| 1999 |
| 20 | EE | David W. Kravitz,
David M. Goldschlag:
Conditional Access Concepts and Principles.
Financial Cryptography 1999: 158-172 |
| 19 | EE | Jon Callas,
Joan Feigenbaum,
David M. Goldschlag,
Erin Sawyer:
Fair Use, Intellectual Property, and the Information Economy (Panel Session Summary).
Financial Cryptography 1999: 173-183 |
| 18 | EE | Stuart G. Stubblebine,
Paul F. Syverson,
David M. Goldschlag:
Unlinkable serial transactions: protocols and applications.
ACM Trans. Inf. Syst. Secur. 2(4): 354-389 (1999) |
| 17 | EE | David M. Goldschlag,
Michael G. Reed,
Paul F. Syverson:
Onion Routing.
Commun. ACM 42(2): 39-41 (1999) |
| 16 | | David M. Goldschlag:
A Mechanization of Unity in PC-NQTHM-92.
J. Autom. Reasoning 23(3-4): 445-498 (1999) |
| 1998 |
| 15 | | David M. Goldschlag,
David W. Kravitz:
Pirate Card Rejection.
CARDIS 1998: 141-149 |
| 14 | EE | David M. Goldschlag,
Stuart G. Stubblebine:
Publicly Verifiable Lotteries: Applications of Delaying Functions.
Financial Cryptography 1998: 214-226 |
| 1997 |
| 13 | | Paul F. Syverson,
Stuart G. Stubblebine,
David M. Goldschlag:
Unlinkable Serial Transactions.
Financial Cryptography 1997: 39-56 |
| 12 | EE | Paul F. Syverson,
David M. Goldschlag,
Michael G. Reed:
Anonymous Connections and Onion Routing.
IEEE Symposium on Security and Privacy 1997: 44-54 |
| 11 | | Michael G. Reed,
Paul F. Syverson,
David M. Goldschlag:
Protocols Using Anonymous Connections: Mobile Applications.
Security Protocols Workshop 1997: 13-23 |
| 10 | | Paul F. Syverson,
Michael G. Reed,
David M. Goldschlag:
Private Web Browsing.
Journal of Computer Security 5(3): 237-248 (1997) |
| 1996 |
| 9 | EE | David M. Goldschlag:
Several Secure Store and Forward Devices.
ACM Conference on Computer and Communications Security 1996: 129-137 |
| 8 | EE | Michael G. Reed,
Paul F. Syverson,
David M. Goldschlag:
Proxies For Anonymous Routing.
ACSAC 1996: 95-104 |
| 7 | EE | John P. McDermott,
David M. Goldschlag:
Towards a model of storage jamming.
CSFW 1996: 176- |
| 6 | | David M. Goldschlag,
Michael G. Reed,
Paul F. Syverson:
Hiding Routing Information.
Information Hiding 1996: 137-150 |
| 1995 |
| 5 | | John P. McDermott,
David M. Goldschlag:
Storage Jamming.
DBSec 1995: 365-381 |
| 1994 |
| 4 | | David M. Goldschlag:
Mechanically Verifying Safety and Liveness Properties of Delay Insensitive Circuits.
Formal Methods in System Design 5(3): 207-225 (1994) |
| 1991 |
| 3 | | David M. Goldschlag:
Mechanically Verifying Safety and Liveness Properties of Delay Insensitive Circuits.
CAV 1991: 354-364 |
| 2 | | David M. Goldschlag:
A Mechanical Formalization of Several Fairness Notions.
VDM Europe (1) 1991: 125-148 |
| 1990 |
| 1 | EE | David M. Goldschlag:
Mechanically Verifying Concurrent Programs with the Boyer-Moore Prover.
IEEE Trans. Software Eng. 16(9): 1005-1023 (1990) |