USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 13 results:
Filters: Author is Ian Goldberg [Clear All Filters]
Duoram: A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation. 32nd USENIX Security Symposium (USENIX Security 23). :3907--3924.
.
2023. Once is Never Enough: Foundations for Sound Statistical Inference in Tor Network Experimentation. 30th USENIX Security Symposium (USENIX Security 21). :3415--3432.
.
2021. Walking Onions: Scaling Anonymity Networks while Protecting Users. 29th USENIX Security Symposium (USENIX Security 20). :1003--1020.
.
2020. High Performance Tor Experimentation from the Magic of Dynamic ELFs. 11th USENIX Workshop on Cyber Security Experimentation and Test (CSET 18).
.
2018. Live Lesson: Netsim: Network simulation and hacking for high schoolers. 2017 USENIX Workshop on Advances in Security Education (ASE 17).
.
2017. Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks. 26th USENIX Security Symposium (USENIX Security 17). :1375--1390.
.
2017. Leading Johnny to Water: Designing for Usability and Trust. Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). :69--88.
.
2015. Effective Attacks and Provable Defenses for Website Fingerprinting. 23rd USENIX Security Symposium (USENIX Security 14). :143--157.
.
2014. Optimally Robust Private Information Retrieval. 21st USENIX Security Symposium (USENIX Security 12). :269--283.
.
2012. PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval. 20th USENIX Security Symposium (USENIX Security 11).
.
2011. Telex: Anticensorship in the Network Infrastructure. 20th USENIX Security Symposium (USENIX Security 11).
.
2011. The Ninja Jukebox. Second USENIX Symposium on Internet Technologies & Systems (USITS 99).
.
1999. A Secure Environment for Untrusted Helper Applications. 6th USENIX Security Symposium (USENIX Security 96).
.
1996.