Ian Goldberg

Results: 120



#Item
71Internet privacy / Cryptographic software / Anonymity / Anonymous remailer / Proxy servers / Email / Penet remailer / Pseudonymous remailer / Pseudonymity / Cryptography / Internet / Computing

Privacy Enhancing Technologies for the Internet III: Ten Years Later∗ Ian Goldberg David R. Cheriton School of Computer Science University of Waterloo Waterloo, ON

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2007-12-29 13:05:17
72Tor / Onion routing / Arm / Proxy server / Bandwidth / Guard / Denial-of-service attack / Internet Relay Chat / Internet privacy / Computing / Internet

Changing of the Guards: A Framework for Understanding and Improving Entry Guard Selection in Tor Tariq Elahi† , Kevin Bauer† , Mashael AlSabah† , Roger Dingledine‡ , Ian Goldberg† † †

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2012-08-31 07:34:36
73Social issues / Cypherpunks / Internet privacy / Privacy / Ian Goldberg / Pseudonymity / Anonymous remailer / Anonymity / Internet protocol suite / Cryptography / Ethics / Identity management

A Pseudonymous Communications Infrastructure for the Internet by Ian Avrum Goldberg B.Math. (University of WaterlooM.Sc. (University of California at Berkeley) 1998

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2000-12-21 17:27:25
74Computing / Internet / Teletraffic / Network congestion / Onion routing / Routing / Tor / Transmission Control Protocol / Network performance / Internet privacy / Network architecture

Congestion-aware Path Selection for Tor⋆ Tao Wang, Kevin Bauer, Clara Forero, and Ian Goldberg Cheriton School of Computer Science University of Waterloo {t55wang,k4bauer,ciforero,iang}@cs.uwaterloo.ca

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2011-12-30 18:18:27
75Anonymity / Public-key cryptography / Group signature / Security token / Internet privacy / User / Blacklist / Trusted Computing / Digital credential / Cryptography / Privacy-enhancing technologies / Pseudonymity

Formalizing Anonymous Blacklisting Systems1 Ryan Henry and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1 {rhenry,iang}@cs.uwaterloo.ca

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2011-03-09 14:36:12
76Cryptography / Distributed computing / File sharing / Failure / Theory of computation / Peer-to-peer / Distributed hash table / Chord / Communications protocol / Distributed data storage / Computing / Concurrent computing

1 Towards Practical Communication in Byzantine-Resistant DHTs Maxwell Young, Aniket Kate, Ian Goldberg, and Martin Karsten

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2012-04-29 17:42:21
77Zero-knowledge proof / IP / Soundness / Commitment scheme / NP / Interactive proof system / Non-interactive zero-knowledge proof / Cryptography / Cryptographic protocols / Proof of knowledge

Batch Proofs of Partial Knowledge Ryan Henry and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2013-02-12 09:54:17
78Internet / Internet privacy / Streaming / Teletraffic / File sharing networks / Tor / Onion routing / Throughput / Proxy server / Computing / Network performance / Network architecture

The Path Less Travelled: Overcoming Tor’s Bottlenecks with Traffic Splitting∗ Mashael AlSabah, Kevin Bauer, Tariq Elahi, and Ian Goldberg {malsabah,k4bauer,mtelahi,iang}@cs.uwaterloo.ca Cheriton School of Computer Sc

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2013-05-03 09:23:34
79Cryptographic software / Boneh/Franklin scheme / Finite fields / Tor / Onion routing / XTR / Diffie–Hellman key exchange / Public-key cryptography / Pairing / Cryptography / Internet privacy / Cryptographic protocols

Pairing-Based Onion Routing with Improved Forward Secrecy ANIKET KATE, GREG M. ZAVERUCHA, and IAN GOLDBERG University of Waterloo This article presents new protocols for onion routing anonymity networks. We define a pro

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2010-12-30 09:39:44
80Alice and Bob / Replay attack / Man-in-the-middle attack / Cryptographic hash function / RSA / Communications protocol / Digital signature / Cryptography / Public-key cryptography / Cryptographic protocols

On Message Recognition Protocols: Recoverability and Explicit Confirmation Ian Goldberg David R. Cheriton School of Computer Science, University of Waterloo Waterloo, Ontario Canada N2L 3G1

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2009-11-13 20:20:01
UPDATE