default search action
George Danezis
Person information
- affiliation: Microsoft Research
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c96]Sam Blackshear, Andrey Chursin, George Danezis, Anastasios Kichidis, Lefteris Kokoris-Kogias, Xun Li, Mark Logan, Ashok Menon, Todd Nowacki, Alberto Sonnino, Brandon Williams, Lu Zhang:
Sui Lutris: A Blockchain Combining Broadcast and Consensus. CCS 2024: 2606-2620 - [i46]George Danezis, Lefteris Kokoris-Kogias, Alberto Sonnino, Mingwei Tian:
Obelia: Scaling DAG-Based Blockchains to Hundreds of Validators. CoRR abs/2410.08701 (2024) - 2023
- [c95]Rati Gelashvili, Alexander Spiegelman, Zhuolun Xiang, George Danezis, Zekun Li, Dahlia Malkhi, Yu Xia, Runtian Zhou:
Block-STM: Scaling Blockchain Execution by Turning Ordering Curse to a Performance Blessing. PPoPP 2023: 232-244 - [c94]Mathieu Baudet, Alberto Sonnino, Mahimna Kelkar, George Danezis:
Zef: Low-latency, Scalable, Private Payments. WPES@CCS 2023: 1-16 - [i45]Lefteris Kokoris-Kogias, Alberto Sonnino, George Danezis:
Cuttlefish: Expressive Fast Path Blockchains with FastUnlock. CoRR abs/2309.12715 (2023) - [i44]Kushal Babel, Andrey Chursin, George Danezis, Lefteris Kokoris-Kogias, Alberto Sonnino:
Mysticeti: Low-Latency DAG Consensus with Fast Commit Path. CoRR abs/2310.14821 (2023) - [i43]Sam Blackshear, Andrey Chursin, George Danezis, Anastasios Kichidis, Lefteris Kokoris-Kogias, Xun Li, Mark Logan, Ashok Menon, Todd Nowacki, Alberto Sonnino, Brandon Williams, Lu Zhang:
Sui Lutris: A Blockchain Combining Broadcast and Consensus. CoRR abs/2310.18042 (2023) - [i42]Alireza Kavousi, Duc Viet Le, Philipp Jovanovic, George Danezis:
BlindPerm: Efficient MEV Mitigation with an Encrypted Mempool and Permutation. IACR Cryptol. ePrint Arch. 2023: 1061 (2023) - 2022
- [c93]George Danezis, Lefteris Kokoris-Kogias, Alberto Sonnino, Alexander Spiegelman:
Narwhal and Tusk: a DAG-based mempool and efficient BFT consensus. EuroSys 2022: 34-50 - [i41]Mathieu Baudet, Alberto Sonnino, Mahimna Kelkar, George Danezis:
Zef: Low-latency, Scalable, Private Payments. CoRR abs/2201.05671 (2022) - [i40]Rati Gelashvili, Alexander Spiegelman, Zhuolun Xiang, George Danezis, Zekun Li, Yu Xia, Runtian Zhou, Dahlia Malkhi:
Block-STM: Scaling Blockchain Execution by Turning Ordering Curse to a Performance Blessing. CoRR abs/2203.06871 (2022) - [i39]Mathieu Baudet, Alberto Sonnino, Mahimna Kelkar, George Danezis:
Zef: Low-latency, Scalable, Private Payments. IACR Cryptol. ePrint Arch. 2022: 83 (2022) - 2021
- [c92]Maria Anna Schett, George Danezis:
Embedding a Deterministic BFT Protocol in a Block DAG. PODC 2021: 177-186 - [i38]Maria Anna Schett, George Danezis:
Embedding a Deterministic BFT Protocol in a Block DAG. CoRR abs/2102.09594 (2021) - [i37]George Danezis, Eleftherios Kokoris-Kogias, Alberto Sonnino, Alexander Spiegelman:
Narwhal and Tusk: A DAG-based Mempool and Efficient BFT Consensus. CoRR abs/2105.11827 (2021) - 2020
- [j13]Nadia Alshahwan, Earl T. Barr, David Clark, George Danezis, Héctor D. Menéndez:
Detecting Malware with Information Complexity. Entropy 22(5): 575 (2020) - [c91]Mathieu Baudet, George Danezis, Alberto Sonnino:
FastPay: High-Performance Byzantine Fault Tolerant Settlement. AFT 2020: 163-177 - [c90]Sarah Azouvi, George Danezis, Valeria Nikolaenko:
Winkle: Foiling Long-Range Attacks in Proof-of-Stake Systems. AFT 2020: 189-201 - [c89]Alberto Sonnino, Shehar Bano, Mustafa Al-Bassam, George Danezis:
Replay Attacks and Defenses Against Cross-shard Consensus in Sharded Distributed Ledgers. EuroS&P 2020: 294-308 - [i36]Mathieu Baudet, George Danezis, Alberto Sonnino:
FastPay: High-Performance Byzantine Fault Tolerant Settlement. CoRR abs/2003.11506 (2020)
2010 – 2019
- 2019
- [j12]Jamie Hayes, Luca Melis, George Danezis, Emiliano De Cristofaro:
LOGAN: Membership Inference Attacks Against Generative Models. Proc. Priv. Enhancing Technol. 2019(1): 133-152 (2019) - [c88]Shehar Bano, Alberto Sonnino, Mustafa Al-Bassam, Sarah Azouvi, Patrick McCorry, Sarah Meiklejohn, George Danezis:
SoK: Consensus in the Age of Blockchains. AFT 2019: 183-198 - [c87]Alberto Sonnino, Mustafa Al-Bassam, Shehar Bano, Sarah Meiklejohn, George Danezis:
Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers. NDSS 2019 - [c86]Hemi Leibowitz, Ania M. Piotrowska, George Danezis, Amir Herzberg:
No Right to Remain Silent: Isolating Malicious Mixes. USENIX Security Symposium 2019: 1841-1858 - [i35]Alberto Sonnino, Shehar Bano, Mustafa Al-Bassam, George Danezis:
Replay Attacks and Defenses against Cross-shard Consensus in Sharded Distributed Ledgers. CoRR abs/1901.11218 (2019) - [i34]Alberto Sonnino, George Danezis:
SybilQuorum: Open Distributed Ledgers Through Trust Networks. CoRR abs/1906.12237 (2019) - [i33]Sarah Azouvi, George Danezis, Valeria Nikolaenko:
Winkle: Foiling Long-Range Attacks in Proof-of-Stake Systems. IACR Cryptol. ePrint Arch. 2019: 1440 (2019) - 2018
- [j11]Awais Rashid, George Danezis, Howard Chivers, Emil Lupu, Andrew Martin, Makayla Lewis, Claudia Peersman:
Scoping the Cyber Security Body of Knowledge. IEEE Secur. Priv. 16(3): 96-102 (2018) - [j10]Alfredo Rial, George Danezis, Markulf Kohlweiss:
Privacy-preserving smart metering revisited. Int. J. Inf. Sec. 17(1): 1-31 (2018) - [c85]Chen Chen, Daniele Enrico Asoni, Adrian Perrig, David Barrera, George Danezis, Carmela Troncoso:
TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer. EuroS&P 2018: 137-152 - [c84]Mustafa Al-Bassam, Alberto Sonnino, Shehar Bano, Dave Hrycyszyn, George Danezis:
Chainspace: A Sharded Smart Contracts Platform. NDSS 2018 - [c83]Jamie Hayes, George Danezis:
Learning Universal Adversarial Perturbations with Generative Models. IEEE Symposium on Security and Privacy Workshops 2018: 43-49 - [c82]Bogdan Kulynych, Wouter Lueks, Marios Isaakidis, George Danezis, Carmela Troncoso:
ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging. WPES@CCS 2018: 86-103 - [i32]Alberto Sonnino, Mustafa Al-Bassam, Shehar Bano, George Danezis:
Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers. CoRR abs/1802.07344 (2018) - [i31]Chen Chen, Daniele Enrico Asoni, Adrian Perrig, David Barrera, George Danezis, Carmela Troncoso:
TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer. CoRR abs/1802.08415 (2018) - [i30]George Danezis, Dave Hrycyszyn:
Blockmania: from Block DAGs to Consensus. CoRR abs/1809.01620 (2018) - 2017
- [j9]Carmela Troncoso, Marios Isaakidis, George Danezis, Harry Halpin:
Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments. Proc. Priv. Enhancing Technol. 2017(4): 404-426 (2017) - [j8]Shehar Bano, Mustafa Al-Bassam, George Danezis:
The Road to Scalable Blockchain Designs. login Usenix Mag. 42(4) (2017) - [c81]Vasilios Mavroudis, Andrea Cerulli, Petr Svenda, Dan Cvrcek, Dusan Klinec, George Danezis:
A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components. CCS 2017: 1583-1600 - [c80]Jamie Hayes, George Danezis:
Generating steganographic images via adversarial training. NIPS 2017: 1954-1963 - [c79]John P. Podolanko, Revanth Pobala, Hussain Mucklai, George Danezis, Matthew Wright:
LiLAC: Lightweight Low-Latency Anonymous Chat. PAC 2017: 141-151 - [c78]Ania M. Piotrowska, Jamie Hayes, Tariq Elahi, Sebastian Meiser, George Danezis:
The Loopix Anonymity System. USENIX Security Symposium 2017: 1199-1216 - [c77]Ania M. Piotrowska, Jamie Hayes, Nethanel Gelernter, George Danezis, Amir Herzberg:
AnNotify: A Private Notification Service. WPES@CCS 2017: 5-15 - [c76]Raphael R. Toledo, George Danezis, Isao Echizen:
Mix-ORAM: Using Delegated Shuffles. WPES@CCS 2017: 51-61 - [i29]Jamie Hayes, George Danezis:
ste-GAN-ography: Generating Steganographic Images via Adversarial Training. CoRR abs/1703.00371 (2017) - [i28]Ania M. Piotrowska, Jamie Hayes, Tariq Elahi, Sebastian Meiser, George Danezis:
The Loopix Anonymity System. CoRR abs/1703.00536 (2017) - [i27]Carmela Troncoso, George Danezis, Marios Isaakidis, Harry Halpin:
Systematizing Decentralization and Privacy: Lessons from 15 years of research and deployments. CoRR abs/1704.08065 (2017) - [i26]Jamie Hayes, Luca Melis, George Danezis, Emiliano De Cristofaro:
LOGAN: Evaluating Privacy Leakage of Generative Models Using Generative Adversarial Networks. CoRR abs/1705.07663 (2017) - [i25]Bogdan Kulynych, Marios Isaakidis, Carmela Troncoso, George Danezis:
ClaimChain: Decentralized Public Key Infrastructure. CoRR abs/1707.06279 (2017) - [i24]Mustafa Al-Bassam, Alberto Sonnino, Shehar Bano, Dave Hrycyszyn, George Danezis:
Chainspace: A Sharded Smart Contracts Platform. CoRR abs/1708.03778 (2017) - [i23]Jamie Hayes, George Danezis:
Machine Learning as an Adversarial Service: Learning Black-Box Adversarial Examples. CoRR abs/1708.05207 (2017) - [i22]Raphael R. Toledo, George Danezis, Isao Echizen:
Mix-ORAM: Using delegate shuffles. CoRR abs/1709.01008 (2017) - [i21]Vasilios Mavroudis, Andrea Cerulli, Petr Svenda, Dan Cvrcek, Dusan Klinec, George Danezis:
A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components. CoRR abs/1709.03817 (2017) - [i20]Shehar Bano, Alberto Sonnino, Mustafa Al-Bassam, Sarah Azouvi, Patrick McCorry, Sarah Meiklejohn, George Danezis:
Consensus in the Age of Blockchains. CoRR abs/1711.03936 (2017) - [i19]Hemi Leibowitz, Ania M. Piotrowska, George Danezis, Amir Herzberg:
No right to remain silent: Isolating Malicious Mixes. IACR Cryptol. ePrint Arch. 2017: 1000 (2017) - 2016
- [j7]Raphael R. Toledo, George Danezis, Ian Goldberg:
Lower-Cost ∈-Private Information Retrieval. Proc. Priv. Enhancing Technol. 2016(4): 184-201 (2016) - [c75]George Danezis, Sarah Meiklejohn:
Centrally Banked Cryptocurrencies. NDSS 2016 - [c74]Luca Melis, George Danezis, Emiliano De Cristofaro:
Efficient Private Statistics with Succinct Sketches. NDSS 2016 - [c73]Jamie Hayes, George Danezis:
k-fingerprinting: A Robust Scalable Website Fingerprinting Technique. USENIX Security Symposium 2016: 1187-1203 - [c72]Marios Isaakidis, Harry Halpin, George Danezis:
UnlimitID: Privacy-Preserving Federated Identity Management using Algebraic MACs. WPES@CCS 2016: 139-142 - [c71]Jamie Hayes, Carmela Troncoso, George Danezis:
TASP: Towards Anonymity Sets that Persist. WPES@CCS 2016: 177-180 - [i18]Raphael R. Toledo, George Danezis, Ian Goldberg:
Lower-Cost epsilon-Private Information Retrieval. CoRR abs/1604.00223 (2016) - [i17]Luís T. A. N. Brandão, Nicolas Christin, George Danezis:
A Public Comment on NCCoE's White Paper on Privacy-Enhancing Identity Brokers. CoRR abs/1611.02968 (2016) - [i16]George Danezis, Stefan Katzenbeisser, Christiane Peters, Bart Preneel:
Privacy and Security in Smart Energy Grids (Dagstuhl Seminar 16032). Dagstuhl Reports 6(1): 99-107 (2016) - [i15]Ania M. Piotrowska, Jamie Hayes, Nethanel Gelernter, George Danezis, Amir Herzberg:
AnoNotify: A Private Notification Service. IACR Cryptol. ePrint Arch. 2016: 466 (2016) - 2015
- [j6]Nikita Borisov, George Danezis, Ian Goldberg:
DP5: A Private Presence Service. Proc. Priv. Enhancing Technol. 2015(2): 4-24 (2015) - [j5]Jamie Hayes, George Danezis:
Guard Sets for Onion Routing. Proc. Priv. Enhancing Technol. 2015(2): 65-80 (2015) - [j4]Luís T. A. N. Brandão, Nicolas Christin, George Danezis, anonymous:
Toward Mending Two Nation-Scale Brokered Identification Systems. Proc. Priv. Enhancing Technol. 2015(2): 135-155 (2015) - [c70]Chen Chen, Daniele Enrico Asoni, David Barrera, George Danezis, Adrian Perrig:
HORNET: High-speed Onion Routing at the Network Layer. CCS 2015: 1441-1454 - [i14]George Danezis, Josep Domingo-Ferrer, Marit Hansen, Jaap-Henk Hoepman, Daniel Le Métayer, Rodica Tirtea, Stefan Schiffner:
Privacy and Data Protection by Design - from policy to engineering. CoRR abs/1501.03726 (2015) - [i13]Nadia Alshahwan, Earl T. Barr, David Clark, George Danezis:
Detecting Malware with Information Complexity. CoRR abs/1502.07661 (2015) - [i12]George Danezis, Sarah Meiklejohn:
Centrally Banked Cryptocurrencies. CoRR abs/1505.06895 (2015) - [i11]Chen Chen, Daniele Enrico Asoni, David Barrera, George Danezis, Adrian Perrig:
HORNET: High-speed Onion Routing at the Network Layer. CoRR abs/1507.05724 (2015) - [i10]Luca Melis, George Danezis, Emiliano De Cristofaro:
Efficient Private Statistics with Succinct Sketches. CoRR abs/1508.06110 (2015) - [i9]Jamie Hayes, George Danezis:
Better open-world website fingerprinting. CoRR abs/1509.00789 (2015) - [i8]George Danezis, Sarah Meiklejohn:
Centrally Banked Cryptocurrencies. IACR Cryptol. ePrint Arch. 2015: 502 (2015) - 2014
- [c69]George Danezis, Cédric Fournet, Jens Groth, Markulf Kohlweiss:
Square Span Programs with Applications to Succinct NIZK Arguments. ASIACRYPT (1) 2014: 532-550 - [c68]Tariq Elahi, George Danezis, Ian Goldberg:
PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks. CCS 2014: 1068-1079 - [c67]George Danezis, Emiliano De Cristofaro:
Fast and Private Genomic Testing for Disease Susceptibility. WPES 2014: 31-34 - [c66]Kumar Sharad, George Danezis:
An Automated Social Graph De-anonymization Technique. WPES 2014: 47-58 - [i7]Kumar Sharad, George Danezis:
An Automated Social Graph De-anonymization Technique. CoRR abs/1408.1276 (2014) - [i6]George Danezis, Cédric Fournet, Jens Groth, Markulf Kohlweiss:
Square Span Programs with Applications to Succinct NIZK Arguments. IACR Cryptol. ePrint Arch. 2014: 718 (2014) - 2013
- [c65]George Danezis, Cédric Fournet, Markulf Kohlweiss, Bryan Parno:
Pinocchio coin: building zerocoin from a succinct pairing-based proof system. PETShop@CCS 2013: 27-30 - [c64]George Danezis, Cédric Fournet, Markulf Kohlweiss, Santiago Zanella Béguelin:
Smart meter aggregation via secret-sharing. SEGS@CCS 2013: 75-80 - [c63]Gilles Barthe, George Danezis, Benjamin Grégoire, César Kunz, Santiago Zanella Béguelin:
Verified Computational Differential Privacy with Applications to Smart Metering. CSF 2013: 287-301 - [c62]Cédric Fournet, Markulf Kohlweiss, George Danezis, Zhengqin Luo:
ZQL: A Compiler for Privacy-Preserving Data Processing. USENIX Security Symposium 2013: 163-178 - [c61]George Danezis, Carmela Troncoso:
You cannot hide for long: de-anonymization of real-world dynamic behaviour. WPES 2013: 49-60 - 2012
- [c60]Andres Molina-Markham, George Danezis, Kevin Fu, Prashant J. Shenoy, David E. Irwin:
Designing Privacy-Preserving Smart Meters with Low-Cost Microcontrollers. Financial Cryptography 2012: 239-253 - [c59]George Danezis, Emilia Käsper:
The Dangers of Composing Anonymous Channels. Information Hiding 2012: 191-206 - [c58]Alfredo Rial, George Danezis:
Privacy-Preserving Smart Metering. ISSE 2012: 105-115 - [c57]George Danezis, Markulf Kohlweiss, Benjamin Livshits, Alfredo Rial:
Private Client-Side Profiling with Random Forests and Hidden Markov Models. Privacy Enhancing Technologies 2012: 18-37 - [e6]Ting Yu, George Danezis, Virgil D. Gligor:
the ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012. ACM 2012, ISBN 978-1-4503-1651-4 [contents] - [e5]George Danezis:
Financial Cryptography and Data Security - 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7035, Springer 2012, ISBN 978-3-642-27575-3 [contents] - [e4]George Danezis, Sven Dietrich, Kazue Sako:
Financial Cryptography and Data Security - FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7126, Springer 2012, ISBN 978-3-642-29888-2 [contents] - 2011
- [j3]Carmela Troncoso, George Danezis, Eleni Kosta, Josep Balasch, Bart Preneel:
PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance. IEEE Trans. Dependable Secur. Comput. 8(5): 742-755 (2011) - [c56]George Danezis, Benjamin Livshits:
Towards ensuring client-side computational integrity. CCSW 2011: 125-130 - [c55]George Danezis, Markulf Kohlweiss, Alfredo Rial:
Differentially Private Billing with Rebates. Information Hiding 2011: 148-162 - [c54]Reza Shokri, George Theodorakopoulos, George Danezis, Jean-Pierre Hubaux, Jean-Yves Le Boudec:
Quantifying Location Privacy: The Case of Sporadic Location Exposure. PETS 2011: 57-76 - [c53]Klaus Kursawe, George Danezis, Markulf Kohlweiss:
Privacy-Friendly Aggregation for the Smart-Grid. PETS 2011: 175-191 - [c52]Alfredo Rial, George Danezis:
Privacy-preserving smart metering. WPES 2011: 49-60 - [e3]Yan Chen, George Danezis, Vitaly Shmatikov:
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011. ACM 2011, ISBN 978-1-4503-0948-6 [contents] - [i5]George Danezis, Markulf Kohlweiss, Alfredo Rial:
Differentially Private Billing with Rebates. IACR Cryptol. ePrint Arch. 2011: 134 (2011) - [i4]Andres Molina-Markham, George Danezis, Kevin Fu, Prashant J. Shenoy, David E. Irwin:
Designing Privacy-preserving Smart Meters with Low-cost Microcontrollers. IACR Cryptol. ePrint Arch. 2011: 544 (2011) - 2010
- [c51]George Danezis, Claudia Díaz, Carmela Troncoso, Ben Laurie:
Drac: An Architecture for Anonymous Low-Volume Communications. Privacy Enhancing Technologies 2010: 202-219 - [c50]George Danezis, Tuomas Aura, Shuo Chen, Emre Kiciman:
How to Share Your Favourite Search Results while Preserving Privacy and Quality. Privacy Enhancing Technologies 2010: 273-290 - [c49]George Danezis:
Generating Channel Ids in Virtual World Operating Systems (Transcript of Discussion). Security Protocols Workshop 2010: 74-81 - [r1]George Danezis, Claudia Díaz, Paul F. Syverson:
Anonymous Communication. Handbook of Financial Cryptography and Security 2010: 341-389
2000 – 2009
- 2009
- [c48]Joseph Bonneau, Jonathan Anderson, George Danezis:
Prying Data out of a Social Network. ASONAM 2009: 249-254 - [c47]George Danezis:
Inferring privacy policies for social networking services. AISec 2009: 5-10 - [c46]Carmela Troncoso, George Danezis:
The bayesian traffic analysis of mix networks. CCS 2009: 369-379 - [c45]George Danezis, Claudia Díaz, Emilia Käsper, Carmela Troncoso:
The Wisdom of Crowds: Attacks and Optimal Constructions. ESORICS 2009: 406-423 - [c44]George Danezis, Prateek Mittal:
SybilInfer: Detecting Sybil Nodes using Social Networks. NDSS 2009 - [c43]George Danezis, Carmela Troncoso:
Vida: How to Use Bayesian Inference to De-anonymize Persistent Communications. Privacy Enhancing Technologies 2009: 56-72 - [c42]George Danezis, Ian Goldberg:
Sphinx: A Compact and Provably Secure Mix Format. SP 2009: 269-282 - [c41]George Danezis:
The Least Privacy-Damaging Centralised Traffic Data Retention Architecture. Security Protocols Workshop 2009: 87-92 - [c40]George Danezis:
The Least Privacy-Damaging Centralised Traffic Data Retention Architecture. Security Protocols Workshop 2009: 93-110 - [c39]Janne Lindqvist, Tuomas Aura, George Danezis, Teemu Koponen, Annu Myllyniemi, Jussi Mäki, Michael Roe:
Privacy-preserving 802.11 access-point discovery. WISEC 2009: 123-130 - 2008
- [c38]George Danezis, Paul F. Syverson:
Bridging and Fingerprinting: Epistemic Attacks on Route Selection. Privacy Enhancing Technologies 2008: 151-166 - [c37]George Danezis, Len Sassaman:
How to Bypass Two Anonymity Revocation Schemes. Privacy Enhancing Technologies 2008: 187-201 - [c36]Daniel Cvrcek, George Danezis:
Fighting the 'Good' Internet War. Security Protocols Workshop 2008: 3-11 - [c35]George Danezis:
Covert Communications Despite Traffic Data Retention. Security Protocols Workshop 2008: 198-214 - [c34]George Danezis:
Covert Communications Despite Traffic Data Retention (Transcript of Discussion). Security Protocols Workshop 2008: 215-219 - [c33]Yoni De Mulder, George Danezis, Lejla Batina, Bart Preneel:
Identification via location-profiling in GSM networks. WPES 2008: 23-32 - [i3]George Danezis, Ian Goldberg:
Sphinx: A Compact and Provably Secure Mix Format. IACR Cryptol. ePrint Arch. 2008: 475 (2008) - 2007
- [j2]George Danezis:
Breaking four mix-related schemes based on Universal Re-encryption. Int. J. Inf. Sec. 6(6): 393-402 (2007) - [c32]