dblp.uni-trier.dewww.uni-trier.de

David M. Goldschlag

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

1999
20EEDavid W. Kravitz, David M. Goldschlag: Conditional Access Concepts and Principles. Financial Cryptography 1999: 158-172
19EEJon Callas, Joan Feigenbaum, David M. Goldschlag, Erin Sawyer: Fair Use, Intellectual Property, and the Information Economy (Panel Session Summary). Financial Cryptography 1999: 173-183
18EEStuart G. Stubblebine, Paul F. Syverson, David M. Goldschlag: Unlinkable serial transactions: protocols and applications. ACM Trans. Inf. Syst. Secur. 2(4): 354-389 (1999)
17EEDavid M. Goldschlag, Michael G. Reed, Paul F. Syverson: Onion Routing. Commun. ACM 42(2): 39-41 (1999)
16 David M. Goldschlag: A Mechanization of Unity in PC-NQTHM-92. J. Autom. Reasoning 23(3-4): 445-498 (1999)
1998
15 David M. Goldschlag, David W. Kravitz: Pirate Card Rejection. CARDIS 1998: 141-149
14EEDavid M. Goldschlag, Stuart G. Stubblebine: Publicly Verifiable Lotteries: Applications of Delaying Functions. Financial Cryptography 1998: 214-226
1997
13 Paul F. Syverson, Stuart G. Stubblebine, David M. Goldschlag: Unlinkable Serial Transactions. Financial Cryptography 1997: 39-56
12EEPaul F. Syverson, David M. Goldschlag, Michael G. Reed: Anonymous Connections and Onion Routing. IEEE Symposium on Security and Privacy 1997: 44-54
11 Michael G. Reed, Paul F. Syverson, David M. Goldschlag: Protocols Using Anonymous Connections: Mobile Applications. Security Protocols Workshop 1997: 13-23
10 Paul F. Syverson, Michael G. Reed, David M. Goldschlag: Private Web Browsing. Journal of Computer Security 5(3): 237-248 (1997)
1996
9EEDavid M. Goldschlag: Several Secure Store and Forward Devices. ACM Conference on Computer and Communications Security 1996: 129-137
8EEMichael G. Reed, Paul F. Syverson, David M. Goldschlag: Proxies For Anonymous Routing. ACSAC 1996: 95-104
7EEJohn P. McDermott, David M. Goldschlag: Towards a model of storage jamming. CSFW 1996: 176-
6 David M. Goldschlag, Michael G. Reed, Paul F. Syverson: Hiding Routing Information. Information Hiding 1996: 137-150
1995
5 John P. McDermott, David M. Goldschlag: Storage Jamming. DBSec 1995: 365-381
1994
4 David M. Goldschlag: Mechanically Verifying Safety and Liveness Properties of Delay Insensitive Circuits. Formal Methods in System Design 5(3): 207-225 (1994)
1991
3 David M. Goldschlag: Mechanically Verifying Safety and Liveness Properties of Delay Insensitive Circuits. CAV 1991: 354-364
2 David M. Goldschlag: A Mechanical Formalization of Several Fairness Notions. VDM Europe (1) 1991: 125-148
1990
1EEDavid M. Goldschlag: Mechanically Verifying Concurrent Programs with the Boyer-Moore Prover. IEEE Trans. Software Eng. 16(9): 1005-1023 (1990)

Coauthor Index

1Jon Callas [19]
2Joan Feigenbaum [19]
3David W. Kravitz [15] [20]
4John P. McDermott [5] [7]
5Michael G. Reed [6] [8] [10] [11] [12] [17]
6Erin Sawyer [19]
7Stuart G. Stubblebine [13] [14] [18]
8Paul F. Syverson [6] [8] [10] [11] [12] [13] [17] [18]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)