BibTeX records: George Danezis

download as .bib file

@inproceedings{DBLP:conf/ppopp/GelashviliSXDLM23,
  author       = {Rati Gelashvili and
                  Alexander Spiegelman and
                  Zhuolun Xiang and
                  George Danezis and
                  Zekun Li and
                  Dahlia Malkhi and
                  Yu Xia and
                  Runtian Zhou},
  editor       = {Maryam Mehri Dehnavi and
                  Milind Kulkarni and
                  Sriram Krishnamoorthy},
  title        = {Block-STM: Scaling Blockchain Execution by Turning Ordering Curse
                  to a Performance Blessing},
  booktitle    = {Proceedings of the 28th {ACM} {SIGPLAN} Annual Symposium on Principles
                  and Practice of Parallel Programming, PPoPP 2023, Montreal, QC, Canada,
                  25 February 2023 - 1 March 2023},
  pages        = {232--244},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3572848.3577524},
  doi          = {10.1145/3572848.3577524},
  timestamp    = {Fri, 03 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ppopp/GelashviliSXDLM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/BaudetSKD23,
  author       = {Mathieu Baudet and
                  Alberto Sonnino and
                  Mahimna Kelkar and
                  George Danezis},
  editor       = {Bart P. Knijnenburg and
                  Panos Papadimitratos},
  title        = {Zef: Low-latency, Scalable, Private Payments},
  booktitle    = {Proceedings of the 22nd Workshop on Privacy in the Electronic Society,
                  {WPES} 2023, Copenhagen, Denmark, 26 November 2023},
  pages        = {1--16},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3603216.3624952},
  doi          = {10.1145/3603216.3624952},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/BaudetSKD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-12715,
  author       = {Lefteris Kokoris{-}Kogias and
                  Alberto Sonnino and
                  George Danezis},
  title        = {Cuttlefish: Expressive Fast Path Blockchains with FastUnlock},
  journal      = {CoRR},
  volume       = {abs/2309.12715},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.12715},
  doi          = {10.48550/ARXIV.2309.12715},
  eprinttype    = {arXiv},
  eprint       = {2309.12715},
  timestamp    = {Wed, 27 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-12715.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-14821,
  author       = {Kushal Babel and
                  Andrey Chursin and
                  George Danezis and
                  Lefteris Kokoris{-}Kogias and
                  Alberto Sonnino},
  title        = {Mysticeti: Low-Latency {DAG} Consensus with Fast Commit Path},
  journal      = {CoRR},
  volume       = {abs/2310.14821},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.14821},
  doi          = {10.48550/ARXIV.2310.14821},
  eprinttype    = {arXiv},
  eprint       = {2310.14821},
  timestamp    = {Mon, 30 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-14821.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-18042,
  author       = {Sam Blackshear and
                  Andrey Chursin and
                  George Danezis and
                  Anastasios Kichidis and
                  Lefteris Kokoris{-}Kogias and
                  Xun Li and
                  Mark Logan and
                  Ashok Menon and
                  Todd Nowacki and
                  Alberto Sonnino and
                  Brandon Williams and
                  Lu Zhang},
  title        = {Sui Lutris: {A} Blockchain Combining Broadcast and Consensus},
  journal      = {CoRR},
  volume       = {abs/2310.18042},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.18042},
  doi          = {10.48550/ARXIV.2310.18042},
  eprinttype    = {arXiv},
  eprint       = {2310.18042},
  timestamp    = {Thu, 02 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-18042.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KavousiLJD23,
  author       = {Alireza Kavousi and
                  Duc Viet Le and
                  Philipp Jovanovic and
                  George Danezis},
  title        = {BlindPerm: Efficient {MEV} Mitigation with an Encrypted Mempool and
                  Permutation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1061},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1061},
  timestamp    = {Mon, 29 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KavousiLJD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosys/DanezisKSS22,
  author       = {George Danezis and
                  Lefteris Kokoris{-}Kogias and
                  Alberto Sonnino and
                  Alexander Spiegelman},
  editor       = {Y{\'{e}}rom{-}David Bromberg and
                  Anne{-}Marie Kermarrec and
                  Christos Kozyrakis},
  title        = {Narwhal and Tusk: a DAG-based mempool and efficient {BFT} consensus},
  booktitle    = {EuroSys '22: Seventeenth European Conference on Computer Systems,
                  Rennes, France, April 5 - 8, 2022},
  pages        = {34--50},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3492321.3519594},
  doi          = {10.1145/3492321.3519594},
  timestamp    = {Wed, 13 Apr 2022 13:48:01 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosys/DanezisKSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-05671,
  author       = {Mathieu Baudet and
                  Alberto Sonnino and
                  Mahimna Kelkar and
                  George Danezis},
  title        = {Zef: Low-latency, Scalable, Private Payments},
  journal      = {CoRR},
  volume       = {abs/2201.05671},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.05671},
  eprinttype    = {arXiv},
  eprint       = {2201.05671},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-05671.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-06871,
  author       = {Rati Gelashvili and
                  Alexander Spiegelman and
                  Zhuolun Xiang and
                  George Danezis and
                  Zekun Li and
                  Yu Xia and
                  Runtian Zhou and
                  Dahlia Malkhi},
  title        = {Block-STM: Scaling Blockchain Execution by Turning Ordering Curse
                  to a Performance Blessing},
  journal      = {CoRR},
  volume       = {abs/2203.06871},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.06871},
  doi          = {10.48550/ARXIV.2203.06871},
  eprinttype    = {arXiv},
  eprint       = {2203.06871},
  timestamp    = {Fri, 03 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-06871.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaudetSKD22,
  author       = {Mathieu Baudet and
                  Alberto Sonnino and
                  Mahimna Kelkar and
                  George Danezis},
  title        = {Zef: Low-latency, Scalable, Private Payments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {83},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/083},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BaudetSKD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/SchettD21,
  author       = {Maria Anna Schett and
                  George Danezis},
  editor       = {Avery Miller and
                  Keren Censor{-}Hillel and
                  Janne H. Korhonen},
  title        = {Embedding a Deterministic {BFT} Protocol in a Block {DAG}},
  booktitle    = {{PODC} '21: {ACM} Symposium on Principles of Distributed Computing,
                  Virtual Event, Italy, July 26-30, 2021},
  pages        = {177--186},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3465084.3467930},
  doi          = {10.1145/3465084.3467930},
  timestamp    = {Mon, 26 Jul 2021 09:04:22 +0200},
  biburl       = {https://dblp.org/rec/conf/podc/SchettD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-09594,
  author       = {Maria Anna Schett and
                  George Danezis},
  title        = {Embedding a Deterministic {BFT} Protocol in a Block {DAG}},
  journal      = {CoRR},
  volume       = {abs/2102.09594},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.09594},
  eprinttype    = {arXiv},
  eprint       = {2102.09594},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-09594.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-11827,
  author       = {George Danezis and
                  Eleftherios Kokoris{-}Kogias and
                  Alberto Sonnino and
                  Alexander Spiegelman},
  title        = {Narwhal and Tusk: {A} DAG-based Mempool and Efficient {BFT} Consensus},
  journal      = {CoRR},
  volume       = {abs/2105.11827},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.11827},
  eprinttype    = {arXiv},
  eprint       = {2105.11827},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-11827.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/AlshahwanBCDM20,
  author       = {Nadia Alshahwan and
                  Earl T. Barr and
                  David Clark and
                  George Danezis and
                  H{\'{e}}ctor D. Men{\'{e}}ndez},
  title        = {Detecting Malware with Information Complexity},
  journal      = {Entropy},
  volume       = {22},
  number       = {5},
  pages        = {575},
  year         = {2020},
  url          = {https://doi.org/10.3390/e22050575},
  doi          = {10.3390/E22050575},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entropy/AlshahwanBCDM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aft/BaudetDS20,
  author       = {Mathieu Baudet and
                  George Danezis and
                  Alberto Sonnino},
  title        = {FastPay: High-Performance Byzantine Fault Tolerant Settlement},
  booktitle    = {{AFT} '20: 2nd {ACM} Conference on Advances in Financial Technologies,
                  New York, NY, USA, October 21-23, 2020},
  pages        = {163--177},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3419614.3423249},
  doi          = {10.1145/3419614.3423249},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aft/BaudetDS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aft/AzouviDN20,
  author       = {Sarah Azouvi and
                  George Danezis and
                  Valeria Nikolaenko},
  title        = {Winkle: Foiling Long-Range Attacks in Proof-of-Stake Systems},
  booktitle    = {{AFT} '20: 2nd {ACM} Conference on Advances in Financial Technologies,
                  New York, NY, USA, October 21-23, 2020},
  pages        = {189--201},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3419614.3423260},
  doi          = {10.1145/3419614.3423260},
  timestamp    = {Thu, 29 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aft/AzouviDN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/SonninoBAD20,
  author       = {Alberto Sonnino and
                  Shehar Bano and
                  Mustafa Al{-}Bassam and
                  George Danezis},
  title        = {Replay Attacks and Defenses Against Cross-shard Consensus in Sharded
                  Distributed Ledgers},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2020, Genoa, Italy, September 7-11, 2020},
  pages        = {294--308},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/EuroSP48549.2020.00026},
  doi          = {10.1109/EUROSP48549.2020.00026},
  timestamp    = {Tue, 10 Nov 2020 11:45:04 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/SonninoBAD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-11506,
  author       = {Mathieu Baudet and
                  George Danezis and
                  Alberto Sonnino},
  title        = {FastPay: High-Performance Byzantine Fault Tolerant Settlement},
  journal      = {CoRR},
  volume       = {abs/2003.11506},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.11506},
  eprinttype    = {arXiv},
  eprint       = {2003.11506},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-11506.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/HayesMDC19,
  author       = {Jamie Hayes and
                  Luca Melis and
                  George Danezis and
                  Emiliano De Cristofaro},
  title        = {{LOGAN:} Membership Inference Attacks Against Generative Models},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2019},
  number       = {1},
  pages        = {133--152},
  year         = {2019},
  url          = {https://doi.org/10.2478/popets-2019-0008},
  doi          = {10.2478/POPETS-2019-0008},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/HayesMDC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aft/BanoSAAMMD19,
  author       = {Shehar Bano and
                  Alberto Sonnino and
                  Mustafa Al{-}Bassam and
                  Sarah Azouvi and
                  Patrick McCorry and
                  Sarah Meiklejohn and
                  George Danezis},
  title        = {SoK: Consensus in the Age of Blockchains},
  booktitle    = {Proceedings of the 1st {ACM} Conference on Advances in Financial Technologies,
                  {AFT} 2019, Zurich, Switzerland, October 21-23, 2019},
  pages        = {183--198},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3318041.3355458},
  doi          = {10.1145/3318041.3355458},
  timestamp    = {Thu, 11 Mar 2021 17:04:51 +0100},
  biburl       = {https://dblp.org/rec/conf/aft/BanoSAAMMD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/SonninoABMD19,
  author       = {Alberto Sonnino and
                  Mustafa Al{-}Bassam and
                  Shehar Bano and
                  Sarah Meiklejohn and
                  George Danezis},
  title        = {Coconut: Threshold Issuance Selective Disclosure Credentials with
                  Applications to Distributed Ledgers},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/coconut-threshold-issuance-selective-disclosure-credentials-with-applications-to-distributed-ledgers/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/SonninoABMD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LeibowitzPDH19,
  author       = {Hemi Leibowitz and
                  Ania M. Piotrowska and
                  George Danezis and
                  Amir Herzberg},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {No Right to Remain Silent: Isolating Malicious Mixes},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {1841--1858},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/leibowitz},
  timestamp    = {Mon, 01 Feb 2021 08:43:12 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/LeibowitzPDH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-11218,
  author       = {Alberto Sonnino and
                  Shehar Bano and
                  Mustafa Al{-}Bassam and
                  George Danezis},
  title        = {Replay Attacks and Defenses against Cross-shard Consensus in Sharded
                  Distributed Ledgers},
  journal      = {CoRR},
  volume       = {abs/1901.11218},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.11218},
  eprinttype    = {arXiv},
  eprint       = {1901.11218},
  timestamp    = {Mon, 04 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-11218.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-12237,
  author       = {Alberto Sonnino and
                  George Danezis},
  title        = {SybilQuorum: Open Distributed Ledgers Through Trust Networks},
  journal      = {CoRR},
  volume       = {abs/1906.12237},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.12237},
  eprinttype    = {arXiv},
  eprint       = {1906.12237},
  timestamp    = {Mon, 01 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-12237.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AzouviDN19,
  author       = {Sarah Azouvi and
                  George Danezis and
                  Valeria Nikolaenko},
  title        = {Winkle: Foiling Long-Range Attacks in Proof-of-Stake Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1440},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1440},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AzouviDN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/RashidDCLMLP18,
  author       = {Awais Rashid and
                  George Danezis and
                  Howard Chivers and
                  Emil Lupu and
                  Andrew Martin and
                  Makayla Lewis and
                  Claudia Peersman},
  title        = {Scoping the Cyber Security Body of Knowledge},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {3},
  pages        = {96--102},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.2701150},
  doi          = {10.1109/MSP.2018.2701150},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/RashidDCLMLP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/RialDK18,
  author       = {Alfredo Rial and
                  George Danezis and
                  Markulf Kohlweiss},
  title        = {Privacy-preserving smart metering revisited},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {1},
  pages        = {1--31},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-016-0355-8},
  doi          = {10.1007/S10207-016-0355-8},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/RialDK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/0013APBDT18,
  author       = {Chen Chen and
                  Daniele Enrico Asoni and
                  Adrian Perrig and
                  David Barrera and
                  George Danezis and
                  Carmela Troncoso},
  title        = {{TARANET:} Traffic-Analysis Resistant Anonymity at the Network Layer},
  booktitle    = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2018, London, United Kingdom, April 24-26, 2018},
  pages        = {137--152},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/EuroSP.2018.00018},
  doi          = {10.1109/EUROSP.2018.00018},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/0013APBDT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/Al-BassamSBHD18,
  author       = {Mustafa Al{-}Bassam and
                  Alberto Sonnino and
                  Shehar Bano and
                  Dave Hrycyszyn and
                  George Danezis},
  title        = {Chainspace: {A} Sharded Smart Contracts Platform},
  booktitle    = {25th Annual Network and Distributed System Security Symposium, {NDSS}
                  2018, San Diego, California, USA, February 18-21, 2018},
  publisher    = {The Internet Society},
  year         = {2018},
  url          = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_09-2\_Al-Bassam\_paper.pdf},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/Al-BassamSBHD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/HayesD18,
  author       = {Jamie Hayes and
                  George Danezis},
  title        = {Learning Universal Adversarial Perturbations with Generative Models},
  booktitle    = {2018 {IEEE} Security and Privacy Workshops, {SP} Workshops 2018, San
                  Francisco, CA, USA, May 24, 2018},
  pages        = {43--49},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SPW.2018.00015},
  doi          = {10.1109/SPW.2018.00015},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/HayesD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/KulynychLIDT18,
  author       = {Bogdan Kulynych and
                  Wouter Lueks and
                  Marios Isaakidis and
                  George Danezis and
                  Carmela Troncoso},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Aaron Johnson},
  title        = {ClaimChain: Improving the Security and Privacy of In-band Key Distribution
                  for Messaging},
  booktitle    = {Proceedings of the 2018 Workshop on Privacy in the Electronic Society,
                  WPES@CCS 2018, Toronto, ON, Canada, October 15-19, 2018},
  pages        = {86--103},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3267323.3268947},
  doi          = {10.1145/3267323.3268947},
  timestamp    = {Wed, 28 Jul 2021 08:57:48 +0200},
  biburl       = {https://dblp.org/rec/conf/wpes/KulynychLIDT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-07344,
  author       = {Alberto Sonnino and
                  Mustafa Al{-}Bassam and
                  Shehar Bano and
                  George Danezis},
  title        = {Coconut: Threshold Issuance Selective Disclosure Credentials with
                  Applications to Distributed Ledgers},
  journal      = {CoRR},
  volume       = {abs/1802.07344},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.07344},
  eprinttype    = {arXiv},
  eprint       = {1802.07344},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-07344.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-08415,
  author       = {Chen Chen and
                  Daniele Enrico Asoni and
                  Adrian Perrig and
                  David Barrera and
                  George Danezis and
                  Carmela Troncoso},
  title        = {{TARANET:} Traffic-Analysis Resistant Anonymity at the NETwork layer},
  journal      = {CoRR},
  volume       = {abs/1802.08415},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.08415},
  eprinttype    = {arXiv},
  eprint       = {1802.08415},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-08415.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1809-01620,
  author       = {George Danezis and
                  Dave Hrycyszyn},
  title        = {Blockmania: from Block DAGs to Consensus},
  journal      = {CoRR},
  volume       = {abs/1809.01620},
  year         = {2018},
  url          = {http://arxiv.org/abs/1809.01620},
  eprinttype    = {arXiv},
  eprint       = {1809.01620},
  timestamp    = {Fri, 05 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1809-01620.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/TroncosoIDH17,
  author       = {Carmela Troncoso and
                  Marios Isaakidis and
                  George Danezis and
                  Harry Halpin},
  title        = {Systematizing Decentralization and Privacy: Lessons from 15 Years
                  of Research and Deployments},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2017},
  number       = {4},
  pages        = {404--426},
  year         = {2017},
  url          = {https://doi.org/10.1515/popets-2017-0056},
  doi          = {10.1515/POPETS-2017-0056},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/TroncosoIDH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/BanoAD17,
  author       = {Shehar Bano and
                  Mustafa Al{-}Bassam and
                  George Danezis},
  title        = {The Road to Scalable Blockchain Designs},
  journal      = {login Usenix Mag.},
  volume       = {42},
  number       = {4},
  year         = {2017},
  url          = {https://www.usenix.org/publications/login/winter2017/bano},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/BanoAD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MavroudisCSCKD17,
  author       = {Vasilios Mavroudis and
                  Andrea Cerulli and
                  Petr Svenda and
                  Dan Cvrcek and
                  Dusan Klinec and
                  George Danezis},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted
                  Components},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {1583--1600},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3133961},
  doi          = {10.1145/3133956.3133961},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MavroudisCSCKD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/HayesD17,
  author       = {Jamie Hayes and
                  George Danezis},
  editor       = {Isabelle Guyon and
                  Ulrike von Luxburg and
                  Samy Bengio and
                  Hanna M. Wallach and
                  Rob Fergus and
                  S. V. N. Vishwanathan and
                  Roman Garnett},
  title        = {Generating steganographic images via adversarial training},
  booktitle    = {Advances in Neural Information Processing Systems 30: Annual Conference
                  on Neural Information Processing Systems 2017, December 4-9, 2017,
                  Long Beach, CA, {USA}},
  pages        = {1954--1963},
  year         = {2017},
  url          = {https://proceedings.neurips.cc/paper/2017/hash/fe2d010308a6b3799a3d9c728ee74244-Abstract.html},
  timestamp    = {Thu, 21 Jan 2021 13:58:27 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/HayesD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pac/PodolankoPMDW17,
  author       = {John P. Podolanko and
                  Revanth Pobala and
                  Hussain Mucklai and
                  George Danezis and
                  Matthew Wright},
  title        = {LiLAC: Lightweight Low-Latency Anonymous Chat},
  booktitle    = {{IEEE} Symposium on Privacy-Aware Computing, {PAC} 2017, Washington,
                  DC, USA, August 1-4, 2017},
  pages        = {141--151},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.ieeecomputersociety.org/10.1109/PAC.2017.14},
  doi          = {10.1109/PAC.2017.14},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pac/PodolankoPMDW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/PiotrowskaHEMD17,
  author       = {Ania M. Piotrowska and
                  Jamie Hayes and
                  Tariq Elahi and
                  Sebastian Meiser and
                  George Danezis},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {The Loopix Anonymity System},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {1199--1216},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/piotrowska},
  timestamp    = {Mon, 01 Feb 2021 08:42:59 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/PiotrowskaHEMD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/PiotrowskaHGDH17,
  author       = {Ania M. Piotrowska and
                  Jamie Hayes and
                  Nethanel Gelernter and
                  George Danezis and
                  Amir Herzberg},
  editor       = {Bhavani Thuraisingham and
                  Adam J. Lee},
  title        = {AnNotify: {A} Private Notification Service},
  booktitle    = {Proceedings of the 2017 on Workshop on Privacy in the Electronic Society,
                  Dallas, TX, USA, October 30 - November 3, 2017},
  pages        = {5--15},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3139550.3139566},
  doi          = {10.1145/3139550.3139566},
  timestamp    = {Wed, 29 Jun 2022 15:37:43 +0200},
  biburl       = {https://dblp.org/rec/conf/wpes/PiotrowskaHGDH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/ToledoDE17,
  author       = {Raphael R. Toledo and
                  George Danezis and
                  Isao Echizen},
  editor       = {Bhavani Thuraisingham and
                  Adam J. Lee},
  title        = {Mix-ORAM: Using Delegated Shuffles},
  booktitle    = {Proceedings of the 2017 on Workshop on Privacy in the Electronic Society,
                  Dallas, TX, USA, October 30 - November 3, 2017},
  pages        = {51--61},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3139550.3139569},
  doi          = {10.1145/3139550.3139569},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/ToledoDE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HayesD17,
  author       = {Jamie Hayes and
                  George Danezis},
  title        = {ste-GAN-ography: Generating Steganographic Images via Adversarial
                  Training},
  journal      = {CoRR},
  volume       = {abs/1703.00371},
  year         = {2017},
  url          = {http://arxiv.org/abs/1703.00371},
  eprinttype    = {arXiv},
  eprint       = {1703.00371},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/HayesD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/PiotrowskaHEMD17,
  author       = {Ania M. Piotrowska and
                  Jamie Hayes and
                  Tariq Elahi and
                  Sebastian Meiser and
                  George Danezis},
  title        = {The Loopix Anonymity System},
  journal      = {CoRR},
  volume       = {abs/1703.00536},
  year         = {2017},
  url          = {http://arxiv.org/abs/1703.00536},
  eprinttype    = {arXiv},
  eprint       = {1703.00536},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/PiotrowskaHEMD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/TroncosoDIH17,
  author       = {Carmela Troncoso and
                  George Danezis and
                  Marios Isaakidis and
                  Harry Halpin},
  title        = {Systematizing Decentralization and Privacy: Lessons from 15 years
                  of research and deployments},
  journal      = {CoRR},
  volume       = {abs/1704.08065},
  year         = {2017},
  url          = {http://arxiv.org/abs/1704.08065},
  eprinttype    = {arXiv},
  eprint       = {1704.08065},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/TroncosoDIH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HayesMDC17,
  author       = {Jamie Hayes and
                  Luca Melis and
                  George Danezis and
                  Emiliano De Cristofaro},
  title        = {{LOGAN:} Evaluating Privacy Leakage of Generative Models Using Generative
                  Adversarial Networks},
  journal      = {CoRR},
  volume       = {abs/1705.07663},
  year         = {2017},
  url          = {http://arxiv.org/abs/1705.07663},
  eprinttype    = {arXiv},
  eprint       = {1705.07663},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/HayesMDC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KulynychITD17,
  author       = {Bogdan Kulynych and
                  Marios Isaakidis and
                  Carmela Troncoso and
                  George Danezis},
  title        = {ClaimChain: Decentralized Public Key Infrastructure},
  journal      = {CoRR},
  volume       = {abs/1707.06279},
  year         = {2017},
  url          = {http://arxiv.org/abs/1707.06279},
  eprinttype    = {arXiv},
  eprint       = {1707.06279},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KulynychITD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-03778,
  author       = {Mustafa Al{-}Bassam and
                  Alberto Sonnino and
                  Shehar Bano and
                  Dave Hrycyszyn and
                  George Danezis},
  title        = {Chainspace: {A} Sharded Smart Contracts Platform},
  journal      = {CoRR},
  volume       = {abs/1708.03778},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.03778},
  eprinttype    = {arXiv},
  eprint       = {1708.03778},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-03778.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-05207,
  author       = {Jamie Hayes and
                  George Danezis},
  title        = {Machine Learning as an Adversarial Service: Learning Black-Box Adversarial
                  Examples},
  journal      = {CoRR},
  volume       = {abs/1708.05207},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.05207},
  eprinttype    = {arXiv},
  eprint       = {1708.05207},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-05207.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-01008,
  author       = {Raphael R. Toledo and
                  George Danezis and
                  Isao Echizen},
  title        = {Mix-ORAM: Using delegate shuffles},
  journal      = {CoRR},
  volume       = {abs/1709.01008},
  year         = {2017},
  url          = {http://arxiv.org/abs/1709.01008},
  eprinttype    = {arXiv},
  eprint       = {1709.01008},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1709-01008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-03817,
  author       = {Vasilios Mavroudis and
                  Andrea Cerulli and
                  Petr Svenda and
                  Dan Cvrcek and
                  Dusan Klinec and
                  George Danezis},
  title        = {A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted
                  Components},
  journal      = {CoRR},
  volume       = {abs/1709.03817},
  year         = {2017},
  url          = {http://arxiv.org/abs/1709.03817},
  eprinttype    = {arXiv},
  eprint       = {1709.03817},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1709-03817.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1711-03936,
  author       = {Shehar Bano and
                  Alberto Sonnino and
                  Mustafa Al{-}Bassam and
                  Sarah Azouvi and
                  Patrick McCorry and
                  Sarah Meiklejohn and
                  George Danezis},
  title        = {Consensus in the Age of Blockchains},
  journal      = {CoRR},
  volume       = {abs/1711.03936},
  year         = {2017},
  url          = {http://arxiv.org/abs/1711.03936},
  eprinttype    = {arXiv},
  eprint       = {1711.03936},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1711-03936.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeibowitzPDH17,
  author       = {Hemi Leibowitz and
                  Ania M. Piotrowska and
                  George Danezis and
                  Amir Herzberg},
  title        = {No right to remain silent: Isolating Malicious Mixes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1000},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1000},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeibowitzPDH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/ToledoDG16,
  author       = {Raphael R. Toledo and
                  George Danezis and
                  Ian Goldberg},
  title        = {Lower-Cost {\(\in\)}-Private Information Retrieval},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2016},
  number       = {4},
  pages        = {184--201},
  year         = {2016},
  url          = {https://doi.org/10.1515/popets-2016-0035},
  doi          = {10.1515/POPETS-2016-0035},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/ToledoDG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/DanezisM16,
  author       = {George Danezis and
                  Sarah Meiklejohn},
  title        = {Centrally Banked Cryptocurrencies},
  booktitle    = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
                  2016, San Diego, California, USA, February 21-24, 2016},
  publisher    = {The Internet Society},
  year         = {2016},
  url          = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/centrally-banked-cryptocurrencies.pdf},
  timestamp    = {Thu, 17 Jun 2021 16:04:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/DanezisM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/MelisDC16,
  author       = {Luca Melis and
                  George Danezis and
                  Emiliano De Cristofaro},
  title        = {Efficient Private Statistics with Succinct Sketches},
  booktitle    = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
                  2016, San Diego, California, USA, February 21-24, 2016},
  publisher    = {The Internet Society},
  year         = {2016},
  url          = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/efficient-private-statistics-with-succinct-sketches.pdf},
  timestamp    = {Tue, 16 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/MelisDC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HayesD16,
  author       = {Jamie Hayes and
                  George Danezis},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {k-fingerprinting: {A} Robust Scalable Website Fingerprinting Technique},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {1187--1203},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/hayes},
  timestamp    = {Mon, 01 Feb 2021 08:43:18 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/HayesD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/IsaakidisHD16,
  author       = {Marios Isaakidis and
                  Harry Halpin and
                  George Danezis},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Sabrina De Capitani di Vimercati},
  title        = {UnlimitID: Privacy-Preserving Federated Identity Management using
                  Algebraic MACs},
  booktitle    = {Proceedings of the 2016 {ACM} on Workshop on Privacy in the Electronic
                  Society, WPES@CCS 2016, Vienna, Austria, October 24 - 28, 2016},
  pages        = {139--142},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2994637},
  timestamp    = {Tue, 06 Nov 2018 16:59:07 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/IsaakidisHD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/HayesTD16,
  author       = {Jamie Hayes and
                  Carmela Troncoso and
                  George Danezis},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Sabrina De Capitani di Vimercati},
  title        = {{TASP:} Towards Anonymity Sets that Persist},
  booktitle    = {Proceedings of the 2016 {ACM} on Workshop on Privacy in the Electronic
                  Society, WPES@CCS 2016, Vienna, Austria, October 24 - 28, 2016},
  pages        = {177--180},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2994635},
  timestamp    = {Sun, 05 Mar 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/HayesTD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ToledoDG16,
  author       = {Raphael R. Toledo and
                  George Danezis and
                  Ian Goldberg},
  title        = {Lower-Cost epsilon-Private Information Retrieval},
  journal      = {CoRR},
  volume       = {abs/1604.00223},
  year         = {2016},
  url          = {http://arxiv.org/abs/1604.00223},
  eprinttype    = {arXiv},
  eprint       = {1604.00223},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ToledoDG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BrandaoCD16,
  author       = {Lu{\'{\i}}s T. A. N. Brand{\~{a}}o and
                  Nicolas Christin and
                  George Danezis},
  title        = {A Public Comment on NCCoE's White Paper on Privacy-Enhancing Identity
                  Brokers},
  journal      = {CoRR},
  volume       = {abs/1611.02968},
  year         = {2016},
  url          = {http://arxiv.org/abs/1611.02968},
  eprinttype    = {arXiv},
  eprint       = {1611.02968},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BrandaoCD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/Danezis0PP16,
  author       = {George Danezis and
                  Stefan Katzenbeisser and
                  Christiane Peters and
                  Bart Preneel},
  title        = {Privacy and Security in Smart Energy Grids (Dagstuhl Seminar 16032)},
  journal      = {Dagstuhl Reports},
  volume       = {6},
  number       = {1},
  pages        = {99--107},
  year         = {2016},
  url          = {https://doi.org/10.4230/DagRep.6.1.99},
  doi          = {10.4230/DAGREP.6.1.99},
  timestamp    = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/Danezis0PP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PiotrowskaHGDH16,
  author       = {Ania M. Piotrowska and
                  Jamie Hayes and
                  Nethanel Gelernter and
                  George Danezis and
                  Amir Herzberg},
  title        = {AnoNotify: {A} Private Notification Service},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {466},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/466},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PiotrowskaHGDH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/BorisovDG15,
  author       = {Nikita Borisov and
                  George Danezis and
                  Ian Goldberg},
  title        = {{DP5:} {A} Private Presence Service},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2015},
  number       = {2},
  pages        = {4--24},
  year         = {2015},
  url          = {https://doi.org/10.1515/popets-2015-0008},
  doi          = {10.1515/POPETS-2015-0008},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/BorisovDG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/HayesD15,
  author       = {Jamie Hayes and
                  George Danezis},
  title        = {Guard Sets for Onion Routing},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2015},
  number       = {2},
  pages        = {65--80},
  year         = {2015},
  url          = {https://doi.org/10.1515/popets-2015-0017},
  doi          = {10.1515/POPETS-2015-0017},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/HayesD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/BrandaoCDa15,
  author       = {Lu{\'{\i}}s T. A. N. Brand{\~{a}}o and
                  Nicolas Christin and
                  George Danezis and
                  anonymous},
  title        = {Toward Mending Two Nation-Scale Brokered Identification Systems},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2015},
  number       = {2},
  pages        = {135--155},
  year         = {2015},
  url          = {https://doi.org/10.1515/popets-2015-0022},
  doi          = {10.1515/POPETS-2015-0022},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/BrandaoCDa15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChenABDP15,
  author       = {Chen Chen and
                  Daniele Enrico Asoni and
                  David Barrera and
                  George Danezis and
                  Adrian Perrig},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {{HORNET:} High-speed Onion Routing at the Network Layer},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {1441--1454},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813628},
  doi          = {10.1145/2810103.2813628},
  timestamp    = {Tue, 10 Nov 2020 19:58:09 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChenABDP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/DanezisDHHMTS15,
  author       = {George Danezis and
                  Josep Domingo{-}Ferrer and
                  Marit Hansen and
                  Jaap{-}Henk Hoepman and
                  Daniel Le M{\'{e}}tayer and
                  Rodica Tirtea and
                  Stefan Schiffner},
  title        = {Privacy and Data Protection by Design - from policy to engineering},
  journal      = {CoRR},
  volume       = {abs/1501.03726},
  year         = {2015},
  url          = {http://arxiv.org/abs/1501.03726},
  eprinttype    = {arXiv},
  eprint       = {1501.03726},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/DanezisDHHMTS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AlshahwanBCD15,
  author       = {Nadia Alshahwan and
                  Earl T. Barr and
                  David Clark and
                  George Danezis},
  title        = {Detecting Malware with Information Complexity},
  journal      = {CoRR},
  volume       = {abs/1502.07661},
  year         = {2015},
  url          = {http://arxiv.org/abs/1502.07661},
  eprinttype    = {arXiv},
  eprint       = {1502.07661},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/AlshahwanBCD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/DanezisM15,
  author       = {George Danezis and
                  Sarah Meiklejohn},
  title        = {Centrally Banked Cryptocurrencies},
  journal      = {CoRR},
  volume       = {abs/1505.06895},
  year         = {2015},
  url          = {http://arxiv.org/abs/1505.06895},
  eprinttype    = {arXiv},
  eprint       = {1505.06895},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/DanezisM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ChenABDP15,
  author       = {Chen Chen and
                  Daniele Enrico Asoni and
                  David Barrera and
                  George Danezis and
                  Adrian Perrig},
  title        = {{HORNET:} High-speed Onion Routing at the Network Layer},
  journal      = {CoRR},
  volume       = {abs/1507.05724},
  year         = {2015},
  url          = {http://arxiv.org/abs/1507.05724},
  eprinttype    = {arXiv},
  eprint       = {1507.05724},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ChenABDP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MelisDC15,
  author       = {Luca Melis and
                  George Danezis and
                  Emiliano De Cristofaro},
  title        = {Efficient Private Statistics with Succinct Sketches},
  journal      = {CoRR},
  volume       = {abs/1508.06110},
  year         = {2015},
  url          = {http://arxiv.org/abs/1508.06110},
  eprinttype    = {arXiv},
  eprint       = {1508.06110},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MelisDC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HayesD15,
  author       = {Jamie Hayes and
                  George Danezis},
  title        = {Better open-world website fingerprinting},
  journal      = {CoRR},
  volume       = {abs/1509.00789},
  year         = {2015},
  url          = {http://arxiv.org/abs/1509.00789},
  eprinttype    = {arXiv},
  eprint       = {1509.00789},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/HayesD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DanezisM15,
  author       = {George Danezis and
                  Sarah Meiklejohn},
  title        = {Centrally Banked Cryptocurrencies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {502},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/502},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DanezisM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DanezisFGK14,
  author       = {George Danezis and
                  C{\'{e}}dric Fournet and
                  Jens Groth and
                  Markulf Kohlweiss},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {Square Span Programs with Applications to Succinct {NIZK} Arguments},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8873},
  pages        = {532--550},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45611-8\_28},
  doi          = {10.1007/978-3-662-45611-8\_28},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DanezisFGK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ElahiDG14,
  author       = {Tariq Elahi and
                  George Danezis and
                  Ian Goldberg},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {PrivEx: Private Collection of Traffic Statistics for Anonymous Communication
                  Networks},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {1068--1079},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660280},
  doi          = {10.1145/2660267.2660280},
  timestamp    = {Tue, 10 Nov 2020 20:00:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ElahiDG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/DanezisC14,
  author       = {George Danezis and
                  Emiliano De Cristofaro},
  editor       = {Gail{-}Joon Ahn and
                  Anupam Datta},
  title        = {Fast and Private Genomic Testing for Disease Susceptibility},
  booktitle    = {Proceedings of the 13th Workshop on Privacy in the Electronic Society,
                  {WPES} 2014, Scottsdale, AZ, USA, November 3, 2014},
  pages        = {31--34},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2665943.2665952},
  doi          = {10.1145/2665943.2665952},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/DanezisC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/SharadD14,
  author       = {Kumar Sharad and
                  George Danezis},
  editor       = {Gail{-}Joon Ahn and
                  Anupam Datta},
  title        = {An Automated Social Graph De-anonymization Technique},
  booktitle    = {Proceedings of the 13th Workshop on Privacy in the Electronic Society,
                  {WPES} 2014, Scottsdale, AZ, USA, November 3, 2014},
  pages        = {47--58},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2665943.2665960},
  doi          = {10.1145/2665943.2665960},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/SharadD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SharadD14,
  author       = {Kumar Sharad and
                  George Danezis},
  title        = {An Automated Social Graph De-anonymization Technique},
  journal      = {CoRR},
  volume       = {abs/1408.1276},
  year         = {2014},
  url          = {http://arxiv.org/abs/1408.1276},
  eprinttype    = {arXiv},
  eprint       = {1408.1276},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/SharadD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DanezisFGK14,
  author       = {George Danezis and
                  C{\'{e}}dric Fournet and
                  Jens Groth and
                  Markulf Kohlweiss},
  title        = {Square Span Programs with Applications to Succinct {NIZK} Arguments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {718},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/718},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DanezisFGK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DanezisFKP13,
  author       = {George Danezis and
                  C{\'{e}}dric Fournet and
                  Markulf Kohlweiss and
                  Bryan Parno},
  editor       = {Martin Franz and
                  Andreas Holzer and
                  Rupak Majumdar and
                  Bryan Parno and
                  Helmut Veith},
  title        = {Pinocchio coin: building zerocoin from a succinct pairing-based proof
                  system},
  booktitle    = {PETShop'13, Proceedings of the 2013 {ACM} Workshop on Language Support
                  for Privacy-Enhancing Technologies, Co-located with {CCS} 2013, November
                  4, 2013, Berlin, Germany},
  pages        = {27--30},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517872.2517878},
  doi          = {10.1145/2517872.2517878},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/DanezisFKP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DanezisFKB13,
  author       = {George Danezis and
                  C{\'{e}}dric Fournet and
                  Markulf Kohlweiss and
                  Santiago Zanella B{\'{e}}guelin},
  editor       = {Benessa Defend and
                  Klaus Kursawe},
  title        = {Smart meter aggregation via secret-sharing},
  booktitle    = {SEGS'13, Proceedings of the 2013 {ACM} Workshop on Smart Energy Grid
                  Security, Co-located with {CCS} 2013, November 8, 2013, Berlin, Germany},
  pages        = {75--80},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2516930.2516944},
  doi          = {10.1145/2516930.2516944},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/DanezisFKB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BartheDGKB13,
  author       = {Gilles Barthe and
                  George Danezis and
                  Benjamin Gr{\'{e}}goire and
                  C{\'{e}}sar Kunz and
                  Santiago Zanella B{\'{e}}guelin},
  title        = {Verified Computational Differential Privacy with Applications to Smart
                  Metering},
  booktitle    = {2013 {IEEE} 26th Computer Security Foundations Symposium, New Orleans,
                  LA, USA, June 26-28, 2013},
  pages        = {287--301},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CSF.2013.26},
  doi          = {10.1109/CSF.2013.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BartheDGKB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/FournetKDL13,
  author       = {C{\'{e}}dric Fournet and
                  Markulf Kohlweiss and
                  George Danezis and
                  Zhengqin Luo},
  editor       = {Samuel T. King},
  title        = {{ZQL:} {A} Compiler for Privacy-Preserving Data Processing},
  booktitle    = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC,
                  USA, August 14-16, 2013},
  pages        = {163--178},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/fournet},
  timestamp    = {Mon, 01 Feb 2021 08:42:56 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/FournetKDL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/DanezisT13,
  author       = {George Danezis and
                  Carmela Troncoso},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Sara Foresti},
  title        = {You cannot hide for long: de-anonymization of real-world dynamic behaviour},
  booktitle    = {Proceedings of the 12th annual {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2013, Berlin, Germany, November 4, 2013},
  pages        = {49--60},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517840.2517846},
  doi          = {10.1145/2517840.2517846},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/DanezisT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Molina-MarkhamDFSI12,
  author       = {Andres Molina{-}Markham and
                  George Danezis and
                  Kevin Fu and
                  Prashant J. Shenoy and
                  David E. Irwin},
  editor       = {Angelos D. Keromytis},
  title        = {Designing Privacy-Preserving Smart Meters with Low-Cost Microcontrollers},
  booktitle    = {Financial Cryptography and Data Security - 16th International Conference,
                  {FC} 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7397},
  pages        = {239--253},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32946-3\_18},
  doi          = {10.1007/978-3-642-32946-3\_18},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/Molina-MarkhamDFSI12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/DanezisK12,
  author       = {George Danezis and
                  Emilia K{\"{a}}sper},
  editor       = {Matthias Kirchner and
                  Dipak Ghosal},
  title        = {The Dangers of Composing Anonymous Channels},
  booktitle    = {Information Hiding - 14th International Conference, {IH} 2012, Berkeley,
                  CA, USA, May 15-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7692},
  pages        = {191--206},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-36373-3\_13},
  doi          = {10.1007/978-3-642-36373-3\_13},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/DanezisK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/RialD12,
  author       = {Alfredo Rial and
                  George Danezis},
  editor       = {Helmut Reimer and
                  Norbert Pohlmann and
                  Wolfgang Schneider},
  title        = {Privacy-Preserving Smart Metering},
  booktitle    = {{ISSE} 2012 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2012 Conference, Brussels,
                  Belgium, October 23-24, 2012},
  pages        = {105--115},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-658-00333-3\_11},
  doi          = {10.1007/978-3-658-00333-3\_11},
  timestamp    = {Wed, 24 Apr 2019 16:36:13 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/RialD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/DanezisKLR12,
  author       = {George Danezis and
                  Markulf Kohlweiss and
                  Benjamin Livshits and
                  Alfredo Rial},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Matthew K. Wright},
  title        = {Private Client-Side Profiling with Random Forests and Hidden Markov
                  Models},
  booktitle    = {Privacy Enhancing Technologies - 12th International Symposium, {PETS}
                  2012, Vigo, Spain, July 11-13, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7384},
  pages        = {18--37},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31680-7\_2},
  doi          = {10.1007/978-3-642-31680-7\_2},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/DanezisKLR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2012,
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {http://dl.acm.org/citation.cfm?id=2382196},
  isbn         = {978-1-4503-1651-4},
  timestamp    = {Tue, 12 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2011,
  editor       = {George Danezis},
  title        = {Financial Cryptography and Data Security - 15th International Conference,
                  {FC} 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7035},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-27576-0},
  doi          = {10.1007/978-3-642-27576-0},
  isbn         = {978-3-642-27575-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2011w,
  editor       = {George Danezis and
                  Sven Dietrich and
                  Kazue Sako},
  title        = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS}
                  and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7126},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29889-9},
  doi          = {10.1007/978-3-642-29889-9},
  isbn         = {978-3-642-29888-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2011w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/TroncosoDKBP11,
  author       = {Carmela Troncoso and
                  George Danezis and
                  Eleni Kosta and
                  Josep Balasch and
                  Bart Preneel},
  title        = {PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {8},
  number       = {5},
  pages        = {742--755},
  year         = {2011},
  url          = {https://doi.org/10.1109/TDSC.2010.71},
  doi          = {10.1109/TDSC.2010.71},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/TroncosoDKBP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DanezisL11,
  author       = {George Danezis and
                  Benjamin Livshits},
  editor       = {Christian Cachin and
                  Thomas Ristenpart},
  title        = {Towards ensuring client-side computational integrity},
  booktitle    = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW}
                  2011, Chicago, IL, USA, October 21, 2011},
  pages        = {125--130},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046660.2046683},
  doi          = {10.1145/2046660.2046683},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DanezisL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/DanezisKR11,
  author       = {George Danezis and
                  Markulf Kohlweiss and
                  Alfredo Rial},
  editor       = {Tom{\'{a}}s Filler and
                  Tom{\'{a}}s Pevn{\'{y}} and
                  Scott Craver and
                  Andrew D. Ker},
  title        = {Differentially Private Billing with Rebates},
  booktitle    = {Information Hiding - 13th International Conference, {IH} 2011, Prague,
                  Czech Republic, May 18-20, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6958},
  pages        = {148--162},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24178-9\_11},
  doi          = {10.1007/978-3-642-24178-9\_11},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/DanezisKR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/ShokriTDHB11,
  author       = {Reza Shokri and
                  George Theodorakopoulos and
                  George Danezis and
                  Jean{-}Pierre Hubaux and
                  Jean{-}Yves Le Boudec},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Nicholas Hopper},
  title        = {Quantifying Location Privacy: The Case of Sporadic Location Exposure},
  booktitle    = {Privacy Enhancing Technologies - 11th International Symposium, {PETS}
                  2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6794},
  pages        = {57--76},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22263-4\_4},
  doi          = {10.1007/978-3-642-22263-4\_4},
  timestamp    = {Thu, 17 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/ShokriTDHB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/KursaweDK11,
  author       = {Klaus Kursawe and
                  George Danezis and
                  Markulf Kohlweiss},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Nicholas Hopper},
  title        = {Privacy-Friendly Aggregation for the Smart-Grid},
  booktitle    = {Privacy Enhancing Technologies - 11th International Symposium, {PETS}
                  2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6794},
  pages        = {175--191},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22263-4\_10},
  doi          = {10.1007/978-3-642-22263-4\_10},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/KursaweDK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/RialD11,
  author       = {Alfredo Rial and
                  George Danezis},
  editor       = {Yan Chen and
                  Jaideep Vaidya},
  title        = {Privacy-preserving smart metering},
  booktitle    = {Proceedings of the 10th annual {ACM} workshop on Privacy in the electronic
                  society, {WPES} 2011, Chicago, IL, USA, October 17, 2011},
  pages        = {49--60},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046556.2046564},
  doi          = {10.1145/2046556.2046564},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/RialD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2011,
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  publisher    = {{ACM}},
  year         = {2011},
  isbn         = {978-1-4503-0948-6},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DanezisKR11,
  author       = {George Danezis and
                  Markulf Kohlweiss and
                  Alfredo Rial},
  title        = {Differentially Private Billing with Rebates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {134},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/134},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DanezisKR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Molina-MarkhamDFSI11,
  author       = {Andres Molina{-}Markham and
                  George Danezis and
                  Kevin Fu and
                  Prashant J. Shenoy and
                  David E. Irwin},
  title        = {Designing Privacy-preserving Smart Meters with Low-cost Microcontrollers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {544},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/544},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Molina-MarkhamDFSI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/DanezisDTL10,
  author       = {George Danezis and
                  Claudia D{\'{\i}}az and
                  Carmela Troncoso and
                  Ben Laurie},
  editor       = {Mikhail J. Atallah and
                  Nicholas J. Hopper},
  title        = {Drac: An Architecture for Anonymous Low-Volume Communications},
  booktitle    = {Privacy Enhancing Technologies, 10th International Symposium, {PETS}
                  2010, Berlin, Germany, July 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6205},
  pages        = {202--219},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14527-8\_12},
  doi          = {10.1007/978-3-642-14527-8\_12},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/DanezisDTL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/DanezisACK10,
  author       = {George Danezis and
                  Tuomas Aura and
                  Shuo Chen and
                  Emre Kiciman},
  editor       = {Mikhail J. Atallah and
                  Nicholas J. Hopper},
  title        = {How to Share Your Favourite Search Results while Preserving Privacy
                  and Quality},
  booktitle    = {Privacy Enhancing Technologies, 10th International Symposium, {PETS}
                  2010, Berlin, Germany, July 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6205},
  pages        = {273--290},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14527-8\_16},
  doi          = {10.1007/978-3-642-14527-8\_16},
  timestamp    = {Wed, 01 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pet/DanezisACK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Danezis10,
  author       = {George Danezis},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {Generating Channel Ids in Virtual World Operating Systems (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {74--81},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_13},
  doi          = {10.1007/978-3-662-45921-8\_13},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Danezis10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/DanezisDS10,
  author       = {George Danezis and
                  Claudia D{\'{\i}}az and
                  Paul F. Syverson},
  editor       = {Burton Rosenberg},
  title        = {Anonymous Communication},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {341--389},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c13},
  doi          = {10.1201/9781420059823-C13},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/DanezisDS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asunam/BonneauAD09,
  author       = {Joseph Bonneau and
                  Jonathan Anderson and
                  George Danezis},
  editor       = {Nasrullah Memon and
                  Reda Alhajj},
  title        = {Prying Data out of a Social Network},
  booktitle    = {2009 International Conference on Advances in Social Network Analysis
                  and Mining, {ASONAM} 2009, 20-22 July 2009, Athens, Greece},
  pages        = {249--254},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ASONAM.2009.45},
  doi          = {10.1109/ASONAM.2009.45},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asunam/BonneauAD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Danezis09,
  author       = {George Danezis},
  editor       = {Dirk Balfanz and
                  Jessica Staddon},
  title        = {Inferring privacy policies for social networking services},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2009, Chicago, Illinois, USA, November 9, 2009},
  pages        = {5--10},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1654988.1654991},
  doi          = {10.1145/1654988.1654991},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Danezis09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TroncosoD09,
  author       = {Carmela Troncoso and
                  George Danezis},
  editor       = {Ehab Al{-}Shaer and
                  Somesh Jha and
                  Angelos D. Keromytis},
  title        = {The bayesian traffic analysis of mix networks},
  booktitle    = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages        = {369--379},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1653662.1653707},
  doi          = {10.1145/1653662.1653707},
  timestamp    = {Tue, 10 Nov 2020 19:58:07 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/TroncosoD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DanezisDKT09,
  author       = {George Danezis and
                  Claudia D{\'{\i}}az and
                  Emilia K{\"{a}}sper and
                  Carmela Troncoso},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {The Wisdom of Crowds: Attacks and Optimal Constructions},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {406--423},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_25},
  doi          = {10.1007/978-3-642-04444-1\_25},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DanezisDKT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/DanezisM09,
  author       = {George Danezis and
                  Prateek Mittal},
  title        = {SybilInfer: Detecting Sybil Nodes using Social Networks},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2009, San Diego, California, USA, 8th February - 11th February
                  2009},
  publisher    = {The Internet Society},
  year         = {2009},
  url          = {https://www.ndss-symposium.org/ndss2009/sybillnfer-detecting-sybil-nodes-using-social-networks/},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/DanezisM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/DanezisT09,
  author       = {George Danezis and
                  Carmela Troncoso},
  editor       = {Ian Goldberg and
                  Mikhail J. Atallah},
  title        = {Vida: How to Use Bayesian Inference to De-anonymize Persistent Communications},
  booktitle    = {Privacy Enhancing Technologies, 9th International Symposium, {PETS}
                  2009, Seattle, WA, USA, August 5-7, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5672},
  pages        = {56--72},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03168-7\_4},
  doi          = {10.1007/978-3-642-03168-7\_4},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/DanezisT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/DanezisG09,
  author       = {George Danezis and
                  Ian Goldberg},
  title        = {Sphinx: {A} Compact and Provably Secure Mix Format},
  booktitle    = {30th {IEEE} Symposium on Security and Privacy {(SP} 2009), 17-20 May
                  2009, Oakland, California, {USA}},
  pages        = {269--282},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SP.2009.15},
  doi          = {10.1109/SP.2009.15},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/DanezisG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Danezis09,
  author       = {George Danezis},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {The Least Privacy-Damaging Centralised Traffic Data Retention Architecture},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {87--92},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_13},
  doi          = {10.1007/978-3-642-36213-2\_13},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Danezis09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Danezis09a,
  author       = {George Danezis},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {The Least Privacy-Damaging Centralised Traffic Data Retention Architecture},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {93--110},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_14},
  doi          = {10.1007/978-3-642-36213-2\_14},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Danezis09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/LindqvistADKMMR09,
  author       = {Janne Lindqvist and
                  Tuomas Aura and
                  George Danezis and
                  Teemu Koponen and
                  Annu Myllyniemi and
                  Jussi M{\"{a}}ki and
                  Michael Roe},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {Privacy-preserving 802.11 access-point discovery},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {123--130},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514293},
  doi          = {10.1145/1514274.1514293},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/LindqvistADKMMR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/DanezisS08,
  author       = {George Danezis and
                  Paul F. Syverson},
  editor       = {Nikita Borisov and
                  Ian Goldberg},
  title        = {Bridging and Fingerprinting: Epistemic Attacks on Route Selection},
  booktitle    = {Privacy Enhancing Technologies, 8th International Symposium, {PETS}
                  2008, Leuven, Belgium, July 23-25, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5134},
  pages        = {151--166},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70630-4\_10},
  doi          = {10.1007/978-3-540-70630-4\_10},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/DanezisS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/DanezisS08a,
  author       = {George Danezis and
                  Len Sassaman},
  editor       = {Nikita Borisov and
                  Ian Goldberg},
  title        = {How to Bypass Two Anonymity Revocation Schemes},
  booktitle    = {Privacy Enhancing Technologies, 8th International Symposium, {PETS}
                  2008, Leuven, Belgium, July 23-25, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5134},
  pages        = {187--201},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70630-4\_12},
  doi          = {10.1007/978-3-540-70630-4\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/DanezisS08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/CvrcekD08,
  author       = {Daniel Cvrcek and
                  George Danezis},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Fighting the 'Good' Internet War},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {3--11},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_2},
  doi          = {10.1007/978-3-642-22137-8\_2},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/CvrcekD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Danezis08,
  author       = {George Danezis},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Covert Communications Despite Traffic Data Retention},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {198--214},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_27},
  doi          = {10.1007/978-3-642-22137-8\_27},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Danezis08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Danezis08a,
  author       = {George Danezis},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Covert Communications Despite Traffic Data Retention (Transcript of
                  Discussion)},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {215--219},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_28},
  doi          = {10.1007/978-3-642-22137-8\_28},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Danezis08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/MulderDBP08,
  author       = {Yoni De Mulder and
                  George Danezis and
                  Lejla Batina and
                  Bart Preneel},
  editor       = {Vijay Atluri and
                  Marianne Winslett},
  title        = {Identification via location-profiling in {GSM} networks},
  booktitle    = {Proceedings of the 2008 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {23--32},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456403.1456409},
  doi          = {10.1145/1456403.1456409},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/MulderDBP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DanezisG08,
  author       = {George Danezis and
                  Ian Goldberg},
  title        = {Sphinx: {A} Compact and Provably Secure Mix Format},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {475},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/475},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DanezisG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Danezis07,
  author       = {George Danezis},
  title        = {Breaking four mix-related schemes based on Universal Re-encryption},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {6},
  pages        = {393--402},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-007-0033-y},
  doi          = {10.1007/S10207-007-0033-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/Danezis07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BorisovDMT07,
  author       = {Nikita Borisov and
                  George Danezis and
                  Prateek Mittal and
                  Parisa Tabriz},
  editor       = {Peng Ning and
                  Sabrina De Capitani di Vimercati and
                  Paul F. Syverson},
  title        = {Denial of service or denial of security?},
  booktitle    = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages        = {92--102},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1315245.1315258},
  doi          = {10.1145/1315245.1315258},
  timestamp    = {Tue, 10 Nov 2020 20:00:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BorisovDMT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/DanezisD07,
  author       = {George Danezis and
                  Claudia D{\'{\i}}az},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Space-Efficient Private Search with Applications to Rateless Codes},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {148--162},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_15},
  doi          = {10.1007/978-3-540-77366-5\_15},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/DanezisD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/DanezisDFKTP07,
  author       = {George Danezis and
                  Claudia D{\'{\i}}az and
                  Sebastian Faust and
                  Emilia K{\"{a}}sper and
                  Carmela Troncoso and
                  Bart Preneel},
  editor       = {Juan A. Garay and
                  Arjen K. Lenstra and
                  Masahiro Mambo and
                  Ren{\'{e}} Peralta},
  title        = {Efficient Negative Databases from Cryptographic Hash Functions},
  booktitle    = {Information Security, 10th International Conference, {ISC} 2007, Valpara{\'{\i}}so,
                  Chile, October 9-12, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4779},
  pages        = {423--436},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75496-1\_28},
  doi          = {10.1007/978-3-540-75496-1\_28},
  timestamp    = {Fri, 03 Feb 2023 21:39:19 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/DanezisDFKTP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/DanezisDT07,
  author       = {George Danezis and
                  Claudia D{\'{\i}}az and
                  Carmela Troncoso},
  editor       = {Nikita Borisov and
                  Philippe Golle},
  title        = {Two-Sided Statistical Disclosure Attack},
  booktitle    = {Privacy Enhancing Technologies, 7th International Symposium, {PET}
                  2007 Ottawa, Canada, June 20-22, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4776},
  pages        = {30--44},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75551-7\_3},
  doi          = {10.1007/978-3-540-75551-7\_3},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/DanezisDT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/DanezisL07,
  author       = {George Danezis and
                  Ben Laurie},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Private Yet Abuse Resistant Open Publishing},
  booktitle    = {Security Protocols - 15th International Workshop, Brno, Czech Republic,
                  April 18-20, 2007. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5964},
  pages        = {222--243},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-17773-6\_28},
  doi          = {10.1007/978-3-642-17773-6\_28},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/DanezisL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Danezis07,
  author       = {George Danezis},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Private Yet Abuse Resistant Open Publishing (Transcript of Discussion)},
  booktitle    = {Security Protocols - 15th International Workshop, Brno, Czech Republic,
                  April 18-20, 2007. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5964},
  pages        = {244--255},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-17773-6\_29},
  doi          = {10.1007/978-3-642-17773-6\_29},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Danezis07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/DiazTD07,
  author       = {Claudia D{\'{\i}}az and
                  Carmela Troncoso and
                  George Danezis},
  editor       = {Peng Ning and
                  Ting Yu},
  title        = {Does additional information always reduce anonymity?},
  booktitle    = {Proceedings of the 2007 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2007, Alexandria, VA, USA, October 29, 2007},
  pages        = {72--75},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314333.1314347},
  doi          = {10.1145/1314333.1314347},
  timestamp    = {Mon, 04 Apr 2022 16:00:14 +0200},
  biburl       = {https://dblp.org/rec/conf/wpes/DiazTD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/TroncosoDKP07,
  author       = {Carmela Troncoso and
                  George Danezis and
                  Eleni Kosta and
                  Bart Preneel},
  editor       = {Peng Ning and
                  Ting Yu},
  title        = {Pripayd: privacy friendly pay-as-you-drive insurance},
  booktitle    = {Proceedings of the 2007 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2007, Alexandria, VA, USA, October 29, 2007},
  pages        = {99--107},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314333.1314353},
  doi          = {10.1145/1314333.1314353},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/TroncosoDKP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/Danezis06,
  author       = {George Danezis},
  editor       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  Michael Backes and
                  Stefanos Gritzalis and
                  Bart Preneel},
  title        = {Breaking Four Mix-Related Schemes Based on Universal Re-encryption},
  booktitle    = {Information Security, 9th International Conference, {ISC} 2006, Samos
                  Island, Greece, August 30 - September 2, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4176},
  pages        = {46--59},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11836810\_4},
  doi          = {10.1007/11836810\_4},
  timestamp    = {Thu, 29 Aug 2019 08:10:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/Danezis06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/BondD06,
  author       = {Mike Bond and
                  George Danezis},
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {A pact with the devil},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2006, Schloss Dagstuhl,
                  Germany, September 19-22, 2006},
  pages        = {77--82},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://dl.acm.org/citation.cfm?id=1278952},
  timestamp    = {Thu, 29 Nov 2018 11:17:10 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/BondD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/p2p/DanezisC06,
  author       = {George Danezis and
                  Richard Clayton},
  editor       = {Alberto Montresor and
                  Adam Wierzbicki and
                  Nahid Shahmehri},
  title        = {Route Fingerprinting in Anonymous Communications},
  booktitle    = {Sixth {IEEE} International Conference on Peer-to-Peer Computing {(P2P}
                  2006), 2-4 October 2006, Cambridge, United Kingdom},
  pages        = {69--72},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/P2P.2006.33},
  doi          = {10.1109/P2P.2006.33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/p2p/DanezisC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/CvrcekKMD06,
  author       = {Daniel Cvrcek and
                  Marek Kumpost and
                  Vashek Matyas and
                  George Danezis},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {The Value of Location Information},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {112--121},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_15},
  doi          = {10.1007/978-3-642-04904-0\_15},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/CvrcekKMD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/DanezisW06,
  author       = {George Danezis and
                  Bettina Wittneben},
  title        = {The Economics of Mass Surveillance and the Questionable Value of Anonymous
                  Communications},
  booktitle    = {5th Annual Workshop on the Economics of Information Security, {WEIS}
                  2006, Robinson College, University of Cambridge, England, UK, June
                  26-28, 2006},
  year         = {2006},
  url          = {http://weis2006.econinfosec.org/docs/36.pdf},
  timestamp    = {Thu, 22 Jul 2021 16:15:46 +0200},
  biburl       = {https://dblp.org/rec/conf/weis/DanezisW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/CvrcekKMD06,
  author       = {Daniel Cvrcek and
                  Marek Kumpost and
                  Vashek Matyas and
                  George Danezis},
  editor       = {Ari Juels and
                  Marianne Winslett},
  title        = {A study on the value of location privacy},
  booktitle    = {Proceedings of the 2006 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2006, Alexandria, VA, USA, October 30, 2006},
  pages        = {109--118},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179601.1179621},
  doi          = {10.1145/1179601.1179621},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/CvrcekKMD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pet/2005,
  editor       = {George Danezis and
                  David M. Martin Jr.},
  title        = {Privacy Enhancing Technologies, 5th International Workshop, {PET}
                  2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3856},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11767831},
  doi          = {10.1007/11767831},
  isbn         = {3-540-34745-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pet/2006,
  editor       = {George Danezis and
                  Philippe Golle},
  title        = {Privacy Enhancing Technologies, 6th International Workshop, {PET}
                  2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4258},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11957454},
  doi          = {10.1007/11957454},
  isbn         = {3-540-68790-4},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DanezisD06,
  author       = {George Danezis and
                  Claudia D{\'{\i}}az},
  title        = {Improving the Decoding Efficiency of Private Search},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {24},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/024},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DanezisD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/DanezisA05,
  author       = {George Danezis and
                  Ross J. Anderson},
  title        = {The Economics of Resisting Censorship},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {3},
  number       = {1},
  pages        = {45--50},
  year         = {2005},
  url          = {https://doi.org/10.1109/MSP.2005.29},
  doi          = {10.1109/MSP.2005.29},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/DanezisA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DanezisLKA05,
  author       = {George Danezis and
                  Chris Lesniewski{-}Laas and
                  M. Frans Kaashoek and
                  Ross J. Anderson},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {Sybil-Resistant {DHT} Routing},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {305--318},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_18},
  doi          = {10.1007/11555827\_18},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DanezisLKA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/DanezisC05,
  author       = {George Danezis and
                  Jolyon Clulow},
  editor       = {Mauro Barni and
                  Jordi Herrera{-}Joancomart{\'{\i}} and
                  Stefan Katzenbeisser and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Compulsion Resistant Anonymous Communications},
  booktitle    = {Information Hiding, 7th International Workshop, {IH} 2005, Barcelona,
                  Spain, June 6-8, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3727},
  pages        = {11--25},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11558859\_2},
  doi          = {10.1007/11558859\_2},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/DanezisC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MurdochD05,
  author       = {Steven J. Murdoch and
                  George Danezis},
  title        = {Low-Cost Traffic Analysis of Tor},
  booktitle    = {2005 {IEEE} Symposium on Security and Privacy (S{\&}P 2005), 8-11
                  May 2005, Oakland, CA, {USA}},
  pages        = {183--195},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/SP.2005.12},
  doi          = {10.1109/SP.2005.12},
  timestamp    = {Thu, 21 Sep 2023 15:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/MurdochD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BondD05,
  author       = {Mike Bond and
                  George Danezis},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {The Dining Freemasons (Security Protocols for Secret Societies)},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {258--265},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_32},
  doi          = {10.1007/978-3-540-77156-2\_32},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BondD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/DanezisLA05,
  author       = {George Danezis and
                  Stephen Lewis and
                  Ross J. Anderson},
  title        = {How Much Is Location Privacy Worth?},
  booktitle    = {4th Annual Workshop on the Economics of Information Security, {WEIS}
                  2005, Harvard University, Cambridge, MA, USA, June 1-3, 2005},
  year         = {2005},
  url          = {http://infosecon.net/workshop/pdf/location-privacy.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/weis/DanezisLA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/DanezisD05,
  author       = {George Danezis and
                  Claudia D{\'{\i}}az},
  editor       = {Shlomi Dolev and
                  Rafail Ostrovsky and
                  Andreas Pfitzmann},
  title        = {Improving the Decoding Efficiency of Private Search},
  booktitle    = {Anonymous Communication and its Applications, 09.10. - 14.10.2005},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {05411},
  publisher    = {Internationales Begegnungs- und Forschungszentrum f{\"{u}}r Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2005},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2006/482},
  timestamp    = {Thu, 10 Jun 2021 13:02:08 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/DanezisD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ethos/Danezis04,
  author       = {George Danezis},
  title        = {Better anonymous communications},
  school       = {University of Cambridge, {UK}},
  year         = {2004},
  url          = {https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.616002},
  timestamp    = {Tue, 05 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ethos/Danezis04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/DanezisS04,
  author       = {George Danezis and
                  Andrei Serjantov},
  editor       = {Jessica J. Fridrich},
  title        = {Statistical Disclosure or Intersection Attacks on Anonymity Systems},
  booktitle    = {Information Hiding, 6th International Workshop, {IH} 2004, Toronto,
                  Canada, May 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3200},
  pages        = {293--308},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30114-1\_21},
  doi          = {10.1007/978-3-540-30114-1\_21},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/DanezisS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/Danezis04,
  author       = {George Danezis},
  editor       = {David M. Martin Jr. and
                  Andrei Serjantov},
  title        = {The Traffic Analysis of Continuous-Time Mixes},
  booktitle    = {Privacy Enhancing Technologies, 4th International Workshop, {PET}
                  2004, Toronto, Canada, May 26-28, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3424},
  pages        = {35--50},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11423409\_3},
  doi          = {10.1007/11423409\_3},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/Danezis04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/DiazDGPS04,
  author       = {Claudia D{\'{\i}}az and
                  George Danezis and
                  Christian Grothoff and
                  Andreas Pfitzmann and
                  Paul F. Syverson},
  editor       = {David M. Martin Jr. and
                  Andrei Serjantov},
  title        = {Panel Discussion - Mix Cascades Versus Peer-to-Peer: Is One Concept
                  Superior?},
  booktitle    = {Privacy Enhancing Technologies, 4th International Workshop, {PET}
                  2004, Toronto, Canada, May 26-28, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3424},
  pages        = {242--242},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11423409\_15},
  doi          = {10.1007/11423409\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/DiazDGPS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/BohmeDDKP04,
  author       = {Rainer B{\"{o}}hme and
                  George Danezis and
                  Claudia D{\'{\i}}az and
                  Stefan K{\"{o}}psell and
                  Andreas Pfitzmann},
  editor       = {David M. Martin Jr. and
                  Andrei Serjantov},
  title        = {On the {PET} Workshop Panel "Mix Cascades Versus Peer-to-Peer:
                  Is One Concept Superior?"},
  booktitle    = {Privacy Enhancing Technologies, 4th International Workshop, {PET}
                  2004, Toronto, Canada, May 26-28, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3424},
  pages        = {243--255},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11423409\_16},
  doi          = {10.1007/11423409\_16},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/BohmeDDKP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/DanezisL04,
  author       = {George Danezis and
                  Ben Laurie},
  editor       = {Vijay Atluri and
                  Paul F. Syverson and
                  Sabrina De Capitani di Vimercati},
  title        = {Minx: a simple and efficient anonymous packet format},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2004, Washington, DC, USA, October 28, 2004},
  pages        = {59--65},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029179.1029198},
  doi          = {10.1145/1029179.1029198},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/DanezisL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/Danezis03,
  author       = {George Danezis},
  editor       = {Roger Dingledine},
  title        = {Mix-Networks with Restricted Routes},
  booktitle    = {Privacy Enhancing Technologies, Third International Workshop, {PET}
                  2003, Dresden, Germany, March 26-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2760},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40956-4\_1},
  doi          = {10.1007/978-3-540-40956-4\_1},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/Danezis03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/Danezis03,
  author       = {George Danezis},
  editor       = {Dimitris Gritzalis and
                  Sabrina De Capitani di Vimercati and
                  Pierangela Samarati and
                  Sokratis K. Katsikas},
  title        = {Statistical Disclosure Attacks},
  booktitle    = {Security and Privacy in the Age of Uncertainty, {IFIP} {TC11} 18\({}^{\mbox{th}}\)
                  International Conference on Information Security (SEC2003), May 26-28,
                  2003, Athens, Greece},
  series       = {{IFIP} Conference Proceedings},
  volume       = {250},
  pages        = {421--426},
  publisher    = {Kluwer},
  year         = {2003},
  timestamp    = {Fri, 25 Apr 2003 10:12:34 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/Danezis03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/DanezisDM03,
  author       = {George Danezis and
                  Roger Dingledine and
                  Nick Mathewson},
  title        = {Mixminion: Design of a Type {III} Anonymous Remailer Protocol},
  booktitle    = {2003 {IEEE} Symposium on Security and Privacy (S{\&}P 2003), 11-14
                  May 2003, Berkeley, CA, {USA}},
  pages        = {2--15},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/SECPRI.2003.1199323},
  doi          = {10.1109/SECPRI.2003.1199323},
  timestamp    = {Thu, 21 Sep 2023 15:57:30 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/DanezisDM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/DanezisS03,
  author       = {George Danezis and
                  Len Sassaman},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Paul F. Syverson},
  title        = {Heartbeat traffic to counter (n-1) attacks: red-green-black mixes},
  booktitle    = {Proceedings of the 2003 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2003, Washington, DC, USA, October 30, 2003},
  pages        = {89--93},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/1005140.1005154},
  doi          = {10.1145/1005140.1005154},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/DanezisS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ClaytonD02,
  author       = {Richard Clayton and
                  George Danezis},
  editor       = {Fabien A. P. Petitcolas},
  title        = {Chaffinch: Confidentiality in the Face of Legal Threats},
  booktitle    = {Information Hiding, 5th International Workshop, {IH} 2002, Noordwijkerhout,
                  The Netherlands, October 7-9, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2578},
  pages        = {70--86},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36415-3\_5},
  doi          = {10.1007/3-540-36415-3\_5},
  timestamp    = {Sun, 02 Oct 2022 16:07:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ClaytonD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/SerjantovD02,
  author       = {Andrei Serjantov and
                  George Danezis},
  editor       = {Roger Dingledine and
                  Paul F. Syverson},
  title        = {Towards an Information Theoretic Metric for Anonymity},
  booktitle    = {Privacy Enhancing Technologies, Second International Workshop, {PET}
                  2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2482},
  pages        = {41--53},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36467-6\_4},
  doi          = {10.1007/3-540-36467-6\_4},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/SerjantovD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ClaytonDK01,
  author       = {Richard Clayton and
                  George Danezis and
                  Markus G. Kuhn},
  editor       = {Ira S. Moskowitz},
  title        = {Real World Patterns of Failure in Anonymity Systems},
  booktitle    = {Information Hiding, 4th International Workshop, {IHW} 2001, Pittsburgh,
                  PA, USA, April 25-27, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2137},
  pages        = {230--244},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45496-9\_17},
  doi          = {10.1007/3-540-45496-9\_17},
  timestamp    = {Wed, 16 Mar 2022 23:55:28 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/ClaytonDK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Danezis00,
  author       = {George Danezis},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {An Anonymous Auction Protocol Using "Money Escrow" (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {223--233},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_29},
  doi          = {10.1007/3-540-44810-1\_29},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Danezis00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics