Search the dblp DataBase
Ian Goldberg :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
David Wagner , Ian Goldberg Proofs of Security for the Unix Password Hashing Algorithm. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:560-572 [Conf ] Scott Crosby , Ian Goldberg , Robert Johnson , Dawn Xiaodong Song , David Wagner A Cryptanalysis of the High-Bandwidth Digital Content Protection System. [Citation Graph (0, 0)][DBLP ] Digital Rights Management Workshop, 2001, pp:192-200 [Conf ] Rebecca N. Wright , L. Jean Camp , Ian Goldberg , Ronald L. Rivest , Graham Wood Privacy Tradeoffs: Myth or Reality? Panel. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2002, pp:147-151 [Conf ] Chris Hall , Ian Goldberg , Bruce Schneier Reaction Attacks against several Public-Key Cryptosystems. [Citation Graph (0, 0)][DBLP ] ICICS, 1999, pp:2-12 [Conf ] Nikita Borisov , Ian Goldberg , David Wagner Intercepting mobile communications: the insecurity of 802.11. [Citation Graph (0, 0)][DBLP ] MOBICOM, 2001, pp:180-189 [Conf ] Ian Goldberg Privacy-Enhancing Technologies for the Internet, II: Five Years Later. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2002, pp:1-12 [Conf ] Ian Goldberg On the Security of the Tor Authentication Protocol. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2006, pp:316-331 [Conf ] Ian Goldberg Improving the Robustness of Private Information Retrieval. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:131-148 [Conf ] Ian Goldberg , Steven D. Gribble , David Wagner , Eric A. Brewer The Ninja Jukebox. [Citation Graph (0, 0)][DBLP ] USENIX Symposium on Internet Technologies and Systems, 1999, pp:- [Conf ] Nikita Borisov , Ian Goldberg , Eric A. Brewer Off-the-record communication, or, why not to use PGP. [Citation Graph (0, 0)][DBLP ] WPES, 2004, pp:77-84 [Conf ] Ian Goldberg , David Wagner TAZ Servers and the Rewebber Network: Enabling Anonymous Publishing on the World Wide Web. [Citation Graph (0, 0)][DBLP ] First Monday, 1998, v:3, n:4, pp:- [Journal ] Aniket Kate , Gregory M. Zaverucha , Ian Goldberg Pairing-Based Onion Routing. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2007, pp:95-112 [Conf ] Ge Zhong , Ian Goldberg , Urs Hengartner Louis, Lester and Pierre: Three Protocols for Location Privacy. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2007, pp:62-76 [Conf ] A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks. [Citation Graph (, )][DBLP ] Multi-party off-the-record messaging. [Citation Graph (, )][DBLP ] Using Sphinx to Improve Onion Routing Circuit Construction. [Citation Graph (, )][DBLP ] Distributed Key Generation for the Internet. [Citation Graph (, )][DBLP ] Practical Robust Communication in DHTs Tolerating a Byzantine Adversary. [Citation Graph (, )][DBLP ] Achieving Efficient Query Privacy for Location Based Services. [Citation Graph (, )][DBLP ] Making a Nymbler Nymble Using VERBS. [Citation Graph (, )][DBLP ] Privacy-Preserving Queries over Relational Databases. [Citation Graph (, )][DBLP ] Distributed Private-Key Generators for Identity-Based Cryptography. [Citation Graph (, )][DBLP ] Sphinx: A Compact and Provably Secure Mix Format. [Citation Graph (, )][DBLP ] Improved user authentication in off-the-record messaging. [Citation Graph (, )][DBLP ] A user study of off-the-record messaging. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.002secs