Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: George Danezis
@inproceedings{DBLP:conf/ppopp/GelashviliSXDLM23, author = {Rati Gelashvili and Alexander Spiegelman and Zhuolun Xiang and George Danezis and Zekun Li and Dahlia Malkhi and Yu Xia and Runtian Zhou}, editor = {Maryam Mehri Dehnavi and Milind Kulkarni and Sriram Krishnamoorthy}, title = {Block-STM: Scaling Blockchain Execution by Turning Ordering Curse to a Performance Blessing}, booktitle = {Proceedings of the 28th {ACM} {SIGPLAN} Annual Symposium on Principles and Practice of Parallel Programming, PPoPP 2023, Montreal, QC, Canada, 25 February 2023 - 1 March 2023}, pages = {232--244}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3572848.3577524}, doi = {10.1145/3572848.3577524}, timestamp = {Fri, 03 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ppopp/GelashviliSXDLM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/BaudetSKD23, author = {Mathieu Baudet and Alberto Sonnino and Mahimna Kelkar and George Danezis}, editor = {Bart P. Knijnenburg and Panos Papadimitratos}, title = {Zef: Low-latency, Scalable, Private Payments}, booktitle = {Proceedings of the 22nd Workshop on Privacy in the Electronic Society, {WPES} 2023, Copenhagen, Denmark, 26 November 2023}, pages = {1--16}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3603216.3624952}, doi = {10.1145/3603216.3624952}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/BaudetSKD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-12715, author = {Lefteris Kokoris{-}Kogias and Alberto Sonnino and George Danezis}, title = {Cuttlefish: Expressive Fast Path Blockchains with FastUnlock}, journal = {CoRR}, volume = {abs/2309.12715}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.12715}, doi = {10.48550/ARXIV.2309.12715}, eprinttype = {arXiv}, eprint = {2309.12715}, timestamp = {Wed, 27 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-12715.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-14821, author = {Kushal Babel and Andrey Chursin and George Danezis and Lefteris Kokoris{-}Kogias and Alberto Sonnino}, title = {Mysticeti: Low-Latency {DAG} Consensus with Fast Commit Path}, journal = {CoRR}, volume = {abs/2310.14821}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.14821}, doi = {10.48550/ARXIV.2310.14821}, eprinttype = {arXiv}, eprint = {2310.14821}, timestamp = {Mon, 30 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-14821.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-18042, author = {Sam Blackshear and Andrey Chursin and George Danezis and Anastasios Kichidis and Lefteris Kokoris{-}Kogias and Xun Li and Mark Logan and Ashok Menon and Todd Nowacki and Alberto Sonnino and Brandon Williams and Lu Zhang}, title = {Sui Lutris: {A} Blockchain Combining Broadcast and Consensus}, journal = {CoRR}, volume = {abs/2310.18042}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.18042}, doi = {10.48550/ARXIV.2310.18042}, eprinttype = {arXiv}, eprint = {2310.18042}, timestamp = {Thu, 02 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-18042.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KavousiLJD23, author = {Alireza Kavousi and Duc Viet Le and Philipp Jovanovic and George Danezis}, title = {BlindPerm: Efficient {MEV} Mitigation with an Encrypted Mempool and Permutation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1061}, year = {2023}, url = {https://eprint.iacr.org/2023/1061}, timestamp = {Mon, 29 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KavousiLJD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosys/DanezisKSS22, author = {George Danezis and Lefteris Kokoris{-}Kogias and Alberto Sonnino and Alexander Spiegelman}, editor = {Y{\'{e}}rom{-}David Bromberg and Anne{-}Marie Kermarrec and Christos Kozyrakis}, title = {Narwhal and Tusk: a DAG-based mempool and efficient {BFT} consensus}, booktitle = {EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5 - 8, 2022}, pages = {34--50}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3492321.3519594}, doi = {10.1145/3492321.3519594}, timestamp = {Wed, 13 Apr 2022 13:48:01 +0200}, biburl = {https://dblp.org/rec/conf/eurosys/DanezisKSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-05671, author = {Mathieu Baudet and Alberto Sonnino and Mahimna Kelkar and George Danezis}, title = {Zef: Low-latency, Scalable, Private Payments}, journal = {CoRR}, volume = {abs/2201.05671}, year = {2022}, url = {https://arxiv.org/abs/2201.05671}, eprinttype = {arXiv}, eprint = {2201.05671}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-05671.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-06871, author = {Rati Gelashvili and Alexander Spiegelman and Zhuolun Xiang and George Danezis and Zekun Li and Yu Xia and Runtian Zhou and Dahlia Malkhi}, title = {Block-STM: Scaling Blockchain Execution by Turning Ordering Curse to a Performance Blessing}, journal = {CoRR}, volume = {abs/2203.06871}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.06871}, doi = {10.48550/ARXIV.2203.06871}, eprinttype = {arXiv}, eprint = {2203.06871}, timestamp = {Fri, 03 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-06871.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaudetSKD22, author = {Mathieu Baudet and Alberto Sonnino and Mahimna Kelkar and George Danezis}, title = {Zef: Low-latency, Scalable, Private Payments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {83}, year = {2022}, url = {https://eprint.iacr.org/2022/083}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BaudetSKD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/SchettD21, author = {Maria Anna Schett and George Danezis}, editor = {Avery Miller and Keren Censor{-}Hillel and Janne H. Korhonen}, title = {Embedding a Deterministic {BFT} Protocol in a Block {DAG}}, booktitle = {{PODC} '21: {ACM} Symposium on Principles of Distributed Computing, Virtual Event, Italy, July 26-30, 2021}, pages = {177--186}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3465084.3467930}, doi = {10.1145/3465084.3467930}, timestamp = {Mon, 26 Jul 2021 09:04:22 +0200}, biburl = {https://dblp.org/rec/conf/podc/SchettD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-09594, author = {Maria Anna Schett and George Danezis}, title = {Embedding a Deterministic {BFT} Protocol in a Block {DAG}}, journal = {CoRR}, volume = {abs/2102.09594}, year = {2021}, url = {https://arxiv.org/abs/2102.09594}, eprinttype = {arXiv}, eprint = {2102.09594}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-09594.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-11827, author = {George Danezis and Eleftherios Kokoris{-}Kogias and Alberto Sonnino and Alexander Spiegelman}, title = {Narwhal and Tusk: {A} DAG-based Mempool and Efficient {BFT} Consensus}, journal = {CoRR}, volume = {abs/2105.11827}, year = {2021}, url = {https://arxiv.org/abs/2105.11827}, eprinttype = {arXiv}, eprint = {2105.11827}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-11827.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/AlshahwanBCDM20, author = {Nadia Alshahwan and Earl T. Barr and David Clark and George Danezis and H{\'{e}}ctor D. Men{\'{e}}ndez}, title = {Detecting Malware with Information Complexity}, journal = {Entropy}, volume = {22}, number = {5}, pages = {575}, year = {2020}, url = {https://doi.org/10.3390/e22050575}, doi = {10.3390/E22050575}, timestamp = {Wed, 28 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entropy/AlshahwanBCDM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aft/BaudetDS20, author = {Mathieu Baudet and George Danezis and Alberto Sonnino}, title = {FastPay: High-Performance Byzantine Fault Tolerant Settlement}, booktitle = {{AFT} '20: 2nd {ACM} Conference on Advances in Financial Technologies, New York, NY, USA, October 21-23, 2020}, pages = {163--177}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3419614.3423249}, doi = {10.1145/3419614.3423249}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aft/BaudetDS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aft/AzouviDN20, author = {Sarah Azouvi and George Danezis and Valeria Nikolaenko}, title = {Winkle: Foiling Long-Range Attacks in Proof-of-Stake Systems}, booktitle = {{AFT} '20: 2nd {ACM} Conference on Advances in Financial Technologies, New York, NY, USA, October 21-23, 2020}, pages = {189--201}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3419614.3423260}, doi = {10.1145/3419614.3423260}, timestamp = {Thu, 29 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aft/AzouviDN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/SonninoBAD20, author = {Alberto Sonnino and Shehar Bano and Mustafa Al{-}Bassam and George Danezis}, title = {Replay Attacks and Defenses Against Cross-shard Consensus in Sharded Distributed Ledgers}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2020, Genoa, Italy, September 7-11, 2020}, pages = {294--308}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/EuroSP48549.2020.00026}, doi = {10.1109/EUROSP48549.2020.00026}, timestamp = {Tue, 10 Nov 2020 11:45:04 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/SonninoBAD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-11506, author = {Mathieu Baudet and George Danezis and Alberto Sonnino}, title = {FastPay: High-Performance Byzantine Fault Tolerant Settlement}, journal = {CoRR}, volume = {abs/2003.11506}, year = {2020}, url = {https://arxiv.org/abs/2003.11506}, eprinttype = {arXiv}, eprint = {2003.11506}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-11506.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/HayesMDC19, author = {Jamie Hayes and Luca Melis and George Danezis and Emiliano De Cristofaro}, title = {{LOGAN:} Membership Inference Attacks Against Generative Models}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2019}, number = {1}, pages = {133--152}, year = {2019}, url = {https://doi.org/10.2478/popets-2019-0008}, doi = {10.2478/POPETS-2019-0008}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/HayesMDC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aft/BanoSAAMMD19, author = {Shehar Bano and Alberto Sonnino and Mustafa Al{-}Bassam and Sarah Azouvi and Patrick McCorry and Sarah Meiklejohn and George Danezis}, title = {SoK: Consensus in the Age of Blockchains}, booktitle = {Proceedings of the 1st {ACM} Conference on Advances in Financial Technologies, {AFT} 2019, Zurich, Switzerland, October 21-23, 2019}, pages = {183--198}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3318041.3355458}, doi = {10.1145/3318041.3355458}, timestamp = {Thu, 11 Mar 2021 17:04:51 +0100}, biburl = {https://dblp.org/rec/conf/aft/BanoSAAMMD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/SonninoABMD19, author = {Alberto Sonnino and Mustafa Al{-}Bassam and Shehar Bano and Sarah Meiklejohn and George Danezis}, title = {Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/coconut-threshold-issuance-selective-disclosure-credentials-with-applications-to-distributed-ledgers/}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/SonninoABMD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LeibowitzPDH19, author = {Hemi Leibowitz and Ania M. Piotrowska and George Danezis and Amir Herzberg}, editor = {Nadia Heninger and Patrick Traynor}, title = {No Right to Remain Silent: Isolating Malicious Mixes}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {1841--1858}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/leibowitz}, timestamp = {Mon, 01 Feb 2021 08:43:12 +0100}, biburl = {https://dblp.org/rec/conf/uss/LeibowitzPDH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-11218, author = {Alberto Sonnino and Shehar Bano and Mustafa Al{-}Bassam and George Danezis}, title = {Replay Attacks and Defenses against Cross-shard Consensus in Sharded Distributed Ledgers}, journal = {CoRR}, volume = {abs/1901.11218}, year = {2019}, url = {http://arxiv.org/abs/1901.11218}, eprinttype = {arXiv}, eprint = {1901.11218}, timestamp = {Mon, 04 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-11218.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-12237, author = {Alberto Sonnino and George Danezis}, title = {SybilQuorum: Open Distributed Ledgers Through Trust Networks}, journal = {CoRR}, volume = {abs/1906.12237}, year = {2019}, url = {http://arxiv.org/abs/1906.12237}, eprinttype = {arXiv}, eprint = {1906.12237}, timestamp = {Mon, 01 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-12237.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AzouviDN19, author = {Sarah Azouvi and George Danezis and Valeria Nikolaenko}, title = {Winkle: Foiling Long-Range Attacks in Proof-of-Stake Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1440}, year = {2019}, url = {https://eprint.iacr.org/2019/1440}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AzouviDN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/RashidDCLMLP18, author = {Awais Rashid and George Danezis and Howard Chivers and Emil Lupu and Andrew Martin and Makayla Lewis and Claudia Peersman}, title = {Scoping the Cyber Security Body of Knowledge}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {3}, pages = {96--102}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.2701150}, doi = {10.1109/MSP.2018.2701150}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/RashidDCLMLP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/RialDK18, author = {Alfredo Rial and George Danezis and Markulf Kohlweiss}, title = {Privacy-preserving smart metering revisited}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {1}, pages = {1--31}, year = {2018}, url = {https://doi.org/10.1007/s10207-016-0355-8}, doi = {10.1007/S10207-016-0355-8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/RialDK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/0013APBDT18, author = {Chen Chen and Daniele Enrico Asoni and Adrian Perrig and David Barrera and George Danezis and Carmela Troncoso}, title = {{TARANET:} Traffic-Analysis Resistant Anonymity at the Network Layer}, booktitle = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2018, London, United Kingdom, April 24-26, 2018}, pages = {137--152}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/EuroSP.2018.00018}, doi = {10.1109/EUROSP.2018.00018}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/0013APBDT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/Al-BassamSBHD18, author = {Mustafa Al{-}Bassam and Alberto Sonnino and Shehar Bano and Dave Hrycyszyn and George Danezis}, title = {Chainspace: {A} Sharded Smart Contracts Platform}, booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS} 2018, San Diego, California, USA, February 18-21, 2018}, publisher = {The Internet Society}, year = {2018}, url = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_09-2\_Al-Bassam\_paper.pdf}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/Al-BassamSBHD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/HayesD18, author = {Jamie Hayes and George Danezis}, title = {Learning Universal Adversarial Perturbations with Generative Models}, booktitle = {2018 {IEEE} Security and Privacy Workshops, {SP} Workshops 2018, San Francisco, CA, USA, May 24, 2018}, pages = {43--49}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SPW.2018.00015}, doi = {10.1109/SPW.2018.00015}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/sp/HayesD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/KulynychLIDT18, author = {Bogdan Kulynych and Wouter Lueks and Marios Isaakidis and George Danezis and Carmela Troncoso}, editor = {David Lie and Mohammad Mannan and Aaron Johnson}, title = {ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging}, booktitle = {Proceedings of the 2018 Workshop on Privacy in the Electronic Society, WPES@CCS 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {86--103}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3267323.3268947}, doi = {10.1145/3267323.3268947}, timestamp = {Wed, 28 Jul 2021 08:57:48 +0200}, biburl = {https://dblp.org/rec/conf/wpes/KulynychLIDT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-07344, author = {Alberto Sonnino and Mustafa Al{-}Bassam and Shehar Bano and George Danezis}, title = {Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers}, journal = {CoRR}, volume = {abs/1802.07344}, year = {2018}, url = {http://arxiv.org/abs/1802.07344}, eprinttype = {arXiv}, eprint = {1802.07344}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-07344.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-08415, author = {Chen Chen and Daniele Enrico Asoni and Adrian Perrig and David Barrera and George Danezis and Carmela Troncoso}, title = {{TARANET:} Traffic-Analysis Resistant Anonymity at the NETwork layer}, journal = {CoRR}, volume = {abs/1802.08415}, year = {2018}, url = {http://arxiv.org/abs/1802.08415}, eprinttype = {arXiv}, eprint = {1802.08415}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-08415.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1809-01620, author = {George Danezis and Dave Hrycyszyn}, title = {Blockmania: from Block DAGs to Consensus}, journal = {CoRR}, volume = {abs/1809.01620}, year = {2018}, url = {http://arxiv.org/abs/1809.01620}, eprinttype = {arXiv}, eprint = {1809.01620}, timestamp = {Fri, 05 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1809-01620.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/TroncosoIDH17, author = {Carmela Troncoso and Marios Isaakidis and George Danezis and Harry Halpin}, title = {Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2017}, number = {4}, pages = {404--426}, year = {2017}, url = {https://doi.org/10.1515/popets-2017-0056}, doi = {10.1515/POPETS-2017-0056}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/TroncosoIDH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/BanoAD17, author = {Shehar Bano and Mustafa Al{-}Bassam and George Danezis}, title = {The Road to Scalable Blockchain Designs}, journal = {login Usenix Mag.}, volume = {42}, number = {4}, year = {2017}, url = {https://www.usenix.org/publications/login/winter2017/bano}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/BanoAD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MavroudisCSCKD17, author = {Vasilios Mavroudis and Andrea Cerulli and Petr Svenda and Dan Cvrcek and Dusan Klinec and George Danezis}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1583--1600}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133961}, doi = {10.1145/3133956.3133961}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MavroudisCSCKD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/HayesD17, author = {Jamie Hayes and George Danezis}, editor = {Isabelle Guyon and Ulrike von Luxburg and Samy Bengio and Hanna M. Wallach and Rob Fergus and S. V. N. Vishwanathan and Roman Garnett}, title = {Generating steganographic images via adversarial training}, booktitle = {Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, December 4-9, 2017, Long Beach, CA, {USA}}, pages = {1954--1963}, year = {2017}, url = {https://proceedings.neurips.cc/paper/2017/hash/fe2d010308a6b3799a3d9c728ee74244-Abstract.html}, timestamp = {Thu, 21 Jan 2021 13:58:27 +0100}, biburl = {https://dblp.org/rec/conf/nips/HayesD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pac/PodolankoPMDW17, author = {John P. Podolanko and Revanth Pobala and Hussain Mucklai and George Danezis and Matthew Wright}, title = {LiLAC: Lightweight Low-Latency Anonymous Chat}, booktitle = {{IEEE} Symposium on Privacy-Aware Computing, {PAC} 2017, Washington, DC, USA, August 1-4, 2017}, pages = {141--151}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.ieeecomputersociety.org/10.1109/PAC.2017.14}, doi = {10.1109/PAC.2017.14}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pac/PodolankoPMDW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/PiotrowskaHEMD17, author = {Ania M. Piotrowska and Jamie Hayes and Tariq Elahi and Sebastian Meiser and George Danezis}, editor = {Engin Kirda and Thomas Ristenpart}, title = {The Loopix Anonymity System}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {1199--1216}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/piotrowska}, timestamp = {Mon, 01 Feb 2021 08:42:59 +0100}, biburl = {https://dblp.org/rec/conf/uss/PiotrowskaHEMD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/PiotrowskaHGDH17, author = {Ania M. Piotrowska and Jamie Hayes and Nethanel Gelernter and George Danezis and Amir Herzberg}, editor = {Bhavani Thuraisingham and Adam J. Lee}, title = {AnNotify: {A} Private Notification Service}, booktitle = {Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30 - November 3, 2017}, pages = {5--15}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139550.3139566}, doi = {10.1145/3139550.3139566}, timestamp = {Wed, 29 Jun 2022 15:37:43 +0200}, biburl = {https://dblp.org/rec/conf/wpes/PiotrowskaHGDH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/ToledoDE17, author = {Raphael R. Toledo and George Danezis and Isao Echizen}, editor = {Bhavani Thuraisingham and Adam J. Lee}, title = {Mix-ORAM: Using Delegated Shuffles}, booktitle = {Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30 - November 3, 2017}, pages = {51--61}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139550.3139569}, doi = {10.1145/3139550.3139569}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/ToledoDE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/HayesD17, author = {Jamie Hayes and George Danezis}, title = {ste-GAN-ography: Generating Steganographic Images via Adversarial Training}, journal = {CoRR}, volume = {abs/1703.00371}, year = {2017}, url = {http://arxiv.org/abs/1703.00371}, eprinttype = {arXiv}, eprint = {1703.00371}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/HayesD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/PiotrowskaHEMD17, author = {Ania M. Piotrowska and Jamie Hayes and Tariq Elahi and Sebastian Meiser and George Danezis}, title = {The Loopix Anonymity System}, journal = {CoRR}, volume = {abs/1703.00536}, year = {2017}, url = {http://arxiv.org/abs/1703.00536}, eprinttype = {arXiv}, eprint = {1703.00536}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/PiotrowskaHEMD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/TroncosoDIH17, author = {Carmela Troncoso and George Danezis and Marios Isaakidis and Harry Halpin}, title = {Systematizing Decentralization and Privacy: Lessons from 15 years of research and deployments}, journal = {CoRR}, volume = {abs/1704.08065}, year = {2017}, url = {http://arxiv.org/abs/1704.08065}, eprinttype = {arXiv}, eprint = {1704.08065}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/TroncosoDIH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/HayesMDC17, author = {Jamie Hayes and Luca Melis and George Danezis and Emiliano De Cristofaro}, title = {{LOGAN:} Evaluating Privacy Leakage of Generative Models Using Generative Adversarial Networks}, journal = {CoRR}, volume = {abs/1705.07663}, year = {2017}, url = {http://arxiv.org/abs/1705.07663}, eprinttype = {arXiv}, eprint = {1705.07663}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/HayesMDC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KulynychITD17, author = {Bogdan Kulynych and Marios Isaakidis and Carmela Troncoso and George Danezis}, title = {ClaimChain: Decentralized Public Key Infrastructure}, journal = {CoRR}, volume = {abs/1707.06279}, year = {2017}, url = {http://arxiv.org/abs/1707.06279}, eprinttype = {arXiv}, eprint = {1707.06279}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KulynychITD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-03778, author = {Mustafa Al{-}Bassam and Alberto Sonnino and Shehar Bano and Dave Hrycyszyn and George Danezis}, title = {Chainspace: {A} Sharded Smart Contracts Platform}, journal = {CoRR}, volume = {abs/1708.03778}, year = {2017}, url = {http://arxiv.org/abs/1708.03778}, eprinttype = {arXiv}, eprint = {1708.03778}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-03778.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-05207, author = {Jamie Hayes and George Danezis}, title = {Machine Learning as an Adversarial Service: Learning Black-Box Adversarial Examples}, journal = {CoRR}, volume = {abs/1708.05207}, year = {2017}, url = {http://arxiv.org/abs/1708.05207}, eprinttype = {arXiv}, eprint = {1708.05207}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-05207.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1709-01008, author = {Raphael R. Toledo and George Danezis and Isao Echizen}, title = {Mix-ORAM: Using delegate shuffles}, journal = {CoRR}, volume = {abs/1709.01008}, year = {2017}, url = {http://arxiv.org/abs/1709.01008}, eprinttype = {arXiv}, eprint = {1709.01008}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1709-01008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1709-03817, author = {Vasilios Mavroudis and Andrea Cerulli and Petr Svenda and Dan Cvrcek and Dusan Klinec and George Danezis}, title = {A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components}, journal = {CoRR}, volume = {abs/1709.03817}, year = {2017}, url = {http://arxiv.org/abs/1709.03817}, eprinttype = {arXiv}, eprint = {1709.03817}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1709-03817.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1711-03936, author = {Shehar Bano and Alberto Sonnino and Mustafa Al{-}Bassam and Sarah Azouvi and Patrick McCorry and Sarah Meiklejohn and George Danezis}, title = {Consensus in the Age of Blockchains}, journal = {CoRR}, volume = {abs/1711.03936}, year = {2017}, url = {http://arxiv.org/abs/1711.03936}, eprinttype = {arXiv}, eprint = {1711.03936}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1711-03936.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeibowitzPDH17, author = {Hemi Leibowitz and Ania M. Piotrowska and George Danezis and Amir Herzberg}, title = {No right to remain silent: Isolating Malicious Mixes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1000}, year = {2017}, url = {http://eprint.iacr.org/2017/1000}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeibowitzPDH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/ToledoDG16, author = {Raphael R. Toledo and George Danezis and Ian Goldberg}, title = {Lower-Cost {\(\in\)}-Private Information Retrieval}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2016}, number = {4}, pages = {184--201}, year = {2016}, url = {https://doi.org/10.1515/popets-2016-0035}, doi = {10.1515/POPETS-2016-0035}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/ToledoDG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/DanezisM16, author = {George Danezis and Sarah Meiklejohn}, title = {Centrally Banked Cryptocurrencies}, booktitle = {23rd Annual Network and Distributed System Security Symposium, {NDSS} 2016, San Diego, California, USA, February 21-24, 2016}, publisher = {The Internet Society}, year = {2016}, url = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/centrally-banked-cryptocurrencies.pdf}, timestamp = {Thu, 17 Jun 2021 16:04:48 +0200}, biburl = {https://dblp.org/rec/conf/ndss/DanezisM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/MelisDC16, author = {Luca Melis and George Danezis and Emiliano De Cristofaro}, title = {Efficient Private Statistics with Succinct Sketches}, booktitle = {23rd Annual Network and Distributed System Security Symposium, {NDSS} 2016, San Diego, California, USA, February 21-24, 2016}, publisher = {The Internet Society}, year = {2016}, url = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/efficient-private-statistics-with-succinct-sketches.pdf}, timestamp = {Tue, 16 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/MelisDC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HayesD16, author = {Jamie Hayes and George Danezis}, editor = {Thorsten Holz and Stefan Savage}, title = {k-fingerprinting: {A} Robust Scalable Website Fingerprinting Technique}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {1187--1203}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/hayes}, timestamp = {Mon, 01 Feb 2021 08:43:18 +0100}, biburl = {https://dblp.org/rec/conf/uss/HayesD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/IsaakidisHD16, author = {Marios Isaakidis and Harry Halpin and George Danezis}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Sabrina De Capitani di Vimercati}, title = {UnlimitID: Privacy-Preserving Federated Identity Management using Algebraic MACs}, booktitle = {Proceedings of the 2016 {ACM} on Workshop on Privacy in the Electronic Society, WPES@CCS 2016, Vienna, Austria, October 24 - 28, 2016}, pages = {139--142}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2994637}, timestamp = {Tue, 06 Nov 2018 16:59:07 +0100}, biburl = {https://dblp.org/rec/conf/wpes/IsaakidisHD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/HayesTD16, author = {Jamie Hayes and Carmela Troncoso and George Danezis}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Sabrina De Capitani di Vimercati}, title = {{TASP:} Towards Anonymity Sets that Persist}, booktitle = {Proceedings of the 2016 {ACM} on Workshop on Privacy in the Electronic Society, WPES@CCS 2016, Vienna, Austria, October 24 - 28, 2016}, pages = {177--180}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2994635}, timestamp = {Sun, 05 Mar 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/HayesTD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ToledoDG16, author = {Raphael R. Toledo and George Danezis and Ian Goldberg}, title = {Lower-Cost epsilon-Private Information Retrieval}, journal = {CoRR}, volume = {abs/1604.00223}, year = {2016}, url = {http://arxiv.org/abs/1604.00223}, eprinttype = {arXiv}, eprint = {1604.00223}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ToledoDG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BrandaoCD16, author = {Lu{\'{\i}}s T. A. N. Brand{\~{a}}o and Nicolas Christin and George Danezis}, title = {A Public Comment on NCCoE's White Paper on Privacy-Enhancing Identity Brokers}, journal = {CoRR}, volume = {abs/1611.02968}, year = {2016}, url = {http://arxiv.org/abs/1611.02968}, eprinttype = {arXiv}, eprint = {1611.02968}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BrandaoCD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/Danezis0PP16, author = {George Danezis and Stefan Katzenbeisser and Christiane Peters and Bart Preneel}, title = {Privacy and Security in Smart Energy Grids (Dagstuhl Seminar 16032)}, journal = {Dagstuhl Reports}, volume = {6}, number = {1}, pages = {99--107}, year = {2016}, url = {https://doi.org/10.4230/DagRep.6.1.99}, doi = {10.4230/DAGREP.6.1.99}, timestamp = {Wed, 07 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/Danezis0PP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PiotrowskaHGDH16, author = {Ania M. Piotrowska and Jamie Hayes and Nethanel Gelernter and George Danezis and Amir Herzberg}, title = {AnoNotify: {A} Private Notification Service}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {466}, year = {2016}, url = {http://eprint.iacr.org/2016/466}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PiotrowskaHGDH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/BorisovDG15, author = {Nikita Borisov and George Danezis and Ian Goldberg}, title = {{DP5:} {A} Private Presence Service}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2015}, number = {2}, pages = {4--24}, year = {2015}, url = {https://doi.org/10.1515/popets-2015-0008}, doi = {10.1515/POPETS-2015-0008}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/BorisovDG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/HayesD15, author = {Jamie Hayes and George Danezis}, title = {Guard Sets for Onion Routing}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2015}, number = {2}, pages = {65--80}, year = {2015}, url = {https://doi.org/10.1515/popets-2015-0017}, doi = {10.1515/POPETS-2015-0017}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/HayesD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/BrandaoCDa15, author = {Lu{\'{\i}}s T. A. N. Brand{\~{a}}o and Nicolas Christin and George Danezis and anonymous}, title = {Toward Mending Two Nation-Scale Brokered Identification Systems}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2015}, number = {2}, pages = {135--155}, year = {2015}, url = {https://doi.org/10.1515/popets-2015-0022}, doi = {10.1515/POPETS-2015-0022}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/BrandaoCDa15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenABDP15, author = {Chen Chen and Daniele Enrico Asoni and David Barrera and George Danezis and Adrian Perrig}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{HORNET:} High-speed Onion Routing at the Network Layer}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1441--1454}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813628}, doi = {10.1145/2810103.2813628}, timestamp = {Tue, 10 Nov 2020 19:58:09 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChenABDP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/DanezisDHHMTS15, author = {George Danezis and Josep Domingo{-}Ferrer and Marit Hansen and Jaap{-}Henk Hoepman and Daniel Le M{\'{e}}tayer and Rodica Tirtea and Stefan Schiffner}, title = {Privacy and Data Protection by Design - from policy to engineering}, journal = {CoRR}, volume = {abs/1501.03726}, year = {2015}, url = {http://arxiv.org/abs/1501.03726}, eprinttype = {arXiv}, eprint = {1501.03726}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/DanezisDHHMTS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AlshahwanBCD15, author = {Nadia Alshahwan and Earl T. Barr and David Clark and George Danezis}, title = {Detecting Malware with Information Complexity}, journal = {CoRR}, volume = {abs/1502.07661}, year = {2015}, url = {http://arxiv.org/abs/1502.07661}, eprinttype = {arXiv}, eprint = {1502.07661}, timestamp = {Wed, 28 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/AlshahwanBCD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/DanezisM15, author = {George Danezis and Sarah Meiklejohn}, title = {Centrally Banked Cryptocurrencies}, journal = {CoRR}, volume = {abs/1505.06895}, year = {2015}, url = {http://arxiv.org/abs/1505.06895}, eprinttype = {arXiv}, eprint = {1505.06895}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/DanezisM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ChenABDP15, author = {Chen Chen and Daniele Enrico Asoni and David Barrera and George Danezis and Adrian Perrig}, title = {{HORNET:} High-speed Onion Routing at the Network Layer}, journal = {CoRR}, volume = {abs/1507.05724}, year = {2015}, url = {http://arxiv.org/abs/1507.05724}, eprinttype = {arXiv}, eprint = {1507.05724}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ChenABDP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MelisDC15, author = {Luca Melis and George Danezis and Emiliano De Cristofaro}, title = {Efficient Private Statistics with Succinct Sketches}, journal = {CoRR}, volume = {abs/1508.06110}, year = {2015}, url = {http://arxiv.org/abs/1508.06110}, eprinttype = {arXiv}, eprint = {1508.06110}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MelisDC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/HayesD15, author = {Jamie Hayes and George Danezis}, title = {Better open-world website fingerprinting}, journal = {CoRR}, volume = {abs/1509.00789}, year = {2015}, url = {http://arxiv.org/abs/1509.00789}, eprinttype = {arXiv}, eprint = {1509.00789}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/HayesD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DanezisM15, author = {George Danezis and Sarah Meiklejohn}, title = {Centrally Banked Cryptocurrencies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {502}, year = {2015}, url = {http://eprint.iacr.org/2015/502}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DanezisM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DanezisFGK14, author = {George Danezis and C{\'{e}}dric Fournet and Jens Groth and Markulf Kohlweiss}, editor = {Palash Sarkar and Tetsu Iwata}, title = {Square Span Programs with Applications to Succinct {NIZK} Arguments}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8873}, pages = {532--550}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45611-8\_28}, doi = {10.1007/978-3-662-45611-8\_28}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DanezisFGK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ElahiDG14, author = {Tariq Elahi and George Danezis and Ian Goldberg}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1068--1079}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660280}, doi = {10.1145/2660267.2660280}, timestamp = {Tue, 10 Nov 2020 20:00:23 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ElahiDG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/DanezisC14, author = {George Danezis and Emiliano De Cristofaro}, editor = {Gail{-}Joon Ahn and Anupam Datta}, title = {Fast and Private Genomic Testing for Disease Susceptibility}, booktitle = {Proceedings of the 13th Workshop on Privacy in the Electronic Society, {WPES} 2014, Scottsdale, AZ, USA, November 3, 2014}, pages = {31--34}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2665943.2665952}, doi = {10.1145/2665943.2665952}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/DanezisC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/SharadD14, author = {Kumar Sharad and George Danezis}, editor = {Gail{-}Joon Ahn and Anupam Datta}, title = {An Automated Social Graph De-anonymization Technique}, booktitle = {Proceedings of the 13th Workshop on Privacy in the Electronic Society, {WPES} 2014, Scottsdale, AZ, USA, November 3, 2014}, pages = {47--58}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2665943.2665960}, doi = {10.1145/2665943.2665960}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/SharadD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SharadD14, author = {Kumar Sharad and George Danezis}, title = {An Automated Social Graph De-anonymization Technique}, journal = {CoRR}, volume = {abs/1408.1276}, year = {2014}, url = {http://arxiv.org/abs/1408.1276}, eprinttype = {arXiv}, eprint = {1408.1276}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SharadD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DanezisFGK14, author = {George Danezis and C{\'{e}}dric Fournet and Jens Groth and Markulf Kohlweiss}, title = {Square Span Programs with Applications to Succinct {NIZK} Arguments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {718}, year = {2014}, url = {http://eprint.iacr.org/2014/718}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DanezisFGK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DanezisFKP13, author = {George Danezis and C{\'{e}}dric Fournet and Markulf Kohlweiss and Bryan Parno}, editor = {Martin Franz and Andreas Holzer and Rupak Majumdar and Bryan Parno and Helmut Veith}, title = {Pinocchio coin: building zerocoin from a succinct pairing-based proof system}, booktitle = {PETShop'13, Proceedings of the 2013 {ACM} Workshop on Language Support for Privacy-Enhancing Technologies, Co-located with {CCS} 2013, November 4, 2013, Berlin, Germany}, pages = {27--30}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517872.2517878}, doi = {10.1145/2517872.2517878}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DanezisFKP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DanezisFKB13, author = {George Danezis and C{\'{e}}dric Fournet and Markulf Kohlweiss and Santiago Zanella B{\'{e}}guelin}, editor = {Benessa Defend and Klaus Kursawe}, title = {Smart meter aggregation via secret-sharing}, booktitle = {SEGS'13, Proceedings of the 2013 {ACM} Workshop on Smart Energy Grid Security, Co-located with {CCS} 2013, November 8, 2013, Berlin, Germany}, pages = {75--80}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2516930.2516944}, doi = {10.1145/2516930.2516944}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DanezisFKB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BartheDGKB13, author = {Gilles Barthe and George Danezis and Benjamin Gr{\'{e}}goire and C{\'{e}}sar Kunz and Santiago Zanella B{\'{e}}guelin}, title = {Verified Computational Differential Privacy with Applications to Smart Metering}, booktitle = {2013 {IEEE} 26th Computer Security Foundations Symposium, New Orleans, LA, USA, June 26-28, 2013}, pages = {287--301}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CSF.2013.26}, doi = {10.1109/CSF.2013.26}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BartheDGKB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/FournetKDL13, author = {C{\'{e}}dric Fournet and Markulf Kohlweiss and George Danezis and Zhengqin Luo}, editor = {Samuel T. King}, title = {{ZQL:} {A} Compiler for Privacy-Preserving Data Processing}, booktitle = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC, USA, August 14-16, 2013}, pages = {163--178}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/fournet}, timestamp = {Mon, 01 Feb 2021 08:42:56 +0100}, biburl = {https://dblp.org/rec/conf/uss/FournetKDL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/DanezisT13, author = {George Danezis and Carmela Troncoso}, editor = {Ahmad{-}Reza Sadeghi and Sara Foresti}, title = {You cannot hide for long: de-anonymization of real-world dynamic behaviour}, booktitle = {Proceedings of the 12th annual {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2013, Berlin, Germany, November 4, 2013}, pages = {49--60}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517840.2517846}, doi = {10.1145/2517840.2517846}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/DanezisT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Molina-MarkhamDFSI12, author = {Andres Molina{-}Markham and George Danezis and Kevin Fu and Prashant J. Shenoy and David E. Irwin}, editor = {Angelos D. Keromytis}, title = {Designing Privacy-Preserving Smart Meters with Low-Cost Microcontrollers}, booktitle = {Financial Cryptography and Data Security - 16th International Conference, {FC} 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7397}, pages = {239--253}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32946-3\_18}, doi = {10.1007/978-3-642-32946-3\_18}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/Molina-MarkhamDFSI12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/DanezisK12, author = {George Danezis and Emilia K{\"{a}}sper}, editor = {Matthias Kirchner and Dipak Ghosal}, title = {The Dangers of Composing Anonymous Channels}, booktitle = {Information Hiding - 14th International Conference, {IH} 2012, Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7692}, pages = {191--206}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-36373-3\_13}, doi = {10.1007/978-3-642-36373-3\_13}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/DanezisK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/RialD12, author = {Alfredo Rial and George Danezis}, editor = {Helmut Reimer and Norbert Pohlmann and Wolfgang Schneider}, title = {Privacy-Preserving Smart Metering}, booktitle = {{ISSE} 2012 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2012 Conference, Brussels, Belgium, October 23-24, 2012}, pages = {105--115}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-658-00333-3\_11}, doi = {10.1007/978-3-658-00333-3\_11}, timestamp = {Wed, 24 Apr 2019 16:36:13 +0200}, biburl = {https://dblp.org/rec/conf/isse/RialD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/DanezisKLR12, author = {George Danezis and Markulf Kohlweiss and Benjamin Livshits and Alfredo Rial}, editor = {Simone Fischer{-}H{\"{u}}bner and Matthew K. Wright}, title = {Private Client-Side Profiling with Random Forests and Hidden Markov Models}, booktitle = {Privacy Enhancing Technologies - 12th International Symposium, {PETS} 2012, Vigo, Spain, July 11-13, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7384}, pages = {18--37}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31680-7\_2}, doi = {10.1007/978-3-642-31680-7\_2}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pet/DanezisKLR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2012, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, publisher = {{ACM}}, year = {2012}, url = {http://dl.acm.org/citation.cfm?id=2382196}, isbn = {978-1-4503-1651-4}, timestamp = {Tue, 12 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2011, editor = {George Danezis}, title = {Financial Cryptography and Data Security - 15th International Conference, {FC} 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7035}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-27576-0}, doi = {10.1007/978-3-642-27576-0}, isbn = {978-3-642-27575-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2011w, editor = {George Danezis and Sven Dietrich and Kazue Sako}, title = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS} and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7126}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29889-9}, doi = {10.1007/978-3-642-29889-9}, isbn = {978-3-642-29888-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2011w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/TroncosoDKBP11, author = {Carmela Troncoso and George Danezis and Eleni Kosta and Josep Balasch and Bart Preneel}, title = {PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {8}, number = {5}, pages = {742--755}, year = {2011}, url = {https://doi.org/10.1109/TDSC.2010.71}, doi = {10.1109/TDSC.2010.71}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/TroncosoDKBP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DanezisL11, author = {George Danezis and Benjamin Livshits}, editor = {Christian Cachin and Thomas Ristenpart}, title = {Towards ensuring client-side computational integrity}, booktitle = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW} 2011, Chicago, IL, USA, October 21, 2011}, pages = {125--130}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046660.2046683}, doi = {10.1145/2046660.2046683}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DanezisL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/DanezisKR11, author = {George Danezis and Markulf Kohlweiss and Alfredo Rial}, editor = {Tom{\'{a}}s Filler and Tom{\'{a}}s Pevn{\'{y}} and Scott Craver and Andrew D. Ker}, title = {Differentially Private Billing with Rebates}, booktitle = {Information Hiding - 13th International Conference, {IH} 2011, Prague, Czech Republic, May 18-20, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6958}, pages = {148--162}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24178-9\_11}, doi = {10.1007/978-3-642-24178-9\_11}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/DanezisKR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/ShokriTDHB11, author = {Reza Shokri and George Theodorakopoulos and George Danezis and Jean{-}Pierre Hubaux and Jean{-}Yves Le Boudec}, editor = {Simone Fischer{-}H{\"{u}}bner and Nicholas Hopper}, title = {Quantifying Location Privacy: The Case of Sporadic Location Exposure}, booktitle = {Privacy Enhancing Technologies - 11th International Symposium, {PETS} 2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6794}, pages = {57--76}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22263-4\_4}, doi = {10.1007/978-3-642-22263-4\_4}, timestamp = {Thu, 17 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pet/ShokriTDHB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/KursaweDK11, author = {Klaus Kursawe and George Danezis and Markulf Kohlweiss}, editor = {Simone Fischer{-}H{\"{u}}bner and Nicholas Hopper}, title = {Privacy-Friendly Aggregation for the Smart-Grid}, booktitle = {Privacy Enhancing Technologies - 11th International Symposium, {PETS} 2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6794}, pages = {175--191}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22263-4\_10}, doi = {10.1007/978-3-642-22263-4\_10}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pet/KursaweDK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/RialD11, author = {Alfredo Rial and George Danezis}, editor = {Yan Chen and Jaideep Vaidya}, title = {Privacy-preserving smart metering}, booktitle = {Proceedings of the 10th annual {ACM} workshop on Privacy in the electronic society, {WPES} 2011, Chicago, IL, USA, October 17, 2011}, pages = {49--60}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046556.2046564}, doi = {10.1145/2046556.2046564}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/RialD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2011, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, publisher = {{ACM}}, year = {2011}, isbn = {978-1-4503-0948-6}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DanezisKR11, author = {George Danezis and Markulf Kohlweiss and Alfredo Rial}, title = {Differentially Private Billing with Rebates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {134}, year = {2011}, url = {http://eprint.iacr.org/2011/134}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DanezisKR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Molina-MarkhamDFSI11, author = {Andres Molina{-}Markham and George Danezis and Kevin Fu and Prashant J. Shenoy and David E. Irwin}, title = {Designing Privacy-preserving Smart Meters with Low-cost Microcontrollers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {544}, year = {2011}, url = {http://eprint.iacr.org/2011/544}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Molina-MarkhamDFSI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/DanezisDTL10, author = {George Danezis and Claudia D{\'{\i}}az and Carmela Troncoso and Ben Laurie}, editor = {Mikhail J. Atallah and Nicholas J. Hopper}, title = {Drac: An Architecture for Anonymous Low-Volume Communications}, booktitle = {Privacy Enhancing Technologies, 10th International Symposium, {PETS} 2010, Berlin, Germany, July 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6205}, pages = {202--219}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14527-8\_12}, doi = {10.1007/978-3-642-14527-8\_12}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/DanezisDTL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/DanezisACK10, author = {George Danezis and Tuomas Aura and Shuo Chen and Emre Kiciman}, editor = {Mikhail J. Atallah and Nicholas J. Hopper}, title = {How to Share Your Favourite Search Results while Preserving Privacy and Quality}, booktitle = {Privacy Enhancing Technologies, 10th International Symposium, {PETS} 2010, Berlin, Germany, July 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6205}, pages = {273--290}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14527-8\_16}, doi = {10.1007/978-3-642-14527-8\_16}, timestamp = {Wed, 01 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pet/DanezisACK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Danezis10, author = {George Danezis}, editor = {Bruce Christianson and James A. Malcolm}, title = {Generating Channel Ids in Virtual World Operating Systems (Transcript of Discussion)}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {74--81}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_13}, doi = {10.1007/978-3-662-45921-8\_13}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/Danezis10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/DanezisDS10, author = {George Danezis and Claudia D{\'{\i}}az and Paul F. Syverson}, editor = {Burton Rosenberg}, title = {Anonymous Communication}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {341--389}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c13}, doi = {10.1201/9781420059823-C13}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/DanezisDS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asunam/BonneauAD09, author = {Joseph Bonneau and Jonathan Anderson and George Danezis}, editor = {Nasrullah Memon and Reda Alhajj}, title = {Prying Data out of a Social Network}, booktitle = {2009 International Conference on Advances in Social Network Analysis and Mining, {ASONAM} 2009, 20-22 July 2009, Athens, Greece}, pages = {249--254}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ASONAM.2009.45}, doi = {10.1109/ASONAM.2009.45}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asunam/BonneauAD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Danezis09, author = {George Danezis}, editor = {Dirk Balfanz and Jessica Staddon}, title = {Inferring privacy policies for social networking services}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009}, pages = {5--10}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1654988.1654991}, doi = {10.1145/1654988.1654991}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Danezis09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TroncosoD09, author = {Carmela Troncoso and George Danezis}, editor = {Ehab Al{-}Shaer and Somesh Jha and Angelos D. Keromytis}, title = {The bayesian traffic analysis of mix networks}, booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009}, pages = {369--379}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1653662.1653707}, doi = {10.1145/1653662.1653707}, timestamp = {Tue, 10 Nov 2020 19:58:07 +0100}, biburl = {https://dblp.org/rec/conf/ccs/TroncosoD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DanezisDKT09, author = {George Danezis and Claudia D{\'{\i}}az and Emilia K{\"{a}}sper and Carmela Troncoso}, editor = {Michael Backes and Peng Ning}, title = {The Wisdom of Crowds: Attacks and Optimal Constructions}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {406--423}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_25}, doi = {10.1007/978-3-642-04444-1\_25}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DanezisDKT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/DanezisM09, author = {George Danezis and Prateek Mittal}, title = {SybilInfer: Detecting Sybil Nodes using Social Networks}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2009, San Diego, California, USA, 8th February - 11th February 2009}, publisher = {The Internet Society}, year = {2009}, url = {https://www.ndss-symposium.org/ndss2009/sybillnfer-detecting-sybil-nodes-using-social-networks/}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/DanezisM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/DanezisT09, author = {George Danezis and Carmela Troncoso}, editor = {Ian Goldberg and Mikhail J. Atallah}, title = {Vida: How to Use Bayesian Inference to De-anonymize Persistent Communications}, booktitle = {Privacy Enhancing Technologies, 9th International Symposium, {PETS} 2009, Seattle, WA, USA, August 5-7, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5672}, pages = {56--72}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03168-7\_4}, doi = {10.1007/978-3-642-03168-7\_4}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/DanezisT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/DanezisG09, author = {George Danezis and Ian Goldberg}, title = {Sphinx: {A} Compact and Provably Secure Mix Format}, booktitle = {30th {IEEE} Symposium on Security and Privacy {(SP} 2009), 17-20 May 2009, Oakland, California, {USA}}, pages = {269--282}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/SP.2009.15}, doi = {10.1109/SP.2009.15}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/DanezisG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Danezis09, author = {George Danezis}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {The Least Privacy-Damaging Centralised Traffic Data Retention Architecture}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {87--92}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_13}, doi = {10.1007/978-3-642-36213-2\_13}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/Danezis09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Danezis09a, author = {George Danezis}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {The Least Privacy-Damaging Centralised Traffic Data Retention Architecture}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {93--110}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_14}, doi = {10.1007/978-3-642-36213-2\_14}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Danezis09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/LindqvistADKMMR09, author = {Janne Lindqvist and Tuomas Aura and George Danezis and Teemu Koponen and Annu Myllyniemi and Jussi M{\"{a}}ki and Michael Roe}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {Privacy-preserving 802.11 access-point discovery}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {123--130}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514293}, doi = {10.1145/1514274.1514293}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/LindqvistADKMMR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/DanezisS08, author = {George Danezis and Paul F. Syverson}, editor = {Nikita Borisov and Ian Goldberg}, title = {Bridging and Fingerprinting: Epistemic Attacks on Route Selection}, booktitle = {Privacy Enhancing Technologies, 8th International Symposium, {PETS} 2008, Leuven, Belgium, July 23-25, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5134}, pages = {151--166}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70630-4\_10}, doi = {10.1007/978-3-540-70630-4\_10}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/DanezisS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/DanezisS08a, author = {George Danezis and Len Sassaman}, editor = {Nikita Borisov and Ian Goldberg}, title = {How to Bypass Two Anonymity Revocation Schemes}, booktitle = {Privacy Enhancing Technologies, 8th International Symposium, {PETS} 2008, Leuven, Belgium, July 23-25, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5134}, pages = {187--201}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70630-4\_12}, doi = {10.1007/978-3-540-70630-4\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pet/DanezisS08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/CvrcekD08, author = {Daniel Cvrcek and George Danezis}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Fighting the 'Good' Internet War}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {3--11}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_2}, doi = {10.1007/978-3-642-22137-8\_2}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/CvrcekD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Danezis08, author = {George Danezis}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Covert Communications Despite Traffic Data Retention}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {198--214}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_27}, doi = {10.1007/978-3-642-22137-8\_27}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Danezis08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Danezis08a, author = {George Danezis}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Covert Communications Despite Traffic Data Retention (Transcript of Discussion)}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {215--219}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_28}, doi = {10.1007/978-3-642-22137-8\_28}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Danezis08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/MulderDBP08, author = {Yoni De Mulder and George Danezis and Lejla Batina and Bart Preneel}, editor = {Vijay Atluri and Marianne Winslett}, title = {Identification via location-profiling in {GSM} networks}, booktitle = {Proceedings of the 2008 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2008, Alexandria, VA, USA, October 27, 2008}, pages = {23--32}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456403.1456409}, doi = {10.1145/1456403.1456409}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/MulderDBP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DanezisG08, author = {George Danezis and Ian Goldberg}, title = {Sphinx: {A} Compact and Provably Secure Mix Format}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {475}, year = {2008}, url = {http://eprint.iacr.org/2008/475}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DanezisG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Danezis07, author = {George Danezis}, title = {Breaking four mix-related schemes based on Universal Re-encryption}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {6}, pages = {393--402}, year = {2007}, url = {https://doi.org/10.1007/s10207-007-0033-y}, doi = {10.1007/S10207-007-0033-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Danezis07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BorisovDMT07, author = {Nikita Borisov and George Danezis and Prateek Mittal and Parisa Tabriz}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Denial of service or denial of security?}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {92--102}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315258}, doi = {10.1145/1315245.1315258}, timestamp = {Tue, 10 Nov 2020 20:00:14 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BorisovDMT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/DanezisD07, author = {George Danezis and Claudia D{\'{\i}}az}, editor = {Sven Dietrich and Rachna Dhamija}, title = {Space-Efficient Private Search with Applications to Rateless Codes}, booktitle = {Financial Cryptography and Data Security, 11th International Conference, {FC} 2007, and 1st International Workshop on Usable Security, {USEC} 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4886}, pages = {148--162}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77366-5\_15}, doi = {10.1007/978-3-540-77366-5\_15}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/DanezisD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/DanezisDFKTP07, author = {George Danezis and Claudia D{\'{\i}}az and Sebastian Faust and Emilia K{\"{a}}sper and Carmela Troncoso and Bart Preneel}, editor = {Juan A. Garay and Arjen K. Lenstra and Masahiro Mambo and Ren{\'{e}} Peralta}, title = {Efficient Negative Databases from Cryptographic Hash Functions}, booktitle = {Information Security, 10th International Conference, {ISC} 2007, Valpara{\'{\i}}so, Chile, October 9-12, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4779}, pages = {423--436}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75496-1\_28}, doi = {10.1007/978-3-540-75496-1\_28}, timestamp = {Fri, 03 Feb 2023 21:39:19 +0100}, biburl = {https://dblp.org/rec/conf/isw/DanezisDFKTP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/DanezisDT07, author = {George Danezis and Claudia D{\'{\i}}az and Carmela Troncoso}, editor = {Nikita Borisov and Philippe Golle}, title = {Two-Sided Statistical Disclosure Attack}, booktitle = {Privacy Enhancing Technologies, 7th International Symposium, {PET} 2007 Ottawa, Canada, June 20-22, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4776}, pages = {30--44}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75551-7\_3}, doi = {10.1007/978-3-540-75551-7\_3}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/DanezisDT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/DanezisL07, author = {George Danezis and Ben Laurie}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Private Yet Abuse Resistant Open Publishing}, booktitle = {Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5964}, pages = {222--243}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-17773-6\_28}, doi = {10.1007/978-3-642-17773-6\_28}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/DanezisL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Danezis07, author = {George Danezis}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Private Yet Abuse Resistant Open Publishing (Transcript of Discussion)}, booktitle = {Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5964}, pages = {244--255}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-17773-6\_29}, doi = {10.1007/978-3-642-17773-6\_29}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Danezis07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/DiazTD07, author = {Claudia D{\'{\i}}az and Carmela Troncoso and George Danezis}, editor = {Peng Ning and Ting Yu}, title = {Does additional information always reduce anonymity?}, booktitle = {Proceedings of the 2007 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2007, Alexandria, VA, USA, October 29, 2007}, pages = {72--75}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314333.1314347}, doi = {10.1145/1314333.1314347}, timestamp = {Mon, 04 Apr 2022 16:00:14 +0200}, biburl = {https://dblp.org/rec/conf/wpes/DiazTD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/TroncosoDKP07, author = {Carmela Troncoso and George Danezis and Eleni Kosta and Bart Preneel}, editor = {Peng Ning and Ting Yu}, title = {Pripayd: privacy friendly pay-as-you-drive insurance}, booktitle = {Proceedings of the 2007 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2007, Alexandria, VA, USA, October 29, 2007}, pages = {99--107}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314333.1314353}, doi = {10.1145/1314333.1314353}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/TroncosoDKP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/Danezis06, author = {George Danezis}, editor = {Sokratis K. Katsikas and Javier L{\'{o}}pez and Michael Backes and Stefanos Gritzalis and Bart Preneel}, title = {Breaking Four Mix-Related Schemes Based on Universal Re-encryption}, booktitle = {Information Security, 9th International Conference, {ISC} 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4176}, pages = {46--59}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11836810\_4}, doi = {10.1007/11836810\_4}, timestamp = {Thu, 29 Aug 2019 08:10:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/Danezis06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/BondD06, author = {Mike Bond and George Danezis}, editor = {Christian Hempelmann and Victor Raskin}, title = {A pact with the devil}, booktitle = {Proceedings of the New Security Paradigms Workshop 2006, Schloss Dagstuhl, Germany, September 19-22, 2006}, pages = {77--82}, publisher = {{ACM}}, year = {2006}, url = {https://dl.acm.org/citation.cfm?id=1278952}, timestamp = {Thu, 29 Nov 2018 11:17:10 +0100}, biburl = {https://dblp.org/rec/conf/nspw/BondD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/p2p/DanezisC06, author = {George Danezis and Richard Clayton}, editor = {Alberto Montresor and Adam Wierzbicki and Nahid Shahmehri}, title = {Route Fingerprinting in Anonymous Communications}, booktitle = {Sixth {IEEE} International Conference on Peer-to-Peer Computing {(P2P} 2006), 2-4 October 2006, Cambridge, United Kingdom}, pages = {69--72}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/P2P.2006.33}, doi = {10.1109/P2P.2006.33}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/p2p/DanezisC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/CvrcekKMD06, author = {Daniel Cvrcek and Marek Kumpost and Vashek Matyas and George Danezis}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {The Value of Location Information}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {112--121}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_15}, doi = {10.1007/978-3-642-04904-0\_15}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/CvrcekKMD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/DanezisW06, author = {George Danezis and Bettina Wittneben}, title = {The Economics of Mass Surveillance and the Questionable Value of Anonymous Communications}, booktitle = {5th Annual Workshop on the Economics of Information Security, {WEIS} 2006, Robinson College, University of Cambridge, England, UK, June 26-28, 2006}, year = {2006}, url = {http://weis2006.econinfosec.org/docs/36.pdf}, timestamp = {Thu, 22 Jul 2021 16:15:46 +0200}, biburl = {https://dblp.org/rec/conf/weis/DanezisW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/CvrcekKMD06, author = {Daniel Cvrcek and Marek Kumpost and Vashek Matyas and George Danezis}, editor = {Ari Juels and Marianne Winslett}, title = {A study on the value of location privacy}, booktitle = {Proceedings of the 2006 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2006, Alexandria, VA, USA, October 30, 2006}, pages = {109--118}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179601.1179621}, doi = {10.1145/1179601.1179621}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/CvrcekKMD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pet/2005, editor = {George Danezis and David M. Martin Jr.}, title = {Privacy Enhancing Technologies, 5th International Workshop, {PET} 2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3856}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11767831}, doi = {10.1007/11767831}, isbn = {3-540-34745-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pet/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pet/2006, editor = {George Danezis and Philippe Golle}, title = {Privacy Enhancing Technologies, 6th International Workshop, {PET} 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4258}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11957454}, doi = {10.1007/11957454}, isbn = {3-540-68790-4}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pet/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DanezisD06, author = {George Danezis and Claudia D{\'{\i}}az}, title = {Improving the Decoding Efficiency of Private Search}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {24}, year = {2006}, url = {http://eprint.iacr.org/2006/024}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DanezisD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/DanezisA05, author = {George Danezis and Ross J. Anderson}, title = {The Economics of Resisting Censorship}, journal = {{IEEE} Secur. Priv.}, volume = {3}, number = {1}, pages = {45--50}, year = {2005}, url = {https://doi.org/10.1109/MSP.2005.29}, doi = {10.1109/MSP.2005.29}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/DanezisA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DanezisLKA05, author = {George Danezis and Chris Lesniewski{-}Laas and M. Frans Kaashoek and Ross J. Anderson}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {Sybil-Resistant {DHT} Routing}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {305--318}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_18}, doi = {10.1007/11555827\_18}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DanezisLKA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/DanezisC05, author = {George Danezis and Jolyon Clulow}, editor = {Mauro Barni and Jordi Herrera{-}Joancomart{\'{\i}} and Stefan Katzenbeisser and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, title = {Compulsion Resistant Anonymous Communications}, booktitle = {Information Hiding, 7th International Workshop, {IH} 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3727}, pages = {11--25}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11558859\_2}, doi = {10.1007/11558859\_2}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/DanezisC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MurdochD05, author = {Steven J. Murdoch and George Danezis}, title = {Low-Cost Traffic Analysis of Tor}, booktitle = {2005 {IEEE} Symposium on Security and Privacy (S{\&}P 2005), 8-11 May 2005, Oakland, CA, {USA}}, pages = {183--195}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/SP.2005.12}, doi = {10.1109/SP.2005.12}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/MurdochD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BondD05, author = {Mike Bond and George Danezis}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {The Dining Freemasons (Security Protocols for Secret Societies)}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {258--265}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_32}, doi = {10.1007/978-3-540-77156-2\_32}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/BondD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/DanezisLA05, author = {George Danezis and Stephen Lewis and Ross J. Anderson}, title = {How Much Is Location Privacy Worth?}, booktitle = {4th Annual Workshop on the Economics of Information Security, {WEIS} 2005, Harvard University, Cambridge, MA, USA, June 1-3, 2005}, year = {2005}, url = {http://infosecon.net/workshop/pdf/location-privacy.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/weis/DanezisLA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/DanezisD05, author = {George Danezis and Claudia D{\'{\i}}az}, editor = {Shlomi Dolev and Rafail Ostrovsky and Andreas Pfitzmann}, title = {Improving the Decoding Efficiency of Private Search}, booktitle = {Anonymous Communication and its Applications, 09.10. - 14.10.2005}, series = {Dagstuhl Seminar Proceedings}, volume = {05411}, publisher = {Internationales Begegnungs- und Forschungszentrum f{\"{u}}r Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2005}, url = {http://drops.dagstuhl.de/opus/volltexte/2006/482}, timestamp = {Thu, 10 Jun 2021 13:02:08 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/DanezisD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ethos/Danezis04, author = {George Danezis}, title = {Better anonymous communications}, school = {University of Cambridge, {UK}}, year = {2004}, url = {https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.616002}, timestamp = {Tue, 05 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ethos/Danezis04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/DanezisS04, author = {George Danezis and Andrei Serjantov}, editor = {Jessica J. Fridrich}, title = {Statistical Disclosure or Intersection Attacks on Anonymity Systems}, booktitle = {Information Hiding, 6th International Workshop, {IH} 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3200}, pages = {293--308}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30114-1\_21}, doi = {10.1007/978-3-540-30114-1\_21}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/DanezisS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/Danezis04, author = {George Danezis}, editor = {David M. Martin Jr. and Andrei Serjantov}, title = {The Traffic Analysis of Continuous-Time Mixes}, booktitle = {Privacy Enhancing Technologies, 4th International Workshop, {PET} 2004, Toronto, Canada, May 26-28, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3424}, pages = {35--50}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11423409\_3}, doi = {10.1007/11423409\_3}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/Danezis04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/DiazDGPS04, author = {Claudia D{\'{\i}}az and George Danezis and Christian Grothoff and Andreas Pfitzmann and Paul F. Syverson}, editor = {David M. Martin Jr. and Andrei Serjantov}, title = {Panel Discussion - Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?}, booktitle = {Privacy Enhancing Technologies, 4th International Workshop, {PET} 2004, Toronto, Canada, May 26-28, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3424}, pages = {242--242}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11423409\_15}, doi = {10.1007/11423409\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pet/DiazDGPS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/BohmeDDKP04, author = {Rainer B{\"{o}}hme and George Danezis and Claudia D{\'{\i}}az and Stefan K{\"{o}}psell and Andreas Pfitzmann}, editor = {David M. Martin Jr. and Andrei Serjantov}, title = {On the {PET} Workshop Panel "Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?"}, booktitle = {Privacy Enhancing Technologies, 4th International Workshop, {PET} 2004, Toronto, Canada, May 26-28, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3424}, pages = {243--255}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11423409\_16}, doi = {10.1007/11423409\_16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pet/BohmeDDKP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/DanezisL04, author = {George Danezis and Ben Laurie}, editor = {Vijay Atluri and Paul F. Syverson and Sabrina De Capitani di Vimercati}, title = {Minx: a simple and efficient anonymous packet format}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2004, Washington, DC, USA, October 28, 2004}, pages = {59--65}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029179.1029198}, doi = {10.1145/1029179.1029198}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/DanezisL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/Danezis03, author = {George Danezis}, editor = {Roger Dingledine}, title = {Mix-Networks with Restricted Routes}, booktitle = {Privacy Enhancing Technologies, Third International Workshop, {PET} 2003, Dresden, Germany, March 26-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2760}, pages = {1--17}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40956-4\_1}, doi = {10.1007/978-3-540-40956-4\_1}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/Danezis03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/Danezis03, author = {George Danezis}, editor = {Dimitris Gritzalis and Sabrina De Capitani di Vimercati and Pierangela Samarati and Sokratis K. Katsikas}, title = {Statistical Disclosure Attacks}, booktitle = {Security and Privacy in the Age of Uncertainty, {IFIP} {TC11} 18\({}^{\mbox{th}}\) International Conference on Information Security (SEC2003), May 26-28, 2003, Athens, Greece}, series = {{IFIP} Conference Proceedings}, volume = {250}, pages = {421--426}, publisher = {Kluwer}, year = {2003}, timestamp = {Fri, 25 Apr 2003 10:12:34 +0200}, biburl = {https://dblp.org/rec/conf/sec/Danezis03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/DanezisDM03, author = {George Danezis and Roger Dingledine and Nick Mathewson}, title = {Mixminion: Design of a Type {III} Anonymous Remailer Protocol}, booktitle = {2003 {IEEE} Symposium on Security and Privacy (S{\&}P 2003), 11-14 May 2003, Berkeley, CA, {USA}}, pages = {2--15}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/SECPRI.2003.1199323}, doi = {10.1109/SECPRI.2003.1199323}, timestamp = {Thu, 21 Sep 2023 15:57:30 +0200}, biburl = {https://dblp.org/rec/conf/sp/DanezisDM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/DanezisS03, author = {George Danezis and Len Sassaman}, editor = {Sushil Jajodia and Pierangela Samarati and Paul F. Syverson}, title = {Heartbeat traffic to counter (n-1) attacks: red-green-black mixes}, booktitle = {Proceedings of the 2003 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2003, Washington, DC, USA, October 30, 2003}, pages = {89--93}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/1005140.1005154}, doi = {10.1145/1005140.1005154}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/DanezisS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ClaytonD02, author = {Richard Clayton and George Danezis}, editor = {Fabien A. P. Petitcolas}, title = {Chaffinch: Confidentiality in the Face of Legal Threats}, booktitle = {Information Hiding, 5th International Workshop, {IH} 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2578}, pages = {70--86}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36415-3\_5}, doi = {10.1007/3-540-36415-3\_5}, timestamp = {Sun, 02 Oct 2022 16:07:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/ClaytonD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/SerjantovD02, author = {Andrei Serjantov and George Danezis}, editor = {Roger Dingledine and Paul F. Syverson}, title = {Towards an Information Theoretic Metric for Anonymity}, booktitle = {Privacy Enhancing Technologies, Second International Workshop, {PET} 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2482}, pages = {41--53}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36467-6\_4}, doi = {10.1007/3-540-36467-6\_4}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/SerjantovD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ClaytonDK01, author = {Richard Clayton and George Danezis and Markus G. Kuhn}, editor = {Ira S. Moskowitz}, title = {Real World Patterns of Failure in Anonymity Systems}, booktitle = {Information Hiding, 4th International Workshop, {IHW} 2001, Pittsburgh, PA, USA, April 25-27, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2137}, pages = {230--244}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45496-9\_17}, doi = {10.1007/3-540-45496-9\_17}, timestamp = {Wed, 16 Mar 2022 23:55:28 +0100}, biburl = {https://dblp.org/rec/conf/ih/ClaytonDK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Danezis00, author = {George Danezis}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {An Anonymous Auction Protocol Using "Money Escrow" (Transcript of Discussion)}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {223--233}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_29}, doi = {10.1007/3-540-44810-1\_29}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/Danezis00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.