You are here

Bibliography

Export 37 results:
Author Title Type [ Year(Asc)]
Filters: Author is George Danezis  [Clear All Filters]
2009
Troncoso C, Danezis G. The bayesian traffic analysis of mix networks. In: Al-Shaer E, Jha S, Keromytis AD Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. ACM; 2009. pp. 369–379. Available from: http://portal.acm.org/citation.cfm?id=1653662.1653707
Danezis G, Goldberg I. Sphinx: A Compact and Provably Secure Mix Format. In: Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), 17-20 May, Oakland, California, USA. Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), 17-20 May, Oakland, California, USA. IEEE Computer Society; 2009. pp. 269–282. Available from: http://portal.acm.org/citation.cfm?id=1607723.1608138
Danezis G, Diaz C, Käsper E, Troncoso C. The Wisdom of Crowds: Attacks and Optimal Constructions. In: Backes M, Ning P Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS 2009), Saint-Malo, France, September 21-23. Vol. 5789. Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS 2009), Saint-Malo, France, September 21-23. Springer; 2009. pp. 406–423. Available from: http://www.springerlink.com/content/t6q86u137t4762k8/
2008
Danezis G, Syverson P. Bridging and Fingerprinting: Epistemic Attacks on Route Selection. In: Borisov N, Goldberg I Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 133–150. Available from: http://www.springerlink.com/content/q2r7g81286026576/
Danezis G, Sassaman L. How to Bypass Two Anonymity Revocation Systems. In: Borisov N, Goldberg I Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 187–201. Available from: http://www.springerlink.com/content/179453h161722821/
Danezis G, Diaz C. A Survey of Anonymous Communication Channels. [Internet]. 2008 . Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.138.7951
2007
Borisov N, Danezis G, Mittal P, Tabriz P. Denial of Service or Denial of Security? How Attacks on Reliability can Compromise Anonymity. In: Proceedings of CCS 2007. Proceedings of CCS 2007. ACM New York, NY, USA; 2007. Available from: http://portal.acm.org/citation.cfm?id=1315258
Diaz C, Troncoso C, Danezis G. Does additional information always reduce anonymity?. In: Yu T Proceedings of the Workshop on Privacy in the Electronic Society 2007. Proceedings of the Workshop on Privacy in the Electronic Society 2007. Alexandria,VA,USA: ACM New York, NY, USA; 2007. pp. 72–75. Available from: http://portal.acm.org/citation.cfm?id=1314333.1314347
Danezis G, Diaz C. Space-Efficient Private Search. In: Proceedings of Financial Cryptography (FC2007). Proceedings of Financial Cryptography (FC2007). Tobago: Springer-Verlag; 2007. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.130.7014
Danezis G, Diaz C, Troncoso C. Two-Sided Statistical Disclosure Attack. In: Borisov N, Golle P Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007). Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007). Ottawa, Canada: Springer; 2007. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.78.7347
2006
Dingledine R, Serjantov A, Syverson P. Blending Different Latency Traffic with Alpha-Mixing. In: Danezis G, Golle P Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Cambridge, UK: Springer; 2006. pp. 245–257. Available from: http://www.springerlink.com/content/m23510526727k317/
Danezis G. Breaking Four Mix-related Schemes Based on Universal Re-encryption. In: Proceedings of Information Security Conference 2006. Proceedings of Information Security Conference 2006. Springer-Verlag; 2006. Available from: http://www.springerlink.com/content/x038u85171776236/
Tabriz P, Borisov N. Breaking the Collusion Detection Mechanism of MorphMix. In: Danezis G, Golle P Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Cambridge, UK: Springer; 2006. pp. 368–384. Available from: http://www.springerlink.com/content/p2612108665331n7/
Danezis G, Wittneben B. The Economics of Mass Surveillance and the Questionable Value of Anonymous Communications. In: Anderson R Proceedings of the Fifth Workshop on the Economics of Information Security (WEIS 2006). Proceedings of the Fifth Workshop on the Economics of Information Security (WEIS 2006). Cambridge, UK; 2006. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.9384
Clayton R, Murdoch SJ, Watson RNM. Ignoring the Great Firewall of China. In: Danezis G, Golle P Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Cambridge, UK: Springer; 2006. pp. 20–35. Available from: http://www.springerlink.com/content/7224582654260k03/
Ciaccio G. Improving Sender Anonymity in a Structured Overlay with Imprecise Routing. In: Danezis G, Golle P Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Cambridge, UK: Springer; 2006. pp. 190–207. Available from: http://www.springerlink.com/content/v473127846n07255/
Pashalidis A, Meyer B. Linking Anonymous Transactions: The Consistent View Attack. In: Danezis G, Golle P Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Cambridge, UK: Springer; 2006. pp. 384–392. Available from: http://www.springerlink.com/content/y6l6412387663581/
Heydt-Benjamin TS, Chae H-J, Defend B, Fu K. Privacy for Public Transportation. In: Danezis G, Golle P Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Cambridge, UK: Springer; 2006. pp. 1–19. Available from: http://www.springerlink.com/content/c75053mr42n82wv5/
Goldberg I. On the Security of the Tor Authentication Protocol. In: Danezis G, Golle P Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Cambridge, UK: Springer; 2006. pp. 316–331. Available from: http://www.springerlink.com/content/n77w19002743xu51/
Øverlier L, Syverson P. Valet Services: Improving Hidden Servers with a Personal Touch. In: Danezis G, Golle P Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Cambridge, UK: Springer; 2006. pp. 223–244. Available from: http://www.springerlink.com/content/d58607007777r8l1/
2005
Danezis G, Clulow J. Compulsion Resistant Anonymous Communications. In: Proceedings of Information Hiding Workshop (IH 2005). Proceedings of Information Hiding Workshop (IH 2005). Springer Berlin / Heidelberg; 2005. pp. 11–25. Available from: http://www.springerlink.com/content/74461772r675l828/
Murdoch SJ, Danezis G. Low-Cost Traffic Analysis of Tor. In: Proceedings of the 2005 IEEE Symposium on Security and Privacy. Proceedings of the 2005 IEEE Symposium on Security and Privacy. IEEE CS; 2005. Available from: http://portal.acm.org/citation.cfm?id=1059390
Danezis G, Lesniewski-laas C, Kaashoek FM, Anderson R. Sybil-resistant DHT routing. In: In ESORICS. In ESORICS. Springer; 2005. pp. 305–318. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.65.3947
2004
Danezis G. Better Anonymous Communications. [Internet]. 2004 . Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.58.3200
Danezis G, Anderson R. The Economics of Censorship Resistance. In: In The Third Annual Workshop on Economics and Information Security (WEIS04. In The Third Annual Workshop on Economics and Information Security (WEIS04. ; 2004. Available from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.4.7003&rep=rep1&type=pdf

Pages