Follow
Paul Syverson
Paul Syverson
Verified email at nrl.navy.mil
Title
Cited by
Cited by
Year
Tor: The second-generation onion router
R Dingledine, N Mathewson, P Syverson
Naval Research Lab Washington DC, 2004
55662004
Anonymous connections and onion routing
MG Reed, PF Syverson, DM Goldschlag
IEEE Journal on Selected areas in Communications 16 (4), 482-494, 1998
15541998
Onion routing
D Goldschlag, M Reed, P Syverson
Communications of the ACM 42 (2), 39-41, 1999
12831999
Hiding routing information
DM Goldschlag, MG Reed, PF Syverson
Information Hiding: First International Workshop Cambridge, UK, May 30–June …, 2005
8252005
Anonymous connections and onion routing
PF Syverson, DM Goldschlag, MG Reed
Proceedings. 1997 IEEE symposium on security and privacy (cat. no. 97CB36097 …, 1997
8211997
Universal re-encryption for mixnets
P Golle, M Jakobsson, A Juels, P Syverson
Topics in Cryptology–CT-RSA 2004: The Cryptographers’ Track at the RSA …, 2004
6112004
Towards an analysis of onion routing security
P Syverson, G Tsudik, M Reed, C Landwehr
Designing Privacy Enhancing Technologies: International Workshop on Design …, 2001
5172001
On unifying some cryptographic protocol logics
PF Syverson, PC Van Oorschot
Proceedings of 1994 IEEE Computer Society Symposium on Research in Security …, 1994
5071994
A taxonomy of replay attacks [cryptographic protocols]
P Syverson
Proceedings The Computer Security Foundations Workshop VII, 187-191, 1994
5051994
Locating hidden servers
L Overlier, P Syverson
2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-114, 2006
4412006
Users get routed: Traffic correlation on Tor by realistic adversaries
A Johnson, C Wacek, R Jansen, M Sherr, P Syverson
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
3362013
From a trickle to a flood: Active attacks on several mix types
A Serjantov, R Dingledine, P Syverson
Information Hiding: 5th International Workshop, IH 2002 Noordwijkerhout, The …, 2003
3192003
Proxies for anonymous routing
MG Reed, PF Syverson, DM Goldschlag
Proceedings 12th Annual Computer Security Applications Conference, 95-104, 1996
2511996
System and method for electronic transactions
DM Goldschlag, SG Stubblebine, PF Syverson
US Patent 6,108,644, 2000
2282000
AS-awareness in Tor path selection
M Edman, P Syverson
Proceedings of the 16th ACM conference on Computer and communications …, 2009
2232009
Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach
L Lazos, R Poovendran, C Meadows, P Syverson, LW Chang
IEEE Wireless Communications and Networking Conference, 2005 2, 1193-1199, 2005
2232005
On the economics of anonymity
A Acquisti, R Dingledine, P Syverson
Financial Cryptography: 7th International Conference, FC 2003, Guadeloupe …, 2003
2212003
Fail-stop protocols: An approach to designing secure protocols
L Gong, X Qian
SRI International, Computer Science Laboratory, 1994
2201994
The logic of authentication protocols
P Syverson, I Cervesato
Foundations of Security Analysis and Design: Tutorial Lectures 1, 63-137, 2001
2162001
Onion routing network for securely moving data through communication networks
MG Reed, PF Syverson, DM Goldschlag
US Patent 6,266,704, 2001
1982001
The system can't perform the operation now. Try again later.
Articles 1–20