Paul Syverson
Paul Syverson
Mathematician, U.S. Naval Research Laboratory
Email verificata su itd.nrl.navy.mil - Home page
Titolo
Citata da
Citata da
Anno
Tor: The second-generation onion router
R Dingledine, N Mathewson, P Syverson
Naval Research Lab Washington DC, 2004
44002004
Anonymous connections and onion routing
MG Reed, PF Syverson, DM Goldschlag
IEEE Journal on Selected areas in Communications 16 (4), 482-494, 1998
13541998
Onion routing
D Goldschlag, M Reed, P Syverson
Communications of the ACM 42 (2), 39-41, 1999
10991999
Anonymous connections and onion routing
PF Syverson, DM Goldschlag, MG Reed
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997
7331997
Hiding routing information
DM Goldschlag, MG Reed, PF Syverson
International workshop on information hiding, 137-150, 1996
7021996
Universal re-encryption for mixnets
P Golle, M Jakobsson, A Juels, P Syverson
Cryptographers’ Track at the RSA Conference, 163-178, 2004
5212004
On unifying some cryptographic protocol logics
PF Syverson, PC Van Oorschot
Proceedings of 1994 IEEE Computer Society Symposium on Research in Security …, 1994
4741994
Towards an analysis of onion routing security
P Syverson, G Tsudik, M Reed, C Landwehr
Designing Privacy Enhancing Technologies, 96-114, 2001
4362001
A taxonomy of replay attacks [cryptographic protocols]
P Syverson
Proceedings The Computer Security Foundations Workshop VII, 187-191, 1994
4361994
Locating hidden servers
L Overlier, P Syverson
2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-114, 2006
3742006
From a trickle to a flood: Active attacks on several mix types
A Serjantov, R Dingledine, P Syverson
International Workshop on Information Hiding, 36-52, 2002
2622002
Users get routed: Traffic correlation on Tor by realistic adversaries
A Johnson, C Wacek, R Jansen, M Sherr, P Syverson
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2242013
System and method for electronic transactions
DM Goldschlag, SG Stubblebine, PF Syverson
US Patent 6,108,644, 2000
2202000
Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach
L Lazos, R Poovendran, C Meadows, P Syverson, LW Chang
IEEE Wireless Communications and Networking Conference, 2005 2, 1193-1199, 2005
2102005
Fail-stop protocols: An approach to designing secure protocols
L Gong, X Qian
SRI International, Computer Science Laboratory, 1994
2061994
On the economics of anonymity
A Acquisti, R Dingledine, P Syverson
International Conference on Financial Cryptography, 84-102, 2003
2012003
Proxies for anonymous routing
MG Reed, PF Syverson, DM Goldschlag
Proceedings 12th Annual Computer Security Applications Conference, 95-104, 1996
1931996
The logic of authentication protocols
P Syverson, I Cervesato
International School on Foundations of Security Analysis and Design, 63-137, 2000
1862000
High-power proxies for enhancing RFID privacy and utility
A Juels, P Syverson, D Bailey
International Workshop on Privacy Enhancing Technologies, 210-226, 2005
1522005
Group principals and the formalization of anonymity
PF Syverson, SG Stubblebine
International Symposium on Formal Methods, 814-833, 1999
1501999
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20