Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: David M. Goldschlag
@article{DBLP:journals/ijisec/GoldschlagSS10, author = {David M. Goldschlag and Stuart G. Stubblebine and Paul F. Syverson}, title = {Temporarily hidden bit commitment and lottery applications}, journal = {Int. J. Inf. Sec.}, volume = {9}, number = {1}, pages = {33--50}, year = {2010}, url = {https://doi.org/10.1007/s10207-009-0094-1}, doi = {10.1007/S10207-009-0094-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/GoldschlagSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/GoldschlagRS99, author = {David M. Goldschlag and Michael G. Reed and Paul F. Syverson}, title = {Onion Routing}, journal = {Commun. {ACM}}, volume = {42}, number = {2}, pages = {39--41}, year = {1999}, url = {https://doi.org/10.1145/293411.293443}, doi = {10.1145/293411.293443}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/GoldschlagRS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/Goldschlag99, author = {David M. Goldschlag}, title = {A Mechanization of Unity in {PC-NQTHM-92}}, journal = {J. Autom. Reason.}, volume = {23}, number = {3-4}, pages = {445--498}, year = {1999}, url = {https://doi.org/10.1023/A:1006262609127}, doi = {10.1023/A:1006262609127}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/Goldschlag99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/StubblebineSG99, author = {Stuart G. Stubblebine and Paul F. Syverson and David M. Goldschlag}, title = {Unlinkable serial transactions: protocols and applications}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {2}, number = {4}, pages = {354--389}, year = {1999}, url = {https://doi.org/10.1145/330382.330384}, doi = {10.1145/330382.330384}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/StubblebineSG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KravitzG99, author = {David W. Kravitz and David M. Goldschlag}, editor = {Matthew K. Franklin}, title = {Conditional Access Concepts and Principles}, booktitle = {Financial Cryptography, Third International Conference, FC'99, Anguilla, British West Indies, February 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1648}, pages = {158--172}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48390-X\_12}, doi = {10.1007/3-540-48390-X\_12}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/KravitzG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/CallasFGS99, author = {Jon Callas and Joan Feigenbaum and David M. Goldschlag and Erin Sawyer}, editor = {Matthew K. Franklin}, title = {Fair Use, Intellectual Property, and the Information Economy (Panel Session Summary)}, booktitle = {Financial Cryptography, Third International Conference, FC'99, Anguilla, British West Indies, February 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1648}, pages = {173--183}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48390-X\_13}, doi = {10.1007/3-540-48390-X\_13}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/CallasFGS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartcard/GoldschlagK99, author = {David M. Goldschlag and David W. Kravitz}, editor = {Scott B. Guthery and Peter Honeyman}, title = {Beyond Cryptographic Conditional Access}, booktitle = {Proceedings of the 1st Workshop on Smartcard Technology, Smartcard 1999, Chicago, Illinois, USA, May 10-11, 1999}, publisher = {{USENIX} Association}, year = {1999}, url = {https://www.usenix.org/conference/usenix-workshop-smartcard-technology/beyond-cryptographic-conditional-access}, timestamp = {Wed, 04 Jul 2018 13:06:34 +0200}, biburl = {https://dblp.org/rec/conf/smartcard/GoldschlagK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/ReedSG98, author = {Michael G. Reed and Paul F. Syverson and David M. Goldschlag}, title = {Anonymous connections and onion routing}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {16}, number = {4}, pages = {482--494}, year = {1998}, url = {https://doi.org/10.1109/49.668972}, doi = {10.1109/49.668972}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/ReedSG98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/GoldschlagK98, author = {David M. Goldschlag and David W. Kravitz}, editor = {Jean{-}Jacques Quisquater and Bruce Schneier}, title = {Pirate Card Rejection}, booktitle = {Smart Card Research and Applications, This International Conference, {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1820}, pages = {141--149}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/10721064\_12}, doi = {10.1007/10721064\_12}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/GoldschlagK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/GoldschlagS98, author = {David M. Goldschlag and Stuart G. Stubblebine}, editor = {Rafael Hirschfeld}, title = {Publicly Verifiable Lotteries: Applications of Delaying Functions}, booktitle = {Financial Cryptography, Second International Conference, FC'98, Anguilla, British West Indies, February 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1465}, pages = {214--226}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055485}, doi = {10.1007/BFB0055485}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/GoldschlagS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/SyversonRG97, author = {Paul F. Syverson and Michael G. Reed and David M. Goldschlag}, title = {Private Web Browsing}, journal = {J. Comput. Secur.}, volume = {5}, number = {3}, pages = {237--248}, year = {1997}, url = {https://doi.org/10.3233/JCS-1997-5305}, doi = {10.3233/JCS-1997-5305}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/SyversonRG97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pieee/LandwehrG97, author = {Carl E. Landwehr and David M. Goldschlag}, title = {Security issues in networks with Internet access}, journal = {Proc. {IEEE}}, volume = {85}, number = {12}, pages = {2034--2051}, year = {1997}, url = {https://doi.org/10.1109/5.650183}, doi = {10.1109/5.650183}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pieee/LandwehrG97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/SyversonSG97, author = {Paul F. Syverson and Stuart G. Stubblebine and David M. Goldschlag}, editor = {Rafael Hirschfeld}, title = {Unlinkable Serial Transactions}, booktitle = {Financial Cryptography, First International Conference, {FC} '97, Anguilla, British West Indies, February 24-28, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1318}, pages = {39--56}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-63594-7\_66}, doi = {10.1007/3-540-63594-7\_66}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/SyversonSG97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SyversonGR97, author = {Paul F. Syverson and David M. Goldschlag and Michael G. Reed}, title = {Anonymous Connections and Onion Routing}, booktitle = {1997 {IEEE} Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, {USA}}, pages = {44--54}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/SECPRI.1997.601314}, doi = {10.1109/SECPRI.1997.601314}, timestamp = {Thu, 21 Sep 2023 15:57:36 +0200}, biburl = {https://dblp.org/rec/conf/sp/SyversonGR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ReedSG97, author = {Michael G. Reed and Paul F. Syverson and David M. Goldschlag}, editor = {Bruce Christianson and Bruno Crispo and T. Mark A. Lomas and Michael Roe}, title = {Protocols Using Anonymous Connections: Mobile Applications}, booktitle = {Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1361}, pages = {13--23}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028156}, doi = {10.1007/BFB0028156}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/ReedSG97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ReedSG96, author = {Michael G. Reed and Paul F. Syverson and David M. Goldschlag}, title = {Proxies For Anonymous Routing}, booktitle = {12th Annual Computer Security Applications Conference {(ACSAC} 1996), 9-13 December 1996, San Diego, CA, {USA}}, pages = {95--104}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/CSAC.1996.569678}, doi = {10.1109/CSAC.1996.569678}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ReedSG96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Goldschlag96, author = {David M. Goldschlag}, editor = {Li Gong and Jacques Stearn}, title = {Several Secure Store and Forward Devices}, booktitle = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996}, pages = {129--137}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/238168.238200}, doi = {10.1145/238168.238200}, timestamp = {Tue, 10 Nov 2020 20:00:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Goldschlag96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/McDermottG96, author = {John P. McDermott and David M. Goldschlag}, title = {Towards a model of storage jamming}, booktitle = {Ninth {IEEE} Computer Security Foundations Workshop, March 10 - 12, 1996, Dromquinna Manor, Kenmare, County Kerry, Ireland}, pages = {176}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/CSFW.1996.503703}, doi = {10.1109/CSFW.1996.503703}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/McDermottG96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/GoldschlagRS96, author = {David M. Goldschlag and Michael G. Reed and Paul F. Syverson}, editor = {Ross J. Anderson}, title = {Hiding Routing Information}, booktitle = {Information Hiding, First International Workshop, Cambridge, UK, May 30 - June 1, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1174}, pages = {137--150}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-61996-8\_37}, doi = {10.1007/3-540-61996-8\_37}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/GoldschlagRS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/McDermottG95, author = {John P. McDermott and David M. Goldschlag}, editor = {David L. Spooner and Steven A. Demurjian and John E. Dobson}, title = {Storage Jamming}, booktitle = {Database Security {IX:} Status and Prospects, Proceedings of the Ninth Annual {IFIP} {WG11} Working Conference on Database Security, Rensselaerville, New York, USA, 13-16 August 1995}, series = {{IFIP} Conference Proceedings}, volume = {51}, pages = {365--381}, publisher = {Chapman {\&} Hall}, year = {1995}, timestamp = {Thu, 24 Oct 2002 16:18:58 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/McDermottG95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fmsd/Goldschlag94, author = {David M. Goldschlag}, title = {Mechanically Verifying Safety and Liveness Properties of Delay Insensitive Circuits}, journal = {Formal Methods Syst. Des.}, volume = {5}, number = {3}, pages = {207--225}, year = {1994}, url = {https://doi.org/10.1007/BF01383831}, doi = {10.1007/BF01383831}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fmsd/Goldschlag94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/BoyerGKM91, author = {Robert S. Boyer and David M. Goldschlag and Matt Kaufmann and J Strother Moore}, editor = {Vladimir Lifschitz}, title = {Functional Instantiation in First-Order Logic}, booktitle = {Artificial and Mathematical Theory of Computation, Papers in Honor of John McCarthy on the occasion of his sixty-fourth birthday}, pages = {7--26}, publisher = {Academic Press / Elsevier}, year = {1991}, url = {https://doi.org/10.1016/b978-0-12-450010-5.50007-4}, doi = {10.1016/B978-0-12-450010-5.50007-4}, timestamp = {Mon, 19 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/BoyerGKM91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/Goldschlag91, author = {David M. Goldschlag}, editor = {Kim Guldstrand Larsen and Arne Skou}, title = {Mechanically Verifying Safety and Liveness Properties of Delay Insensitive Circuits}, booktitle = {Computer Aided Verification, 3rd International Workshop, {CAV} '91, Aalborg, Denmark, July, 1-4, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {575}, pages = {354--364}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-55179-4\_34}, doi = {10.1007/3-540-55179-4\_34}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/cav/Goldschlag91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fm/Goldschlag91, author = {David M. Goldschlag}, editor = {S{\o}ren Prehn and W. J. Toetenel}, title = {A Mechanical Formalization of Several Fairness Notions}, booktitle = {{VDM} '91 - Formal Software Development, 4th International Symposium of {VDM} Europe, Noordwijkerhout, The Netherlands, October 21-25, 1991, Proceedings, Volume 1: Conference Contributions}, series = {Lecture Notes in Computer Science}, volume = {551}, pages = {125--148}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-54834-3\_10}, doi = {10.1007/3-540-54834-3\_10}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/fm/Goldschlag91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/Goldschlag90, author = {David M. Goldschlag}, title = {Mechanically Verifying Concurrent Programs with the Boyer-Moore Prover}, journal = {{IEEE} Trans. Software Eng.}, volume = {16}, number = {9}, pages = {1005--1023}, year = {1990}, url = {https://doi.org/10.1109/32.58787}, doi = {10.1109/32.58787}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/Goldschlag90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip2/Goldschlag90, author = {David M. Goldschlag}, editor = {Manfred Broy and Cliff B. Jones}, title = {Mechanizing Unity}, booktitle = {Programming concepts and methods: Proceedings of the {IFIP} Working Group 2.2, 2.3 Working Conference on Programming Concepts and Methods, Sea of Galilee, Israel, 2-5 April, 1990}, pages = {387--414}, publisher = {North-Holland}, year = {1990}, timestamp = {Sat, 26 Dec 2020 18:17:05 +0100}, biburl = {https://dblp.org/rec/conf/ifip2/Goldschlag90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.