2008 |
62 | | Peng Ning,
Paul F. Syverson,
Somesh Jha:
Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008
ACM 2008 |
61 | EE | George Danezis,
Paul F. Syverson:
Bridging and Fingerprinting: Epistemic Attacks on Route Selection.
Privacy Enhancing Technologies 2008: 151-166 |
2007 |
60 | | Peng Ning,
Sabrina De Capitani di Vimercati,
Paul F. Syverson:
Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007
ACM 2007 |
59 | EE | Joan Feigenbaum,
Aaron Johnson,
Paul F. Syverson:
A Model of Onion Routing with Provable Anonymity.
Financial Cryptography 2007: 57-71 |
58 | EE | Lasse Øverlier,
Paul F. Syverson:
Improving Efficiency and Simplicity of Tor Circuit Establishment and Hidden Services.
Privacy Enhancing Technologies 2007: 134-152 |
57 | EE | Joan Feigenbaum,
Aaron Johnson,
Paul F. Syverson:
Probabilistic analysis of onion routing in a black-box model.
WPES 2007: 1-10 |
56 | EE | Geoffrey Goodell,
Paul F. Syverson:
The right place at the right time.
Commun. ACM 50(5): 113-117 (2007) |
2006 |
55 | EE | Lasse Øverlier,
Paul F. Syverson:
Locating Hidden Servers.
IEEE Symposium on Security and Privacy 2006: 100-114 |
54 | EE | Lasse Øverlier,
Paul F. Syverson:
Valet Services: Improving Hidden Servers with a Personal Touch.
Privacy Enhancing Technologies 2006: 223-244 |
53 | EE | Roger Dingledine,
Andrei Serjantov,
Paul F. Syverson:
Blending Different Latency Traffic with Alpha-mixing.
Privacy Enhancing Technologies 2006: 245-257 |
2005 |
52 | | Sabrina De Capitani di Vimercati,
Paul F. Syverson,
Dieter Gollmann:
Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings
Springer 2005 |
51 | EE | Ari Juels,
Paul F. Syverson,
Daniel V. Bailey:
High-Power Proxies for Enhancing RFID Privacy and Utility.
Privacy Enhancing Technologies 2005: 210-226 |
2004 |
50 | | Vijay Atluri,
Paul F. Syverson,
Sabrina De Capitani di Vimercati:
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, WPES 2004, Washington, DC, USA, October 28, 2004
ACM 2004 |
49 | EE | Philippe Golle,
Markus Jakobsson,
Ari Juels,
Paul F. Syverson:
Universal Re-encryption for Mixnets.
CT-RSA 2004: 163-178 |
48 | EE | Roger Dingledine,
Vitaly Shmatikov,
Paul F. Syverson:
Synchronous Batching: From Cascades to Free Routes.
Privacy Enhancing Technologies 2004: 186-206 |
47 | EE | Claudia Díaz,
George Danezis,
Christian Grothoff,
Andreas Pfitzmann,
Paul F. Syverson:
Panel Discussion - Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?
Privacy Enhancing Technologies 2004: 242-242 |
46 | EE | Roger Dingledine,
Nick Mathewson,
Paul F. Syverson:
Tor: The Second-Generation Onion Router.
USENIX Security Symposium 2004: 303-320 |
45 | | Catherine Meadows,
Paul F. Syverson,
Iliano Cervesato:
Formal specification and analysis of the Group Domain Of Interpretation Protocol using NPATRL and the NRL Protocol Analyzer.
Journal of Computer Security 12(6): 893-931 (2004) |
2003 |
44 | | Sushil Jajodia,
Pierangela Samarati,
Paul F. Syverson:
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, WPES 2003, Washington, DC, USA, October 30, 2003
ACM 2003 |
43 | | Roger Dingledine,
Paul F. Syverson:
Privacy Enhancing Technologies, Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers
Springer 2003 |
42 | EE | Paul F. Syverson:
Onion Routing for Resistance to Traffic Analysis.
DISCEX (2) 2003: 108-110 |
41 | EE | Alessandro Acquisti,
Roger Dingledine,
Paul F. Syverson:
On the Economics of Anonymity.
Financial Cryptography 2003: 84-102 |
40 | EE | Richard E. Newman,
Ira S. Moskowitz,
Paul F. Syverson,
Andrei Serjantov:
Metrics for Trafic Analysis Prevention.
Privacy Enhancing Technologies 2003: 48-65 |
2002 |
39 | | Paul F. Syverson:
Financial Cryptography, 5th International Conference, FC 2001, Grand Cayman, British West Indies, February 19-22, 2002, Proceedings
Springer 2002 |
38 | EE | Roger Dingledine,
Paul F. Syverson:
Reliable MIX Cascade Networks through Reputation.
Financial Cryptography 2002: 253-268 |
37 | EE | Ran Canetti,
Catherine Meadows,
Paul F. Syverson:
Environmental Requirements for Authentication Protocols.
ISSS 2002: 339-355 |
36 | EE | Andrei Serjantov,
Roger Dingledine,
Paul F. Syverson:
From a Trickle to a Flood: Active Attacks on Several Mix Types.
Information Hiding 2002: 36-52 |
2001 |
35 | EE | Catherine Meadows,
Paul F. Syverson:
Formalizing GDOI group key management requirements in NPATRL.
ACM Conference on Computer and Communications Security 2001: 235-244 |
2000 |
34 | EE | Paul F. Syverson,
Iliano Cervesato:
The Logic of Authentication Protocols.
FOSAD 2000: 63-136 |
33 | EE | Stuart G. Stubblebine,
Paul F. Syverson:
Authentic Attributes with Fine-Grained Anonymity Protection.
Financial Cryptography 2000: 276-294 |
32 | EE | Paul F. Syverson,
Gene Tsudik,
Michael G. Reed,
Carl E. Landwehr:
Towards an Analysis of Onion Routing Security.
Workshop on Design Issues in Anonymity and Unobservability 2000: 96-114 |
1999 |
31 | EE | Stuart G. Stubblebine,
Paul F. Syverson:
Fair On-Line Auctions without Special Trusted Parties.
Financial Cryptography 1999: 230-240 |
30 | EE | Paul F. Syverson,
Stuart G. Stubblebine:
Group Principals and the Formalization of Anonymity.
World Congress on Formal Methods 1999: 814-833 |
29 | EE | Stuart G. Stubblebine,
Paul F. Syverson,
David M. Goldschlag:
Unlinkable serial transactions: protocols and applications.
ACM Trans. Inf. Syst. Secur. 2(4): 354-389 (1999) |
28 | EE | David M. Goldschlag,
Michael G. Reed,
Paul F. Syverson:
Onion Routing.
Commun. ACM 42(2): 39-41 (1999) |
1998 |
27 | EE | Paul F. Syverson:
Anonymity on the Internet (Panel).
ACM Conference on Computer and Communications Security 1998: 37 |
26 | EE | Paul F. Syverson:
Weakly Secret Bit Commitment: Applications to Lotteries and Fair Exchange.
CSFW 1998: 2-13 |
25 | EE | Roberto Gorrieri,
Paul F. Syverson,
Martín Abadi,
Riccardo Focardi,
Dieter Gollmann,
Gavin Lowe,
Catherine Meadows:
Panel Introduction: Varieties of Authentication.
CSFW 1998: 79-82 |
24 | EE | Catherine Meadows,
Paul F. Syverson:
A Formal Specification of Requirements for Payment Transactions in the SET Protocol.
Financial Cryptography 1998: 122-140 |
23 | EE | James W. Gray III,
Paul F. Syverson:
A Logical Approach to Multilevel Security of Probabilistic Systems.
Distributed Computing 11(2): 73-90 (1998) |
1997 |
22 | EE | Paul F. Syverson:
A Different Look at Secure Distributed Computation.
CSFW 1997: 109-115 |
21 | | Paul F. Syverson,
Stuart G. Stubblebine,
David M. Goldschlag:
Unlinkable Serial Transactions.
Financial Cryptography 1997: 39-56 |
20 | EE | Paul F. Syverson,
David M. Goldschlag,
Michael G. Reed:
Anonymous Connections and Onion Routing.
IEEE Symposium on Security and Privacy 1997: 44-54 |
19 | | Michael G. Reed,
Paul F. Syverson,
David M. Goldschlag:
Protocols Using Anonymous Connections: Mobile Applications.
Security Protocols Workshop 1997: 13-23 |
18 | | Paul F. Syverson,
Michael G. Reed,
David M. Goldschlag:
Private Web Browsing.
Journal of Computer Security 5(3): 237-248 (1997) |
1996 |
17 | EE | Michael G. Reed,
Paul F. Syverson,
David M. Goldschlag:
Proxies For Anonymous Routing.
ACSAC 1996: 95-104 |
16 | EE | Paul F. Syverson:
What is an Attack on a Cryptographic Protocal?
CSFW 1996: 188 |
15 | EE | Paul F. Syverson:
Limitations on Design Principles for Public Key Protocols.
IEEE Symposium on Security and Privacy 1996: 62-72 |
14 | | David M. Goldschlag,
Michael G. Reed,
Paul F. Syverson:
Hiding Routing Information.
Information Hiding 1996: 137-150 |
13 | | Paul F. Syverson,
Catherine Meadows:
A Formal Language for Cryptographic Protocol Requirements.
Des. Codes Cryptography 7(1-2): 27-59 (1996) |
12 | | Paul F. Syverson:
A New Look at an Old Protocol.
Operating Systems Review 30(3): 1-4 (1996) |
1995 |
11 | EE | Paul F. Syverson,
James W. Gray III:
The epistemic representation of information flow security in probabilistic systems.
CSFW 1995: 152-166 |
1994 |
10 | | Paul F. Syverson:
A Taxonomy of Replay Attacks.
CSFW 1994: 187-191 |
9 | EE | Paul F. Syverson,
Catherine Meadows:
Formal Requirements for Key Distribution Protocols.
EUROCRYPT 1994: 320-331 |
8 | | Paul F. Syverson:
An Epistemic Logic of Situations.
TARK 1994: 109-121 |
1993 |
7 | EE | Paul F. Syverson:
Adding Time to a Logic of Authentication.
ACM Conference on Computer and Communications Security 1993: 97-101 |
6 | | Paul F. Syverson:
Panel: Cryptographic Protocol Models and Requirements.
CSFW 1993: 161 |
5 | | Paul F. Syverson:
On Key Distribution Protocols for Repeated Authentication.
Operating Systems Review 27(4): 24-30 (1993) |
1992 |
4 | | Paul F. Syverson:
Knowledge, Belief, and Semantics in the Analysis of Cryptographic Protocols.
Journal of Computer Security 1(3-4): 317-334 (1992) |
1991 |
3 | | Paul F. Syverson:
The Value of Semantics for the Analysis of Cryptographic Protocols.
CSFW 1991: 228-229 |
2 | | Paul F. Syverson:
The Use of Logic in the Analysis of Cryptographic Protocols.
IEEE Symposium on Security and Privacy 1991: 156-170 |
1990 |
1 | | Paul F. Syverson:
Formal Semantics for Logics of Cryptographic Protocols.
CSFW 1990: 32-41 |