Ian Goldberg
Orcid: 0000-0002-1176-2882Affiliations:
- University of Waterloo, Canada
According to our database1,
Ian Goldberg
authored at least 125 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2023, "For contributions to the development and deployment of privacy enhancing technologies".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on id.loc.gov
On csauthors.net:
Bibliography
2024
The Flexible Round-Optimized Schnorr Threshold (FROST) Protocol for Two-Round Schnorr Signatures.
RFC, June, 2024
Proc. Priv. Enhancing Technol., January, 2024
Proc. Priv. Enhancing Technol., 2024
IACR Cryptol. ePrint Arch., 2024
2023
Proc. Priv. Enhancing Technol., January, 2023
Waks-On/Waks-Off: Fast Oblivious Offline/Online Shuffling and Sorting with Waksman Networks.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Grading on a Curve: How Rust can Facilitate New Contributors while Decreasing Vulnerabilities.
Proceedings of the IEEE Secure Development Conference, 2023
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023
2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the 21st Workshop on Privacy in the Electronic Society, 2022
2021
Do you feel a chill? Using PIR against chilling effects for censorship-resistant publishing.
IACR Cryptol. ePrint Arch., 2021
Proceedings of the WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, 2021
Proceedings of the WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, 2021
Once is Never Enough: Foundations for Sound Statistical Inference in Tor Network Experimentation.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
Proc. Priv. Enhancing Technol., 2020
Proc. Priv. Enhancing Technol., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the SUI '20: Symposium on Spatial User Interaction, Virtual Event, Canada, October 31, 2020
2019
ConsenSGX: Scaling Anonymous Communications Networks with Trusted Execution Environments.
Proc. Priv. Enhancing Technol., 2019
2018
Some Results on the Existence of t-All-or-Nothing Transforms Over Arbitrary Alphabets.
IEEE Trans. Inf. Theory, 2018
Proc. Priv. Enhancing Technol., 2018
Proc. Priv. Enhancing Technol., 2018
Proc. Priv. Enhancing Technol., 2018
Style Counsel: Seeing the (Random) Forest for the Trees in Adversarial Code Stylometry.
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018
Proceedings of the 11th USENIX Workshop on Cyber Security Experimentation and Test, 2018
Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices (Transcript of Discussion).
Proceedings of the Security Protocols XXVI, 2018
Proceedings of the Security Protocols XXVI, 2018
Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the Companion of the 2018 ACM/IEEE International Conference on Human-Robot Interaction, 2018
2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 2017 USENIX Workshop on Advances in Security Education, 2017
Proceedings of the Financial Cryptography and Data Security, 2017
2016
Proc. Priv. Enhancing Technol., 2016
Proc. Priv. Enhancing Technol., 2016
Proc. Priv. Enhancing Technol., 2016
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016
Proceedings of the Security Protocols XXIV, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the Applied Cryptography and Network Security, 2016
2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015
Proceedings of the Financial Cryptography and Data Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
The Best of Both Worlds: Combining Information-Theoretic and Computational PIR for Communication Efficiency.
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014
PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
IEEE/ACM Trans. Netw., 2013
Des. Codes Cryptogr., 2013
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013
One (Block) Size Fits All: PIR and SPIR with Variable-Length Records via Multi-Block Queries.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
PCTCP: per-circuit TCP-over-IPsec transport for anonymous communication overlay networks.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the Applied Cryptography and Network Security, 2013
2012
Changing of the guards: a framework for understanding and improving entry guard selection in tor.
Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, 2012
Proceedings of the Financial Cryptography and Data Security, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011
Proceedings of the Financial Cryptography and Data Security, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
ACM Trans. Inf. Syst. Secur., 2010
Int. J. Appl. Cryptogr., 2010
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010
2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the 2009 ACM Workshop on Privacy in the Electronic Society, 2009
Improving Tor using a TCP-over-DTLS Tunnel.
Proceedings of the 18th USENIX Security Symposium, 2009
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009
2008
Proceedings of the 4th Symposium on Usable Privacy and Security, 2008
2007
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007
2006
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006
2004
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004
2002
Proceedings of the Privacy Enhancing Technologies, Second International Workshop, 2002
Proceedings of the Financial Cryptography, 6th International Conference, 2002
2001
Proceedings of the MOBICOM 2001, 2001
Proceedings of the Security and Privacy in Digital Rights Management, 2001
2000
How not to design a privacy system: reflections on the process behind the Freedom product.
Proceedings of the Tenth Conference on Computers, 2000
Proceedings of the Advances in Cryptology, 2000
1999
Proceedings of the 2nd USENIX Symposium on Internet Technologies and Systems, 1999
Proceedings of the Information and Communication Security, Second International Conference, 1999
1998
TAZ Servers and the Rewebber Network: Enabling Anonymous Publishing on the World Wide Web.
First Monday, 1998
1997
Proceedings of the Proceedings IEEE COMPCON 97, 1997
1996
Proceedings of the 6th USENIX Security Symposium, San Jose, CA, USA, July 22-25, 1996, 1996