The SCEAS System
Navigation Menu

Search the dblp DataBase


Ian Goldberg: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. David Wagner, Ian Goldberg
    Proofs of Security for the Unix Password Hashing Algorithm. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:560-572 [Conf]
  2. Scott Crosby, Ian Goldberg, Robert Johnson, Dawn Xiaodong Song, David Wagner
    A Cryptanalysis of the High-Bandwidth Digital Content Protection System. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2001, pp:192-200 [Conf]
  3. Rebecca N. Wright, L. Jean Camp, Ian Goldberg, Ronald L. Rivest, Graham Wood
    Privacy Tradeoffs: Myth or Reality? Panel. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:147-151 [Conf]
  4. Chris Hall, Ian Goldberg, Bruce Schneier
    Reaction Attacks against several Public-Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:2-12 [Conf]
  5. Nikita Borisov, Ian Goldberg, David Wagner
    Intercepting mobile communications: the insecurity of 802.11. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 2001, pp:180-189 [Conf]
  6. Ian Goldberg
    Privacy-Enhancing Technologies for the Internet, II: Five Years Later. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2002, pp:1-12 [Conf]
  7. Ian Goldberg
    On the Security of the Tor Authentication Protocol. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2006, pp:316-331 [Conf]
  8. Ian Goldberg
    Improving the Robustness of Private Information Retrieval. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:131-148 [Conf]
  9. Ian Goldberg, Steven D. Gribble, David Wagner, Eric A. Brewer
    The Ninja Jukebox. [Citation Graph (0, 0)][DBLP]
    USENIX Symposium on Internet Technologies and Systems, 1999, pp:- [Conf]
  10. Nikita Borisov, Ian Goldberg, Eric A. Brewer
    Off-the-record communication, or, why not to use PGP. [Citation Graph (0, 0)][DBLP]
    WPES, 2004, pp:77-84 [Conf]
  11. Ian Goldberg, David Wagner
    TAZ Servers and the Rewebber Network: Enabling Anonymous Publishing on the World Wide Web. [Citation Graph (0, 0)][DBLP]
    First Monday, 1998, v:3, n:4, pp:- [Journal]
  12. Aniket Kate, Gregory M. Zaverucha, Ian Goldberg
    Pairing-Based Onion Routing. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2007, pp:95-112 [Conf]
  13. Ge Zhong, Ian Goldberg, Urs Hengartner
    Louis, Lester and Pierre: Three Protocols for Location Privacy. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2007, pp:62-76 [Conf]

  14. A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks. [Citation Graph (, )][DBLP]

  15. Multi-party off-the-record messaging. [Citation Graph (, )][DBLP]

  16. Using Sphinx to Improve Onion Routing Circuit Construction. [Citation Graph (, )][DBLP]

  17. Distributed Key Generation for the Internet. [Citation Graph (, )][DBLP]

  18. Practical Robust Communication in DHTs Tolerating a Byzantine Adversary. [Citation Graph (, )][DBLP]

  19. Achieving Efficient Query Privacy for Location Based Services. [Citation Graph (, )][DBLP]

  20. Making a Nymbler Nymble Using VERBS. [Citation Graph (, )][DBLP]

  21. Privacy-Preserving Queries over Relational Databases. [Citation Graph (, )][DBLP]

  22. Distributed Private-Key Generators for Identity-Based Cryptography. [Citation Graph (, )][DBLP]

  23. Sphinx: A Compact and Provably Secure Mix Format. [Citation Graph (, )][DBLP]

  24. Improved user authentication in off-the-record messaging. [Citation Graph (, )][DBLP]

  25. A user study of off-the-record messaging. [Citation Graph (, )][DBLP]

Search in 0.054secs, Finished in 0.055secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002