Found 37 results
Filters: Author is Syverson, Paul  [Clear All Filters]
2013
Jansen, R., A. Johnson, and P. Syverson, "LIRA: Lightweight Incentivized Routing for Anonymity", 20th Annual Network & Distributed System Security Symposium (NDSS '13), 2013. PDF icon Jansen etal2013.pdf (1.14 MB)
Johnson, A., C. Wacek, R. Jansen, M. Sherr, and P. Syverson, "Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries", 20th ACM Conference on Computer and Communications Security, 11/2013. PDF icon 13-1231-2077.pdf (2.99 MB)
2012
Feigenbaum, J., A. Johnson, and P. Syverson, "Probabilistic Analysis of Onion Routing in a Black-box Model", ACM Transactions on Information and System Security (TISSEC), vol. 15, issue 3, 2012. PDF icon Feigenbaum etal2012.pdf (363.26 KB)
Jansen, R., P. Syverson, and N. Hopper, "Throttling Tor Bandwidth Parasites", USENIX Security Symposium, 2012. PDF icon 12-1231-2049.pdf (1.13 MB)
2011
Johnson, A., P. Syverson, R. Dingledine, and N. Mathewson, "Truth-based Anonymous Communication: Adversary Models and Routing Algorithms", Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS 2011), 2011. PDF icon Johnson etal2011.pdf (320.76 KB)
2009
Johnson, A., and P. Syverson, "More Anonymous Onion Routing Through Trust", 22nd IEEE Computer Security Foundations Symposium (CSF 2009), 2009. PDF icon Johnson etal2009.pdf (197.77 KB)
2007
Dingledine, R., N. Mathewson, and P. Syverson, "Deploying Low-Latency Anonymity: Design Challenges and Social Factors", IEEE Security & Privacy, vol. 5, issue 5, pp. 83-87, 2007. PDF icon Dingledine etal2007.pdf (71.26 KB)
Overlier, L., and P. Syverson, "Improving Efficiency and Simplicity of Tor circuit establishment and hidden services", 2007 Privacy Enhancing Technologies Symposium, vol. LNCS 4776, 2007. PDF icon OverlierSyverson2007.pdf (619.35 KB)
Feigenbaum, J., A. Johnson, and P. Syverson, "A Model of Onion Routing with Provable Anonymity", Financial Cryptography and Data Security, 11th International Conference, FC 2007, 2007. PDF icon Feigenbaum etal2007b.pdf (224.34 KB)
Feigenbaum, J., A. Johnson, and P. Syverson, "Probabilistic Analysis of Onion Routing in a Black-box Model [Extended Abstract]", WPES'07: Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society: ACM Press, pp. 1-10, 2007. PDF icon Feigenbaum etal2007.pdf (228.68 KB)
2006
Overlier, L., and P. Syverson, "Locating Hidden Servers", IEEE Symposium on Security and Privacy, Oakland, California, IEEE Computer Society Press, 2006. PDF icon OverlierSyverson2006b.pdf (852.47 KB)
Overlier, L., and P. Syverson, "Valet Services: Improving Hidden Servers with a Personal Touch", Privacy Enhancing Technologies Workshop, 2006. PDF icon OverlierSyverson2006.pdf (656.17 KB)
2005
Dingledine, R., N. Mathewson, and P. Syverson, "Challenges in deploying low-latency anonymity", NRL CHACS, no. 5540-625, 2005. PDF icon Dingledine etal2005.pdf (202.95 KB)
Juels, A., P. Syverson, and D. Bailey, "High-Power Proxies for Enhancing RFID Privacy and Utility", Privacy Enhancing Technologies Workshop (PET 2005), Cavtat, Croatia, 2005. PDF icon Juels etal2005.pdf (125.29 KB)
2004
Dingledine, R., V. Shmatikov, and P. Syverson, "Synchronous Batching: From Cascades to Free Routes", Privacy Enhancing Technologies workshop (PET 2004), 2004. PDF icon Dingledine etal2004b.pdf (303.49 KB)
Dingledine, R., N. Mathewson, and P. Syverson, "Tor: The Second-Generation Onion Router", 13th USENIX Security Symposium, 2004. PDF icon Dingledine etal2004.pdf (214.58 KB)
Shostack, A., and P. Syverson, "What Price Privacy? (and why identity theft is about neither identity nor theft)", Economics of Information Security: Kluwer Academic Publishers, pp. 129-142, 2004. PDF icon ShostackSyverson2004.pdf (65.66 KB)

Pages