Ian Goldberg's Publications
Peer-reviewed Journal Publications
-
PRAC: Round-Efficient 3-Party MPC for Dynamic Data Structures
Sajin Sasy, Adithya Vadapalli, Ian Goldberg,
Proceedings on Privacy Enhancing Technologies, Vol. 2024, No. 3,
July 2024.
-
SoK: Metadata-Protecting Communication Systems
Sajin Sasy, Ian Goldberg,
Proceedings on Privacy Enhancing Technologies, Vol. 2024, No. 1,
January 2024.
-
Lox: Protecting the Social Graph in Bridge Distribution
Lindsey Tulloch, Ian Goldberg,
Proceedings on Privacy Enhancing Technologies, Vol. 2023, No. 1,
January 2023.
-
SoK: Privacy-Preserving Reputation Systems
Stan Gurtler, Ian Goldberg,
Proceedings on Privacy Enhancing Technologies, Vol. 2021, No. 1,
January 2021.
-
Mitigator: Privacy policy compliance using trusted hardware
Miti Mazmudar, Ian Goldberg,
Proceedings on Privacy Enhancing Technologies, Vol. 2020, No. 3,
July 2020.
-
Mind the Gap: Ceremonies for Applied Secret Sharing
Bailey Kacsmar, Chelsea H. Komlo, Florian Kerschbaum, Ian Goldberg,
Proceedings on Privacy Enhancing Technologies, Vol. 2020, No. 2,
April 2020.
-
ConsenSGX: Scaling Anonymous Communications Networks with Trusted Execution Environments
Sajin Sasy, Ian Goldberg,
Proceedings on Privacy Enhancing Technologies, Vol. 2019, No. 3,
July 2019.
-
Secure asymmetry and deployability for decoy routing systems
Cecylia Bocovich, Ian Goldberg,
Proceedings on Privacy Enhancing Technologies, Vol. 2018, No. 3,
July 2018.
-
Privacy Pass: Bypassing Internet Challenges Anonymously
Alex Davidson, Ian Goldberg, Nick Sullivan, George Tankersley, Filippo Valsorda,
Proceedings on Privacy Enhancing Technologies, Vol. 2018, No. 3,
July 2018.
-
Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets
Navid Nasr Esfahani, Ian Goldberg, Douglas Stinson,
IEEE Transactions on Information Theory, Vol. 64, No. 4,
April 2018.
-
Improved Strongly Deniable Authenticated Key Exchanges for Secure Messaging
Nik Unger, Ian Goldberg,
Proceedings on Privacy Enhancing Technologies, Vol. 2018, No. 1,
January 2018.
-
A Framework for the Game-theoretic Analysis of Censorship Resistance
Tariq Elahi, John A. Doucette, Hadi Hosseini, Steven J. Murdoch, Ian Goldberg,
Proceedings on Privacy Enhancing Technologies, Vol. 2016, No. 4,
October 2016.
-
On Realistically Attacking Tor with Website Fingerprinting
Tao Wang, Ian Goldberg,
Proceedings on Privacy Enhancing Technologies, Vol. 2016, No. 4,
October 2016.
-
Lower-Cost epsilon-Private Information Retrieval
Raphael Toledo, George Danezis, Ian Goldberg,
Proceedings on Privacy Enhancing Technologies, Vol. 2016, No. 4,
October 2016.
-
SoK: Making Sense of Censorship Resistance Systems
Sheharbano Khattak, Tariq Elahi, Laurent Simon, Colleen M. Swanson, Steven J. Murdoch, Ian Goldberg,
Proceedings on Privacy Enhancing Technologies, Vol. 2016, No. 4,
October 2016.
-
Performance and Security Improvements for Tor: A Survey
Mashael AlSabah, Ian Goldberg,
ACM Computing Surveys, Vol. 49, No. 2,
September 2016.
Extended version available as ePrint Technical Report 2015/235.
-
DP5: A Private Presence Service
Nikita Borisov, George Danezis, Ian Goldberg,
Proceedings on Privacy Enhancing Technologies, Vol. 2015, No. 2,
June 2015.
-
Anonymity and one-way authentication in key exchange protocols
Ian Goldberg, Douglas Stebila, Berkant Ustaoglu,
Designs, Codes and Cryptography, Vol. 67, No. 2,
May 2013.
Extended version available as CACR Tech Report 2011-11.
-
Towards Practical Communication in Byzantine-Resistant DHTs
Maxwell Young, Aniket Kate, Ian Goldberg, Martin Karsten,
IEEE/ACM Transactions on Networking, Vol. 21, No. 1,
February 2013.
-
Generalizing Cryptosystems Based on the Subset Sum Problem
Aniket Kate, Ian Goldberg,
International Journal of Information Security, Vol. 10, No. 3,
June 2011.
-
On Message Recognition Protocols: Recoverability and Explicit Confirmation
Ian Goldberg, Atefeh Mashatan, Douglas Stinson,
International Journal of Applied Cryptography, Vol. 2, No. 2,
December 2010.
-
Pairing-Based Onion Routing with Improved Forward Secrecy
Aniket Kate, Gregory Zaverucha, Ian Goldberg,
ACM Transactions on Information and System Security, Vol. 13, No. 4,
December 2010.
-
TAZ Servers and the Rewebber Network: Enabling Anonymous Publishing on the World Wide Web
Ian Goldberg, David Wagner,
First Monday electronic journal, Vol. 3, No. 4,
April 1998.
Peer-reviewed Conference and Workshop Publications
-
Waks-On/Waks-Off: Fast Oblivious Offline/Online Shuffling and Sorting with Waksman Networks
Sajin Sasy, Aaron Johnson, Ian Goldberg,
30th ACM Conference on Computer and Communications Security,
November 2023.
Extended version available as ePrint Technical Report 2023/1236.
-
Grading on a Curve: How Rust can Facilitate New Contributors while Decreasing Vulnerabilities
Justin Tracey, Ian Goldberg,
8th IEEE Secure Development Conference,
October 2023.
-
Duoram: A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation
Adithya Vadapalli, Ryan Henry, Ian Goldberg,
32nd USENIX Security Symposium,
August 2023.
Extended version available as ePrint Technical Report 2022/1747.
-
Investigating Membership Inference Attacks under Data Dependencies
Thomas Humphries, Simon Oya, Lindsey Tulloch, Matthew Rafuse, Ian Goldberg, Urs Hengartner, Florian Kerschbaum,
35th IEEE Computer Security Foundations Symposium,
July 2023.
-
PRSONA: Private Reputation Supporting Ongoing Network Avatars
Stan Gurtler, Ian Goldberg,
21st ACM Workshop on Privacy in the Electronic Society,
November 2022.
-
Fast Fully Oblivious Compaction and Shuffling
Sajin Sasy, Aaron Johnson, Ian Goldberg,
29th ACM Conference on Computer and Communications Security,
November 2022.
Extended version available as ePrint Technical Report 2022/1333.
-
Astrape: Anonymous Payment Channels with Boring Cryptography
Yuhao Dong, Ian Goldberg, Sergey Gorbunov, Raouf Boutaba,
20th International Conference on Applied Cryptography and Network Security,
June 2022.
Extended version available as ePrint Technical Report 2022/450.
-
Improving the Privacy of Tor Onion Services
Edward Eaton, Sajin Sasy, Ian Goldberg,
20th International Conference on Applied Cryptography and Network Security,
June 2022.
Extended version available as ePrint Technical Report 2022/407.
-
Do You Feel a Chill? Using PIR Against Chilling Effects for Censorship-resistant Publishing
Miti Mazmudar, Stan Gurtler, Ian Goldberg,
20th ACM Workshop on Privacy in the Electronic Society,
November 2021.
Extended version available as ePrint Technical Report 2021/1195.
-
OUStralopithecus: Overt User Simulation for Censorship Circumvention
Anna Harbluk Lorimer, Lindsey Tulloch, Cecylia Bocovich, Ian Goldberg,
20th ACM Workshop on Privacy in the Electronic Society,
November 2021.
-
ZXAD: High-volume Attack Mitigation for Tor
Akshaya Mani, Ian Goldberg,
20th ACM Workshop on Privacy in the Electronic Society,
November 2021.
Extended version available as ePrint Technical Report 2021/374.
-
Weaving a Faster Tor: A Multi-Threaded Relay Architecture for Improved Throughput
Steven Engler, Ian Goldberg,
16th International Conference on Availability, Reliability, and Security,
August 2021.
-
Once is Never Enough: Foundations for Sound Statistical Inference in Tor Network Experimentation
Rob Jansen, Justin Tracey, Ian Goldberg,
30th USENIX Security Symposium,
August 2021.
Extended version available as ArXiv Technical Report 2102.05196.
-
Augmented Unlocking Techniques for Smartphones Using Pre-Touch Information
Matthew Lakier, Dimcho Karakashev, Yixin Wang, Ian Goldberg,
ACM Symposium on Spatial User Interaction 2020,
October 2020.
Extended version available as ArXiv Technical Report 1908.09165.
-
FROST: Flexible Round-Optimized Schnorr Threshold Signatures
Chelsea Komlo, Ian Goldberg,
27th Conference on Selected Areas in Cryptography,
October 2020.
Extended version available as ePrint Technical Report 2020/852.
-
Walking Onions: Scaling Anonymity Networks while Protecting Users
Chelsea H. Komlo, Nick Mathewson, Ian Goldberg,
29th USENIX Security Symposium,
August 2020.
-
Style Counsel: Seeing the (Random) Forest for the Trees in Adversarial Code Stylometry
Christopher McKnight, Ian Goldberg,
17th ACM Workshop on Privacy in the Electronic Society,
October 2018.
Extended version available as CACR Technical Report 2018-08.
-
High Performance Tor Experimentation from the Magic of Dynamic ELFs
Justin Tracey, Rob Jansen, Ian Goldberg,
11th USENIX Workshop on Cyber Security Experimentation and Test,
August 2018.
-
Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices
Erinn Atwater, Ian Goldberg,
26th International Workshop on Security Protocols,
March 2018.
-
Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions
Stefanie Roos, Pedro Moreno-Sanchez, Aniket Kate, Ian Goldberg,
25th Network and Distributed System Security Symposium,
February 2018.
-
Netsim: Network simulation and hacking for high schoolers
Erinn Atwater, Cecylia Bocovich, Urs Hengartner, Ian Goldberg,
2017 USENIX Workshop on Advances in Security Education,
August 2017.
-
Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks
Tao Wang, Ian Goldberg,
26th USENIX Security Symposium,
August 2017.
-
Lavinia: Censorship-Resistant Publishing with Incentives
Cecylia Bocovich, John A. Doucette, Ian Goldberg,
21st International Conference on Financial Cryptography and Data Security,
April 2017.
Extended version available as CACR Technical Report 2015-06.
-
Elxa: Scalable Privacy-Preserving Plagiarism Detection
Nik Unger, Sahithi Thandra, Ian Goldberg,
15th ACM Workshop on Privacy in the Electronic Society,
October 2016.
Extended version available as CACR Technical Report 2016-07.
-
Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement
Cecylia Bocovich, Ian Goldberg,
23rd ACM Conference on Computer and Communications Security,
October 2016.
-
Low-cost Mitigation against Cold Boot Attacks for an Authentication Token
Ian Goldberg, Graeme Jenkinson, Frank Stajano,
14th International Conference on Applied Cryptography and Network Security,
June 2016.
-
Red button and yellow button: usable security for lost security tokens
Ian Goldberg, Graeme Jenkinson, David Llewellyn-Jones, Frank Stajano,
24th International Workshop on Security Protocols,
April 2016.
-
Deniable Key Exchanges for Secure Messaging
Nik Unger, Ian Goldberg,
22nd ACM Conference on Computer and Communications Security,
October 2015.
-
Leading Johnny to Water: Designing for Usability and Trust
Erinn Atwater, Cecylia Bocovich, Urs Hengartner, Ed Lank, Ian Goldberg,
11th Symposium On Usable Privacy and Security,
July 2015.
-
SoK: Secure Messaging
Nik Unger, Sergej Dechand, Joseph Bonneau, Sascha Fahl, Henning Perl, Ian Goldberg, Matthew Smith,
36th IEEE Symposium on Security and Privacy,
May 2015.
Extended version available as CACR Tech Report 2015-02.
-
Sublinear Scaling for Multi-Client Private Information Retrieval
Wouter Lueks, Ian Goldberg,
19th International Conference on Financial Cryptography and Data Security,
January 2015.
-
PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks
Tariq Elahi, George Danezis, Ian Goldberg,
21st ACM Conference on Computer and Communications Security,
November 2014.
Extended version available as CACR Tech Report 2014-08.
-
A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses
Xiang Cai, Rishab Nithyanand, Tao Wang, Robert Johnson, Ian Goldberg,
21st ACM Conference on Computer and Communications Security,
November 2014.
-
Effective Attacks and Provable Defenses for Website Fingerprinting
Tao Wang, Xiang Cai, Rishab Nithyanand, Robert Johnson, Ian Goldberg,
23rd USENIX Security Symposium,
August 2014.
-
The Best of Both Worlds: Combining Information-Theoretic and Computational PIR for Communication Efficiency
Casey Devet, Ian Goldberg,
14th Privacy Enhancing Technologies Symposium (PETS 2014),
July 2014.
Extended version available as CACR Tech Report 2014-07.
-
PCTCP: Per-Circuit TCP-over-IPSec Transport for Anonymous Communication Overlay Networks
Mashael AlSabah, Ian Goldberg,
20th ACM Conference on Computer and Communications Security,
November 2013.
-
Improved Website Fingerprinting on Tor
Tao Wang, Ian Goldberg,
12th ACM Workshop on Privacy in the Electronic Society,
November 2013.
-
Outsourced Private Information Retrieval with Pricing and Access Control
Yizhou Huang, Ian Goldberg,
12th ACM Workshop on Privacy in the Electronic Society,
November 2013.
Extended version available as CACR Tech Report 2013-11.
-
Thinking Inside the BLAC Box: Smarter Protocols for Faster Anonymous Blacklisting
Ryan Henry, Ian Goldberg,
12th ACM Workshop on Privacy in the Electronic Society,
November 2013.
Extended version available as CACR Tech Report 2013-26.
-
The Path Less Travelled: Overcoming Tor's Bottlenecks with Traffic Splitting
Mashael AlSabah, Kevin Bauer, Tariq Elahi, Ian Goldberg,
13th Privacy Enhancing Technologies Symposium (PETS 2013),
July 2013.
Extended version available as CACR Tech Report 2013-16.
-
Batch Proofs of Partial Knowledge
Ryan Henry, Ian Goldberg,
11th International Conference on Applied Cryptography and Network Security,
June 2013.
Extended version available as CACR Tech Report 2013-08.
-
One (Block) Size Fits All: PIR and SPIR Over Arbitrary-Length Records via Multi-block PIR Queries
Ryan Henry, Yizhou Huang, Ian Goldberg,
20th Network and Distributed System Security Symposium,
February 2013.
-
Changing of the Guards: A Framework for Understanding and Improving Entry Guard Selection in Tor
Tariq Elahi, Kevin Bauer, Mashael AlSabah, Roger Dingledine, Ian Goldberg,
11th ACM Workshop on Privacy in the Electronic Society,
October 2012.
-
Enhancing Tor's Performance using Real-time Traffic Classification
Mashael AlSabah, Kevin Bauer, Ian Goldberg,
19th ACM Conference on Computer and Communications Security,
October 2012.
-
SkypeMorph: Protocol Obfuscation for Tor Bridges
Hooman Mohajeri Moghaddam, Baiyu Li, Mohammad Derakhshani, Ian Goldberg,
19th ACM Conference on Computer and Communications Security,
October 2012.
-
Optimally Robust Private Information Retrieval
Casey Devet, Ian Goldberg, Nadia Heninger,
21st USENIX Security Symposium,
August 2012.
Extended version available as ePrint Tech Report 2012/083.
-
Provably Secure and Practical Onion Routing
Michael Backes, Ian Goldberg, Aniket Kate, Esfandiar Mohammadi,
25th IEEE Computer Security Foundations Symposium,
June 2012.
Extended version available as ePrint Tech Report 2011/308.
-
Adding Query Privacy to Robust DHTs
Michael Backes, Ian Goldberg, Aniket Kate, Tomas Toft,
7th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2012),
May 2012.
Extended version available as arXiv Tech Report 1107.1072.
-
Solving Discrete Logarithms in Smooth-Order Groups with CUDA
Ryan Henry, Ian Goldberg,
5th Workshop on Special-Purpose Hardware for Attacking Cryptographic Systems (SHARCS 2012),
March 2012.
-
Congestion-aware Path Selection for Tor
Tao Wang, Kevin Bauer, Clara Forero, Ian Goldberg,
16th International Conference on Financial Cryptography and Data Security,
February 2012.
Extended version available as CACR Tech Report 2011-20.
-
NotiSense: An Urban Sensing Notification System To Improve Bystander Privacy
Sarah Pidcock, Rob Smits, Urs Hengartner, Ian Goldberg,
PhoneSense 2011,
November 2011.
-
BridgeSPA: Improving Tor Bridges with Single Packet Authorization
Rob Smits, Divam Jain, Sarah Pidcock, Ian Goldberg, Urs Hengartner,
10th ACM Workshop on Privacy in the Electronic Society,
October 2011.
-
SPEcTRe: Spot-checked Private Ecash Tolling at Roadside
Jeremy Day, Yizhou Huang, Edward Knapp, Ian Goldberg,
10th ACM Workshop on Privacy in the Electronic Society,
October 2011.
-
Practical PIR for Electronic Commerce
Ryan Henry, Femi Olumofin, Ian Goldberg,
18th ACM Conference on Computer and Communications Security,
October 2011.
Extended version available as CACR Tech Report 2011-04.
-
PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval
Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg,
20th USENIX Security Symposium,
August 2011.
Extended version available as CACR Tech Report 2011-05.
-
Telex: Anticensorship in the Network Infrastructure
Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman,
20th USENIX Security Symposium,
August 2011.
-
DefenestraTor: Throwing out Windows in Tor
Mashael AlSabah, Kevin Bauer, Ian Goldberg, Dirk Grunwald, Damon McCoy, Stefan Savage, Geoffrey Voelker,
11th Privacy Enhancing Technologies Symposium,
July 2011.
-
Formalizing Anonymous Blacklisting Systems
Ryan Henry, Ian Goldberg,
32nd IEEE Symposium on Security and Privacy,
May 2011.
Extended version available as CACR Tech Report 2010-24.
-
Extending Nymble-like Systems
Ryan Henry, Ian Goldberg,
32nd IEEE Symposium on Security and Privacy,
May 2011.
-
Revisiting the Computational Practicality of Private Information Retrieval
Femi Olumofin, Ian Goldberg,
15th International Conference on Financial Cryptography and Data Security,
February 2011.
Extended version available as CACR Tech Report 2010-17.
-
Constant-Size Commitments to Polynomials and Their Applications
Aniket Kate, Gregory Zaverucha, Ian Goldberg,
16th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2010),
December 2010.
Extended version available as CACR Tech Report 2010-10.
-
An Improved Algorithm for Tor Circuit Scheduling
Can Tang, Ian Goldberg,
17th ACM Conference on Computer and Communications Security,
October 2010.
-
Distributed Private-Key Generators for Identity-Based Cryptography
Aniket Kate, Ian Goldberg,
7th Conference on Security and Cryptography for Networks,
September 2010.
Extended version available as ePrint Tech Report 2009/355.
-
Making a Nymbler Nymble using VERBS
Ryan Henry, Kevin Henry, Ian Goldberg,
10th Privacy Enhancing Technologies Symposium,
July 2010.
Extended version available as CACR Tech Report 2010-05.
-
Privacy-preserving Queries over Relational Databases
Femi Olumofin, Ian Goldberg,
10th Privacy Enhancing Technologies Symposium,
July 2010.
Extended version available as CACR Tech Report 2009-37.
-
Achieving Efficient Query Privacy for Location Based Services
Femi Olumofin, Piotr K. Tysowski, Ian Goldberg, Urs Hengartner,
10th Privacy Enhancing Technologies Symposium,
July 2010.
Extended version available as CACR Tech Report 2009-22.
-
Practical Robust Communication in DHTs Tolerating a Byzantine Adversary
Maxwell Young, Aniket Kate, Ian Goldberg, Martin Karsten,
30th International Conference on Distributed Computing Systems,
June 2010.
Extended version available as CACR Tech Report 2009-31.
-
Using Sphinx to Improve Onion Routing Circuit Construction
Aniket Kate, Ian Goldberg,
14th International Conference on Financial Cryptography and Data Security,
January 2010.
Extended version available as CACR Tech Report 2009-33.
-
Multi-party Off-the-Record Messaging
Ian Goldberg, Berkant Ustaoğlu, Matthew Van Gundy, Hao Chen,
16th ACM Conference on Computer and Communications Security,
November 2009.
-
Plinko: Polling with a Physical Implementation of a Noisy Channel
Chris Alexander, Joel Reardon, Ian Goldberg,
8th ACM Workshop on Privacy in the Electronic Society,
November 2009.
Extended version available as CACR Tech Report 2009-21.
-
Improving Tor Using a TCP-over-DTLS Tunnel
Joel Reardon, Ian Goldberg,
18th USENIX Security Symposium,
August 2009.
-
Distributed Key Generation for the Internet
Aniket Kate, Ian Goldberg,
29th International Conference on Distributed Computing Systems,
June 2009.
-
A New Message Recognition Protocol With Self-Recoverability for Ad Hoc Pervasive Networks
Ian Goldberg, Atefeh Mashatan, Douglas Stinson,
7th International Conference on Applied Cryptography and Network Security,
June 2009.
-
Sphinx: A Compact and Provably Secure Mix Format
George Danezis, Ian Goldberg,
2009 IEEE Symposium on Security and Privacy,
May 2009.
-
A User Study of Off-the-Record Messaging
Ryan Stedman, Kayo Yoshida, Ian Goldberg,
The 2008 Symposium On Usable Privacy and Security,
July 2008.
-
Improved User Authentication in Off-The-Record Messaging
Chris Alexander, Ian Goldberg,
6th ACM Workshop on Privacy in the Electronic Society,
October 2007.
-
Louis, Lester and Pierre: Three Protocols for Location Privacy
Ge Zhong, Ian Goldberg, Urs Hengartner,
7th Privacy Enhancing Technologies Symposium,
June 2007.
-
Pairing-Based Onion Routing
Aniket Kate, Gregory Zaverucha, Ian Goldberg,
7th Privacy Enhancing Technologies Symposium,
June 2007.
-
Improving the Robustness of Private Information Retrieval
Ian Goldberg,
2007 IEEE Symposium on Security and Privacy,
May 2007.
-
On the Security of the Tor Authentication Protocol
Ian Goldberg,
Workshop on Privacy Enhancing Technologies 2006,
June 2006.
-
Off-the-Record Communication, or, Why Not To Use PGP
Nikita Borisov, Ian Goldberg, Eric Brewer,
3rd ACM Workshop on Privacy in the Electronic Society,
October 2004.
-
Privacy-enhancing Technologies for the Internet, II: Five Years Later
Ian Goldberg,
Workshop on Privacy Enhancing Technologies 2002,
April 2002.
-
A Cryptanalysis of the High-bandwidth Digital Content Protection System
Scott Crosby, Ian Goldberg, Robert Johnson, Dawn Song, David Wagner,
Workshop on Security and Privacy in Digital Rights Management 2001,
November 2001.
-
Intercepting Mobile Communications: The Insecurity of 802.11
Nikita Borisov, Ian Goldberg, David Wagner,
ACM SIGMOBILE Annual International Conference on Mobile Computing and Networking 2001,
July 2001.
-
Proofs of Security for the Unix Password Hashing Algorithm
David Wagner, Ian Goldberg,
Asiacrypt 2000,
December 2000.
-
Reaction Attacks Against Several Public-Key Cryptosystems
Chris Hall, Ian Goldberg, Bruce Schneier,
International Conference on Information and Communication Security 1999,
November 1999.
-
The Ninja Jukebox
Ian Goldberg, Steven D. Gribble, David Wagner, Eric A. Brewer,
2nd USENIX Symposium on Internet Technologies and Systems,
October 1999.
-
Experience With Top Gun Wingman: A Proxy-Based Graphical Web Browser for the 3Com PalmPilot
Armando Fox, Ian Goldberg, Steven D. Gribble, David C. Lee, Anthony Polito, Eric A. Brewer,
IFIP International Conference on Distributed Systems Platforms and Open Distributed Processing (Middleware) 1998,
September 1998.
-
A Secure Environment for Untrusted Helper Applications: Confining the Wily Hacker
Ian Goldberg, David Wagner, Randi Thomas, Eric A. Brewer,
6th USENIX Security Symposium,
July 1996.
Books Edited
-
Financial Cryptography and Data Security, 23rd International Conference (FC 2019)
Ian Goldberg, Tyler Moore,
Frigate Bay, St. Kitts and Nevis,
February 2019.
-
Privacy Enhancing Technologies, 9th International Symposium (PETS 2009)
Ian Goldberg, Mikhail Atallah,
Seattle, WA,
August 2009.
-
Privacy Enhancing Technologies, 8th International
Symposium (PETS 2008)
Nikita Borisov, Ian Goldberg,
Leuven, Belgium,
July 2008.
Book Chapters
-
Privacy-Enhancing Technologies for the Internet III: Ten Years Later
Ian Goldberg,
Chapter 1 of "Digital Privacy: Theory, Technologies, and Practices", Alessandro Acquisti, Stefanos Gritzalis, Costos Lambrinoudakis, Sabrina di Vimercati, editors,
December 2007.
-
Architectural Considerations for Cryptanalytic Hardware
Ian Goldberg, David Wagner,
Chapter 10 of "Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design",
July 1998.
Other Invited Publications
-
Trust, Ethics, and Privacy
Ian Goldberg, Austin Hill, Adam Shostack,
Boston University Law Review, Vol. 81, No. 2,
April 2001.
-
Privacy-enhancing Technologies for the Internet
Ian Goldberg, David Wagner, Eric A. Brewer,
IEEE COMPCON '97,
February 1997.
Technical Specifications
Technical Reports
-
Slipping Past the Cordon: A Systematization of Internet Censorship Resistance
Tariq Elahi, Colleen M. Swanson, Ian Goldberg,
CACR Tech Report 2015-10,
August 2015.
-
All-but-k Mercurial Commitments and their Applications
Ryan Henry, Ian Goldberg,
CACR Tech Report 2012-26,
December 2012.
-
Distributed Key Generation in the Wild
Aniket Kate, Yizhou Huang, Ian Goldberg,
ePrint Tech Report 2012/377,
July 2012.
-
The Mis-entropists: New Approaches to Measures in Tor
Angèle Hamel, Jean-Charles Grégoire, Ian Goldberg,
CACR Tech Report 2011-18,
July 2011.
-
Local Anonymity: A Metric for Improving User Privacy in Tor
Simina Brânzei, Tariq Elahi, Ian Goldberg,
CACR Tech Report 2011-17,
July 2011.
-
Preserving Access Privacy Over Large Databases
Femi Olumofin, Ian Goldberg,
CACR Tech Report 2010-33,
November 2010.
-
Relational-Complete Private Information Retrieval
Joel Reardon, Jeff Pound, Ian Goldberg,
CACR Tech Report 2007-34,
November 2007.
-
KleeQ: Asynchronous Key Management for Dynamic Ad-Hoc Networks
Joel Reardon, Alan Kligman, Brian Agala, Ian Goldberg,
CACR Tech Report 2007-03,
January 2007.
Theses