Paul F. Syverson
Affiliations:- Naval Research Laboratory, USA
According to our database1,
Paul F. Syverson
authored at least 102 papers
between 1990 and 2024.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2014, "For contributions to and leadership in the theory and practice of privacy and security.".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on id.loc.gov
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024
2023
Proc. Priv. Enhancing Technol., October, 2023
2022
CoRR, 2022
Proceedings of the 21st Workshop on Privacy in the Electronic Society, 2022
2021
Privacy-Preserving & Incrementally-Deployable Support for Certificate Transparency in Tor.
Proc. Priv. Enhancing Technol., 2021
Attacks on Onion Discovery and Remedies via Self-Authenticating Traditional Addresses.
Proceedings of the WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, 2021
Proceedings of the Protocols, Strands, and Logic, 2021
2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
Proceedings of the 2019 IEEE Cybersecurity Development, 2019
Proceedings of the Foundations of Security, Protocols, and Equational Reasoning, 2019
2018
Proceedings of the 8th USENIX Workshop on Free and Open Communications on the Internet, 2018
2017
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017
Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
2016
IEEE Secur. Priv., 2016
2015
20, 000 In League Under the Sea: Anonymous Communication, Trust, MLATs, and Undersea Cables.
Proc. Priv. Enhancing Technol., 2015
2014
CoRR, 2014
Never Been KIST: Tor's Congestion Management Blossoms with Kernel-Informed Socket Transport.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the Financial Cryptography and Data Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
ACM Trans. Inf. Syst. Secur., 2012
ACM Trans. Inf. Syst. Secur., 2012
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Proceedings of the Security Protocols XX, 2012
2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
Proceedings of the Handbook of Financial Cryptography and Security., 2010
ACM Trans. Inf. Syst. Secur., 2010
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
2009
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
Proceedings of the Privacy Enhancing Technologies, 2008
2007
Proceedings of the Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 2007
IEEE Secur. Priv., 2007
Improving Efficiency and Simplicity of Tor Circuit Establishment and Hidden Services.
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007
Proceedings of the Financial Cryptography and Data Security, 2007
2006
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006
2005
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005
2004
Proceedings of the Economics of Information Security, 2004
Formal specification and analysis of the Group Domain Of Interpretation Protocol using NPATRL and the NRL Protocol Analyzer.
J. Comput. Secur., 2004
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004
2003
Proceedings of the Privacy Enhancing Technologies, Third International Workshop, 2003
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003
2002
Proceedings of the Software Security -- Theories and Systems, 2002
Proceedings of the Information Hiding, 5th International Workshop, 2002
Proceedings of the Financial Cryptography, 6th International Conference, 2002
Proceedings of the 12th Annual Conference on Computers, Freedom and Privacy, 2002
2001
Proceedings of the CCS 2001, 2001
2000
Proceedings of the Foundations of Security Analysis and Design, 2000
Proceedings of the Financial Cryptography, 2000
Proceedings of the Designing Privacy Enhancing Technologies, 2000
1999
ACM Trans. Inf. Syst. Secur., 1999
Proceedings of the FM'99 - Formal Methods, 1999
Proceedings of the Financial Cryptography, 1999
1998
Distributed Comput., 1998
Proceedings of the Financial Cryptography, 1998
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998
1997
Proceedings of the Security Protocols, 1997
Proceedings of the 10th Computer Security Foundations Workshop (CSFW '97), 1997
1996
Des. Codes Cryptogr., 1996
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996
Proceedings of the Information Hiding, First International Workshop, Cambridge, UK, May 30, 1996
Proceedings of the Ninth IEEE Computer Security Foundations Workshop, March 10, 1996
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996
1995
Proceedings of the Eighth IEEE Computer Security Foundations Workshop (CSFW '95), 1995
1994
An Epistemic Logic of Situations.
Proceedings of the 5th Conference on Theoretical Aspects of Reasoning about Knowledge, 1994
Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy, 1994
Proceedings of the Advances in Cryptology, 1994
Proceedings of the Seventh IEEE Computer Security Foundations Workshop, 1994
1993
ACM SIGOPS Oper. Syst. Rev., 1993
Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993
Panel: Cryptographic Protocol Models and Requirements.
Proceedings of the 6th IEEE Computer Security Foundations Workshop, 1993
1992
J. Comput. Secur., 1992
1991
Proceedings of the 1991 IEEE Symposium on Security and Privacy, 1991
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991
1990
Proceedings of the Third IEEE Computer Security Foundations Workshop, 1990