What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Paul F. Syverson
Google Scholar
32
publications in security and cryptology related venues
Year
Venue
Title
2014
conf/uss
Never Been KIST: Tor's Congestion Management Blossoms with Kernel-Informed Socket Transport.
Rob Jansen
John Geddes
Chris Wacek
Micah Sherr
Paul F. Syverson
2013
conf/ccs
Users get routed: traffic correlation on tor by realistic adversaries.
Aaron Johnson
Chris Wacek
Rob Jansen
Micah Sherr
Paul F. Syverson
2013
conf/fc
Onions for Sale: Putting Privacy on the Market.
Aaron Johnson
Rob Jansen
Paul F. Syverson
2013
conf/ndss
LIRA: Lightweight Incentivized Routing for Anonymity.
Rob Jansen
Aaron Johnson
Paul F. Syverson
2012
conf/uss
Throttling Tor Bandwidth Parasites.
Rob Jansen
Paul F. Syverson
Nicholas Hopper
2012
conf/ndss
Throttling Tor Bandwidth Parasites.
Rob Jansen
Nicholas Hopper
Paul F. Syverson
2011
conf/ccs
Trust-based anonymous communication: adversary models and routing algorithms.
Aaron Johnson
Paul F. Syverson
Roger Dingledine
Nick Mathewson
2011
conf/acsac
A peel of onion.
Paul F. Syverson
2010
conf/fc
Intention-Disguised Algorithmic Trading.
William Yuen
Paul F. Syverson
Zhenming Liu
Christopher Thorpe
2009
conf/ccs
As-awareness in Tor path selection.
Matthew Edman
Paul F. Syverson
2007
conf/fc
A Model of Onion Routing with Provable Anonymity.
Joan Feigenbaum
Aaron Johnson
Paul F. Syverson
2006
conf/sp
Locating Hidden Servers.
Lasse Øverlier
Paul F. Syverson
2004
conf/uss
Tor: The Second-Generation Onion Router.
Roger Dingledine
Nick Mathewson
Paul F. Syverson
2004
conf/ctrsa
Universal Re-encryption for Mixnets.
Philippe Golle
Markus Jakobsson
Ari Juels
Paul F. Syverson
2003
conf/fc
On the Economics of Anonymity.
Alessandro Acquisti
Roger Dingledine
Paul F. Syverson
2002
conf/fc
Reliable MIX Cascade Networks through Reputation.
Roger Dingledine
Paul F. Syverson
2002
conf/ih
From a Trickle to a Flood: Active Attacks on Several Mix Types.
Andrei Serjantov
Roger Dingledine
Paul F. Syverson
2001
conf/ccs
Formalizing GDOI group key management requirements in NPATRL.
Catherine Meadows
Paul F. Syverson
2000
conf/fc
Authentic Attributes with Fine-Grained Anonymity Protection.
Stuart G. Stubblebine
Paul F. Syverson
1999
conf/fc
Fair On-Line Auctions without Special Trusted Parties.
Stuart G. Stubblebine
Paul F. Syverson
1998
conf/ccs
Anonymity on the Internet (Panel).
Paul F. Syverson
1998
conf/fc
A Formal Specification of Requirements for Payment Transactions in the SET Protocol.
Catherine Meadows
Paul F. Syverson
1997
conf/fc
Unlinkable Serial Transactions.
Paul F. Syverson
Stuart G. Stubblebine
David M. Goldschlag
1997
conf/sp
Anonymous Connections and Onion Routing.
Paul F. Syverson
David M. Goldschlag
Michael G. Reed
1996
conf/sp
Limitations on Design Principles for Public Key Protocols.
Paul F. Syverson
1996
conf/ih
Hiding Routing Information.
David M. Goldschlag
Michael G. Reed
Paul F. Syverson
1996
conf/acsac
Proxies For Anonymous Routing.
Michael G. Reed
Paul F. Syverson
David M. Goldschlag
1994
conf/sp
On unifying some cryptographic protocol logics.
Paul F. Syverson
Paul C. van Oorschot
1994
conf/eurocrypt
Formal Requirements for Key Distribution Protocols.
Paul F. Syverson
Catherine Meadows
1993
conf/ccs
Adding Time to a Logic of Authentication.
Paul F. Syverson
1992
conf/sp
A logical approach to multilevel security of probabilistic systems.
James W. Gray III
Paul F. Syverson
1991
conf/sp
The Use of Logic in the Analysis of Cryptographic Protocols.
Paul F. Syverson
Coauthors
Aaron Johnson
(5)
Alessandro Acquisti
(1)
Andrei Serjantov
(1)
Ari Juels
(1)
Catherine Meadows
(3)
Chris Wacek
(2)
Christopher Thorpe
(1)
David M. Goldschlag
(4)
James W. Gray III
(1)
Joan Feigenbaum
(1)
John Geddes
(1)
Lasse Øverlier
(1)
Markus Jakobsson
(1)
Matthew Edman
(1)
Micah Sherr
(2)
Michael G. Reed
(3)
Nicholas Hopper
(2)
Nick Mathewson
(2)
Paul C. van Oorschot
(1)
Paul F. Syverson
(32)
Philippe Golle
(1)
Rob Jansen
(6)
Roger Dingledine
(5)
Stuart G. Stubblebine
(3)
William Yuen
(1)
Zhenming Liu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to