2008 |
6 | EE | George Danezis,
Len Sassaman:
How to Bypass Two Anonymity Revocation Schemes.
Privacy Enhancing Technologies 2008: 187-201 |
5 | EE | Meredith L. Patterson,
Len Sassaman,
David Chaum:
Freezing More Than Bits: Chilling Effects of the OLPC XO Security Model.
UPSEC 2008 |
2005 |
4 | EE | Len Sassaman,
Bram Cohen,
Nick Mathewson:
The pynchon gate: a secure method of pseudonymous mail retrieval.
WPES 2005: 1-9 |
2004 |
3 | EE | Claudia Díaz,
Len Sassaman,
Evelyne Dewitte:
Comparison Between Two Practical Mix Designs.
ESORICS 2004: 141-159 |
2003 |
2 | EE | George Danezis,
Len Sassaman:
Heartbeat traffic to counter (n-1) attacks: red-green-black mixes.
WPES 2003: 89-93 |
2002 |
1 | | Len Sassaman:
The Promise of Privacy.
LISA 2002 |