The SCEAS System
Navigation Menu

Search the dblp DataBase


Len Sassaman: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Claudia Díaz, Len Sassaman, Evelyne Dewitte
    Comparison Between Two Practical Mix Designs. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:141-159 [Conf]
  2. Len Sassaman
    The Promise of Privacy. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:- [Conf]
  3. George Danezis, Len Sassaman
    Heartbeat traffic to counter (n-1) attacks: red-green-black mixes. [Citation Graph (0, 0)][DBLP]
    WPES, 2003, pp:89-93 [Conf]
  4. Len Sassaman, Bram Cohen, Nick Mathewson
    The pynchon gate: a secure method of pseudonymous mail retrieval. [Citation Graph (0, 0)][DBLP]
    WPES, 2005, pp:1-9 [Conf]

  5. PKI Layer Cake: New Collision Attacks against the Global X.509 Infrastructure. [Citation Graph (, )][DBLP]

  6. Ethical Guidelines for Computer Security Researchers: "Be Reasonable". [Citation Graph (, )][DBLP]

  7. Freezing More Than Bits: Chilling Effects of the OLPC XO Security Model. [Citation Graph (, )][DBLP]

  8. How to Bypass Two Anonymity Revocation Schemes. [Citation Graph (, )][DBLP]

Search in 0.001secs, Finished in 0.002secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002