![]() | ![]() |
2008 | ||
---|---|---|
6 | EE | George Danezis, Len Sassaman: How to Bypass Two Anonymity Revocation Schemes. Privacy Enhancing Technologies 2008: 187-201 |
5 | EE | Meredith L. Patterson, Len Sassaman, David Chaum: Freezing More Than Bits: Chilling Effects of the OLPC XO Security Model. UPSEC 2008 |
2005 | ||
4 | EE | Len Sassaman, Bram Cohen, Nick Mathewson: The pynchon gate: a secure method of pseudonymous mail retrieval. WPES 2005: 1-9 |
2004 | ||
3 | EE | Claudia Díaz, Len Sassaman, Evelyne Dewitte: Comparison Between Two Practical Mix Designs. ESORICS 2004: 141-159 |
2003 | ||
2 | EE | George Danezis, Len Sassaman: Heartbeat traffic to counter (n-1) attacks: red-green-black mixes. WPES 2003: 89-93 |
2002 | ||
1 | Len Sassaman: The Promise of Privacy. LISA 2002 |
1 | David Chaum | [5] |
2 | Bram Cohen | [4] |
3 | George Danezis | [2] [6] |
4 | Evelyne Dewitte | [3] |
5 | Claudia Díaz | [3] |
6 | Nick Mathewson | [4] |
7 | Meredith L. Patterson | [5] |