default search action
Sharon Goldberg
2020 – today
- 2024
- [c26]Sharon Goldberg, Miro Haller, Nadia Heninger, Mike Milano, Dan Shumow, Marc Stevens, Adam Suhl:
RADIUS/UDP Considered Harmful. USENIX Security Symposium 2024 - 2023
- [i25]Ethan Heilman, Lucie Mugnier, Athanasios Filippidis, Sharon Goldberg, Sebastien Lipman, Yuval Marcus, Mike Milano, Sidhartha Premkumar, Chad Unrein:
OpenPubkey: Augmenting OpenID Connect with User held Signing Keys. IACR Cryptol. ePrint Arch. 2023: 296 (2023) - [i24]Sharon Goldberg, Leonid Reyzin, Dimitrios Papadopoulos, Jan Vcelák:
Verifiable Random Functions (VRFs). RFC 9381: 1-47 (2023) - 2022
- [i23]Yossi Gilad, Sharon Goldberg, Kotikalapudi Sriram, Job Snijders, Ben Maddison:
The Use of maxLength in the Resource Public Key Infrastructure (RPKI). RFC 9319: 1-13 (2022) - 2020
- [c25]Ethan Heilman, Sebastien Lipmann, Sharon Goldberg:
The Arwen Trading Protocols. Financial Cryptography 2020: 156-173 - [i22]Ethan Heilman, Sebastien Lipmann, Sharon Goldberg:
The Arwen Trading Protocols (Full Version). IACR Cryptol. ePrint Arch. 2020: 24 (2020)
2010 – 2019
- 2019
- [c24]Sharon Goldberg, Leonid Reyzin, Omar Sagga, Foteini Baldimtsi:
Efficient Noninteractive Certification of RSA Moduli and Beyond. ASIACRYPT (3) 2019: 700-727 - [i21]Muzammil Abdul Rehman, Sharon Goldberg, David R. Choffnes:
Passport: Enabling Accurate Country-Level Router Geolocation using Inaccurate Sources. CoRR abs/1905.04651 (2019) - [i20]Aanchal Malhotra, Willem Toorop, Benno J. Overeinder, Ralph Dolmans, Sharon Goldberg:
The Impact of Time on DNS Security. IACR Cryptol. ePrint Arch. 2019: 788 (2019) - [i19]Aanchal Malhotra, Sharon Goldberg:
Message Authentication Code for the Network Time Protocol. RFC 8573: 1-5 (2019) - 2018
- [j14]Sharon Goldberg, Ethan Heilman:
Technical perspective: The rewards of selfish mining. Commun. ACM 61(7): 94 (2018) - [c23]Sarah Scheffler, Sean Smith, Yossi Gilad, Sharon Goldberg:
The Unintended Consequences of Email Spam Prevention. PAM 2018: 158-169 - [i18]Foteini Baldimtsi, Sharon Goldberg, Leonid Reyzin, Omar Sagga:
Certifying RSA Public Keys with an Efficient NIZK. IACR Cryptol. ePrint Arch. 2018: 57 (2018) - [i17]Yuval Marcus, Ethan Heilman, Sharon Goldberg:
Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network. IACR Cryptol. ePrint Arch. 2018: 236 (2018) - 2017
- [c22]Yossi Gilad, Omar Sagga, Sharon Goldberg:
MaxLength Considered Harmful to the RPKI. CoNEXT 2017: 101-107 - [c21]Aanchal Malhotra, Matthew Van Gundy, Mayank Varia, Haydn Kennedy, Jonathan Gardner, Sharon Goldberg:
The Security of NTP's Datagram Protocol. Financial Cryptography 2017: 405-423 - [c20]Ethan Heilman, Leen Alshenibr, Foteini Baldimtsi, Alessandra Scafuro, Sharon Goldberg:
TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub. NDSS 2017 - [i16]Dimitrios Papadopoulos, Duane Wessels, Shumon Huque, Moni Naor, Jan Vcelák, Leonid Reyzin, Sharon Goldberg:
Can NSEC5 be practical for DNSSEC deployments? IACR Cryptol. ePrint Arch. 2017: 99 (2017) - 2016
- [j13]Robert Lychev, Michael Schapira, Sharon Goldberg:
Rethinking security for internet routing. Commun. ACM 59(10): 48-57 (2016) - [j12]Aanchal Malhotra, Sharon Goldberg:
Attacking NTP's Authenticated Broadcast Mode. Comput. Commun. Rev. 46(2): 12-17 (2016) - [c19]Ethan Heilman, Foteini Baldimtsi, Sharon Goldberg:
Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions. Financial Cryptography Workshops 2016: 43-60 - [c18]Aanchal Malhotra, Isaac E. Cohen, Erik Brakke, Sharon Goldberg:
Attacking the Network Time Protocol. NDSS 2016 - [i15]Aanchal Malhotra, Sharon Goldberg:
Attacking NTP's Authenticated Broadcast Mode. IACR Cryptol. ePrint Arch. 2016: 55 (2016) - [i14]Ethan Heilman, Foteini Baldimtsi, Sharon Goldberg:
Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions. IACR Cryptol. ePrint Arch. 2016: 56 (2016) - [i13]Sharon Goldberg, Moni Naor, Dimitrios Papadopoulos, Leonid Reyzin:
NSEC5 from Elliptic Curves: Provably Preventing DNSSEC Zone Enumeration with Shorter Responses. IACR Cryptol. ePrint Arch. 2016: 83 (2016) - [i12]Ethan Heilman, Foteini Baldimtsi, Leen Alshenibr, Alessandra Scafuro, Sharon Goldberg:
TumbleBit: An Untrusted Tumbler for Bitcoin-Compatible Anonymous Payments. IACR Cryptol. ePrint Arch. 2016: 575 (2016) - [i11]Aanchal Malhotra, Matthew Van Gundy, Mayank Varia, Haydn Kennedy, Jonathan Gardner, Sharon Goldberg:
The Security of NTP's Datagram Protocol. IACR Cryptol. ePrint Arch. 2016: 1006 (2016) - [i10]Yossi Gilad, Omar Sagga, Sharon Goldberg:
MaxLength Considered Harmful to the RPKI. IACR Cryptol. ePrint Arch. 2016: 1015 (2016) - 2015
- [j11]Sharon Goldberg, David Xiao, Eran Tromer, Boaz Barak, Jennifer Rexford:
Path-Quality Monitoring in the Presence of Adversaries: The Secure Sketch Protocols. IEEE/ACM Trans. Netw. 23(6): 1729-1741 (2015) - [j10]Phillipa Gill, Masashi Crete-Nishihata, Jakub Dalek, Sharon Goldberg, Adam Senft, Greg Wiseman:
Characterizing Web Censorship Worldwide: Another Look at the OpenNet Initiative Data. ACM Trans. Web 9(1): 4:1-4:29 (2015) - [c17]Sharon Goldberg, Moni Naor, Dimitrios Papadopoulos, Leonid Reyzin, Sachin Vasant, Asaf Ziv:
NSEC5: Provably Preventing DNSSEC Zone Enumeration. NDSS 2015 - [c16]Ethan Heilman, Alison Kendler, Aviv Zohar, Sharon Goldberg:
Eclipse Attacks on Bitcoin's Peer-to-Peer Network. USENIX Security Symposium 2015: 129-144 - [i9]Ethan Heilman, Alison Kendler, Aviv Zohar, Sharon Goldberg:
Eclipse Attacks on Bitcoin's Peer-to-Peer Network. IACR Cryptol. ePrint Arch. 2015: 263 (2015) - [i8]Aanchal Malhotra, Isaac E. Cohen, Erik Brakke, Sharon Goldberg:
Attacking the Network Time Protocol. IACR Cryptol. ePrint Arch. 2015: 1020 (2015) - 2014
- [j9]Sharon Goldberg:
Why is it taking so long to secure internet routing? Commun. ACM 57(10): 56-63 (2014) - [j8]Phillipa Gill, Michael Schapira, Sharon Goldberg:
A survey of interdomain routing policies. Comput. Commun. Rev. 44(1): 28-34 (2014) - [j7]Sharon Goldberg, Michael Schapira, Peter Hummon, Jennifer Rexford:
How secure are secure interdomain routing protocols? Comput. Networks 70: 260-287 (2014) - [j6]Kyle Brogle, Sharon Goldberg, Leonid Reyzin:
Sequential aggregate signatures with lazy verification from trapdoor permutations. Inf. Comput. 239: 356-376 (2014) - [j5]Davide Proserpio, Sharon Goldberg, Frank McSherry:
Calibrating Data to Sensitivity in Private Data Analysis. Proc. VLDB Endow. 7(8): 637-648 (2014) - [j4]Myungjin Lee, Sharon Goldberg, Ramana Rao Kompella, George Varghese:
FineComb: Measuring Microscopic Latency and Loss in the Presence of Reordering. IEEE/ACM Trans. Netw. 22(4): 1136-1149 (2014) - [c15]Ethan Heilman, Danny Cooper, Leonid Reyzin, Sharon Goldberg:
From the consent of the routed: improving the transparency of the RPKI. SIGCOMM 2014: 51-62 - [c14]Aanchal Malhotra, Sharon Goldberg:
RPKI vs ROVER: comparing the risks of BGP security solutions. SIGCOMM 2014: 113-114 - [i7]Aanchal Malhotra, Sharon Goldberg:
RPKI vs ROVER: Comparing the Risks of BGP Security Solutions. IACR Cryptol. ePrint Arch. 2014: 444 (2014) - [i6]Sharon Goldberg, Moni Naor, Dimitrios Papadopoulos, Leonid Reyzin, Sachin Vasant, Asaf Ziv:
NSEC5: Provably Preventing DNSSEC Zone Enumeration. IACR Cryptol. ePrint Arch. 2014: 582 (2014) - 2013
- [c13]Danny Cooper, Ethan Heilman, Kyle Brogle, Leonid Reyzin, Sharon Goldberg:
On the risk of misbehaving RPKI authorities. HotNets 2013: 16:1-16:7 - [c12]Robert Lychev, Sharon Goldberg, Michael Schapira:
BGP security in partial deployment: is the juice worth the squeeze? SIGCOMM 2013: 171-182 - [c11]Sharon Goldberg, Zhenming Liu:
The Diffusion of Networking Technologies. SODA 2013: 1577-1594 - [i5]Robert Lychev, Sharon Goldberg, Michael Schapira:
BGP Security in Partial Deployment: Is the Juice Worth the Squeeze? CoRR abs/1307.2690 (2013) - 2012
- [j3]Phillipa Gill, Michael Schapira, Sharon Goldberg:
Modeling on quicksand: dealing with the scarcity of ground truth in interdomain routing data. Comput. Commun. Rev. 42(1): 40-46 (2012) - [c10]Kyle Brogle, Sharon Goldberg, Leonid Reyzin:
Sequential Aggregate Signatures with Lazy Verification from Trapdoor Permutations - (Extended Abstract). ASIACRYPT 2012: 644-662 - [c9]Robert Lychev, Sharon Goldberg, Michael Schapira:
Brief announcement: network-destabilizing attacks. PODC 2012: 331-332 - [c8]Davide Proserpio, Sharon Goldberg, Frank McSherry:
A workflow for differentially-private graph synthesis. WOSN 2012: 13-18 - [i4]Sharon Goldberg, Zhenming Liu:
Technology Diffusion in Communication Networks. CoRR abs/1202.2928 (2012) - [i3]Robert Lychev, Sharon Goldberg, Michael Schapira:
Network-Destabilizing Attacks. CoRR abs/1203.1681 (2012) - [i2]Davide Proserpio, Sharon Goldberg, Frank McSherry:
A Workflow for Differentially-Private Graph Synthesis. CoRR abs/1203.3453 (2012) - 2011
- [c7]Phillipa Gill, Michael Schapira, Sharon Goldberg:
Let the market drive deployment: a strategy for transitioning to BGP security. SIGCOMM 2011: 14-25 - [c6]Myungjin Lee, Sharon Goldberg, Ramana Rao Kompella, George Varghese:
Fine-grained latency and loss measurements in the presence of reordering. SIGMETRICS 2011: 329-340 - [i1]Kyle Brogle, Sharon Goldberg, Leonid Reyzin:
Sequential Aggregate Signatures with Lazy Verification from Trapdoor Permutations. IACR Cryptol. ePrint Arch. 2011: 222 (2011) - 2010
- [c5]Sharon Goldberg, Michael Schapira, Peter Hummon, Jennifer Rexford:
How secure are secure interdomain routing protocols. SIGCOMM 2010: 87-98
2000 – 2009
- 2008
- [c4]Boaz Barak, Sharon Goldberg, David Xiao:
Protocols and Lower Bounds for Failure Localization in the Internet. EUROCRYPT 2008: 341-360 - [c3]Sharon Goldberg, Shai Halevi, Aaron D. Jaggard, Vijay Ramachandran, Rebecca N. Wright:
Rationality and traffic attraction: incentives for honest path announcements in bgp. SIGCOMM 2008: 267-278 - [c2]Sharon Goldberg, David Xiao, Eran Tromer, Boaz Barak, Jennifer Rexford:
Path-quality monitoring in the presence of adversaries. SIGMETRICS 2008: 193-204 - 2007
- [j2]Sharon Goldberg, Varghese Baby, Ting Wang, Paul R. Prucnal:
Source-Matched Spreading Codes for Optical CDMA. IEEE Trans. Commun. 55(5): 850-853 (2007) - [j1]Sharon Goldberg, Paul R. Prucnal:
On the Teletraffic Capacity of Optical CDMA. IEEE Trans. Commun. 55(7): 1334-1343 (2007) - 2004
- [c1]Sharon Goldberg, Stephen Liu, Sean Nicolson, Khoman Phang:
CMOS limiting optical preamplifiers using dynamic biasing for wide dynamic range. ISCAS (4) 2004: 217-220
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint