BibTeX records: David M. Goldschlag

download as .bib file

@article{DBLP:journals/ijisec/GoldschlagSS10,
  author       = {David M. Goldschlag and
                  Stuart G. Stubblebine and
                  Paul F. Syverson},
  title        = {Temporarily hidden bit commitment and lottery applications},
  journal      = {Int. J. Inf. Sec.},
  volume       = {9},
  number       = {1},
  pages        = {33--50},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10207-009-0094-1},
  doi          = {10.1007/S10207-009-0094-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/GoldschlagSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/GoldschlagRS99,
  author       = {David M. Goldschlag and
                  Michael G. Reed and
                  Paul F. Syverson},
  title        = {Onion Routing},
  journal      = {Commun. {ACM}},
  volume       = {42},
  number       = {2},
  pages        = {39--41},
  year         = {1999},
  url          = {https://doi.org/10.1145/293411.293443},
  doi          = {10.1145/293411.293443},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/GoldschlagRS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jar/Goldschlag99,
  author       = {David M. Goldschlag},
  title        = {A Mechanization of Unity in {PC-NQTHM-92}},
  journal      = {J. Autom. Reason.},
  volume       = {23},
  number       = {3-4},
  pages        = {445--498},
  year         = {1999},
  url          = {https://doi.org/10.1023/A:1006262609127},
  doi          = {10.1023/A:1006262609127},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jar/Goldschlag99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/StubblebineSG99,
  author       = {Stuart G. Stubblebine and
                  Paul F. Syverson and
                  David M. Goldschlag},
  title        = {Unlinkable serial transactions: protocols and applications},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {2},
  number       = {4},
  pages        = {354--389},
  year         = {1999},
  url          = {https://doi.org/10.1145/330382.330384},
  doi          = {10.1145/330382.330384},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/StubblebineSG99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KravitzG99,
  author       = {David W. Kravitz and
                  David M. Goldschlag},
  editor       = {Matthew K. Franklin},
  title        = {Conditional Access Concepts and Principles},
  booktitle    = {Financial Cryptography, Third International Conference, FC'99, Anguilla,
                  British West Indies, February 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1648},
  pages        = {158--172},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48390-X\_12},
  doi          = {10.1007/3-540-48390-X\_12},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/KravitzG99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/CallasFGS99,
  author       = {Jon Callas and
                  Joan Feigenbaum and
                  David M. Goldschlag and
                  Erin Sawyer},
  editor       = {Matthew K. Franklin},
  title        = {Fair Use, Intellectual Property, and the Information Economy (Panel
                  Session Summary)},
  booktitle    = {Financial Cryptography, Third International Conference, FC'99, Anguilla,
                  British West Indies, February 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1648},
  pages        = {173--183},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48390-X\_13},
  doi          = {10.1007/3-540-48390-X\_13},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/CallasFGS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartcard/GoldschlagK99,
  author       = {David M. Goldschlag and
                  David W. Kravitz},
  editor       = {Scott B. Guthery and
                  Peter Honeyman},
  title        = {Beyond Cryptographic Conditional Access},
  booktitle    = {Proceedings of the 1st Workshop on Smartcard Technology, Smartcard
                  1999, Chicago, Illinois, USA, May 10-11, 1999},
  publisher    = {{USENIX} Association},
  year         = {1999},
  url          = {https://www.usenix.org/conference/usenix-workshop-smartcard-technology/beyond-cryptographic-conditional-access},
  timestamp    = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/smartcard/GoldschlagK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/ReedSG98,
  author       = {Michael G. Reed and
                  Paul F. Syverson and
                  David M. Goldschlag},
  title        = {Anonymous connections and onion routing},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {16},
  number       = {4},
  pages        = {482--494},
  year         = {1998},
  url          = {https://doi.org/10.1109/49.668972},
  doi          = {10.1109/49.668972},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/ReedSG98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/GoldschlagK98,
  author       = {David M. Goldschlag and
                  David W. Kravitz},
  editor       = {Jean{-}Jacques Quisquater and
                  Bruce Schneier},
  title        = {Pirate Card Rejection},
  booktitle    = {Smart Card Research and Applications, This International Conference,
                  {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1820},
  pages        = {141--149},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/10721064\_12},
  doi          = {10.1007/10721064\_12},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/GoldschlagK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/GoldschlagS98,
  author       = {David M. Goldschlag and
                  Stuart G. Stubblebine},
  editor       = {Rafael Hirschfeld},
  title        = {Publicly Verifiable Lotteries: Applications of Delaying Functions},
  booktitle    = {Financial Cryptography, Second International Conference, FC'98, Anguilla,
                  British West Indies, February 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1465},
  pages        = {214--226},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055485},
  doi          = {10.1007/BFB0055485},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/GoldschlagS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/SyversonRG97,
  author       = {Paul F. Syverson and
                  Michael G. Reed and
                  David M. Goldschlag},
  title        = {Private Web Browsing},
  journal      = {J. Comput. Secur.},
  volume       = {5},
  number       = {3},
  pages        = {237--248},
  year         = {1997},
  url          = {https://doi.org/10.3233/JCS-1997-5305},
  doi          = {10.3233/JCS-1997-5305},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/SyversonRG97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pieee/LandwehrG97,
  author       = {Carl E. Landwehr and
                  David M. Goldschlag},
  title        = {Security issues in networks with Internet access},
  journal      = {Proc. {IEEE}},
  volume       = {85},
  number       = {12},
  pages        = {2034--2051},
  year         = {1997},
  url          = {https://doi.org/10.1109/5.650183},
  doi          = {10.1109/5.650183},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pieee/LandwehrG97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/SyversonSG97,
  author       = {Paul F. Syverson and
                  Stuart G. Stubblebine and
                  David M. Goldschlag},
  editor       = {Rafael Hirschfeld},
  title        = {Unlinkable Serial Transactions},
  booktitle    = {Financial Cryptography, First International Conference, {FC} '97,
                  Anguilla, British West Indies, February 24-28, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1318},
  pages        = {39--56},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-63594-7\_66},
  doi          = {10.1007/3-540-63594-7\_66},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/SyversonSG97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SyversonGR97,
  author       = {Paul F. Syverson and
                  David M. Goldschlag and
                  Michael G. Reed},
  title        = {Anonymous Connections and Onion Routing},
  booktitle    = {1997 {IEEE} Symposium on Security and Privacy, May 4-7, 1997, Oakland,
                  CA, {USA}},
  pages        = {44--54},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/SECPRI.1997.601314},
  doi          = {10.1109/SECPRI.1997.601314},
  timestamp    = {Thu, 21 Sep 2023 15:57:36 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/SyversonGR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ReedSG97,
  author       = {Michael G. Reed and
                  Paul F. Syverson and
                  David M. Goldschlag},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  T. Mark A. Lomas and
                  Michael Roe},
  title        = {Protocols Using Anonymous Connections: Mobile Applications},
  booktitle    = {Security Protocols, 5th International Workshop, Paris, France, April
                  7-9, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1361},
  pages        = {13--23},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028156},
  doi          = {10.1007/BFB0028156},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ReedSG97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ReedSG96,
  author       = {Michael G. Reed and
                  Paul F. Syverson and
                  David M. Goldschlag},
  title        = {Proxies For Anonymous Routing},
  booktitle    = {12th Annual Computer Security Applications Conference {(ACSAC} 1996),
                  9-13 December 1996, San Diego, CA, {USA}},
  pages        = {95--104},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/CSAC.1996.569678},
  doi          = {10.1109/CSAC.1996.569678},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ReedSG96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Goldschlag96,
  author       = {David M. Goldschlag},
  editor       = {Li Gong and
                  Jacques Stearn},
  title        = {Several Secure Store and Forward Devices},
  booktitle    = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
                  Communications Security, New Delhi, India, March 14-16, 1996},
  pages        = {129--137},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/238168.238200},
  doi          = {10.1145/238168.238200},
  timestamp    = {Tue, 10 Nov 2020 20:00:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Goldschlag96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/McDermottG96,
  author       = {John P. McDermott and
                  David M. Goldschlag},
  title        = {Towards a model of storage jamming},
  booktitle    = {Ninth {IEEE} Computer Security Foundations Workshop, March 10 - 12,
                  1996, Dromquinna Manor, Kenmare, County Kerry, Ireland},
  pages        = {176},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/CSFW.1996.503703},
  doi          = {10.1109/CSFW.1996.503703},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/McDermottG96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/GoldschlagRS96,
  author       = {David M. Goldschlag and
                  Michael G. Reed and
                  Paul F. Syverson},
  editor       = {Ross J. Anderson},
  title        = {Hiding Routing Information},
  booktitle    = {Information Hiding, First International Workshop, Cambridge, UK, May
                  30 - June 1, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1174},
  pages        = {137--150},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-61996-8\_37},
  doi          = {10.1007/3-540-61996-8\_37},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/GoldschlagRS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/McDermottG95,
  author       = {John P. McDermott and
                  David M. Goldschlag},
  editor       = {David L. Spooner and
                  Steven A. Demurjian and
                  John E. Dobson},
  title        = {Storage Jamming},
  booktitle    = {Database Security {IX:} Status and Prospects, Proceedings of the Ninth
                  Annual {IFIP} {WG11} Working Conference on Database Security, Rensselaerville,
                  New York, USA, 13-16 August 1995},
  series       = {{IFIP} Conference Proceedings},
  volume       = {51},
  pages        = {365--381},
  publisher    = {Chapman {\&} Hall},
  year         = {1995},
  timestamp    = {Thu, 24 Oct 2002 16:18:58 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/McDermottG95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fmsd/Goldschlag94,
  author       = {David M. Goldschlag},
  title        = {Mechanically Verifying Safety and Liveness Properties of Delay Insensitive
                  Circuits},
  journal      = {Formal Methods Syst. Des.},
  volume       = {5},
  number       = {3},
  pages        = {207--225},
  year         = {1994},
  url          = {https://doi.org/10.1007/BF01383831},
  doi          = {10.1007/BF01383831},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fmsd/Goldschlag94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/BoyerGKM91,
  author       = {Robert S. Boyer and
                  David M. Goldschlag and
                  Matt Kaufmann and
                  J Strother Moore},
  editor       = {Vladimir Lifschitz},
  title        = {Functional Instantiation in First-Order Logic},
  booktitle    = {Artificial and Mathematical Theory of Computation, Papers in Honor
                  of John McCarthy on the occasion of his sixty-fourth birthday},
  pages        = {7--26},
  publisher    = {Academic Press / Elsevier},
  year         = {1991},
  url          = {https://doi.org/10.1016/b978-0-12-450010-5.50007-4},
  doi          = {10.1016/B978-0-12-450010-5.50007-4},
  timestamp    = {Mon, 19 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/BoyerGKM91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/Goldschlag91,
  author       = {David M. Goldschlag},
  editor       = {Kim Guldstrand Larsen and
                  Arne Skou},
  title        = {Mechanically Verifying Safety and Liveness Properties of Delay Insensitive
                  Circuits},
  booktitle    = {Computer Aided Verification, 3rd International Workshop, {CAV} '91,
                  Aalborg, Denmark, July, 1-4, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {575},
  pages        = {354--364},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-55179-4\_34},
  doi          = {10.1007/3-540-55179-4\_34},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/Goldschlag91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fm/Goldschlag91,
  author       = {David M. Goldschlag},
  editor       = {S{\o}ren Prehn and
                  W. J. Toetenel},
  title        = {A Mechanical Formalization of Several Fairness Notions},
  booktitle    = {{VDM} '91 - Formal Software Development, 4th International Symposium
                  of {VDM} Europe, Noordwijkerhout, The Netherlands, October 21-25,
                  1991, Proceedings, Volume 1: Conference Contributions},
  series       = {Lecture Notes in Computer Science},
  volume       = {551},
  pages        = {125--148},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-54834-3\_10},
  doi          = {10.1007/3-540-54834-3\_10},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/fm/Goldschlag91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/Goldschlag90,
  author       = {David M. Goldschlag},
  title        = {Mechanically Verifying Concurrent Programs with the Boyer-Moore Prover},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {16},
  number       = {9},
  pages        = {1005--1023},
  year         = {1990},
  url          = {https://doi.org/10.1109/32.58787},
  doi          = {10.1109/32.58787},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/Goldschlag90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip2/Goldschlag90,
  author       = {David M. Goldschlag},
  editor       = {Manfred Broy and
                  Cliff B. Jones},
  title        = {Mechanizing Unity},
  booktitle    = {Programming concepts and methods: Proceedings of the {IFIP} Working
                  Group 2.2, 2.3 Working Conference on Programming Concepts and Methods,
                  Sea of Galilee, Israel, 2-5 April, 1990},
  pages        = {387--414},
  publisher    = {North-Holland},
  year         = {1990},
  timestamp    = {Sat, 26 Dec 2020 18:17:05 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip2/Goldschlag90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics