default search action
George Danezis
Person information
- affiliation: Microsoft Research
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i46]George Danezis, Lefteris Kokoris-Kogias, Alberto Sonnino, Mingwei Tian:
Obelia: Scaling DAG-Based Blockchains to Hundreds of Validators. CoRR abs/2410.08701 (2024) - 2023
- [c95]Rati Gelashvili, Alexander Spiegelman, Zhuolun Xiang, George Danezis, Zekun Li, Dahlia Malkhi, Yu Xia, Runtian Zhou:
Block-STM: Scaling Blockchain Execution by Turning Ordering Curse to a Performance Blessing. PPoPP 2023: 232-244 - [c94]Mathieu Baudet, Alberto Sonnino, Mahimna Kelkar, George Danezis:
Zef: Low-latency, Scalable, Private Payments. WPES@CCS 2023: 1-16 - [i45]Lefteris Kokoris-Kogias, Alberto Sonnino, George Danezis:
Cuttlefish: Expressive Fast Path Blockchains with FastUnlock. CoRR abs/2309.12715 (2023) - [i44]Kushal Babel, Andrey Chursin, George Danezis, Lefteris Kokoris-Kogias, Alberto Sonnino:
Mysticeti: Low-Latency DAG Consensus with Fast Commit Path. CoRR abs/2310.14821 (2023) - [i43]Sam Blackshear, Andrey Chursin, George Danezis, Anastasios Kichidis, Lefteris Kokoris-Kogias, Xun Li, Mark Logan, Ashok Menon, Todd Nowacki, Alberto Sonnino, Brandon Williams, Lu Zhang:
Sui Lutris: A Blockchain Combining Broadcast and Consensus. CoRR abs/2310.18042 (2023) - [i42]Alireza Kavousi, Duc Viet Le, Philipp Jovanovic, George Danezis:
BlindPerm: Efficient MEV Mitigation with an Encrypted Mempool and Permutation. IACR Cryptol. ePrint Arch. 2023: 1061 (2023) - 2022
- [c93]George Danezis, Lefteris Kokoris-Kogias, Alberto Sonnino, Alexander Spiegelman:
Narwhal and Tusk: a DAG-based mempool and efficient BFT consensus. EuroSys 2022: 34-50 - [i41]Mathieu Baudet, Alberto Sonnino, Mahimna Kelkar, George Danezis:
Zef: Low-latency, Scalable, Private Payments. CoRR abs/2201.05671 (2022) - [i40]Rati Gelashvili, Alexander Spiegelman, Zhuolun Xiang, George Danezis, Zekun Li, Yu Xia, Runtian Zhou, Dahlia Malkhi:
Block-STM: Scaling Blockchain Execution by Turning Ordering Curse to a Performance Blessing. CoRR abs/2203.06871 (2022) - [i39]Mathieu Baudet, Alberto Sonnino, Mahimna Kelkar, George Danezis:
Zef: Low-latency, Scalable, Private Payments. IACR Cryptol. ePrint Arch. 2022: 83 (2022) - 2021
- [c92]Maria Anna Schett, George Danezis:
Embedding a Deterministic BFT Protocol in a Block DAG. PODC 2021: 177-186 - [i38]Maria Anna Schett, George Danezis:
Embedding a Deterministic BFT Protocol in a Block DAG. CoRR abs/2102.09594 (2021) - [i37]George Danezis, Eleftherios Kokoris-Kogias, Alberto Sonnino, Alexander Spiegelman:
Narwhal and Tusk: A DAG-based Mempool and Efficient BFT Consensus. CoRR abs/2105.11827 (2021) - 2020
- [j13]Nadia Alshahwan, Earl T. Barr, David Clark, George Danezis, Héctor D. Menéndez:
Detecting Malware with Information Complexity. Entropy 22(5): 575 (2020) - [c91]Mathieu Baudet, George Danezis, Alberto Sonnino:
FastPay: High-Performance Byzantine Fault Tolerant Settlement. AFT 2020: 163-177 - [c90]Sarah Azouvi, George Danezis, Valeria Nikolaenko:
Winkle: Foiling Long-Range Attacks in Proof-of-Stake Systems. AFT 2020: 189-201 - [c89]Alberto Sonnino, Shehar Bano, Mustafa Al-Bassam, George Danezis:
Replay Attacks and Defenses Against Cross-shard Consensus in Sharded Distributed Ledgers. EuroS&P 2020: 294-308 - [i36]Mathieu Baudet, George Danezis, Alberto Sonnino:
FastPay: High-Performance Byzantine Fault Tolerant Settlement. CoRR abs/2003.11506 (2020)
2010 – 2019
- 2019
- [j12]Jamie Hayes, Luca Melis, George Danezis, Emiliano De Cristofaro:
LOGAN: Membership Inference Attacks Against Generative Models. Proc. Priv. Enhancing Technol. 2019(1): 133-152 (2019) - [c88]Shehar Bano, Alberto Sonnino, Mustafa Al-Bassam, Sarah Azouvi, Patrick McCorry, Sarah Meiklejohn, George Danezis:
SoK: Consensus in the Age of Blockchains. AFT 2019: 183-198 - [c87]Alberto Sonnino, Mustafa Al-Bassam, Shehar Bano, Sarah Meiklejohn, George Danezis:
Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers. NDSS 2019 - [c86]Hemi Leibowitz, Ania M. Piotrowska, George Danezis, Amir Herzberg:
No Right to Remain Silent: Isolating Malicious Mixes. USENIX Security Symposium 2019: 1841-1858 - [i35]Alberto Sonnino, Shehar Bano, Mustafa Al-Bassam, George Danezis:
Replay Attacks and Defenses against Cross-shard Consensus in Sharded Distributed Ledgers. CoRR abs/1901.11218 (2019) - [i34]Alberto Sonnino, George Danezis:
SybilQuorum: Open Distributed Ledgers Through Trust Networks. CoRR abs/1906.12237 (2019) - [i33]Sarah Azouvi, George Danezis, Valeria Nikolaenko:
Winkle: Foiling Long-Range Attacks in Proof-of-Stake Systems. IACR Cryptol. ePrint Arch. 2019: 1440 (2019) - 2018
- [j11]Awais Rashid, George Danezis, Howard Chivers, Emil Lupu, Andrew Martin, Makayla Lewis, Claudia Peersman:
Scoping the Cyber Security Body of Knowledge. IEEE Secur. Priv. 16(3): 96-102 (2018) - [j10]Alfredo Rial, George Danezis, Markulf Kohlweiss:
Privacy-preserving smart metering revisited. Int. J. Inf. Sec. 17(1): 1-31 (2018) - [c85]Chen Chen, Daniele Enrico Asoni, Adrian Perrig, David Barrera, George Danezis, Carmela Troncoso:
TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer. EuroS&P 2018: 137-152 - [c84]Mustafa Al-Bassam, Alberto Sonnino, Shehar Bano, Dave Hrycyszyn, George Danezis:
Chainspace: A Sharded Smart Contracts Platform. NDSS 2018 - [c83]Jamie Hayes, George Danezis:
Learning Universal Adversarial Perturbations with Generative Models. IEEE Symposium on Security and Privacy Workshops 2018: 43-49 - [c82]Bogdan Kulynych, Wouter Lueks, Marios Isaakidis, George Danezis, Carmela Troncoso:
ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging. WPES@CCS 2018: 86-103 - [i32]Alberto Sonnino, Mustafa Al-Bassam, Shehar Bano, George Danezis:
Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers. CoRR abs/1802.07344 (2018) - [i31]Chen Chen, Daniele Enrico Asoni, Adrian Perrig, David Barrera, George Danezis, Carmela Troncoso:
TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer. CoRR abs/1802.08415 (2018) - [i30]George Danezis, Dave Hrycyszyn:
Blockmania: from Block DAGs to Consensus. CoRR abs/1809.01620 (2018) - 2017
- [j9]Carmela Troncoso, Marios Isaakidis, George Danezis, Harry Halpin:
Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments. Proc. Priv. Enhancing Technol. 2017(4): 404-426 (2017) - [j8]Shehar Bano, Mustafa Al-Bassam, George Danezis:
The Road to Scalable Blockchain Designs. login Usenix Mag. 42(4) (2017) - [c81]Vasilios Mavroudis, Andrea Cerulli, Petr Svenda, Dan Cvrcek, Dusan Klinec, George Danezis:
A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components. CCS 2017: 1583-1600 - [c80]Jamie Hayes, George Danezis:
Generating steganographic images via adversarial training. NIPS 2017: 1954-1963 - [c79]John P. Podolanko, Revanth Pobala, Hussain Mucklai, George Danezis, Matthew Wright:
LiLAC: Lightweight Low-Latency Anonymous Chat. PAC 2017: 141-151 - [c78]Ania M. Piotrowska, Jamie Hayes, Tariq Elahi, Sebastian Meiser, George Danezis:
The Loopix Anonymity System. USENIX Security Symposium 2017: 1199-1216 - [c77]Ania M. Piotrowska, Jamie Hayes, Nethanel Gelernter, George Danezis, Amir Herzberg:
AnNotify: A Private Notification Service. WPES@CCS 2017: 5-15 - [c76]Raphael R. Toledo, George Danezis, Isao Echizen:
Mix-ORAM: Using Delegated Shuffles. WPES@CCS 2017: 51-61 - [i29]Jamie Hayes, George Danezis:
ste-GAN-ography: Generating Steganographic Images via Adversarial Training. CoRR abs/1703.00371 (2017) - [i28]Ania M. Piotrowska, Jamie Hayes, Tariq Elahi, Sebastian Meiser, George Danezis:
The Loopix Anonymity System. CoRR abs/1703.00536 (2017) - [i27]Carmela Troncoso, George Danezis, Marios Isaakidis, Harry Halpin:
Systematizing Decentralization and Privacy: Lessons from 15 years of research and deployments. CoRR abs/1704.08065 (2017) - [i26]Jamie Hayes, Luca Melis, George Danezis, Emiliano De Cristofaro:
LOGAN: Evaluating Privacy Leakage of Generative Models Using Generative Adversarial Networks. CoRR abs/1705.07663 (2017) - [i25]Bogdan Kulynych, Marios Isaakidis, Carmela Troncoso, George Danezis:
ClaimChain: Decentralized Public Key Infrastructure. CoRR abs/1707.06279 (2017) - [i24]Mustafa Al-Bassam, Alberto Sonnino, Shehar Bano, Dave Hrycyszyn, George Danezis:
Chainspace: A Sharded Smart Contracts Platform. CoRR abs/1708.03778 (2017) - [i23]Jamie Hayes, George Danezis:
Machine Learning as an Adversarial Service: Learning Black-Box Adversarial Examples. CoRR abs/1708.05207 (2017) - [i22]Raphael R. Toledo, George Danezis, Isao Echizen:
Mix-ORAM: Using delegate shuffles. CoRR abs/1709.01008 (2017) - [i21]Vasilios Mavroudis, Andrea Cerulli, Petr Svenda, Dan Cvrcek, Dusan Klinec, George Danezis:
A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components. CoRR abs/1709.03817 (2017) - [i20]Shehar Bano, Alberto Sonnino, Mustafa Al-Bassam, Sarah Azouvi, Patrick McCorry, Sarah Meiklejohn, George Danezis:
Consensus in the Age of Blockchains. CoRR abs/1711.03936 (2017) - [i19]Hemi Leibowitz, Ania M. Piotrowska, George Danezis, Amir Herzberg:
No right to remain silent: Isolating Malicious Mixes. IACR Cryptol. ePrint Arch. 2017: 1000 (2017) - 2016
- [j7]Raphael R. Toledo, George Danezis, Ian Goldberg:
Lower-Cost ∈-Private Information Retrieval. Proc. Priv. Enhancing Technol. 2016(4): 184-201 (2016) - [c75]George Danezis, Sarah Meiklejohn:
Centrally Banked Cryptocurrencies. NDSS 2016 - [c74]Luca Melis, George Danezis, Emiliano De Cristofaro:
Efficient Private Statistics with Succinct Sketches. NDSS 2016 - [c73]Jamie Hayes, George Danezis:
k-fingerprinting: A Robust Scalable Website Fingerprinting Technique. USENIX Security Symposium 2016: 1187-1203 - [c72]Marios Isaakidis, Harry Halpin, George Danezis:
UnlimitID: Privacy-Preserving Federated Identity Management using Algebraic MACs. WPES@CCS 2016: 139-142 - [c71]Jamie Hayes, Carmela Troncoso, George Danezis:
TASP: Towards Anonymity Sets that Persist. WPES@CCS 2016: 177-180 - [i18]Raphael R. Toledo, George Danezis, Ian Goldberg:
Lower-Cost epsilon-Private Information Retrieval. CoRR abs/1604.00223 (2016) - [i17]Luís T. A. N. Brandão, Nicolas Christin, George Danezis:
A Public Comment on NCCoE's White Paper on Privacy-Enhancing Identity Brokers. CoRR abs/1611.02968 (2016) - [i16]George Danezis, Stefan Katzenbeisser, Christiane Peters, Bart Preneel:
Privacy and Security in Smart Energy Grids (Dagstuhl Seminar 16032). Dagstuhl Reports 6(1): 99-107 (2016) - [i15]Ania M. Piotrowska, Jamie Hayes, Nethanel Gelernter, George Danezis, Amir Herzberg:
AnoNotify: A Private Notification Service. IACR Cryptol. ePrint Arch. 2016: 466 (2016) - 2015
- [j6]Nikita Borisov, George Danezis, Ian Goldberg:
DP5: A Private Presence Service. Proc. Priv. Enhancing Technol. 2015(2): 4-24 (2015) - [j5]Jamie Hayes, George Danezis:
Guard Sets for Onion Routing. Proc. Priv. Enhancing Technol. 2015(2): 65-80 (2015) - [j4]Luís T. A. N. Brandão, Nicolas Christin, George Danezis, anonymous:
Toward Mending Two Nation-Scale Brokered Identification Systems. Proc. Priv. Enhancing Technol. 2015(2): 135-155 (2015) - [c70]Chen Chen, Daniele Enrico Asoni, David Barrera, George Danezis, Adrian Perrig:
HORNET: High-speed Onion Routing at the Network Layer. CCS 2015: 1441-1454 - [i14]George Danezis, Josep Domingo-Ferrer, Marit Hansen, Jaap-Henk Hoepman, Daniel Le Métayer, Rodica Tirtea, Stefan Schiffner:
Privacy and Data Protection by Design - from policy to engineering. CoRR abs/1501.03726 (2015) - [i13]Nadia Alshahwan, Earl T. Barr, David Clark, George Danezis:
Detecting Malware with Information Complexity. CoRR abs/1502.07661 (2015) - [i12]George Danezis, Sarah Meiklejohn:
Centrally Banked Cryptocurrencies. CoRR abs/1505.06895 (2015) - [i11]Chen Chen, Daniele Enrico Asoni, David Barrera, George Danezis, Adrian Perrig:
HORNET: High-speed Onion Routing at the Network Layer. CoRR abs/1507.05724 (2015) - [i10]Luca Melis, George Danezis, Emiliano De Cristofaro:
Efficient Private Statistics with Succinct Sketches. CoRR abs/1508.06110 (2015) - [i9]Jamie Hayes, George Danezis:
Better open-world website fingerprinting. CoRR abs/1509.00789 (2015) - [i8]George Danezis, Sarah Meiklejohn:
Centrally Banked Cryptocurrencies. IACR Cryptol. ePrint Arch. 2015: 502 (2015) - 2014
- [c69]George Danezis, Cédric Fournet, Jens Groth, Markulf Kohlweiss:
Square Span Programs with Applications to Succinct NIZK Arguments. ASIACRYPT (1) 2014: 532-550 - [c68]Tariq Elahi, George Danezis, Ian Goldberg:
PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks. CCS 2014: 1068-1079 - [c67]George Danezis, Emiliano De Cristofaro:
Fast and Private Genomic Testing for Disease Susceptibility. WPES 2014: 31-34 - [c66]Kumar Sharad, George Danezis:
An Automated Social Graph De-anonymization Technique. WPES 2014: 47-58 - [i7]Kumar Sharad, George Danezis:
An Automated Social Graph De-anonymization Technique. CoRR abs/1408.1276 (2014) - [i6]George Danezis, Cédric Fournet, Jens Groth, Markulf Kohlweiss:
Square Span Programs with Applications to Succinct NIZK Arguments. IACR Cryptol. ePrint Arch. 2014: 718 (2014) - 2013
- [c65]George Danezis, Cédric Fournet, Markulf Kohlweiss, Bryan Parno:
Pinocchio coin: building zerocoin from a succinct pairing-based proof system. PETShop@CCS 2013: 27-30 - [c64]George Danezis, Cédric Fournet, Markulf Kohlweiss, Santiago Zanella Béguelin:
Smart meter aggregation via secret-sharing. SEGS@CCS 2013: 75-80 - [c63]Gilles Barthe, George Danezis, Benjamin Grégoire, César Kunz, Santiago Zanella Béguelin:
Verified Computational Differential Privacy with Applications to Smart Metering. CSF 2013: 287-301 - [c62]Cédric Fournet, Markulf Kohlweiss, George Danezis, Zhengqin Luo:
ZQL: A Compiler for Privacy-Preserving Data Processing. USENIX Security Symposium 2013: 163-178 - [c61]George Danezis, Carmela Troncoso:
You cannot hide for long: de-anonymization of real-world dynamic behaviour. WPES 2013: 49-60 - 2012
- [c60]Andres Molina-Markham, George Danezis, Kevin Fu, Prashant J. Shenoy, David E. Irwin:
Designing Privacy-Preserving Smart Meters with Low-Cost Microcontrollers. Financial Cryptography 2012: 239-253 - [c59]George Danezis, Emilia Käsper:
The Dangers of Composing Anonymous Channels. Information Hiding 2012: 191-206 - [c58]Alfredo Rial, George Danezis:
Privacy-Preserving Smart Metering. ISSE 2012: 105-115 - [c57]George Danezis, Markulf Kohlweiss, Benjamin Livshits, Alfredo Rial:
Private Client-Side Profiling with Random Forests and Hidden Markov Models. Privacy Enhancing Technologies 2012: 18-37 - [e6]Ting Yu, George Danezis, Virgil D. Gligor:
the ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012. ACM 2012, ISBN 978-1-4503-1651-4 [contents] - [e5]George Danezis:
Financial Cryptography and Data Security - 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7035, Springer 2012, ISBN 978-3-642-27575-3 [contents] - [e4]George Danezis, Sven Dietrich, Kazue Sako:
Financial Cryptography and Data Security - FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7126, Springer 2012, ISBN 978-3-642-29888-2 [contents] - 2011
- [j3]Carmela Troncoso, George Danezis, Eleni Kosta, Josep Balasch, Bart Preneel:
PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance. IEEE Trans. Dependable Secur. Comput. 8(5): 742-755 (2011) - [c56]George Danezis, Benjamin Livshits:
Towards ensuring client-side computational integrity. CCSW 2011: 125-130 - [c55]George Danezis, Markulf Kohlweiss, Alfredo Rial:
Differentially Private Billing with Rebates. Information Hiding 2011: 148-162 - [c54]Reza Shokri, George Theodorakopoulos, George Danezis, Jean-Pierre Hubaux, Jean-Yves Le Boudec:
Quantifying Location Privacy: The Case of Sporadic Location Exposure. PETS 2011: 57-76 - [c53]Klaus Kursawe, George Danezis, Markulf Kohlweiss:
Privacy-Friendly Aggregation for the Smart-Grid. PETS 2011: 175-191 - [c52]Alfredo Rial, George Danezis:
Privacy-preserving smart metering. WPES 2011: 49-60 - [e3]Yan Chen, George Danezis, Vitaly Shmatikov:
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011. ACM 2011, ISBN 978-1-4503-0948-6 [contents] - [i5]George Danezis, Markulf Kohlweiss, Alfredo Rial:
Differentially Private Billing with Rebates. IACR Cryptol. ePrint Arch. 2011: 134 (2011) - [i4]Andres Molina-Markham, George Danezis, Kevin Fu, Prashant J. Shenoy, David E. Irwin:
Designing Privacy-preserving Smart Meters with Low-cost Microcontrollers. IACR Cryptol. ePrint Arch. 2011: 544 (2011) - 2010
- [c51]George Danezis, Claudia Díaz, Carmela Troncoso, Ben Laurie:
Drac: An Architecture for Anonymous Low-Volume Communications. Privacy Enhancing Technologies 2010: 202-219 - [c50]George Danezis, Tuomas Aura, Shuo Chen, Emre Kiciman:
How to Share Your Favourite Search Results while Preserving Privacy and Quality. Privacy Enhancing Technologies 2010: 273-290 - [c49]George Danezis:
Generating Channel Ids in Virtual World Operating Systems (Transcript of Discussion). Security Protocols Workshop 2010: 74-81 - [r1]George Danezis, Claudia Díaz, Paul F. Syverson:
Anonymous Communication. Handbook of Financial Cryptography and Security 2010: 341-389
2000 – 2009
- 2009
- [c48]Joseph Bonneau, Jonathan Anderson, George Danezis:
Prying Data out of a Social Network. ASONAM 2009: 249-254 - [c47]George Danezis:
Inferring privacy policies for social networking services. AISec 2009: 5-10 - [c46]Carmela Troncoso, George Danezis:
The bayesian traffic analysis of mix networks. CCS 2009: 369-379 - [c45]George Danezis, Claudia Díaz, Emilia Käsper, Carmela Troncoso:
The Wisdom of Crowds: Attacks and Optimal Constructions. ESORICS 2009: 406-423 - [c44]George Danezis, Prateek Mittal:
SybilInfer: Detecting Sybil Nodes using Social Networks. NDSS 2009 - [c43]George Danezis, Carmela Troncoso:
Vida: How to Use Bayesian Inference to De-anonymize Persistent Communications. Privacy Enhancing Technologies 2009: 56-72 - [c42]George Danezis, Ian Goldberg:
Sphinx: A Compact and Provably Secure Mix Format. SP 2009: 269-282 - [c41]George Danezis:
The Least Privacy-Damaging Centralised Traffic Data Retention Architecture. Security Protocols Workshop 2009: 87-92 - [c40]George Danezis:
The Least Privacy-Damaging Centralised Traffic Data Retention Architecture. Security Protocols Workshop 2009: 93-110 - [c39]Janne Lindqvist, Tuomas Aura, George Danezis, Teemu Koponen, Annu Myllyniemi, Jussi Mäki, Michael Roe:
Privacy-preserving 802.11 access-point discovery. WISEC 2009: 123-130 - 2008
- [c38]George Danezis, Paul F. Syverson:
Bridging and Fingerprinting: Epistemic Attacks on Route Selection. Privacy Enhancing Technologies 2008: 151-166 - [c37]George Danezis, Len Sassaman:
How to Bypass Two Anonymity Revocation Schemes. Privacy Enhancing Technologies 2008: 187-201 - [c36]Daniel Cvrcek, George Danezis:
Fighting the 'Good' Internet War. Security Protocols Workshop 2008: 3-11 - [c35]George Danezis:
Covert Communications Despite Traffic Data Retention. Security Protocols Workshop 2008: 198-214 - [c34]George Danezis:
Covert Communications Despite Traffic Data Retention (Transcript of Discussion). Security Protocols Workshop 2008: 215-219 - [c33]Yoni De Mulder, George Danezis, Lejla Batina, Bart Preneel:
Identification via location-profiling in GSM networks. WPES 2008: 23-32 - [i3]George Danezis, Ian Goldberg:
Sphinx: A Compact and Provably Secure Mix Format. IACR Cryptol. ePrint Arch. 2008: 475 (2008) - 2007
- [j2]George Danezis:
Breaking four mix-related schemes based on Universal Re-encryption. Int. J. Inf. Sec. 6(6): 393-402 (2007) - [c32]Nikita Borisov, George Danezis, Prateek Mittal, Parisa Tabriz:
Denial of service or denial of security? CCS 2007: 92-102 - [c31]George Danezis, Claudia Díaz:
Space-Efficient Private Search with Applications to Rateless Codes. Financial Cryptography 2007: 148-162 - [c30]George Danezis, Claudia Díaz, Sebastian Faust, Emilia Käsper, Carmela Troncoso, Bart Preneel:
Efficient Negative Databases from Cryptographic Hash Functions. ISC 2007: 423-436 - [c29]George Danezis, Claudia Díaz, Carmela Troncoso:
Two-Sided Statistical Disclosure Attack. Privacy Enhancing Technologies 2007: 30-44 - [c28]George Danezis, Ben Laurie:
Private Yet Abuse Resistant Open Publishing. Security Protocols Workshop 2007: 222-243 - [c27]George Danezis:
Private Yet Abuse Resistant Open Publishing (Transcript of Discussion). Security Protocols Workshop 2007: 244-255 - [c26]Claudia Díaz, Carmela Troncoso, George Danezis:
Does additional information always reduce anonymity? WPES 2007: 72-75 - [c25]Carmela Troncoso, George Danezis, Eleni Kosta, Bart Preneel:
Pripayd: privacy friendly pay-as-you-drive insurance. WPES 2007: 99-107 - 2006
- [c24]George Danezis:
Breaking Four Mix-Related Schemes Based on Universal Re-encryption. ISC 2006: 46-59 - [c23]Mike Bond, George Danezis:
A pact with the devil. NSPW 2006: 77-82 - [c22]George Danezis, Richard Clayton:
Route Fingerprinting in Anonymous Communications. Peer-to-Peer Computing 2006: 69-72 - [c21]Daniel Cvrcek, Marek Kumpost, Vashek Matyas, George Danezis:
The Value of Location Information. Security Protocols Workshop 2006: 112-121 - [c20]George Danezis, Bettina Wittneben:
The Economics of Mass Surveillance and the Questionable Value of Anonymous Communications. WEIS 2006 - [c19]Daniel Cvrcek, Marek Kumpost, Vashek Matyas, George Danezis:
A study on the value of location privacy. WPES 2006: 109-118 - [e2]George Danezis, David M. Martin Jr.:
Privacy Enhancing Technologies, 5th International Workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papers. Lecture Notes in Computer Science 3856, Springer 2006, ISBN 3-540-34745-3 [contents] - [e1]George Danezis, Philippe Golle:
Privacy Enhancing Technologies, 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers. Lecture Notes in Computer Science 4258, Springer 2006, ISBN 3-540-68790-4 [contents] - [i2]George Danezis, Claudia Díaz:
Improving the Decoding Efficiency of Private Search. IACR Cryptol. ePrint Arch. 2006: 24 (2006) - 2005
- [j1]George Danezis, Ross J. Anderson:
The Economics of Resisting Censorship. IEEE Secur. Priv. 3(1): 45-50 (2005) - [c18]George Danezis, Chris Lesniewski-Laas, M. Frans Kaashoek, Ross J. Anderson:
Sybil-Resistant DHT Routing. ESORICS 2005: 305-318 - [c17]George Danezis, Jolyon Clulow:
Compulsion Resistant Anonymous Communications. Information Hiding 2005: 11-25 - [c16]Steven J. Murdoch, George Danezis:
Low-Cost Traffic Analysis of Tor. S&P 2005: 183-195 - [c15]Mike Bond, George Danezis:
The Dining Freemasons (Security Protocols for Secret Societies). Security Protocols Workshop 2005: 258-265 - [c14]George Danezis, Stephen Lewis, Ross J. Anderson:
How Much Is Location Privacy Worth? WEIS 2005 - [i1]George Danezis, Claudia Díaz:
Improving the Decoding Efficiency of Private Search. Anonymous Communication and its Applications 2005 - 2004
- [b1]George Danezis:
Better anonymous communications. University of Cambridge, UK, 2004 - [c13]George Danezis, Andrei Serjantov:
Statistical Disclosure or Intersection Attacks on Anonymity Systems. Information Hiding 2004: 293-308 - [c12]George Danezis:
The Traffic Analysis of Continuous-Time Mixes. Privacy Enhancing Technologies 2004: 35-50 - [c11]Claudia Díaz, George Danezis, Christian Grothoff, Andreas Pfitzmann, Paul F. Syverson:
Panel Discussion - Mix Cascades Versus Peer-to-Peer: Is One Concept Superior? Privacy Enhancing Technologies 2004: 242-242 - [c10]Rainer Böhme, George Danezis, Claudia Díaz, Stefan Köpsell, Andreas Pfitzmann:
On the PET Workshop Panel "Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?". Privacy Enhancing Technologies 2004: 243-255 - [c9]George Danezis, Ben Laurie:
Minx: a simple and efficient anonymous packet format. WPES 2004: 59-65 - 2003
- [c8]George Danezis:
Mix-Networks with Restricted Routes. Privacy Enhancing Technologies 2003: 1-17 - [c7]George Danezis:
Statistical Disclosure Attacks. SEC 2003: 421-426 - [c6]George Danezis, Roger Dingledine, Nick Mathewson:
Mixminion: Design of a Type III Anonymous Remailer Protocol. S&P 2003: 2-15 - [c5]George Danezis, Len Sassaman:
Heartbeat traffic to counter (n-1) attacks: red-green-black mixes. WPES 2003: 89-93 - 2002
- [c4]Richard Clayton, George Danezis:
Chaffinch: Confidentiality in the Face of Legal Threats. Information Hiding 2002: 70-86 - [c3]Andrei Serjantov, George Danezis:
Towards an Information Theoretic Metric for Anonymity. Privacy Enhancing Technologies 2002: 41-53 - 2001
- [c2]Richard Clayton, George Danezis, Markus G. Kuhn:
Real World Patterns of Failure in Anonymity Systems. Information Hiding 2001: 230-244 - 2000
- [c1]George Danezis:
An Anonymous Auction Protocol Using "Money Escrow" (Transcript of Discussion). Security Protocols Workshop 2000: 223-233
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 20:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint