Items where Author is "Goldberg, Ian"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 8.

Conference or Workshop Item (A Paper)

Unger, Nik and Dechand, Sergej and Bonneau, Joseph and Fahl, Sascha and Perl, Henning and Goldberg, Ian and Smith, Matthew
(2015) SoK: Secure Messaging.
In: 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015.
Conference: SP IEEE Symposium on Security and Privacy

Backes, Michael and Goldberg, Ian and Kate, Aniket and Toft, Tomas
(2012) Adding query privacy to robust DHTs.
In: Proc. of the 7th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2012).

Backes, Michael and Kate, Aniket and Goldberg, Ian and Mohammadi, Esfandiar
(2012) Provably Secure and Practical Onion Routing.
In: Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Kate, Aniket and Zaverucha, Gregory M. and Goldberg, Ian
(2010) Constant-Size Commitments to Polynomials and Their Applications.
In: Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings.
Conference: ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security

Kate, Aniket and Goldberg, Ian
(2010) Distributed Private-Key Generators for Identity-Based Cryptography.
In: Security and Cryptography for Networks, 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010. Proceedings.

Kate, Aniket and Goldberg, Ian
(2010) Using Sphinx to Improve Onion Routing Circuit Construction.
In: Financial Cryptography and Data Security, 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers.

Article

Young, Maxwell and Kate, Aniket and Goldberg, Ian and Karsten, Martin
(2013) Towards Practical Communication in Byzantine-Resistant DHTs.
Networking, IEEE/ACM Transactions on, 21 (1). pp. 190-203.

Kate, Aniket and Huang, Yizhou and Goldberg, Ian
(2012) Distributed Key Generation in the Wild.
IACR Cryptology ePrint Archive, 2012. p. 377.

This list was generated on Thu Nov 21 12:31:07 2024 CET.