Sharon Goldberg
Sharon Goldberg
Computer Science, Boston University
Dirección de correo verificada de - Página principal
Citado por
Citado por
Eclipse attacks on bitcoin’s peer-to-peer network
E Heilman, A Kendler, A Zohar, S Goldberg
24th {USENIX} Security Symposium ({USENIX} Security 15), 129-144, 2015
Tumblebit: An untrusted bitcoin-compatible anonymous payment hub
E Heilman, L Alshenibr, F Baldimtsi, A Scafuro, S Goldberg
Network and Distributed System Security Symposium, 2017
How secure are secure interdomain routing protocols
S Goldberg, M Schapira, P Hummon, J Rexford
ACM SIGCOMM Computer Communication Review 40 (4), 87-98, 2010
Blindly signed contracts: Anonymous on-blockchain and off-blockchain bitcoin transactions
E Heilman, F Baldimtsi, S Goldberg
International conference on financial cryptography and data security, 43-60, 2016
Let the market drive deployment: A strategy for transitioning to BGP security
P Gill, M Schapira, S Goldberg
ACM SIGCOMM computer communication review 41 (4), 14-25, 2011
Path-quality monitoring in the presence of adversaries
S Goldberg, D Xiao, E Tromer, B Barak, J Rexford
ACM SIGMETRICS Performance Evaluation Review 36 (1), 193-204, 2008
Calibrating data to sensitivity in private data analysis: A platform for differentially-private analysis of weighted datasets
D Proserpio, S Goldberg, F McSherry
Proceedings of the VLDB Endowment 7 (8), 637-648, 2014
Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network.
Y Marcus, E Heilman, S Goldberg
IACR Cryptol. ePrint Arch. 2018, 236, 2018
Why is it taking so long to secure internet routing?
S Goldberg
Communications of the ACM 57 (10), 56-63, 2014
Efficient maximum flow algorithms
AV Goldberg, RE Tarjan
Communications of the ACM 57 (8), 82-89, 2014
BGP security in partial deployment: Is the juice worth the squeeze?
R Lychev, S Goldberg, M Schapira
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM, 171-182, 2013
XML fever
E Wilde, RJ Glushko
Communications of the ACM 51 (7), 40-46, 2008
A survey of interdomain routing policies
P Gill, M Schapira, S Goldberg
ACM SIGCOMM Computer Communication Review 44 (1), 28-34, 2013
On the risk of misbehaving RPKI authorities
D Cooper, E Heilman, K Brogle, L Reyzin, S Goldberg
Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, 1-7, 2013
Attacking the network time protocol
A Malhotra, IE Cohen, E Brakke, S Goldberg
Cryptology ePrint Archive, 2015
Rationality and traffic attraction: Incentives for honest path announcements in BGP
S Goldberg, S Halevi, AD Jaggard, V Ramachandran, RN Wright
ACM SIGCOMM Computer Communication Review 38 (4), 267-278, 2008
Sequential Aggregate Signatures with Lazy Verification
K Brogle, S Goldberg, L Reyzin
Cryptology ePrint Archive: Report 2011/222, 2011. http://eprint. iacr. org …, 2011
Calibrating Data to Sensitivity in Private Data Analysis
D Proserpio, S Goldberg, F McSherry
arXiv preprint arXiv:1203.3453, 2012
Protocols and lower bounds for failure localization in the Internet
B Barak, S Goldberg, D Xiao
Annual International Conference on the Theory and Applications of …, 2008
NSEC5: provably preventing DNSSEC zone enumeration
S Goldberg, M Naor, D Papadopoulos, L Reyzin, S Vasant, A Ziv
Cryptology ePrint Archive, 2014
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20