Ian Goldberg

Results: 120



#Item
41Cryptography / Computer access control / Secret sharing / Pico / Authentication / Secure cryptoprocessor / Encryption / Security token / Polynomial / Public-key cryptography

Low-cost Mitigation against Cold Boot Attacks for an Authentication Token Ian Goldberg?1 , Graeme Jenkinson2 , and Frank Stajano2 1 2

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2016-05-17 22:04:37
42Cryptography / Crypto-anarchism / Internet privacy / Mix network / Secure communication / Ciphertext indistinguishability / Message authentication code

Sphinx: A Compact and Provably Secure Mix Format George Danezis Ian Goldberg Microsoft Research,

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2013-10-10 06:48:59
43

Tariq Elahi, John A. Doucette, Hadi Hosseini, Steven J. Murdoch, and Ian Goldberg A Framework for the Game-theoretic Analysis of Censorship Resistance Abstract: We present a game-theoretic analysis of optimal solutions

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2015-08-31 18:54:57
    44

    The Best of Both Worlds: Combining Information-Theoretic and Computational PIR for Communication Efficiency Casey Devet and Ian Goldberg University of Waterloo, ON, Canada {cjdevet,iang}@cs.uwaterloo.ca

    Add to Reading List

    Source URL: petsymposium.org

    Language: English - Date: 2014-06-27 07:04:35
      45

      The Best of Both Worlds: Combining Information-Theoretic and Computational PIR for Communication Efficiency Casey Devet and Ian Goldberg University of Waterloo, ON, Canada {cjdevet,iang}@cs.uwaterloo.ca

      Add to Reading List

      Source URL: www.petsymposium.org

      Language: English - Date: 2014-06-27 07:04:35
        46

        Walkie-Talkie: An Effective and Efficient Defense against Website Fingerprinting Tao Wang Ian Goldberg

        Add to Reading List

        Source URL: cacr.uwaterloo.ca

        Language: English - Date: 2015-06-25 14:24:46
          47

          A Description of Protocols for Private Credentials Ariel Glenn, Ian Goldberg, Fr´ed´eric L´egar´e, Anton Stiglic Zero-Knowledge Systems Inc. ariel, ian, frederic, anton @zeroknowledge.com 

          Add to Reading List

          Source URL: www.cypherspace.org

          Language: English - Date: 2007-02-24 13:13:37
            48

            An Improved Algorithm for Tor Circuit Scheduling Can Tang Ian Goldberg Cheriton School of Computer Science

            Add to Reading List

            Source URL: www.cypherpunks.ca

            Language: English - Date: 2010-07-15 08:47:15
              49

              Tariq Elahi, Colleen M. Swanson, and Ian Goldberg Slipping Past the Cordon: A Systematization of Internet Censorship Resistance Abstract: The Internet censorship conflict is like a game of cat-and-mouse, in which the ce

              Add to Reading List

              Source URL: cacr.uwaterloo.ca

              Language: English - Date: 2015-08-31 11:50:52
                UPDATE