The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

George Danezis: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. George Danezis, Chris Lesniewski-Laas, M. Frans Kaashoek, Ross J. Anderson
    Sybil-Resistant DHT Routing. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:305-318 [Conf]
  2. Richard Clayton, George Danezis
    Chaffinch: Confidentiality in the Face of Legal Threats. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:70-86 [Conf]
  3. Richard Clayton, George Danezis, Markus G. Kuhn
    Real World Patterns of Failure in Anonymity Systems. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:230-244 [Conf]
  4. George Danezis, Jolyon Clulow
    Compulsion Resistant Anonymous Communications. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2005, pp:11-25 [Conf]
  5. George Danezis, Andrei Serjantov
    Statistical Disclosure or Intersection Attacks on Anonymity Systems. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:293-308 [Conf]
  6. George Danezis
    Breaking Four Mix-Related Schemes Based on Universal Re-encryption. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:46-59 [Conf]
  7. George Danezis, Richard Clayton
    Route Fingerprinting in Anonymous Communications. [Citation Graph (0, 0)][DBLP]
    Peer-to-Peer Computing, 2006, pp:69-72 [Conf]
  8. Andrei Serjantov, George Danezis
    Towards an Information Theoretic Metric for Anonymity. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2002, pp:41-53 [Conf]
  9. Rainer Böhme, George Danezis, Claudia Díaz, Stefan Köpsell, Andreas Pfitzmann
    On the PET Workshop Panel "Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?". [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2004, pp:243-255 [Conf]
  10. George Danezis
    Mix-Networks with Restricted Routes. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2003, pp:1-17 [Conf]
  11. George Danezis
    The Traffic Analysis of Continuous-Time Mixes. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2004, pp:35-50 [Conf]
  12. Claudia Díaz, George Danezis, Christian Grothoff, Andreas Pfitzmann, Paul F. Syverson
    Panel Discussion - Mix Cascades Versus Peer-to-Peer: Is One Concept Superior? [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2004, pp:242-242 [Conf]
  13. George Danezis
    Statistical Disclosure Attacks. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:421-426 [Conf]
  14. George Danezis, Roger Dingledine, Nick Mathewson
    Mixminion: Design of a Type III Anonymous Remailer Protocol. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:2-15 [Conf]
  15. Steven J. Murdoch, George Danezis
    Low-Cost Traffic Analysis of Tor. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:183-195 [Conf]
  16. George Danezis
    An Anonymous Auction Protocol Using "Money Escrow" (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:223-233 [Conf]
  17. George Danezis, Ben Laurie
    Minx: a simple and efficient anonymous packet format. [Citation Graph (0, 0)][DBLP]
    WPES, 2004, pp:59-65 [Conf]
  18. George Danezis, Len Sassaman
    Heartbeat traffic to counter (n-1) attacks: red-green-black mixes. [Citation Graph (0, 0)][DBLP]
    WPES, 2003, pp:89-93 [Conf]
  19. George Danezis, Ross J. Anderson
    The Economics of Resisting Censorship. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:1, pp:45-50 [Journal]
  20. George Danezis, Claudia Díaz, Sebastian Faust, Emilia Käsper, Carmela Troncoso, Bart Preneel
    Efficient Negative Databases from Cryptographic Hash Functions. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:423-436 [Conf]
  21. Mike Bond, George Danezis
    A pact with the devil. [Citation Graph (0, 0)][DBLP]
    NSPW, 2006, pp:77-82 [Conf]
  22. George Danezis, Claudia Díaz, Carmela Troncoso
    Two-Sided Statistical Disclosure Attack. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2007, pp:30-44 [Conf]

  23. Denial of service or denial of security? [Citation Graph (, )][DBLP]


  24. The bayesian traffic analysis of mix networks. [Citation Graph (, )][DBLP]


  25. Inferring privacy policies for social networking services. [Citation Graph (, )][DBLP]


  26. Improving the Decoding Efficiency of Private Search. [Citation Graph (, )][DBLP]


  27. The Wisdom of Crowds: Attacks and Optimal Constructions. [Citation Graph (, )][DBLP]


  28. Space-Efficient Private Search with Applications to Rateless Codes. [Citation Graph (, )][DBLP]


  29. SybilInfer: Detecting Sybil Nodes using Social Networks. [Citation Graph (, )][DBLP]


  30. Bridging and Fingerprinting: Epistemic Attacks on Route Selection. [Citation Graph (, )][DBLP]


  31. How to Bypass Two Anonymity Revocation Schemes. [Citation Graph (, )][DBLP]


  32. Vida: How to Use Bayesian Inference to De-anonymize Persistent Communications. [Citation Graph (, )][DBLP]


  33. How to Share Your Favourite Search Results while Preserving Privacy and Quality. [Citation Graph (, )][DBLP]


  34. Drac: An Architecture for Anonymous Low-Volume Communications. [Citation Graph (, )][DBLP]


  35. Sphinx: A Compact and Provably Secure Mix Format. [Citation Graph (, )][DBLP]


  36. The Dining Freemasons (Security Protocols for Secret Societies). [Citation Graph (, )][DBLP]


  37. The Value of Location Information. [Citation Graph (, )][DBLP]


  38. Does additional information always reduce anonymity? [Citation Graph (, )][DBLP]


  39. Pripayd: privacy friendly pay-as-you-drive insurance. [Citation Graph (, )][DBLP]


  40. Identification via location-profiling in GSM networks. [Citation Graph (, )][DBLP]


  41. A study on the value of location privacy. [Citation Graph (, )][DBLP]


  42. Privacy-preserving 802.11 access-point discovery. [Citation Graph (, )][DBLP]


  43. Prying Data out of a Social Network. [Citation Graph (, )][DBLP]


Search in 0.303secs, Finished in 0.305secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002