Sharon Goldberg
Sharon Goldberg
Computer Science, Boston University
Verified email at cs.bu.edu - Homepage
Title
Cited by
Cited by
Year
Eclipse attacks on bitcoin’s peer-to-peer network
E Heilman, A Kendler, A Zohar, S Goldberg
24th {USENIX} Security Symposium ({USENIX} Security 15), 129-144, 2015
4452015
How secure are secure interdomain routing protocols
S Goldberg, M Schapira, P Hummon, J Rexford
ACM SIGCOMM Computer Communication Review 40 (4), 87-98, 2010
1552010
Tumblebit: An untrusted bitcoin-compatible anonymous payment hub
E Heilman, L Alshenibr, F Baldimtsi, A Scafuro, S Goldberg
Network and Distributed System Security Symposium, 2017
1492017
Calibrating data to sensitivity in private data analysis
D Proserpio, S Goldberg, F McSherry
arXiv preprint arXiv:1203.3453, 2012
131*2012
Let the market drive deployment: A strategy for transitioning to BGP security
P Gill, M Schapira, S Goldberg
ACM SIGCOMM computer communication review 41 (4), 14-25, 2011
1302011
Blindly signed contracts: Anonymous on-blockchain and off-blockchain bitcoin transactions
E Heilman, F Baldimtsi, S Goldberg
International conference on financial cryptography and data security, 43-60, 2016
1162016
Path-quality monitoring in the presence of adversaries
S Goldberg, D Xiao, E Tromer, B Barak, J Rexford
ACM SIGMETRICS Performance Evaluation Review 36 (1), 193-204, 2008
1132008
Why is it taking so long to secure internet routing?
S Goldberg
Communications of the ACM 57 (10), 56-63, 2014
1072014
BGP security in partial deployment: Is the juice worth the squeeze?
R Lychev, S Goldberg, M Schapira
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM, 171-182, 2013
91*2013
XML fever
E Wilde, RJ Glushko
Communications of the ACM 51 (7), 40-46, 2008
90*2008
Efficient maximum flow algorithms
AV Goldberg, RE Tarjan
Communications of the ACM 57 (8), 82-89, 2014
842014
A survey of interdomain routing policies
P Gill, M Schapira, S Goldberg
ACM SIGCOMM Computer Communication Review 44 (1), 28-34, 2013
782013
Rationality and traffic attraction: Incentives for honest path announcements in BGP
S Goldberg, S Halevi, AD Jaggard, V Ramachandran, RN Wright
ACM SIGCOMM Computer Communication Review 38 (4), 267-278, 2008
72*2008
On the risk of misbehaving RPKI authorities
D Cooper, E Heilman, K Brogle, L Reyzin, S Goldberg
Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, 1-7, 2013
652013
Protocols and lower bounds for failure localization in the Internet
B Barak, S Goldberg, D Xiao
Annual International Conference on the Theory and Applications of …, 2008
622008
Attacking the Network Time Protocol.
A Malhotra, IE Cohen, E Brakke, S Goldberg
NDSS, 2016
602016
Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network.
Y Marcus, E Heilman, S Goldberg
IACR Cryptol. ePrint Arch. 2018, 236, 2018
542018
NSEC5: Provably Preventing DNSSEC Zone Enumeration.
S Goldberg, M Naor, D Papadopoulos, L Reyzin, S Vasant, A Ziv
NDSS, 2015
492015
Sequential Aggregate Signatures with Lazy Verification
K Brogle, S Goldberg, L Reyzin
Cryptology ePrint Archive: Report 2011/222, 2011. http://eprint. iacr. org …, 2011
49*2011
Loopholes for Circumventing the Constitution: Warrantless Bulk Surveillance on Americans by Collecting Network Traffic Abroad
A Arnbak, S Goldberg
HOTPETS, 2014
46*2014
The system can't perform the operation now. Try again later.
Articles 1–20