2008 | ||
---|---|---|
62 | Peng Ning, Paul F. Syverson, Somesh Jha: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008 ACM 2008 | |
61 | EE | George Danezis, Paul F. Syverson: Bridging and Fingerprinting: Epistemic Attacks on Route Selection. Privacy Enhancing Technologies 2008: 151-166 |
2007 | ||
60 | Peng Ning, Sabrina De Capitani di Vimercati, Paul F. Syverson: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007 ACM 2007 | |
59 | EE | Joan Feigenbaum, Aaron Johnson, Paul F. Syverson: A Model of Onion Routing with Provable Anonymity. Financial Cryptography 2007: 57-71 |
58 | EE | Lasse Øverlier, Paul F. Syverson: Improving Efficiency and Simplicity of Tor Circuit Establishment and Hidden Services. Privacy Enhancing Technologies 2007: 134-152 |
57 | EE | Joan Feigenbaum, Aaron Johnson, Paul F. Syverson: Probabilistic analysis of onion routing in a black-box model. WPES 2007: 1-10 |
56 | EE | Geoffrey Goodell, Paul F. Syverson: The right place at the right time. Commun. ACM 50(5): 113-117 (2007) |
2006 | ||
55 | EE | Lasse Øverlier, Paul F. Syverson: Locating Hidden Servers. IEEE Symposium on Security and Privacy 2006: 100-114 |
54 | EE | Lasse Øverlier, Paul F. Syverson: Valet Services: Improving Hidden Servers with a Personal Touch. Privacy Enhancing Technologies 2006: 223-244 |
53 | EE | Roger Dingledine, Andrei Serjantov, Paul F. Syverson: Blending Different Latency Traffic with Alpha-mixing. Privacy Enhancing Technologies 2006: 245-257 |
2005 | ||
52 | Sabrina De Capitani di Vimercati, Paul F. Syverson, Dieter Gollmann: Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings Springer 2005 | |
51 | EE | Ari Juels, Paul F. Syverson, Daniel V. Bailey: High-Power Proxies for Enhancing RFID Privacy and Utility. Privacy Enhancing Technologies 2005: 210-226 |
2004 | ||
50 | Vijay Atluri, Paul F. Syverson, Sabrina De Capitani di Vimercati: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, WPES 2004, Washington, DC, USA, October 28, 2004 ACM 2004 | |
49 | EE | Philippe Golle, Markus Jakobsson, Ari Juels, Paul F. Syverson: Universal Re-encryption for Mixnets. CT-RSA 2004: 163-178 |
48 | EE | Roger Dingledine, Vitaly Shmatikov, Paul F. Syverson: Synchronous Batching: From Cascades to Free Routes. Privacy Enhancing Technologies 2004: 186-206 |
47 | EE | Claudia Díaz, George Danezis, Christian Grothoff, Andreas Pfitzmann, Paul F. Syverson: Panel Discussion - Mix Cascades Versus Peer-to-Peer: Is One Concept Superior? Privacy Enhancing Technologies 2004: 242-242 |
46 | EE | Roger Dingledine, Nick Mathewson, Paul F. Syverson: Tor: The Second-Generation Onion Router. USENIX Security Symposium 2004: 303-320 |
45 | Catherine Meadows, Paul F. Syverson, Iliano Cervesato: Formal specification and analysis of the Group Domain Of Interpretation Protocol using NPATRL and the NRL Protocol Analyzer. Journal of Computer Security 12(6): 893-931 (2004) | |
2003 | ||
44 | Sushil Jajodia, Pierangela Samarati, Paul F. Syverson: Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, WPES 2003, Washington, DC, USA, October 30, 2003 ACM 2003 | |
43 | Roger Dingledine, Paul F. Syverson: Privacy Enhancing Technologies, Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers Springer 2003 | |
42 | EE | Paul F. Syverson: Onion Routing for Resistance to Traffic Analysis. DISCEX (2) 2003: 108-110 |
41 | EE | Alessandro Acquisti, Roger Dingledine, Paul F. Syverson: On the Economics of Anonymity. Financial Cryptography 2003: 84-102 |
40 | EE | Richard E. Newman, Ira S. Moskowitz, Paul F. Syverson, Andrei Serjantov: Metrics for Trafic Analysis Prevention. Privacy Enhancing Technologies 2003: 48-65 |
2002 | ||
39 | Paul F. Syverson: Financial Cryptography, 5th International Conference, FC 2001, Grand Cayman, British West Indies, February 19-22, 2002, Proceedings Springer 2002 | |
38 | EE | Roger Dingledine, Paul F. Syverson: Reliable MIX Cascade Networks through Reputation. Financial Cryptography 2002: 253-268 |
37 | EE | Ran Canetti, Catherine Meadows, Paul F. Syverson: Environmental Requirements for Authentication Protocols. ISSS 2002: 339-355 |
36 | EE | Andrei Serjantov, Roger Dingledine, Paul F. Syverson: From a Trickle to a Flood: Active Attacks on Several Mix Types. Information Hiding 2002: 36-52 |
2001 | ||
35 | EE | Catherine Meadows, Paul F. Syverson: Formalizing GDOI group key management requirements in NPATRL. ACM Conference on Computer and Communications Security 2001: 235-244 |
2000 | ||
34 | EE | Paul F. Syverson, Iliano Cervesato: The Logic of Authentication Protocols. FOSAD 2000: 63-136 |
33 | EE | Stuart G. Stubblebine, Paul F. Syverson: Authentic Attributes with Fine-Grained Anonymity Protection. Financial Cryptography 2000: 276-294 |
32 | EE | Paul F. Syverson, Gene Tsudik, Michael G. Reed, Carl E. Landwehr: Towards an Analysis of Onion Routing Security. Workshop on Design Issues in Anonymity and Unobservability 2000: 96-114 |
1999 | ||
31 | EE | Stuart G. Stubblebine, Paul F. Syverson: Fair On-Line Auctions without Special Trusted Parties. Financial Cryptography 1999: 230-240 |
30 | EE | Paul F. Syverson, Stuart G. Stubblebine: Group Principals and the Formalization of Anonymity. World Congress on Formal Methods 1999: 814-833 |
29 | EE | Stuart G. Stubblebine, Paul F. Syverson, David M. Goldschlag: Unlinkable serial transactions: protocols and applications. ACM Trans. Inf. Syst. Secur. 2(4): 354-389 (1999) |
28 | EE | David M. Goldschlag, Michael G. Reed, Paul F. Syverson: Onion Routing. Commun. ACM 42(2): 39-41 (1999) |
1998 | ||
27 | EE | Paul F. Syverson: Anonymity on the Internet (Panel). ACM Conference on Computer and Communications Security 1998: 37 |
26 | EE | Paul F. Syverson: Weakly Secret Bit Commitment: Applications to Lotteries and Fair Exchange. CSFW 1998: 2-13 |
25 | EE | Roberto Gorrieri, Paul F. Syverson, Martín Abadi, Riccardo Focardi, Dieter Gollmann, Gavin Lowe, Catherine Meadows: Panel Introduction: Varieties of Authentication. CSFW 1998: 79-82 |
24 | EE | Catherine Meadows, Paul F. Syverson: A Formal Specification of Requirements for Payment Transactions in the SET Protocol. Financial Cryptography 1998: 122-140 |
23 | EE | James W. Gray III, Paul F. Syverson: A Logical Approach to Multilevel Security of Probabilistic Systems. Distributed Computing 11(2): 73-90 (1998) |
1997 | ||
22 | EE | Paul F. Syverson: A Different Look at Secure Distributed Computation. CSFW 1997: 109-115 |
21 | Paul F. Syverson, Stuart G. Stubblebine, David M. Goldschlag: Unlinkable Serial Transactions. Financial Cryptography 1997: 39-56 | |
20 | EE | Paul F. Syverson, David M. Goldschlag, Michael G. Reed: Anonymous Connections and Onion Routing. IEEE Symposium on Security and Privacy 1997: 44-54 |
19 | Michael G. Reed, Paul F. Syverson, David M. Goldschlag: Protocols Using Anonymous Connections: Mobile Applications. Security Protocols Workshop 1997: 13-23 | |
18 | Paul F. Syverson, Michael G. Reed, David M. Goldschlag: Private Web Browsing. Journal of Computer Security 5(3): 237-248 (1997) | |
1996 | ||
17 | EE | Michael G. Reed, Paul F. Syverson, David M. Goldschlag: Proxies For Anonymous Routing. ACSAC 1996: 95-104 |
16 | EE | Paul F. Syverson: What is an Attack on a Cryptographic Protocal? CSFW 1996: 188 |
15 | EE | Paul F. Syverson: Limitations on Design Principles for Public Key Protocols. IEEE Symposium on Security and Privacy 1996: 62-72 |
14 | David M. Goldschlag, Michael G. Reed, Paul F. Syverson: Hiding Routing Information. Information Hiding 1996: 137-150 | |
13 | Paul F. Syverson, Catherine Meadows: A Formal Language for Cryptographic Protocol Requirements. Des. Codes Cryptography 7(1-2): 27-59 (1996) | |
12 | Paul F. Syverson: A New Look at an Old Protocol. Operating Systems Review 30(3): 1-4 (1996) | |
1995 | ||
11 | EE | Paul F. Syverson, James W. Gray III: The epistemic representation of information flow security in probabilistic systems. CSFW 1995: 152-166 |
1994 | ||
10 | Paul F. Syverson: A Taxonomy of Replay Attacks. CSFW 1994: 187-191 | |
9 | EE | Paul F. Syverson, Catherine Meadows: Formal Requirements for Key Distribution Protocols. EUROCRYPT 1994: 320-331 |
8 | Paul F. Syverson: An Epistemic Logic of Situations. TARK 1994: 109-121 | |
1993 | ||
7 | EE | Paul F. Syverson: Adding Time to a Logic of Authentication. ACM Conference on Computer and Communications Security 1993: 97-101 |
6 | Paul F. Syverson: Panel: Cryptographic Protocol Models and Requirements. CSFW 1993: 161 | |
5 | Paul F. Syverson: On Key Distribution Protocols for Repeated Authentication. Operating Systems Review 27(4): 24-30 (1993) | |
1992 | ||
4 | Paul F. Syverson: Knowledge, Belief, and Semantics in the Analysis of Cryptographic Protocols. Journal of Computer Security 1(3-4): 317-334 (1992) | |
1991 | ||
3 | Paul F. Syverson: The Value of Semantics for the Analysis of Cryptographic Protocols. CSFW 1991: 228-229 | |
2 | Paul F. Syverson: The Use of Logic in the Analysis of Cryptographic Protocols. IEEE Symposium on Security and Privacy 1991: 156-170 | |
1990 | ||
1 | Paul F. Syverson: Formal Semantics for Logics of Cryptographic Protocols. CSFW 1990: 32-41 |