dblp.uni-trier.dewww.uni-trier.de

George Danezis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
36EEJanne Lindqvist, Tuomas Aura, George Danezis, Teemu Koponen, Annu Myllyniemi, Jussi Mäki, Michael Roe: Privacy-preserving 802.11 access-point discovery. WISEC 2009: 123-130
2008
35EEGeorge Danezis, Paul F. Syverson: Bridging and Fingerprinting: Epistemic Attacks on Route Selection. Privacy Enhancing Technologies 2008: 151-166
34EEGeorge Danezis, Len Sassaman: How to Bypass Two Anonymity Revocation Schemes. Privacy Enhancing Technologies 2008: 187-201
33EEYoni De Mulder, George Danezis, Lejla Batina, Bart Preneel: Identification via location-profiling in GSM networks. WPES 2008: 23-32
2007
32EENikita Borisov, George Danezis, Prateek Mittal, Parisa Tabriz: Denial of service or denial of security? ACM Conference on Computer and Communications Security 2007: 92-102
31EEGeorge Danezis, Claudia Díaz: Space-Efficient Private Search with Applications to Rateless Codes. Financial Cryptography 2007: 148-162
30EEGeorge Danezis, Claudia Díaz, Sebastian Faust, Emilia Käsper, Carmela Troncoso, Bart Preneel: Efficient Negative Databases from Cryptographic Hash Functions. ISC 2007: 423-436
29EEGeorge Danezis, Claudia Díaz, Carmela Troncoso: Two-Sided Statistical Disclosure Attack. Privacy Enhancing Technologies 2007: 30-44
28EEClaudia Díaz, Carmela Troncoso, George Danezis: Does additional information always reduce anonymity? WPES 2007: 72-75
27EECarmela Troncoso, George Danezis, Eleni Kosta, Bart Preneel: Pripayd: privacy friendly pay-as-you-drive insurance. WPES 2007: 99-107
26EEGeorge Danezis: Breaking four mix-related schemes based on Universal Re-encryption. Int. J. Inf. Sec. 6(6): 393-402 (2007)
2006
25 George Danezis, David Martin: Privacy Enhancing Technologies, 5th International Workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papers Springer 2006
24 George Danezis, Philippe Golle: Privacy Enhancing Technologies, 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers Springer 2006
23EEGeorge Danezis: Breaking Four Mix-Related Schemes Based on Universal Re-encryption. ISC 2006: 46-59
22EEMike Bond, George Danezis: A pact with the devil. NSPW 2006: 77-82
21EEGeorge Danezis, Richard Clayton: Route Fingerprinting in Anonymous Communications. Peer-to-Peer Computing 2006: 69-72
20EEDaniel Cvrcek, Marek Kumpost, Vashek Matyas, George Danezis: A study on the value of location privacy. WPES 2006: 109-118
2005
19EEGeorge Danezis, Claudia Díaz: Improving the Decoding Efficiency of Private Search. Anonymous Communication and its Applications 2005
18EEGeorge Danezis, Chris Lesniewski-Laas, M. Frans Kaashoek, Ross J. Anderson: Sybil-Resistant DHT Routing. ESORICS 2005: 305-318
17EESteven J. Murdoch, George Danezis: Low-Cost Traffic Analysis of Tor. IEEE Symposium on Security and Privacy 2005: 183-195
16EEGeorge Danezis, Jolyon Clulow: Compulsion Resistant Anonymous Communications. Information Hiding 2005: 11-25
15EEMike Bond, George Danezis: The Dining Freemasons (Security Protocols for Secret Societies). Security Protocols Workshop 2005: 258-265
14EEGeorge Danezis, Ross J. Anderson: The Economics of Resisting Censorship. IEEE Security & Privacy 3(1): 45-50 (2005)
2004
13EEGeorge Danezis, Andrei Serjantov: Statistical Disclosure or Intersection Attacks on Anonymity Systems. Information Hiding 2004: 293-308
12EEClaudia Díaz, George Danezis, Christian Grothoff, Andreas Pfitzmann, Paul F. Syverson: Panel Discussion - Mix Cascades Versus Peer-to-Peer: Is One Concept Superior? Privacy Enhancing Technologies 2004: 242-242
11EERainer Böhme, George Danezis, Claudia Díaz, Stefan Köpsell, Andreas Pfitzmann: On the PET Workshop Panel "Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?". Privacy Enhancing Technologies 2004: 243-255
10EEGeorge Danezis: The Traffic Analysis of Continuous-Time Mixes. Privacy Enhancing Technologies 2004: 35-50
9EEGeorge Danezis, Ben Laurie: Minx: a simple and efficient anonymous packet format. WPES 2004: 59-65
2003
8EEGeorge Danezis, Roger Dingledine, Nick Mathewson: Mixminion: Design of a Type III Anonymous Remailer Protocol. IEEE Symposium on Security and Privacy 2003: 2-15
7EEGeorge Danezis: Mix-Networks with Restricted Routes. Privacy Enhancing Technologies 2003: 1-17
6 George Danezis: Statistical Disclosure Attacks. SEC 2003: 421-426
5EEGeorge Danezis, Len Sassaman: Heartbeat traffic to counter (n-1) attacks: red-green-black mixes. WPES 2003: 89-93
2002
4EERichard Clayton, George Danezis: Chaffinch: Confidentiality in the Face of Legal Threats. Information Hiding 2002: 70-86
3EEAndrei Serjantov, George Danezis: Towards an Information Theoretic Metric for Anonymity. Privacy Enhancing Technologies 2002: 41-53
2001
2EERichard Clayton, George Danezis, Markus G. Kuhn: Real World Patterns of Failure in Anonymity Systems. Information Hiding 2001: 230-244
2000
1EEGeorge Danezis: An Anonymous Auction Protocol Using "Money Escrow" (Transcript of Discussion). Security Protocols Workshop 2000: 223-233

Coauthor Index

1Ross J. Anderson [14] [18]
2Tuomas Aura [36]
3Lejla Batina [33]
4Rainer Böhme [11]
5Mike Bond [15] [22]
6Nikita Borisov [32]
7Richard Clayton [2] [4] [21]
8Jolyon Clulow [16]
9Daniel Cvrcek [20]
10Claudia Díaz [11] [12] [19] [28] [29] [30] [31]
11Roger Dingledine [8]
12Sebastian Faust [30]
13Philippe Golle [24]
14Christian Grothoff [12]
15M. Frans Kaashoek [18]
16Emilia Käsper [30]
17Teemu Koponen [36]
18Stefan Köpsell [11]
19Eleni Kosta [27]
20Markus G. Kuhn [2]
21Marek Kumpost [20]
22Ben Laurie [9]
23Chris Lesniewski-Laas [18]
24Janne Lindqvist [36]
25Jussi Mäki [36]
26David Martin [25]
27Nick Mathewson [8]
28Vashek Matyas [20]
29Prateek Mittal [32]
30Yoni De Mulder [33]
31Steven J. Murdoch [17]
32Annu Myllyniemi [36]
33Andreas Pfitzmann [11] [12]
34Bart Preneel [27] [30] [33]
35Michael Roe [36]
36Len Sassaman [5] [34]
37Andrei Serjantov [3] [13]
38Paul F. Syverson [12] [35]
39Parisa Tabriz [32]
40Carmela Troncoso [27] [28] [29] [30]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)