![]() |
| 2008 | ||
|---|---|---|
| 6 | EE | George Danezis, Len Sassaman: How to Bypass Two Anonymity Revocation Schemes. Privacy Enhancing Technologies 2008: 187-201 |
| 5 | EE | Meredith L. Patterson, Len Sassaman, David Chaum: Freezing More Than Bits: Chilling Effects of the OLPC XO Security Model. UPSEC 2008 |
| 2005 | ||
| 4 | EE | Len Sassaman, Bram Cohen, Nick Mathewson: The pynchon gate: a secure method of pseudonymous mail retrieval. WPES 2005: 1-9 |
| 2004 | ||
| 3 | EE | Claudia Díaz, Len Sassaman, Evelyne Dewitte: Comparison Between Two Practical Mix Designs. ESORICS 2004: 141-159 |
| 2003 | ||
| 2 | EE | George Danezis, Len Sassaman: Heartbeat traffic to counter (n-1) attacks: red-green-black mixes. WPES 2003: 89-93 |
| 2002 | ||
| 1 | Len Sassaman: The Promise of Privacy. LISA 2002 | |
| 1 | David Chaum | [5] |
| 2 | Bram Cohen | [4] |
| 3 | George Danezis | [2] [6] |
| 4 | Evelyne Dewitte | [3] |
| 5 | Claudia Díaz | [3] |
| 6 | Nick Mathewson | [4] |
| 7 | Meredith L. Patterson | [5] |