Paul F. Syverson

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

62 Peng Ning, Paul F. Syverson, Somesh Jha: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008 ACM 2008
61EEGeorge Danezis, Paul F. Syverson: Bridging and Fingerprinting: Epistemic Attacks on Route Selection. Privacy Enhancing Technologies 2008: 151-166
60 Peng Ning, Sabrina De Capitani di Vimercati, Paul F. Syverson: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007 ACM 2007
59EEJoan Feigenbaum, Aaron Johnson, Paul F. Syverson: A Model of Onion Routing with Provable Anonymity. Financial Cryptography 2007: 57-71
58EELasse Øverlier, Paul F. Syverson: Improving Efficiency and Simplicity of Tor Circuit Establishment and Hidden Services. Privacy Enhancing Technologies 2007: 134-152
57EEJoan Feigenbaum, Aaron Johnson, Paul F. Syverson: Probabilistic analysis of onion routing in a black-box model. WPES 2007: 1-10
56EEGeoffrey Goodell, Paul F. Syverson: The right place at the right time. Commun. ACM 50(5): 113-117 (2007)
55EELasse Øverlier, Paul F. Syverson: Locating Hidden Servers. IEEE Symposium on Security and Privacy 2006: 100-114
54EELasse Øverlier, Paul F. Syverson: Valet Services: Improving Hidden Servers with a Personal Touch. Privacy Enhancing Technologies 2006: 223-244
53EERoger Dingledine, Andrei Serjantov, Paul F. Syverson: Blending Different Latency Traffic with Alpha-mixing. Privacy Enhancing Technologies 2006: 245-257
52 Sabrina De Capitani di Vimercati, Paul F. Syverson, Dieter Gollmann: Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings Springer 2005
51EEAri Juels, Paul F. Syverson, Daniel V. Bailey: High-Power Proxies for Enhancing RFID Privacy and Utility. Privacy Enhancing Technologies 2005: 210-226
50 Vijay Atluri, Paul F. Syverson, Sabrina De Capitani di Vimercati: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, WPES 2004, Washington, DC, USA, October 28, 2004 ACM 2004
49EEPhilippe Golle, Markus Jakobsson, Ari Juels, Paul F. Syverson: Universal Re-encryption for Mixnets. CT-RSA 2004: 163-178
48EERoger Dingledine, Vitaly Shmatikov, Paul F. Syverson: Synchronous Batching: From Cascades to Free Routes. Privacy Enhancing Technologies 2004: 186-206
47EEClaudia Díaz, George Danezis, Christian Grothoff, Andreas Pfitzmann, Paul F. Syverson: Panel Discussion - Mix Cascades Versus Peer-to-Peer: Is One Concept Superior? Privacy Enhancing Technologies 2004: 242-242
46EERoger Dingledine, Nick Mathewson, Paul F. Syverson: Tor: The Second-Generation Onion Router. USENIX Security Symposium 2004: 303-320
45 Catherine Meadows, Paul F. Syverson, Iliano Cervesato: Formal specification and analysis of the Group Domain Of Interpretation Protocol using NPATRL and the NRL Protocol Analyzer. Journal of Computer Security 12(6): 893-931 (2004)
44 Sushil Jajodia, Pierangela Samarati, Paul F. Syverson: Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, WPES 2003, Washington, DC, USA, October 30, 2003 ACM 2003
43 Roger Dingledine, Paul F. Syverson: Privacy Enhancing Technologies, Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers Springer 2003
42EEPaul F. Syverson: Onion Routing for Resistance to Traffic Analysis. DISCEX (2) 2003: 108-110
41EEAlessandro Acquisti, Roger Dingledine, Paul F. Syverson: On the Economics of Anonymity. Financial Cryptography 2003: 84-102
40EERichard E. Newman, Ira S. Moskowitz, Paul F. Syverson, Andrei Serjantov: Metrics for Trafic Analysis Prevention. Privacy Enhancing Technologies 2003: 48-65
39 Paul F. Syverson: Financial Cryptography, 5th International Conference, FC 2001, Grand Cayman, British West Indies, February 19-22, 2002, Proceedings Springer 2002
38EERoger Dingledine, Paul F. Syverson: Reliable MIX Cascade Networks through Reputation. Financial Cryptography 2002: 253-268
37EERan Canetti, Catherine Meadows, Paul F. Syverson: Environmental Requirements for Authentication Protocols. ISSS 2002: 339-355
36EEAndrei Serjantov, Roger Dingledine, Paul F. Syverson: From a Trickle to a Flood: Active Attacks on Several Mix Types. Information Hiding 2002: 36-52
35EECatherine Meadows, Paul F. Syverson: Formalizing GDOI group key management requirements in NPATRL. ACM Conference on Computer and Communications Security 2001: 235-244
34EEPaul F. Syverson, Iliano Cervesato: The Logic of Authentication Protocols. FOSAD 2000: 63-136
33EEStuart G. Stubblebine, Paul F. Syverson: Authentic Attributes with Fine-Grained Anonymity Protection. Financial Cryptography 2000: 276-294
32EEPaul F. Syverson, Gene Tsudik, Michael G. Reed, Carl E. Landwehr: Towards an Analysis of Onion Routing Security. Workshop on Design Issues in Anonymity and Unobservability 2000: 96-114
31EEStuart G. Stubblebine, Paul F. Syverson: Fair On-Line Auctions without Special Trusted Parties. Financial Cryptography 1999: 230-240
30EEPaul F. Syverson, Stuart G. Stubblebine: Group Principals and the Formalization of Anonymity. World Congress on Formal Methods 1999: 814-833
29EEStuart G. Stubblebine, Paul F. Syverson, David M. Goldschlag: Unlinkable serial transactions: protocols and applications. ACM Trans. Inf. Syst. Secur. 2(4): 354-389 (1999)
28EEDavid M. Goldschlag, Michael G. Reed, Paul F. Syverson: Onion Routing. Commun. ACM 42(2): 39-41 (1999)
27EEPaul F. Syverson: Anonymity on the Internet (Panel). ACM Conference on Computer and Communications Security 1998: 37
26EEPaul F. Syverson: Weakly Secret Bit Commitment: Applications to Lotteries and Fair Exchange. CSFW 1998: 2-13
25EERoberto Gorrieri, Paul F. Syverson, Martín Abadi, Riccardo Focardi, Dieter Gollmann, Gavin Lowe, Catherine Meadows: Panel Introduction: Varieties of Authentication. CSFW 1998: 79-82
24EECatherine Meadows, Paul F. Syverson: A Formal Specification of Requirements for Payment Transactions in the SET Protocol. Financial Cryptography 1998: 122-140
23EEJames W. Gray III, Paul F. Syverson: A Logical Approach to Multilevel Security of Probabilistic Systems. Distributed Computing 11(2): 73-90 (1998)
22EEPaul F. Syverson: A Different Look at Secure Distributed Computation. CSFW 1997: 109-115
21 Paul F. Syverson, Stuart G. Stubblebine, David M. Goldschlag: Unlinkable Serial Transactions. Financial Cryptography 1997: 39-56
20EEPaul F. Syverson, David M. Goldschlag, Michael G. Reed: Anonymous Connections and Onion Routing. IEEE Symposium on Security and Privacy 1997: 44-54
19 Michael G. Reed, Paul F. Syverson, David M. Goldschlag: Protocols Using Anonymous Connections: Mobile Applications. Security Protocols Workshop 1997: 13-23
18 Paul F. Syverson, Michael G. Reed, David M. Goldschlag: Private Web Browsing. Journal of Computer Security 5(3): 237-248 (1997)
17EEMichael G. Reed, Paul F. Syverson, David M. Goldschlag: Proxies For Anonymous Routing. ACSAC 1996: 95-104
16EEPaul F. Syverson: What is an Attack on a Cryptographic Protocal? CSFW 1996: 188
15EEPaul F. Syverson: Limitations on Design Principles for Public Key Protocols. IEEE Symposium on Security and Privacy 1996: 62-72
14 David M. Goldschlag, Michael G. Reed, Paul F. Syverson: Hiding Routing Information. Information Hiding 1996: 137-150
13 Paul F. Syverson, Catherine Meadows: A Formal Language for Cryptographic Protocol Requirements. Des. Codes Cryptography 7(1-2): 27-59 (1996)
12 Paul F. Syverson: A New Look at an Old Protocol. Operating Systems Review 30(3): 1-4 (1996)
11EEPaul F. Syverson, James W. Gray III: The epistemic representation of information flow security in probabilistic systems. CSFW 1995: 152-166
10 Paul F. Syverson: A Taxonomy of Replay Attacks. CSFW 1994: 187-191
9EEPaul F. Syverson, Catherine Meadows: Formal Requirements for Key Distribution Protocols. EUROCRYPT 1994: 320-331
8 Paul F. Syverson: An Epistemic Logic of Situations. TARK 1994: 109-121
7EEPaul F. Syverson: Adding Time to a Logic of Authentication. ACM Conference on Computer and Communications Security 1993: 97-101
6 Paul F. Syverson: Panel: Cryptographic Protocol Models and Requirements. CSFW 1993: 161
5 Paul F. Syverson: On Key Distribution Protocols for Repeated Authentication. Operating Systems Review 27(4): 24-30 (1993)
4 Paul F. Syverson: Knowledge, Belief, and Semantics in the Analysis of Cryptographic Protocols. Journal of Computer Security 1(3-4): 317-334 (1992)
3 Paul F. Syverson: The Value of Semantics for the Analysis of Cryptographic Protocols. CSFW 1991: 228-229
2 Paul F. Syverson: The Use of Logic in the Analysis of Cryptographic Protocols. IEEE Symposium on Security and Privacy 1991: 156-170
1 Paul F. Syverson: Formal Semantics for Logics of Cryptographic Protocols. CSFW 1990: 32-41

Coauthor Index

1Martín Abadi [25]
2Alessandro Acquisti [41]
3Vijayalakshmi Atluri (Vijay Atluri) [50]
4Daniel V. Bailey [51]
5Ran Canetti [37]
6Iliano Cervesato [34] [45]
7George Danezis [47] [61]
8Claudia Díaz [47]
9Roger Dingledine [36] [38] [41] [43] [46] [48] [53]
10Joan Feigenbaum [57] [59]
11Riccardo Focardi [25]
12David M. Goldschlag [14] [17] [18] [19] [20] [21] [28] [29]
13Philippe Golle [49]
14Dieter Gollmann [25] [52]
15Geoffrey Goodell [56]
16Roberto Gorrieri [25]
17James W. Gray III [11] [23]
18Christian Grothoff [47]
19Sushil Jajodia [44]
20Markus Jakobsson [49]
21Somesh Jha [62]
22Aaron Johnson [57] [59]
23Ari Juels [49] [51]
24Carl E. Landwehr [32]
25Gavin Lowe [25]
26Nick Mathewson [46]
27Catherine Meadows [9] [13] [24] [25] [35] [37] [45]
28Ira S. Moskowitz [40]
29Richard E. Newman [40]
30Peng Ning [60] [62]
31Lasse Øverlier [54] [55] [58]
32Andreas Pfitzmann [47]
33Michael G. Reed [14] [17] [18] [19] [20] [28] [32]
34Pierangela Samarati [44]
35Andrei Serjantov [36] [40] [53]
36Vitaly Shmatikov [48]
37Stuart G. Stubblebine [21] [29] [30] [31] [33]
38Gene Tsudik [32]
39Sabrina De Capitani di Vimercati [50] [52] [60]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)