Found 35 results
Filters: Author is Syverson, Paul  [Clear All Filters]
2002
Canetti, R., C. Meadows, and P. Syverson, "Environmental Requirements for Authentication Protocols", International Symposium on Software Security, vol. Springer-Verlag LNCS 2609, pp. 339-355, 2002. Canetti etal2002.pdf (186.26 KB)
Serjantov, A., R. Dingledine, and P. Syverson, "From a Trickle to a Flood: Active Attacks on Several Mix Types", Information Hiding, vol. Springer-Verlag LNCS 2578, pp. 36-52, 2002. Serjantov etal2002.pdf (222.02 KB)
Dingledine, R., and P. Syverson, "Reliable MIX Cascade Networks through Reputation", Financial Cryptography 2002, 2002. DingledineSyverson2002.pdf (210 KB)
Dingledine, R., N. Mathewson, and P. Syverson, "Reputation in Privacy Enhancing Technologies", Computer, Freedom, and Privacy, 2002. Dingledine etal2002.pdf (25.17 KB)
2001
Meadows, C., P. Syverson, and I. Cervesato, "Formalizing GDOI Group Key Management Requirements in NPATRL", 8th ACM Computer and Communications Security Conference - CCS'01: ACM Press, pp. 235-244, 2001. Meadows etal2001.pdf (148.49 KB)
Syverson, P., and I. Cervesato, "The Logic of Authentication Protocols", Foundations of Security Analysis and Design --- FOSAD'00, vol. Springer-Verlag LNCS 2171, pp. 63-136, 2001. SyversonCervesato2001.pdf (492.12 KB)
2000
Stubblebine, S., and P. Syverson, "Authentic Attributes with Fine-Grained Anonymity Protection", Financial Cryptography, 2000. StubblebineSyverson2000.pdf (286.58 KB)
Syverson, P., C. Meadows, and I. Cervesato, "Dolev-Yao is no better than Machiavelli", First Workshop on Issues in the Theory of Security - WITS'00, Geneva, Switzerland, pp. 87-92, 2000. Syverson etal2000.pdf (169.38 KB)
Syverson, P., M. Reed, and D. Goldschlag, "Onion Routing Access Configurations", DISCEX 2000: Proceedings of the DARPA Information Survivability Conference and Exposition, vol. 1, Hilton Head, South Carolina, IEEE Computer Society Press, pp. 34-40, 2000. Syverson etal2000c.pdf (154.68 KB)
Syverson, P., G. Tsudik, M. Reed, and C. Landwehr, "Towards an Analysis of Onion Routing Security", Workshop on Design Issues in Anonymity and Unobservability, Berkeley, California, 2000. Syverson etal2000b.pdf (252.37 KB)

Pages