WorldCat Identities

Goldberg, I. (Ian)

Publication Timeline
.
Most widely held works by I Goldberg
Terminator: the Sarah Connor chronicles( Visual )

2 editions published in 2009 in English and held by 312 WorldCat member libraries worldwide

A nascent AI, assisted by droids, continues to edge toward world domination and the ruin of humankind, accepting no limits. It fears no one, except John Connor. The machines know John, now 16, is the future head of the resistance and know of his growing abilities. They must find and terminate him. But Sarah Connor is there, protecting and instructing her son as he becomes the man he's destined to be. There will be powerful revelations, breathless pursuits and bravura efforts
International Strategic Minerals Inventory summary report--vanadium by Geological Survey (U.S.)( Book )

6 editions published between 1983 and 1992 in English and held by 302 WorldCat member libraries worldwide

Terminator: the Sarah Connor chronicles( Visual )

2 editions published in 2008 in English and held by 28 WorldCat member libraries worldwide

Sarah and her son John, tired of running from the agents sent from the future to kill them, try to stop the formation of the agency in the present, with the help of a girl with a mysterious link to the future
Privacy enhancing technologies : 7th international symposium, PET 2007, Ottawa, Canada, June 20-22, 2007 : revised selected papers by Ian Goldberg( Book )

4 editions published between 2008 and 2009 in English and held by 26 WorldCat member libraries worldwide

This book constitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, PET 2008, held in Leuven, Belgium, in July 2008 in conjunction with WOTE 2008, the IAVoSS Workshop on Trustworthy Elections. The 13 revised full papers presented were carefully selected from 48 submissions during two rounds of reviewing and improvement. The papers - both from academia and industry - cover design and realization of privacy services for the internet and other communication networks and present novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems
Terminator: the Sarah Connor chronicles( Visual )

1 edition published in 2009 in English and held by 17 WorldCat member libraries worldwide

A nascent AI, assisted by droids, continues to edge toward world domination and the ruin of humankind, accepting no limits. It fears no one, except John Connor. The machines know John, now 16, is the future head of the resistance and know of his growing abilities. They must find and terminate him. But Sarah Connor is there, protecting and instructing her son as he becomes the man he's destined to be. There will be powerful revelations, breathless pursuits and bravura efforts
Terminator: the Sarah Connor chronicles( Visual )

1 edition published in 2009 in English and held by 17 WorldCat member libraries worldwide

A nascent AI, assisted by droids, continues to edge toward world domination and the ruin of humankind, accepting no limits. It fears no one, except John Connor. The machines know John, now 16, is the future head of the resistance and know of his growing abilities. They must find and terminate him. But Sarah Connor is there, protecting and instructing her son as he becomes the man he's destined to be. There will be powerful revelations, breathless pursuits and bravura efforts
Terminator: the Sarah Connor chronicles( Visual )

1 edition published in 2009 in English and held by 17 WorldCat member libraries worldwide

A nascent AI, assisted by droids, continues to edge toward world domination and the ruin of humankind, accepting no limits. It fears no one, except John Connor. The machines know John, now 16, is the future head of the resistance and know of his growing abilities. They must find and terminate him. But Sarah Connor is there, protecting and instructing her son as he becomes the man he's destined to be. There will be powerful revelations, breathless pursuits and bravura efforts
Privacy enhancing technologies 9th international symposium, PETS 2009, Seattle, WA, USA, August 5 - 7, 2009 ; proceedings( )

2 editions published in 2009 in English and held by 8 WorldCat member libraries worldwide

Website Fingerprinting : Attacks and Defenses by Tao Wang( Book )

1 edition published in 2015 in English and held by 3 WorldCat member libraries worldwide

Website fingerprinting attacks allow a local, passive eavesdropper to determine a client's web activity by leveraging features from her packet sequence. These attacks break the privacy expected by users of privacy technologies, including low-latency anonymity networks such as proxies, VPNs, or Tor. As a discipline, website fingerprinting is an application of machine learning techniques to the diverse field of privacy. To perform a website fingerprinting attack, the eavesdropping attacker passively records the time, direction, and size of the client's packets. Then, he uses a machine learning algorithm to classify the packet sequence so as to determine the web page it came from. In this work we construct and evaluate three new website fingerprinting attacks: Wa-OSAD, an attack using a modified edit distance as the kernel of a Support Vector Machine, achieving greater accuracy than attacks before it; Wa-FLev, an attack that quickly approximates an edit distance computation, allowing a low-resource attacker to deanonymize many clients at once; and Wa-kNN, the current state-of-the-art attack, which is effective and fast, with a very low false positive rate in the open-world scenario. While our new attacks perform well in theoretical scenarios, there are significant differences between the situation in the wild and in the laboratory. Specifically, we tackle concerns regarding the freshness of the training set, splitting packet sequences so that each part corresponds to one web page access (for easy classification), and removing misleading noise from the packet sequence. To defend ourselves against such attacks, we need defenses that are both efficient and provable. We rigorously define and motivate the notion of a provable defense in this work, and we present three new provable defenses: Tamaraw, which is a relatively efficient way to flood the channel with fixed-rate packet scheduling; Supersequence, which uses smallest common supersequences to save on bandwidth overhead; and Walkie-Talkie, which uses half-duplex communication to significantly reduce both bandwidth and time overhead, allowing a truly efficient yet provable defense
Ipse and the power of intrusion detection systems : research project by I Goldberg( )

1 edition published in 1998 in English and held by 2 WorldCat member libraries worldwide

19th USENIX Security Symposium August 11-13, 2010, Washington, DC( )

1 edition published in 2010 in English and held by 1 WorldCat member library worldwide

Zhong jie zhe wai zhuan Terminator : the Sarah Connor chronicles( Visual )

1 edition published in 2009 in English and held by 1 WorldCat member library worldwide

Jing you si diao ji ti de xie zhu , er ji jiang chan sheng de ren gong zhi hui , chi xu jin xing hui mie shi jie de ji hua . ta bu shou ren he xian zhi , bu pa ren he ren , chu le yue han kang na . mu qin sha la kang na yi zhi zai bao hu he jiao dao yue han kang na , rang ta neng zai yi hou de ri zi zu dan da ren cheng wei ren lei de jiu shi zhu . ji qi ren du zhi dao shi liu sui de yue han , shi wei lai ren lei fan kang jun de ling xiu , ge xiang ji neng du zai chi xu zeng chang zhong , yin ci , ta men bi xu jin kuai zhao dao yue han bing zhong jie ta . shen mi de san dian biao zhi(bu ming fei xing wu ti ti gong le xian suo ma?). yue han de nu peng you(ka mai rong chi cu le ma?)he yi ge shen mi de xi la gong si(neng gou cao kong bei pan ruan ti tu ke ma?), zhun bei rang ren da chi yi jing . zai di er ji liu pian zhuang zhong , qiang er you li de zhong jie zhe yi jing zhuang man zi dan suo ding mu biao , lie sha xing dong zheng shi zhan kai
Vanadium( Book )

1 edition published in 1992 in English and held by 1 WorldCat member library worldwide

Randomness and the netscape browser by I Goldberg( )

1 edition published in 1996 in English and held by 1 WorldCat member library worldwide

Privacy-Enhancing Technologies for the Internet( Book )

2 editions published in 1997 in English and held by 1 WorldCat member library worldwide

The increased use of the Internet for everyday activities is bringing new threats to personal privacy. This paper gives an overview of existing and potential privacy-enhancing technologies for the Internet, as well as motivation and challenges for future work in this field
Privacy Enhancing Technologies by Nikita Borisov( )

1 edition published in 2008 in English and held by 0 WorldCat member libraries worldwide

This book constitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, PET 2008, held in Leuven, Belgium, in July 2008 in conjunction with WOTE 2008, the IAVoSS Workshop on Trustworthy Elections. The 13 revised full papers presented were carefully selected from 48 submissions during two rounds of reviewing and improvement. The papers - both from academia and industry - cover design and realization of privacy services for the internet and other communication networks and present novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.36 (from 0.21 for Terminator ... to 0.97 for Vanadium / ...)

Terminator: the Sarah Connor chroniclesTerminator: the Sarah Connor chroniclesTerminator: the Sarah Connor chroniclesTerminator: the Sarah Connor chronicles
Alternative Names
Goldberg, Ian

Ian Goldberg Canadees cryptograaf

Ian Goldberg cryptographer

伊恩·戈德堡

Languages
English (31)

Covers
Terminator: the Sarah Connor chroniclesPrivacy enhancing technologies : 7th international symposium, PET 2007, Ottawa, Canada, June 20-22, 2007 : revised selected papersTerminator: the Sarah Connor chroniclesTerminator: the Sarah Connor chroniclesTerminator: the Sarah Connor chroniclesPrivacy enhancing technologies 9th international symposium, PETS 2009, Seattle, WA, USA, August 5 - 7, 2009 ; proceedings