Paul F. Syverson

Affiliations:
  • Naval Research Laboratory, USA


According to our database1, Paul F. Syverson authored at least 102 papers between 1990 and 2024.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2014, "For contributions to and leadership in the theory and practice of privacy and security.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Logic of Sattestation.
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024

2023
Throwing Your Weight Around: Fixing Tor's Positional Weighting.
Proc. Priv. Enhancing Technol., October, 2023

2022
Privacy-Protecting COVID-19 Exposure Notification Based on Cluster Events.
CoRR, 2022

Sauteed Onions: Transparent Associations from Domain Names to Onion Addresses.
Proceedings of the 21st Workshop on Privacy in the Electronic Society, 2022

2021
Privacy-Preserving & Incrementally-Deployable Support for Certificate Transparency in Tor.
Proc. Priv. Enhancing Technol., 2021

Attacks on Onion Discovery and Remedies via Self-Authenticating Traditional Addresses.
Proceedings of the WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, 2021

Principles of Remote Sattestation.
Proceedings of the Protocols, Strands, and Logic, 2021

2020
19th Workshop on Privacy in the Electronic Society (WPES 2020).
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
KIST: Kernel-Informed Socket Transport for Tor.
ACM Trans. Priv. Secur., 2019

Self-Authenticating Traditional Domain Names.
Proceedings of the 2019 IEEE Cybersecurity Development, 2019

Key Reminiscences.
Proceedings of the Foundations of Security, Protocols, and Equational Reasoning, 2019

2018
HSTS Supports Targeted Surveillance.
Proceedings of the 8th USENIX Workshop on Free and Open Communications on the Internet, 2018

2017
PeerFlow: Secure Load Balancing in Tor.
Proc. Priv. Enhancing Technol., 2017

Onions in the Crosshairs: When The Man really is out to get you.
CoRR, 2017

Onions in the Crosshairs: When The Man really <i>is</i> out to get you.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

The Once and Future Onion.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
Bake in .onion for Tear-Free and Stronger Website Authentication.
IEEE Secur. Priv., 2016

2015
20, 000 In League Under the Sea: Anonymous Communication, Trust, MLATs, and Undersea Cables.
Proc. Priv. Enhancing Technol., 2015

Genuine onion: Simple, Fast, Flexible, and Cheap Website Authentication.
CoRR, 2015

2014
Representing Network Trust and Using It to Improve Anonymous Communication.
CoRR, 2014

Never Been KIST: Tor's Congestion Management Blossoms with Kernel-Informed Socket Transport.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

2013
LIRA: Lightweight Incentivized Routing for Anonymity.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Onions for Sale: Putting Privacy on the Market.
Proceedings of the Financial Cryptography and Data Security, 2013

Users get routed: traffic correlation on tor by realistic adversaries.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Guest Editorial: Special Issue on Computer and Communications Security.
ACM Trans. Inf. Syst. Secur., 2012

Probabilistic analysis of onion routing in a black-box model.
ACM Trans. Inf. Syst. Secur., 2012

Throttling Tor Bandwidth Parasites.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Paul Revere Protocols (Transcript of Discussion).
Proceedings of the Security Protocols XX, 2012

Paul Revere Protocols.
Proceedings of the Security Protocols XX, 2012

2011
Trust-based anonymous communication: adversary models and routing algorithms.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

A peel of onion.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
Anonymous Communication.
Proceedings of the Handbook of Financial Cryptography and Security., 2010

Guest editorial: Special issue on computer and communications security.
ACM Trans. Inf. Syst. Secur., 2010

Temporarily hidden bit commitment and lottery applications.
Int. J. Inf. Sec., 2010

Preventing Active Timing Attacks in Low-Latency Anonymous Communication.
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010

Intention-Disguised Algorithmic Trading.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

2009
Why I'm Not an Entropist.
Proceedings of the Security Protocols XVII, 2009

More Anonymous Onion Routing Through Trust.
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009

As-awareness in Tor path selection.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Bridging and Fingerprinting: Epistemic Attacks on Route Selection.
Proceedings of the Privacy Enhancing Technologies, 2008

2007
Distance Bounding Protocols: Authentication Logic Analysis and Collusion Attacks.
Proceedings of the Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 2007

Deploying Low-Latency Anonymity: Design Challenges and Social Factors.
IEEE Secur. Priv., 2007

The right place at the right time.
Commun. ACM, 2007

Improving Efficiency and Simplicity of Tor Circuit Establishment and Hidden Services.
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007

A Model of Onion Routing with Provable Anonymity.
Proceedings of the Financial Cryptography and Data Security, 2007

2006
Locating Hidden Servers.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Towards More Efficient Distance Bounding Protocols for Use in Sensor Networks.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Valet Services: Improving Hidden Servers with a Personal Touch.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006

Blending Different Latency Traffic with Alpha-mixing.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006

2005
Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

High-Power Proxies for Enhancing RFID Privacy and Utility.
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005

2004
What Price Privacy? - and why identity theft is about neither identity nor theft.
Proceedings of the Economics of Information Security, 2004

Formal specification and analysis of the Group Domain Of Interpretation Protocol using NPATRL and the NRL Protocol Analyzer.
J. Comput. Secur., 2004

Tor: The Second-Generation Onion Router.
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004

Synchronous Batching: From Cascades to Free Routes.
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004

Panel Discussion - Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004

Universal Re-encryption for Mixnets.
Proceedings of the Topics in Cryptology, 2004

2003
Metrics for Trafic Analysis Prevention.
Proceedings of the Privacy Enhancing Technologies, Third International Workshop, 2003

On the Economics of Anonymity.
Proceedings of the Financial Cryptography, 2003

Onion Routing for Resistance to Traffic Analysis.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

2002
Environmental Requirements for Authentication Protocols.
Proceedings of the Software Security -- Theories and Systems, 2002

From a Trickle to a Flood: Active Attacks on Several Mix Types.
Proceedings of the Information Hiding, 5th International Workshop, 2002

Reliable MIX Cascade Networks through Reputation.
Proceedings of the Financial Cryptography, 6th International Conference, 2002

Reputation in privacy enhancing technologies.
Proceedings of the 12th Annual Conference on Computers, Freedom and Privacy, 2002

2001
Formalizing GDOI group key management requirements in NPATRL.
Proceedings of the CCS 2001, 2001

2000
The Logic of Authentication Protocols.
Proceedings of the Foundations of Security Analysis and Design, 2000

Authentic Attributes with Fine-Grained Anonymity Protection.
Proceedings of the Financial Cryptography, 2000

Towards an Analysis of Onion Routing Security.
Proceedings of the Designing Privacy Enhancing Technologies, 2000

1999
Unlinkable serial transactions: protocols and applications.
ACM Trans. Inf. Syst. Secur., 1999

Onion Routing.
Commun. ACM, 1999

Group Principals and the Formalization of Anonymity.
Proceedings of the FM'99 - Formal Methods, 1999

Fair On-Line Auctions without Special Trusted Parties.
Proceedings of the Financial Cryptography, 1999

1998
Anonymous connections and onion routing.
IEEE J. Sel. Areas Commun., 1998

A Logical Approach to Multilevel Security of Probabilistic Systems.
Distributed Comput., 1998

A Formal Specification of Requirements for Payment Transactions in the SET Protocol.
Proceedings of the Financial Cryptography, 1998

Weakly Secret Bit Commitment: Applications to Lotteries and Fair Exchange.
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998

Panel Introduction: Varieties of Authentication.
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998

Anonymity on the Internet (Panel).
Proceedings of the CCS '98, 1998

1997
Private Web Browsing.
J. Comput. Secur., 1997

Protocols Using Anonymous Connections: Mobile Applications.
Proceedings of the Security Protocols, 1997

Unlinkable Serial Transactions.
Proceedings of the Financial Cryptography, 1997

A Different Look at Secure Distributed Computation.
Proceedings of the 10th Computer Security Foundations Workshop (CSFW '97), 1997

1996
A New Look at an Old Protocol.
ACM SIGOPS Oper. Syst. Rev., 1996

A Formal Language for Cryptographic Protocol Requirements.
Des. Codes Cryptogr., 1996

Limitations on Design Principles for Public Key Protocols.
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996

Hiding Routing Information.
Proceedings of the Information Hiding, First International Workshop, Cambridge, UK, May 30, 1996

What is an Attack on a Cryptographic Protocal?
Proceedings of the Ninth IEEE Computer Security Foundations Workshop, March 10, 1996

Proxies For Anonymous Routing.
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996

1995
The epistemic representation of information flow security in probabilistic systems.
Proceedings of the Eighth IEEE Computer Security Foundations Workshop (CSFW '95), 1995

1994
An Epistemic Logic of Situations.
Proceedings of the 5th Conference on Theoretical Aspects of Reasoning about Knowledge, 1994

On unifying some cryptographic protocol logics.
Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy, 1994

Formal Requirements for Key Distribution Protocols.
Proceedings of the Advances in Cryptology, 1994

A Taxonomy of Replay Attacks.
Proceedings of the Seventh IEEE Computer Security Foundations Workshop, 1994

1993
On Key Distribution Protocols for Repeated Authentication.
ACM SIGOPS Oper. Syst. Rev., 1993

A logical language for specifying cryptographic protocol requirements.
Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993

Panel: Cryptographic Protocol Models and Requirements.
Proceedings of the 6th IEEE Computer Security Foundations Workshop, 1993

Adding Time to a Logic of Authentication.
Proceedings of the CCS '93, 1993

1992
Knowledge, Belief, and Semantics in the Analysis of Cryptographic Protocols.
J. Comput. Secur., 1992

1991
The Use of Logic in the Analysis of Cryptographic Protocols.
Proceedings of the 1991 IEEE Symposium on Security and Privacy, 1991

The Value of Semantics for the Analysis of Cryptographic Protocols.
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991

1990
Formal Semantics for Logics of Cryptographic Protocols.
Proceedings of the Third IEEE Computer Security Foundations Workshop, 1990


  Loading...