1999 |
20 | EE | David W. Kravitz,
David M. Goldschlag:
Conditional Access Concepts and Principles.
Financial Cryptography 1999: 158-172 |
19 | EE | Jon Callas,
Joan Feigenbaum,
David M. Goldschlag,
Erin Sawyer:
Fair Use, Intellectual Property, and the Information Economy (Panel Session Summary).
Financial Cryptography 1999: 173-183 |
18 | EE | Stuart G. Stubblebine,
Paul F. Syverson,
David M. Goldschlag:
Unlinkable serial transactions: protocols and applications.
ACM Trans. Inf. Syst. Secur. 2(4): 354-389 (1999) |
17 | EE | David M. Goldschlag,
Michael G. Reed,
Paul F. Syverson:
Onion Routing.
Commun. ACM 42(2): 39-41 (1999) |
16 | | David M. Goldschlag:
A Mechanization of Unity in PC-NQTHM-92.
J. Autom. Reasoning 23(3-4): 445-498 (1999) |
1998 |
15 | | David M. Goldschlag,
David W. Kravitz:
Pirate Card Rejection.
CARDIS 1998: 141-149 |
14 | EE | David M. Goldschlag,
Stuart G. Stubblebine:
Publicly Verifiable Lotteries: Applications of Delaying Functions.
Financial Cryptography 1998: 214-226 |
1997 |
13 | | Paul F. Syverson,
Stuart G. Stubblebine,
David M. Goldschlag:
Unlinkable Serial Transactions.
Financial Cryptography 1997: 39-56 |
12 | EE | Paul F. Syverson,
David M. Goldschlag,
Michael G. Reed:
Anonymous Connections and Onion Routing.
IEEE Symposium on Security and Privacy 1997: 44-54 |
11 | | Michael G. Reed,
Paul F. Syverson,
David M. Goldschlag:
Protocols Using Anonymous Connections: Mobile Applications.
Security Protocols Workshop 1997: 13-23 |
10 | | Paul F. Syverson,
Michael G. Reed,
David M. Goldschlag:
Private Web Browsing.
Journal of Computer Security 5(3): 237-248 (1997) |
1996 |
9 | EE | David M. Goldschlag:
Several Secure Store and Forward Devices.
ACM Conference on Computer and Communications Security 1996: 129-137 |
8 | EE | Michael G. Reed,
Paul F. Syverson,
David M. Goldschlag:
Proxies For Anonymous Routing.
ACSAC 1996: 95-104 |
7 | EE | John P. McDermott,
David M. Goldschlag:
Towards a model of storage jamming.
CSFW 1996: 176- |
6 | | David M. Goldschlag,
Michael G. Reed,
Paul F. Syverson:
Hiding Routing Information.
Information Hiding 1996: 137-150 |
1995 |
5 | | John P. McDermott,
David M. Goldschlag:
Storage Jamming.
DBSec 1995: 365-381 |
1994 |
4 | | David M. Goldschlag:
Mechanically Verifying Safety and Liveness Properties of Delay Insensitive Circuits.
Formal Methods in System Design 5(3): 207-225 (1994) |
1991 |
3 | | David M. Goldschlag:
Mechanically Verifying Safety and Liveness Properties of Delay Insensitive Circuits.
CAV 1991: 354-364 |
2 | | David M. Goldschlag:
A Mechanical Formalization of Several Fairness Notions.
VDM Europe (1) 1991: 125-148 |
1990 |
1 | EE | David M. Goldschlag:
Mechanically Verifying Concurrent Programs with the Boyer-Moore Prover.
IEEE Trans. Software Eng. 16(9): 1005-1023 (1990) |