Paul Syverson
#11,041
Most Influential Person Now
Computer scientist and mathematician at the US Naval Research Laboratory, inventor of onion routing
Paul Syverson's AcademicInfluence.com Rankings
Paul Syversoncomputer-science Degrees
Computer Science
#1542
World Rank
#1596
Historical Rank
#758
USA Rank
Paul Syversonmathematics Degrees
Mathematics
#5053
World Rank
#7147
Historical Rank
#1687
USA Rank
Measure Theory
#2197
World Rank
#2643
Historical Rank
#629
USA Rank
Download Badge
Computer Science Mathematics
Why Is Paul Syverson Influential?
(Suggest an Edit or Addition)According to Wikipedia, Paul Syverson is a computer scientist best known for inventing onion routing, a feature of the Tor anonymity network. In 2012, Foreign Policy magazine named Syverson, and Tor's co-creators Roger Dingledine and Nick Mathewson, among its Top 100 Global Thinkers "for making the web safe for whistleblowers".
Paul Syverson's Published Works
Published Works
- Tor: The Second-Generation Onion Router (2004) (3906)
- Anonymous connections and onion routing (1997) (1749)
- Onion routing (1999) (662)
- Hiding Routing Information (1996) (571)
- Onion Routing for Anonymous and Private Internet Connections (1999) (528)
- Universal Re-encryption for Mixnets (2004) (450)
- Towards an Analysis of Onion Routing Security (2000) (389)
- Locating hidden servers (2006) (381)
- On unifying some cryptographic protocol logics (1994) (342)
- A Taxonomy of Replay Attacks (1994) (283)
- Users get routed: traffic correlation on tor by realistic adversaries (2013) (273)
- From a Trickle to a Flood: Active Attacks on Several Mix Types (2002) (251)
- Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings (2005) (193)
- On the Economics of Anonymity (2003) (182)
- Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach (2005) (181)
- The Logic of Authentication Protocols (2000) (165)
- As-awareness in Tor path selection (2009) (150)
- High-Power Proxies for Enhancing RFID Privacy and Utility (2005) (141)
- Group Principals and the Formalization of Anonymity (1999) (140)
- A taxonomy of replay attacks [cryptographic protocols] (1994) (140)
- Reliable MIX Cascade Networks through Reputation (2002) (125)
- Proxies for anonymous routing (1996) (113)
- Weakly secret bit commitment: applications to lotteries and fair exchange (1998) (107)
- Distance Bounding Protocols: Authentication Logic Analysis and Collusion Attacks (2007) (105)
- The use of logic in the analysis of cryptographic protocols (1991) (98)
- Fail-Stop Protocols: An Approach to Designing Secure Protocols (Preprint) (1995) (95)
- A Unified Cryptographic Protocol Logic (1996) (90)
- Fair On-Line Auctions without Special Trusted Parties (1999) (87)
- Onion routing access configurations (2000) (85)
- Improving Efficiency and Simplicity of Tor Circuit Establishment and Hidden Services (2007) (84)
- A logical language for specifying cryptographic protocol requirements (1993) (79)
- A Formal Specification of Requirements for Payment Transactions in the SET Protocol (1998) (79)
- Unlinkable serial transactions: protocols and applications (1999) (74)
- Synchronous Batching: From Cascades to Free Routes (2004) (71)
- Adding time to a logic of authentication (1993) (69)
- A logical approach to multilevel security of probabilistic systems (1992) (68)
- Dolev-Yao is no better than Machiavelli (2000) (66)
- Quasi-Anonymous Channels (2003) (64)
- A Model of Onion Routing with Provable Anonymity (2007) (64)
- Bridging and Fingerprinting: Epistemic Attacks on Route Selection (2008) (57)
- Knowledge, Belief, and Semantics in the Analysis of Cryptographic Protocols (1992) (56)
- Unlinkable Serial Transactions (1997) (56)
- Proceedings of the 15th ACM conference on Computer and communications security (2008) (54)
- On key distribution protocols for repeated authentication (1993) (52)
- Trust-based anonymous communication: adversary models and routing algorithms (2011) (51)
- Why I'm Not an Entropist (2009) (50)
- Limitations on design principles for public key protocols (1996) (49)
- LIRA: Lightweight Incentivized Routing for Anonymity (2013) (49)
- Probabilistic analysis of onion routing in a black-box model (2011) (48)
- Deploying Low-Latency Anonymity: Design Challenges and Social Factors (2007) (48)
- Never Been KIST: Tor's Congestion Management Blossoms with Kernel-Informed Socket Transport (2014) (48)
- Protocols Using Anonymous Connections: Mobile Applications (1997) (47)
- Throttling Tor Bandwidth Parasites (2012) (47)
- Metrics for Traffic Analysis Prevention (2003) (45)
- Formal Requirements for Key Distribution Protocols (1994) (44)
- Formal specification and analysis of the Group Domain Of Interpretation Protocol using NPATRL and the NRL Protocol Analyzer (2004) (44)
- A different look at secure distributed computation (1997) (43)
- Systems for Anonymous Communication (2010) (42)
- Private Web Browsing (1997) (39)
- A formal language for cryptographic protocol requirements (1996) (37)
- The Paradoxical Value of Privacy (2003) (36)
- More Anonymous Onion Routing Through Trust (2009) (36)
- Formal semantics for logics of cryptographic protocols (1990) (34)
- Probabilistic analysis of onion routing in a black-box model (2007) (34)
- A Formal Language for Cryptographic Protocol Requirements (1996) (32)
- Formalizing GDOI group key management requirements in NPATRL (2001) (32)
- Valet Services: Improving Hidden Servers with a Personal Touch (2006) (31)
- Preventing Active Timing Attacks in Low-Latency Anonymous Communication (2010) (29)
- Authentic Attributes with Fine-Grained Anonymity Protection (2000) (29)
- PeerFlow: Secure Load Balancing in Tor (2017) (29)
- Challenges in deploying low-latency anonymity (2005) (28)
- Towards More Efficient Distance Bounding Protocols for Use in Sensor Networks (2006) (25)
- Environmental Requirements for Authentication Protocols (2002) (25)
- A peel of onion (2011) (25)
- Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection (2015) (24)
- What Price Privacy? - and why identity theft is about neither identity nor theft (2004) (24)
- Reputation in privacy enhancing technologies (2002) (23)
- The epistemic representation of information flow security in probabilistic systems (1995) (22)
- From Onions to Shallots: Rewarding Tor Relays with TEARS (2014) (22)
- Blending Different Latency Traffic with Alpha-mixing (2006) (20)
- A Logic for the Analysis of Cryptographic Protocols (1990) (19)
- Tor: The Second-Generation Onion Router (2014 DRAFT v1) (2012) (16)
- Practical Vulnerabilities of the Tor Anonymity Network (2016) (15)
- Towards a Strand Semantics for Authentication Logic (1999) (15)
- Metrics for Trafic Analysis Prevention (2003) (14)
- KIST: Kernel-Informed Socket Transport for Tor (2019) (13)
- Privacy enhancing technologies : Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002 : revised papers (2003) (12)
- Temporarily hidden bit commitment and lottery applications (2010) (12)
- Onions in the Crosshairs: When The Man really is out to get you (2017) (11)
- Challenges in deploying low-latency anonymity ( DRAFT ) (2005) (11)
- 20,000 In League Under the Sea: Anonymous Communication, Trust, MLATs, and Undersea Cables (2015) (10)
- Onion routing for resistance to traffic analysis (2003) (9)
- Sleeping dogs lie on a bed of onions but wake when mixed (2011) (9)
- A Multilevel Transaction Problem for Multilevel Secure Database Systems and Its Solution for the Replicated Architecture (1992) (9)
- HSTS Supports Targeted Surveillance (2018) (8)
- A new look at an old protocol (1996) (8)
- Logic, Convention, and Common Knowledge: A Conventionalist Account of Logic (2002) (8)
- Panel Discussion - Mix Cascades Versus Peer-to-Peer: Is One Concept Superior? (2004) (7)
- The value of semantics for the analysis of cryptographic protocols (1991) (6)
- Representing Network Trust and Using It to Improve Anonymous Communication (2014) (6)
- Privacy-Preserving & Incrementally-Deployable Support for Certificate Transparency in Tor (2021) (6)
- KIST (2018) (5)
- Bake in .onion for Tear-Free and Stronger Website Authentication (2016) (5)
- Logic, convention, and common knowledge (1993) (5)
- The Once and Future Onion (2017) (5)
- Genuine onion: Simple, Fast, Flexible, and Cheap Website Authentication (2015) (5)
- Onions for Sale: Putting Privacy on the Market (2013) (5)
- The right place at the right time (2007) (5)
- Open Issues in the Economics of Anonymity (2002) (5)
- Varieties Of Authentication (1998) (4)
- Intention-Disguised Algorithmic Trading (2010) (4)
- Formal Specification and Analysis of the Group Domain of Intrepretation Protocol Using NPATRL and the NRL Protocol Analyzer (Preprint) (2004) (4)
- CCS '08 : proceedings of the 15th ACM Conference on Computer and Communications Security : Alexandria, Virginia, USA, October 27-31, 2008 (2008) (3)
- Attacks on Onion Discovery and Remedies via Self-Authenticating Traditional Addresses (2021) (3)
- Opening Two Envelopes (2010) (3)
- Towards an Analysis of Onion Routing (2008) (3)
- Self-Authenticating Traditional Domain Names (2019) (3)
- Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007 (2007) (2)
- Panel Introduction: Varieties of Authentication (1998) (2)
- Anonymous Communication (2010) (2)
- TR 14-012 Appendices to Accompany “ Never Been KIST : Tors Congestion Management Blossoms with Kernel-Informed Socket Transport ” (2014) (2)
- Financial Cryptography, 5th International Conference, FC 2001, Grand Cayman, British West Indies, February 19-22, 2002, Proceedings (2002) (2)
- Epistemology of Information Flow in the Multilevel Security of Probabilistic Systems. (1995) (2)
- What is an Attack on a Cryptographic Protocal? (1996) (2)
- Proceedings of the 5th International Conference on Financial Cryptography (2002) (2)
- An epistemic logic of situations: extended abstract (1994) (1)
- Metrics for Traac Analysis Prevention (2003) (1)
- Proceedings of the 2nd international conference on Privacy enhancing technologies (2002) (1)
- Privacy-Protecting COVID-19 Exposure Notification Via Cluster Events Without Proximity Detection (2021) (1)
- Does Pushing Security on Clients Make Them Safer? (2019) (1)
- Guest Editorial: Special Issue on Computer and Communications Security (2012) (1)
- Reliable MIX Cas ade (2002) (1)
- Resisting Traffic Analysis on Unclassified Networks (2004) (1)
- Intention-Disguised Algorithmic Trading The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters (2010) (0)
- Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, WPES 2003, Washington, DC, USA, October 30, 2003 (2003) (0)
- WPES'03 : proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society : Washington, DC, USA , October 30, 2003, co-located with CCS'03 (2003) (0)
- Sauteed Onions: Transparent Associations from Domain Names to Onion Addresses (2022) (0)
- CCS'07 : proceedings of the 14th ACM Conference on Computer and Communications Security : Alexandria, Virginia, USA, October 29-November 2, 2007 (2007) (0)
- Financial Cryptography (2002) (0)
- Onions in the Crosshairs (2017) (0)
- CCS'05 : proceedings of the 12th ACM Conference on Computer and Communications Security, November 7-11, 2005, Alexandria, Virginia, USA (2005) (0)
- Paul Revere Protocols (2012) (0)
- Principles of Remote Sattestation (2021) (0)
- Software Quality and Infrastructure Protection for Diffuse Computing (2003) (0)
- Guest editorial: Special issue on computer and communications security (2010) (0)
- The Logi of Authenti ation Proto ols ? (2001) (0)
- Scenario I: Your Credentials Please (2007) (0)
- Anonymity on the Internet (panel) (1998) (0)
- TR 0110 Intention-Disguised Algorithmic Trading (2010) (0)
- Session details: Keynote address (2008) (0)
- Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008 (2008) (0)
- Session details: Authentication and signature schemes (2003) (0)
- : Secure Load Balancing in Tor (2017) (0)
- Range Authentication Protocols for Localization (2007) (0)
- Privacy Enhancing Technologies 2003 Dresden, Germany March 26-28, 2003 (2003) (0)
- Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, WPES 2004, Washington, DC, USA, October 28, 2004 (2004) (0)
- Key Reminiscences (2019) (0)
- Paul Revere Protocols (Transcript of Discussion) (2012) (0)
- Panel: Cryptographic Protocol Models and Requirements (1993) (0)
- Session details: Access control (2005) (0)
- An Epistemic Logic of Situations (1994) (0)
- Privacy-Protecting COVID-19 Exposure Notification Based on Cluster Events (2021) (0)
- 19th Workshop on Privacy in the Electronic Society (WPES 2020) (2020) (0)
- One way to camouflage communication over a public network is to mingle connections from a variety of users and applications to make them difficult to distinguish. (1999) (0)
- Lower-Latency Anonymity Latency Reduction in the Tor Network using Circuit-Level Round-Trip-Time Measurements (2014) (0)
This paper list is powered by the following services:
Other Resources About Paul Syverson
What Schools Are Affiliated With Paul Syverson?
Paul Syverson is affiliated with the following schools: