vadapalli, Ryan Henry, Ian Goldberg:
Duoram: A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation. IACR Cryptol. ePrint Arch. 2022: 1747 (2022) - 2021
- [j20]Stan Gurtler, Ian Goldberg:
SoK: Privacy-Preserving Reputation Systems. Proc. Priv. Enhancing Technol. 2021(1): 107-127 (2021) - [c84]Steven Engler, Ian Goldberg:
Weaving a Faster Tor: A Multi-Threaded Relay Architecture for Improved Throughput. ARES 2021: 9:1-9:11 - [c83]Rob Jansen, Justin Tracey, Ian Goldberg:
Once is Never Enough: Foundations for Sound Statistical Inference in Tor Network Experimentation. USENIX Security Symposium 2021: 3415-3432 - [c82]Akshaya Mani, Ian Goldberg:
ZXAD: High-volume Attack Mitigation for Tor. WPES@CCS 2021: 1-16 - [c81]Miti Mazmudar, Stan Gurtler, Ian Goldberg:
Do You Feel a Chill?: Using PIR against Chilling Effects for Censorship-resistant Publishing. WPES@CCS 2021: 53-57 - [c80]Anna Harbluk Lorimer, Lindsey Tulloch, Cecylia Bocovich, Ian Goldberg:
OUStralopithecus: Overt User Simulation for Censorship Circumvention. WPES@CCS 2021: 137-150 - [i21]Rob Jansen, Justin Tracey, Ian Goldberg:
Once is Never Enough: Foundations for Sound Statistical Inference in Tor Network Experimentation. CoRR abs/2102.05196 (2021) - [i20]Akshaya Mani, Ian Goldberg:
ZXAD: Zero-knowledge Exit Abuse Detection for Tor. IACR Cryptol. ePrint Arch. 2021: 374 (2021) - [i19]Miti Mazmudar, Stan Gurtler, Ian Goldberg:
Do you feel a chill? Using PIR against chilling effects for censorship-resistant publishing. IACR Cryptol. ePrint Arch. 2021: 1195 (2021) - 2020
- [j19]Bailey Kacsmar, Chelsea Komlo, Florian Kerschbaum, Ian Goldberg:
Mind the Gap: Ceremonies for Applied Secret Sharing. Proc. Priv. Enhancing Technol. 2020(2): 397-415 (2020) - [j18]Miti Mazmudar, Ian Goldberg:
Mitigator: Privacy policy compliance using trusted hardware. Proc. Priv. Enhancing Technol. 2020(3): 204-221 (2020) - [c79]Chelsea Komlo, Ian Goldberg:
FROST: Flexible Round-Optimized Schnorr Threshold Signatures. SAC 2020: 34-65 - [c78]Matthew Lakier, Dimcho Karakashev, Yixin Wang, Ian Goldberg:
Augmented Unlocking Techniques for Smartphones Using Pre-Touch Information. SUI 2020: 17:1-17:5 - [c77]Chelsea Komlo, Nick Mathewson, Ian Goldberg:
Walking Onions: Scaling Anonymity Networks while Protecting Users. USENIX Security Symposium 2020: 1003-1020 - [i18]Thomas Humphries, Matthew Rafuse, Lindsey Tulloch, Simon Oya, Ian Goldberg, Florian Kerschbaum:
Differentially Private Learning Does Not Bound Membership Inference. CoRR abs/2010.12112 (2020) - [i17]Chelsea Komlo, Ian Goldberg:
FROST: Flexible Round-Optimized Schnorr Threshold Signatures. IACR Cryptol. ePrint Arch. 2020: 852 (2020)
2010 – 2019
- 2019
- [j17]Sajin Sasy, Ian Goldberg:
ConsenSGX: Scaling Anonymous Communications Networks with Trusted Execution Environments. Proc. Priv. Enhancing Technol. 2019(3): 331-349 (2019) - [e3]Ian Goldberg, Tyler Moore:
Financial Cryptography and Data Security - 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11598, Springer 2019, ISBN 978-3-030-32100-0 [contents] - [i16]Matthew Lakier, Dimcho Karakashev, Yixin Wang, Ian Goldberg:
Augmented Unlocking Techniques for Smartphones Using Pre-Touch Information. CoRR abs/1908.09165 (2019) - 2018
- [j16]Nik Unger, Ian Goldberg:
Improved Strongly Deniable Authenticated Key Exchanges for Secure Messaging. Proc. Priv. Enhancing Technol. 2018(1): 21-66 (2018) - [j15]Cecylia Bocovich, Ian Goldberg:
Secure asymmetry and deployability for decoy routing systems. Proc. Priv. Enhancing Technol. 2018(3): 43-62 (2018) - [j14]Alex Davidson, Ian Goldberg, Nick Sullivan, George Tankersley, Filippo Valsorda:
Privacy Pass: Bypassing Internet Challenges Anonymously. Proc. Priv. Enhancing Technol. 2018(3): 164-180 (2018) - [j13]Navid Nasr Esfahani, Ian Goldberg, Douglas R. Stinson:
Some Results on the Existence of t-All-or-Nothing Transforms Over Arbitrary Alphabets. IEEE Trans. Inf. Theory 64(4): 3136-3143 (2018) - [c76]Brittany Postnikoff, Ian Goldberg:
Robot Social Engineering: Attacking Human Factors with Non-Human Actors. HRI (Companion) 2018: 313-314 - [c75]Stefanie Roos, Pedro Moreno-Sanchez, Aniket Kate, Ian Goldberg:
Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions. NDSS 2018 - [c74]Erinn Atwater, Ian Goldberg:
Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices. Security Protocols Workshop 2018: 289-294 - [c73]Erinn Atwater, Ian Goldberg:
Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices (Transcript of Discussion). Security Protocols Workshop 2018: 295-303 - [c72]Justin Tracey, Rob Jansen, Ian Goldberg:
High Performance Tor Experimentation from the Magic of Dynamic ELFs. CSET @ USENIX Security Symposium 2018 - [c71]Christopher McKnight, Ian Goldberg:
Style Counsel: Seeing the (Random) Forest for the Trees in Adversarial Code Stylometry. WPES@CCS 2018: 138-142 - 2017
- [c70]Cecylia Bocovich, John A. Doucette, Ian Goldberg:
Lavinia: An Audit-Payment Protocol for Censorship-Resistant Storage. Financial Cryptography 2017: 601-620 - [c69]Erinn Atwater, Cecylia Bocovich, Urs Hengartner, Ian Goldberg:
Live Lesson: Netsim: Network simulation and hacking for high schoolers. ASE @ USENIX Security Symposium 2017 - [c68]Tao Wang, Ian Goldberg:
Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks. USENIX Security Symposium 2017: 1375-1390 - [i15]Navid Nasr Esfahani, Ian Goldberg, Douglas R. Stinson:
Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets. CoRR abs/1702.06612 (2017) - [i14]Stefanie Roos, Pedro Moreno-Sanchez, Aniket Kate, Ian Goldberg:
Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions. CoRR abs/1709.05748 (2017) - [i13]Navid Nasr Esfahani, Ian Goldberg, Douglas R. Stinson:
Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets. IACR Cryptol. ePrint Arch. 2017: 177 (2017) - 2016
- [j12]Mashael AlSabah, Ian Goldberg:
Performance and Security Improvements for Tor: A Survey. ACM Comput. Surv. 49(2): 32:1-32:36 (2016) - [j11]Tao Wang, Ian Goldberg:
On Realistically Attacking Tor with Website Fingerprinting. Proc. Priv. Enhancing Technol. 2016(4): 21-36 (2016) - [j10]Sheharbano Khattak, Tariq Elahi, Laurent Simon, Colleen M. Swanson, Steven J. Murdoch, Ian Goldberg:
SoK: Making Sense of Censorship Resistance Systems. Proc. Priv. Enhancing Technol. 2016(4): 37-61 (2016) - [j9]Tariq Elahi, John A. Doucette, Hadi Hosseini, Steven J. Murdoch, Ian Goldberg:
A Framework for the Game-theoretic Analysis of Censorship Resistance. Proc. Priv. Enhancing Technol. 2016(4): 83-101 (2016) - [j8]Raphael R. Toledo, George Danezis, Ian Goldberg:
Lower-Cost ∈-Private Information Retrieval. Proc. Priv. Enhancing Technol. 2016(4): 184-201 (2016) - [c67]Ian Goldberg, Graeme Jenkinson, Frank Stajano:
Low-Cost Mitigation Against Cold Boot Attacks for an Authentication Token. ACNS 2016: 36-57 - [c66]Cecylia Bocovich, Ian Goldberg:
Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement. CCS 2016: 1702-1714 - [c65]Ian Goldberg, Graeme Jenkinson, David Llewellyn-Jones, Frank Stajano:
Red Button and Yellow Button: Usable Security for Lost Security Tokens. Security Protocols Workshop 2016: 165-171 - [c64]Nik Unger, Sahithi Thandra, Ian Goldberg:
Elxa: Scalable Privacy-Preserving Plagiarism Detection. WPES@CCS 2016: 153-164 - [i12]Raphael R. Toledo, George Danezis, Ian Goldberg:
Lower-Cost epsilon-Private Information Retrieval. CoRR abs/1604.00223 (2016) - 2015
- [j7]Nikita Borisov, George Danezis, Ian Goldberg:
DP5: A Private Presence Service. Proc. Priv. Enhancing Technol. 2015(2): 4-24 (2015) - [c63]Nik Unger, Ian Goldberg:
Deniable Key Exchanges for Secure Messaging. CCS 2015: 1211-1223 - [c62]Wouter Lueks, Ian Goldberg:
Sublinear Scaling for Multi-Client Private Information Retrieval. Financial Cryptography 2015: 168-186 - [c61]Erinn Atwater, Cecylia Bocovich, Urs Hengartner, Ed Lank, Ian Goldberg:
Leading Johnny to Water: Designing for Usability and Trust. SOUPS 2015: 69-88 - [c60]Nik Unger, Sergej Dechand, Joseph Bonneau, Sascha Fahl, Henning Perl, Ian Goldberg, Matthew Smith:
SoK: Secure Messaging. IEEE Symposium on Security and Privacy 2015: 232-249 - [i11]Mashael AlSabah, Ian Goldberg:
Performance and Security Improvements for Tor: A Survey. IACR Cryptol. ePrint Arch. 2015: 235 (2015) - 2014
- [c59]Xiang Cai, Rishab Nithyanand, Tao Wang, Rob Johnson, Ian Goldberg:
A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses. CCS 2014: 227-238 - [c58]Tariq Elahi, George Danezis, Ian Goldberg:
PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks. CCS 2014: 1068-1079 - [c57]Juan Pablo Hourcade, Ann Cavoukian, Ronald J. Deibert, Lorrie Faith Cranor, Ian Goldberg:
Electronic privacy and surveillance. CHI Extended Abstracts 2014: 1075-1080 - [c56]Casey Devet, Ian Goldberg:
The Best of Both Worlds: Combining Information-Theoretic and Computational PIR for Communication Efficiency. Privacy Enhancing Technologies 2014: 63-82 - [c55]Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, Ian Goldberg:
Effective Attacks and Provable Defenses for Website Fingerprinting. USENIX Security Symposium 2014: 143-157 - [i10]Tariq Elahi, Steven J. Murdoch, Ian Goldberg:
Censorship Resistance: Let a Thousand Flowers Bloom? CoRR abs/1412.1859 (2014) - 2013
- [j6]Ian Goldberg, Douglas Stebila, Berkant Ustaoglu:
Anonymity and one-way authentication in key exchange protocols. Des. Codes Cryptogr. 67(2): 245-269 (2013) - [j5]Maxwell Young, Aniket Kate, Ian Goldberg, Martin Karsten:
Towards Practical Communication in Byzantine-Resistant DHTs. IEEE/ACM Trans. Netw. 21(1): 190-203 (2013) - [c54]Ryan Henry, Ian Goldberg:
Batch Proofs of Partial Knowledge. ACNS 2013: 502-517 - [c53]Mashael AlSabah, Ian Goldberg:
PCTCP: per-circuit TCP-over-IPsec transport for anonymous communication overlay networks. CCS 2013: 349-360 - [c52]Ryan Henry, Yizhou Huang, Ian Goldberg:
One (Block) Size Fits All: PIR and SPIR with Variable-Length Records via Multi-Block Queries. NDSS 2013 - [c51]Mashael AlSabah, Kevin S. Bauer, Tariq Elahi, Ian Goldberg:
The Path Less Travelled: Overcoming Tor's Bottlenecks with Traffic Splitting. Privacy Enhancing Technologies 2013: 143-163 - [c50]Ryan Henry, Ian Goldberg:
Thinking inside the BLAC box: smarter protocols for faster anonymous blacklisting. WPES 2013: 71-82 - [c49]Yizhou Huang, Ian Goldberg:
Outsourced private information retrieval. WPES 2013: 119-130 - [c48]Tao Wang, Ian Goldberg:
Improved website fingerprinting on Tor. WPES 2013: 201-212 - 2012
- [c47]Michael Backes, Ian Goldberg, Aniket Kate, Tomas Toft:
Adding query privacy to robust DHTs. AsiaCCS 2012: 30-31 - [c46]Mashael AlSabah, Kevin S. Bauer, Ian Goldberg:
Enhancing Tor's performance using real-time traffic classification. CCS 2012: 73-84 - [c45]Hooman Mohajeri Moghaddam, Baiyu Li, Mohammad Derakhshani, Ian Goldberg:
SkypeMorph: protocol obfuscation for Tor bridges. CCS 2012: 97-108 - [c44]Michael Backes, Ian Goldberg, Aniket Kate, Esfandiar Mohammadi:
Provably Secure and Practical Onion Routing. CSF 2012: 369-385 - [c43]Tao Wang, Kevin S. Bauer, Clara Forero, Ian Goldberg:
Congestion-Aware Path Selection for Tor. Financial Cryptography 2012: 98-113 - [c42]Casey Devet, Ian Goldberg, Nadia Heninger:
Optimally Robust Private Information Retrieval. USENIX Security Symposium 2012: 269-283 - [c41]Tariq Elahi, Kevin S. Bauer, Mashael AlSabah, Roger Dingledine, Ian Goldberg:
Changing of the guards: a framework for understanding and improving entry guard selection in tor. WPES 2012: 43-54 - [i9]Casey Devet, Ian Goldberg, Nadia Heninger:
Optimally Robust Private Information Retrieval. IACR Cryptol. ePrint Arch. 2012: 83 (2012) - [i8]Aniket Kate, Yizhou Huang, Ian Goldberg:
Distributed Key Generation in the Wild. IACR Cryptol. ePrint Arch. 2012: 377 (2012) - 2011
- [j4]Aniket Kate, Ian Goldberg:
Generalizing cryptosystems based on the subset sum problem. Int. J. Inf. Sec. 10(3): 189-199 (2011) - [c40]Ryan Henry, Femi G. Olumofin, Ian Goldberg:
Practical PIR for electronic commerce. CCS 2011: 677-690 - [c39]Femi G. Olumofin, Ian Goldberg:
Revisiting the Computational Practicality of Private Information Retrieval. Financial Cryptography 2011: 158-172 - [c38]Mashael AlSabah, Kevin S. Bauer, Ian Goldberg, Dirk Grunwald, Damon McCoy, Stefan Savage, Geoffrey M. Voelker:
DefenestraTor: Throwing Out Windows in Tor. PETS 2011: 134-154 - [c37]Ryan Henry, Ian Goldberg:
Formalizing Anonymous Blacklisting Systems. IEEE Symposium on Security and Privacy 2011: 81-95 - [c36]Ryan Henry, Ian Goldberg:
Extending Nymble-like Systems. IEEE Symposium on Security and Privacy 2011: 523-537 - [c35]Prateek Mittal, Femi G. Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg:
PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval. USENIX Security Symposium 2011 - [c34]Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman:
Telex: Anticensorship in the Network Infrastructure. USENIX Security Symposium 2011 - [c33]Jeremy Day, Yizhou Huang, Edward Knapp, Ian Goldberg:
SPEcTRe: spot-checked private ecash tolling at roadside. WPES 2011: 61-68 - [c32]Rob Smits, Divam Jain, Sarah Pidcock, Ian Goldberg, Urs Hengartner:
BridgeSPA: improving Tor bridges with single packet authorization. WPES 2011: 93-102 - [i7]Michael Backes, Ian Goldberg, Aniket Kate, Tomas Toft:
Adding Query Privacy to Robust DHTs. CoRR abs/1107.1072 (2011) - [i6]Michael Backes, Ian Goldberg, Aniket Kate, Esfandiar Mohammadi:
Provably Secure and Practical Onion Routing. IACR Cryptol. ePrint Arch. 2011: 308 (2011) - 2010
- [j3]Ian Goldberg, Atefeh Mashatan, Douglas R. Stinson:
On message recognition protocols: recoverability and explicit confirmation. Int. J. Appl. Cryptogr. 2(2): 100-120 (2010) - [j2]Aniket Kate, Gregory M. Zaverucha, Ian Goldberg:
Pairing-Based Onion Routing with Improved Forward Secrecy. ACM Trans. Inf. Syst. Secur. 13(4): 29:1-29:32 (2010) - [c31]Aniket Kate, Gregory M. Zaverucha, Ian Goldberg:
Constant-Size Commitments to Polynomials and Their Applications. ASIACRYPT 2010: 177-194 - [c30]Can Tang, Ian Goldberg:
An improved algorithm for tor circuit scheduling. CCS 2010: 329-339 - [c29]Aniket Kate, Ian Goldberg:
Using Sphinx to Improve Onion Routing Circuit Construction. Financial Cryptography 2010: 359-366 - [c28]Maxwell Young, Aniket Kate, Ian Goldberg, Martin Karsten:
Practical Robust Communication in DHTs Tolerating a Byzantine Adversary. ICDCS 2010: 263-272 - [c27]Femi G. Olumofin, Ian Goldberg:
Privacy-Preserving Queries over Relational Databases. Privacy Enhancing Technologies 2010: 75-92 - [c26]Femi G. Olumofin, Piotr K. Tysowski, Ian Goldberg, Urs Hengartner:
Achieving Efficient Query Privacy for Location Based Services. Privacy Enhancing Technologies 2010: 93-110 - [c25]Ryan Henry, Kevin J. Henry, Ian Goldberg:
Making a Nymbler Nymble Using VERBS. Privacy Enhancing Technologies 2010: 111-129 - [c24]Aniket Kate, Ian Goldberg:
Distributed Private-Key Generators for Identity-Based Cryptography. SCN 2010: 436-453
2000 – 2009
- 2009
- [c23]Ian Goldberg, Atefeh Mashatan, Douglas R. Stinson:
A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks. ACNS 2009: 219-237 - [c22]Ian Goldberg, Berkant Ustaoglu, Matthew Van Gundy, Hao Chen:
Multi-party off-the-record messaging. CCS 2009: 358-368 - [c21]Aniket Kate, Ian Goldberg:
Distributed Key Generation for the Internet. ICDCS 2009: 119-128 - [c20]George Danezis, Ian Goldberg:
Sphinx: A Compact and Provably Secure Mix Format. SP 2009: 269-282 - [c19]Joel Reardon, Ian Goldberg:
Improving Tor using a TCP-over-DTLS Tunnel. USENIX Security Symposium 2009: 119-134 - [c18]Chris Alexander, Joel Reardon, Ian Goldberg:
Plinko: polling with a physical implementation of a noisy channel. WPES 2009: 109-112 - [e2]Ian Goldberg, Mikhail J. Atallah:
Privacy Enhancing Technologies, 9th International Symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009. Proceedings. Lecture Notes in Computer Science 5672, Springer 2009, ISBN 978-3-642-03167-0 [contents] - [i5]Aniket Kate, Ian Goldberg:
Asynchronous Distributed Private-Key Generators for Identity-Based Cryptography. IACR Cryptol. ePrint Arch. 2009: 355 (2009) - [i4]Aniket Kate, Ian Goldberg:
Using Sphinx to Improve Onion Routing Circuit Construction. IACR Cryptol. ePrint Arch. 2009: 628 (2009) - 2008
- [c17]Ryan Stedman, Kayo Yoshida, Ian Goldberg:
A user study of off-the-record messaging. SOUPS 2008: 95-104 - [e1]Nikita Borisov, Ian Goldberg:
Privacy Enhancing Technologies, 8th International Symposium, PETS 2008, Leuven, Belgium, July 23-25, 2008, Proceedings. Lecture Notes in Computer Science 5134, Springer 2008, ISBN 978-3-540-70629-8 [contents] - [i3]Aniket Kate, Gregory M. Zaverucha, Ian Goldberg:
Pairing-Based Onion Routing with Improved Forward Secrecy. IACR Cryptol. ePrint Arch. 2008: 80 (2008) - [i2]George Danezis, Ian Goldberg:
Sphinx: A Compact and Provably Secure Mix Format. IACR Cryptol. ePrint Arch. 2008: 475 (2008) - 2007
- [c16]Ge Zhong, Ian Goldberg, Urs Hengartner:
Louis, Lester and Pierre: Three Protocols for Location Privacy. Privacy Enhancing Technologies 2007: 62-76 - [c15]Aniket Kate, Gregory M. Zaverucha, Ian Goldberg:
Pairing-Based Onion Routing. Privacy Enhancing Technologies 2007: 95-112 - [c14]Ian Goldberg:
Improving the Robustness of Private Information Retrieval. S&P 2007: 131-148 - [c13]Chris Alexander, Ian Goldberg:
Improved user authentication in off-the-record messaging. WPES 2007: 41-47 - 2006
- [c12]Ian Goldberg:
On the Security of the Tor Authentication Protocol. Privacy Enhancing Technologies 2006: 316-331 - 2004
- [c11]Nikita Borisov, Ian Goldberg, Eric A. Brewer:
Off-the-record communication, or, why not to use PGP. WPES 2004: 77-84 - 2002
- [c10]Rebecca N. Wright, L. Jean Camp, Ian Goldberg, Ronald L. Rivest, Graham Wood:
Privacy Tradeoffs: Myth or Reality? Panel. Financial Cryptography 2002: 147-151 - [c9]Ian Goldberg:
Privacy-Enhancing Technologies for the Internet, II: Five Years Later. Privacy Enhancing Technologies 2002: 1-12 - 2001
- [c8]Scott A. Crosby, Ian Goldberg, Robert Johnson, Dawn Xiaodong Song, David A. Wagner:
A Cryptanalysis of the High-Bandwidth Digital Content Protection System. Digital Rights Management Workshop 2001: 192-200 - [c7]Nikita Borisov, Ian Goldberg, David A. Wagner:
Intercepting mobile communications: the insecurity of 802.11. MobiCom 2001: 180-189 - [i1]Ariel Glenn, Ian Goldberg, Frédéric Légaré, Anton Stiglic:
A Description of Protocols for Private Credentials. IACR Cryptol. ePrint Arch. 2001: 82 (2001) - 2000
- [c6]David A. Wagner, Ian Goldberg:
Proofs of Security for the Unix Password Hashing Algorithm. ASIACRYPT 2000: 560-572 - [c5]Adam Shostack, Ian Goldberg:
How not to design a privacy system: reflections on the process behind the Freedom product. CFP 2000: 85-87
1990 – 1999
- 1999
- [c4]Chris Hall, Ian Goldberg, Bruce Schneier:
Reaction Attacks against several Public-Key Cryptosystems. ICICS 1999: 2-12 - [c3]Ian Goldberg, Steven D. Gribble, David A. Wagner, Eric A. Brewer:
The Ninja Jukebox. USENIX Symposium on Internet Technologies and Systems 1999 - 1998
- [j1]Ian Goldberg, David A. Wagner:
TAZ Servers and the Rewebber Network: Enabling Anonymous Publishing on the World Wide Web. First Monday 3(4) (1998) - 1997
- [c2]Ian Goldberg, David A. Wagner, Eric A. Brewer:
Privacy-enhancing technologies for the Internet. COMPCON 1997: 103-109 - 1996
- [c1]Ian Goldberg, David A. Wagner, Randi Thomas, Eric A. Brewer:
A Secure Environment for Untrusted Helper Applications. USENIX Security Symposium 1996
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-25 21:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint