Found 32 results
Filters: Author is Syverson, Paul  [Clear All Filters]
2013
Jansen, R., A. Johnson, and P. Syverson, "LIRA: Lightweight Incentivized Routing for Anonymity", 20th Annual Network & Distributed System Security Symposium (NDSS '13), 2013.
Johnson, A., C. Wacek, R. Jansen, M. Sherr, and P. Syverson, "Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries", 20th ACM Conference on Computer and Communications Security, 11/2013.
2012
Feigenbaum, J., A. Johnson, and P. Syverson, "Probabilistic Analysis of Onion Routing in a Black-box Model", ACM Transactions on Information and System Security (TISSEC), vol. 15, issue 3, 2012.
Jansen, R., P. Syverson, and N. Hopper, "Throttling Tor Bandwidth Parasites", USENIX Security Symposium, 2012.
2011
Johnson, A., P. Syverson, R. Dingledine, and N. Mathewson, "Truth-based Anonymous Communication: Adversary Models and Routing Algorithms", Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS 2011), 2011.
2009
Johnson, A., and P. Syverson, "More Anonymous Onion Routing Through Trust", 22nd IEEE Computer Security Foundations Symposium (CSF 2009), 2009.
2007
Dingledine, R., N. Mathewson, and P. Syverson, "Deploying Low-Latency Anonymity: Design Challenges and Social Factors", IEEE Security & Privacy, vol. 5, issue 5, pp. 83-87, 2007.
Overlier, L., and P. Syverson, "Improving Efficiency and Simplicity of Tor circuit establishment and hidden services", 2007 Privacy Enhancing Technologies Symposium, vol. LNCS 4776, 2007.
Feigenbaum, J., A. Johnson, and P. Syverson, "A Model of Onion Routing with Provable Anonymity", Financial Cryptography and Data Security, 11th International Conference, FC 2007, 2007.
Feigenbaum, J., A. Johnson, and P. Syverson, "Probabilistic Analysis of Onion Routing in a Black-box Model [Extended Abstract]", WPES'07: Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society: ACM Press, pp. 1-10, 2007.
2006
Overlier, L., and P. Syverson, "Locating Hidden Servers", IEEE Symposium on Security and Privacy, Oakland, California, IEEE Computer Society Press, 2006.
Overlier, L., and P. Syverson, "Valet Services: Improving Hidden Servers with a Personal Touch", Privacy Enhancing Technologies Workshop, 2006.
2005
Dingledine, R., N. Mathewson, and P. Syverson, "Challenges in deploying low-latency anonymity", NRL CHACS, no. 5540-625, 2005.
Juels, A., P. Syverson, and D. Bailey, "High-Power Proxies for Enhancing RFID Privacy and Utility", Privacy Enhancing Technologies Workshop (PET 2005), Cavtat, Croatia, 2005.
2004
Dingledine, R., V. Shmatikov, and P. Syverson, "Synchronous Batching: From Cascades to Free Routes", Privacy Enhancing Technologies workshop (PET 2004), 2004.
Dingledine, R., N. Mathewson, and P. Syverson, "Tor: The Second-Generation Onion Router", 13th USENIX Security Symposium, 2004.
Shostack, A., and P. Syverson, "What Price Privacy? (and why identity theft is about neither identity nor theft)", Economics of Information Security: Kluwer Academic Publishers, pp. 129-142, 2004.
2003
Meadows, C., P. Syverson, and I. Cervesato, "Formal Specification and Analysis of the Group Domain of Interpretation Protocol Using NPATRL and the NRL Protocol Analyzer", Journal of Computer Security, 2003.
Newman, R., I. S. Moskowitz, P. Syverson, and A. Serjantov, "Metrics for Traffic Analysis Prevention", PET 2003 Workshop on Privacy Enhancing Technologies, Dresden, Germany, 2003.
Syverson, P., "The Paradoxical Value of Privacy", 2nd Annual Workshop on Economics and Information Security (WEIS 2003), College Park, Maryland, 2003.
Moskowitz, I. S., R. Newman, and P. Syverson, "Quasi-Anonymous Channels", CNIS 2003, New York City, New York, 2003.
2002
Canetti, R., C. Meadows, and P. Syverson, "Environmental Requirements for Authentication Protocols", International Symposium on Software Security, vol. Springer-Verlag LNCS 2609, pp. 339-355, 2002.
Serjantov, A., R. Dingledine, and P. Syverson, "From a Trickle to a Flood: Active Attacks on Several Mix Types", Information Hiding, vol. Springer-Verlag LNCS 2578, pp. 36-52, 2002.
Dingledine, R., and P. Syverson, "Reliable MIX Cascade Networks through Reputation", Financial Cryptography 2002, 2002.

Pages