|
Search the dblp DataBase
George Danezis:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- George Danezis, Chris Lesniewski-Laas, M. Frans Kaashoek, Ross J. Anderson
Sybil-Resistant DHT Routing. [Citation Graph (0, 0)][DBLP] ESORICS, 2005, pp:305-318 [Conf]
- Richard Clayton, George Danezis
Chaffinch: Confidentiality in the Face of Legal Threats. [Citation Graph (0, 0)][DBLP] Information Hiding, 2002, pp:70-86 [Conf]
- Richard Clayton, George Danezis, Markus G. Kuhn
Real World Patterns of Failure in Anonymity Systems. [Citation Graph (0, 0)][DBLP] Information Hiding, 2001, pp:230-244 [Conf]
- George Danezis, Jolyon Clulow
Compulsion Resistant Anonymous Communications. [Citation Graph (0, 0)][DBLP] Information Hiding, 2005, pp:11-25 [Conf]
- George Danezis, Andrei Serjantov
Statistical Disclosure or Intersection Attacks on Anonymity Systems. [Citation Graph (0, 0)][DBLP] Information Hiding, 2004, pp:293-308 [Conf]
- George Danezis
Breaking Four Mix-Related Schemes Based on Universal Re-encryption. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:46-59 [Conf]
- George Danezis, Richard Clayton
Route Fingerprinting in Anonymous Communications. [Citation Graph (0, 0)][DBLP] Peer-to-Peer Computing, 2006, pp:69-72 [Conf]
- Andrei Serjantov, George Danezis
Towards an Information Theoretic Metric for Anonymity. [Citation Graph (0, 0)][DBLP] Privacy Enhancing Technologies, 2002, pp:41-53 [Conf]
- Rainer Böhme, George Danezis, Claudia Díaz, Stefan Köpsell, Andreas Pfitzmann
On the PET Workshop Panel "Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?". [Citation Graph (0, 0)][DBLP] Privacy Enhancing Technologies, 2004, pp:243-255 [Conf]
- George Danezis
Mix-Networks with Restricted Routes. [Citation Graph (0, 0)][DBLP] Privacy Enhancing Technologies, 2003, pp:1-17 [Conf]
- George Danezis
The Traffic Analysis of Continuous-Time Mixes. [Citation Graph (0, 0)][DBLP] Privacy Enhancing Technologies, 2004, pp:35-50 [Conf]
- Claudia Díaz, George Danezis, Christian Grothoff, Andreas Pfitzmann, Paul F. Syverson
Panel Discussion - Mix Cascades Versus Peer-to-Peer: Is One Concept Superior? [Citation Graph (0, 0)][DBLP] Privacy Enhancing Technologies, 2004, pp:242-242 [Conf]
- George Danezis
Statistical Disclosure Attacks. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:421-426 [Conf]
- George Danezis, Roger Dingledine, Nick Mathewson
Mixminion: Design of a Type III Anonymous Remailer Protocol. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2003, pp:2-15 [Conf]
- Steven J. Murdoch, George Danezis
Low-Cost Traffic Analysis of Tor. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2005, pp:183-195 [Conf]
- George Danezis
An Anonymous Auction Protocol Using "Money Escrow" (Transcript of Discussion). [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2000, pp:223-233 [Conf]
- George Danezis, Ben Laurie
Minx: a simple and efficient anonymous packet format. [Citation Graph (0, 0)][DBLP] WPES, 2004, pp:59-65 [Conf]
- George Danezis, Len Sassaman
Heartbeat traffic to counter (n-1) attacks: red-green-black mixes. [Citation Graph (0, 0)][DBLP] WPES, 2003, pp:89-93 [Conf]
- George Danezis, Ross J. Anderson
The Economics of Resisting Censorship. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2005, v:3, n:1, pp:45-50 [Journal]
- George Danezis, Claudia Díaz, Sebastian Faust, Emilia Käsper, Carmela Troncoso, Bart Preneel
Efficient Negative Databases from Cryptographic Hash Functions. [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:423-436 [Conf]
- Mike Bond, George Danezis
A pact with the devil. [Citation Graph (0, 0)][DBLP] NSPW, 2006, pp:77-82 [Conf]
- George Danezis, Claudia Díaz, Carmela Troncoso
Two-Sided Statistical Disclosure Attack. [Citation Graph (0, 0)][DBLP] Privacy Enhancing Technologies, 2007, pp:30-44 [Conf]
Denial of service or denial of security? [Citation Graph (, )][DBLP]
The bayesian traffic analysis of mix networks. [Citation Graph (, )][DBLP]
Inferring privacy policies for social networking services. [Citation Graph (, )][DBLP]
Improving the Decoding Efficiency of Private Search. [Citation Graph (, )][DBLP]
The Wisdom of Crowds: Attacks and Optimal Constructions. [Citation Graph (, )][DBLP]
Space-Efficient Private Search with Applications to Rateless Codes. [Citation Graph (, )][DBLP]
SybilInfer: Detecting Sybil Nodes using Social Networks. [Citation Graph (, )][DBLP]
Bridging and Fingerprinting: Epistemic Attacks on Route Selection. [Citation Graph (, )][DBLP]
How to Bypass Two Anonymity Revocation Schemes. [Citation Graph (, )][DBLP]
Vida: How to Use Bayesian Inference to De-anonymize Persistent Communications. [Citation Graph (, )][DBLP]
How to Share Your Favourite Search Results while Preserving Privacy and Quality. [Citation Graph (, )][DBLP]
Drac: An Architecture for Anonymous Low-Volume Communications. [Citation Graph (, )][DBLP]
Sphinx: A Compact and Provably Secure Mix Format. [Citation Graph (, )][DBLP]
The Dining Freemasons (Security Protocols for Secret Societies). [Citation Graph (, )][DBLP]
The Value of Location Information. [Citation Graph (, )][DBLP]
Does additional information always reduce anonymity? [Citation Graph (, )][DBLP]
Pripayd: privacy friendly pay-as-you-drive insurance. [Citation Graph (, )][DBLP]
Identification via location-profiling in GSM networks. [Citation Graph (, )][DBLP]
A study on the value of location privacy. [Citation Graph (, )][DBLP]
Privacy-preserving 802.11 access-point discovery. [Citation Graph (, )][DBLP]
Prying Data out of a Social Network. [Citation Graph (, )][DBLP]
Search in 0.023secs, Finished in 0.024secs
|