2017 - ACM Distinguished Member
2010 - ACM Senior Member
Computer security, Private information retrieval, The Internet, Cryptography and Information privacy are his primary areas of study. His Computer security study combines topics in areas such as Computer network, Bandwidth and Internet privacy. His study in the field of Eavesdropping, Temporal Key Integrity Protocol, Cryptographic primitive and Wi-Fi Protected Access also crosses realms of Wired Equivalent Privacy.
The Private information retrieval study combines topics in areas such as Database server, Computation and Server. Ian Goldberg has included themes like Telex, Protocol and Service in his The Internet study. His Information privacy study integrates concerns from other disciplines, such as Transport Layer Security, Secure multi-party computation, Key and Sample.
His primary scientific interests are in Computer security, Anonymity, Cryptography, Computer network and Internet privacy. His Computer security research incorporates themes from The Internet and Protocol. His Anonymity study combines topics in areas such as Private information retrieval, Network packet and Communications system.
His research integrates issues of Verifiable secret sharing, Random oracle, Theoretical computer science and Discrete logarithm in his study of Cryptography. His research is interdisciplinary, bridging the disciplines of Hash table and Computer network. His Information privacy, Privacy-enhancing technologies and Privacy software study in the realm of Internet privacy interacts with subjects such as Service provider.
Ian Goldberg mainly focuses on Computer security, Information technology, Computer network, Secret sharing and Internet privacy. His research on Computer security frequently connects to adjacent areas such as Micropayment. He combines subjects such as Key and Secure messaging with his study of Information technology.
His Computer network research integrates issues from Signature, State and Concurrency. The Secret sharing study combines topics in areas such as World Wide Web and Encryption. The study incorporates disciplines such as The Internet and Privacy preserving in addition to Internet privacy.
His scientific interests lie mostly in Information technology, Routing, Internet privacy, Computer security and Key. His study in Routing is interdisciplinary in nature, drawing from both Scalability and Overhead. His biological study spans a wide range of topics, including Policy-based routing, Static routing, Destination-Sequenced Distance Vector routing, Dynamic Source Routing and Distributed computing.
His work on The Internet expands to the thematically related Internet privacy. His Computer security research is multidisciplinary, relying on both Walkie-talkie and Bandwidth. His Key research is multidisciplinary, incorporating perspectives in Cryptocurrency, Database transaction, Payment and Path.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Intercepting mobile communications: the insecurity of 802.11
Nikita Borisov;Ian Goldberg;David Wagner.
acm/ieee international conference on mobile computing and networking (2001)
A secure environment for untrusted helper applications confining the Wily Hacker
Ian Goldberg;David Wagner;Randi Thomas;Eric A. Brewer.
usenix security symposium (1996)
A Secure Environment for Untrusted Helper Applications
Ian Goldberg;David A. Wagner;Randi Thomas;Eric A. Brewer.
usenix security symposium (1996)
Off-the-record communication, or, why not to use PGP
Nikita Borisov;Ian Goldberg;Eric Brewer.
workshop on privacy in the electronic society (2004)
Effective attacks and provable defenses for website fingerprinting
Tao Wang;Xiang Cai;Rishab Nithyanand;Rob Johnson.
usenix security symposium (2014)
Constant-size commitments to polynomials and their applications
Aniket Kate;Gregory M. Zaverucha;Ian Goldberg.
international conference on the theory and application of cryptology and information security (2010)
Improved website fingerprinting on Tor
Tao Wang;Ian Goldberg.
workshop on privacy in the electronic society (2013)
Privacy-enhancing technologies for the Internet
I. Goldberg;D. Wagner;E. Brewer.
Proceedings IEEE COMPCON 97. Digest of Papers (1997)
Louis, Lester and Pierre: three protocols for location privacy
Ge Zhong;Ian Goldberg;Urs Hengartner.
privacy enhancing technologies (2007)
SkypeMorph: protocol obfuscation for Tor bridges
Hooman Mohajeri Moghaddam;Baiyu Li;Mohammad Derakhshani;Ian Goldberg.
computer and communications security (2012)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: