Search the dblp DataBase
David M. Goldschlag :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
John P. McDermott , David M. Goldschlag Storage Jamming. [Citation Graph (1, 0)][DBLP ] DBSec, 1995, pp:365-381 [Conf ] Michael G. Reed , Paul F. Syverson , David M. Goldschlag Proxies For Anonymous Routing. [Citation Graph (0, 0)][DBLP ] ACSAC, 1996, pp:95-104 [Conf ] David M. Goldschlag , David W. Kravitz Pirate Card Rejection. [Citation Graph (0, 0)][DBLP ] CARDIS, 1998, pp:141-149 [Conf ] David M. Goldschlag Mechanically Verifying Safety and Liveness Properties of Delay Insensitive Circuits. [Citation Graph (0, 0)][DBLP ] CAV, 1991, pp:354-364 [Conf ] David M. Goldschlag Several Secure Store and Forward Devices. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1996, pp:129-137 [Conf ] John P. McDermott , David M. Goldschlag Towards a model of storage jamming. [Citation Graph (0, 0)][DBLP ] CSFW, 1996, pp:176-0 [Conf ] David M. Goldschlag , Stuart G. Stubblebine Publicly Verifiable Lotteries: Applications of Delaying Functions. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1998, pp:214-226 [Conf ] Jon Callas , Joan Feigenbaum , David M. Goldschlag , Erin Sawyer Fair Use, Intellectual Property, and the Information Economy (Panel Session Summary). [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1999, pp:173-183 [Conf ] David W. Kravitz , David M. Goldschlag Conditional Access Concepts and Principles. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1999, pp:158-172 [Conf ] Paul F. Syverson , Stuart G. Stubblebine , David M. Goldschlag Unlinkable Serial Transactions. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1997, pp:39-56 [Conf ] David M. Goldschlag A Mechanical Formalization of Several Fairness Notions. [Citation Graph (0, 0)][DBLP ] VDM Europe (1), 1991, pp:125-148 [Conf ] David M. Goldschlag , Michael G. Reed , Paul F. Syverson Hiding Routing Information. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1996, pp:137-150 [Conf ] Paul F. Syverson , David M. Goldschlag , Michael G. Reed Anonymous Connections and Onion Routing. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1997, pp:44-54 [Conf ] Michael G. Reed , Paul F. Syverson , David M. Goldschlag Protocols Using Anonymous Connections: Mobile Applications. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1997, pp:13-23 [Conf ] David M. Goldschlag , Michael G. Reed , Paul F. Syverson Onion Routing. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1999, v:42, n:2, pp:39-41 [Journal ] David M. Goldschlag Mechanically Verifying Safety and Liveness Properties of Delay Insensitive Circuits. [Citation Graph (0, 0)][DBLP ] Formal Methods in System Design, 1994, v:5, n:3, pp:207-225 [Journal ] David M. Goldschlag A Mechanization of Unity in PC-NQTHM-92. [Citation Graph (0, 0)][DBLP ] J. Autom. Reasoning, 1999, v:23, n:3-4, pp:445-498 [Journal ] Paul F. Syverson , Michael G. Reed , David M. Goldschlag Private Web Browsing. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1997, v:5, n:3, pp:237-248 [Journal ] Stuart G. Stubblebine , Paul F. Syverson , David M. Goldschlag Unlinkable serial transactions: protocols and applications. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 1999, v:2, n:4, pp:354-389 [Journal ] David M. Goldschlag Mechanically Verifying Concurrent Programs with the Boyer-Moore Prover. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1990, v:16, n:9, pp:1005-1023 [Journal ] Search in 0.040secs, Finished in 0.041secs