Follow
George Danezis
Title
Cited by
Cited by
Year
Towards an information theoretic metric for anonymity
A Serjantov, G Danezis
International Workshop on Privacy Enhancing Technologies, 41-53, 2002
10982002
Mixminion: Design of a type III anonymous remailer protocol
G Danezis, R Dingledine, N Mathewson
2003 Symposium on Security and Privacy, 2003., 2-15, 2003
10002003
Low-cost traffic analysis of Tor
SJ Murdoch, G Danezis
2005 IEEE Symposium on Security and Privacy (S&P'05), 183-195, 2005
8742005
Logan: Membership inference attacks against generative models
J Hayes, L Melis, G Danezis, E De Cristofaro
arXiv preprint arXiv:1705.07663, 2017
712*2017
SoK: Consensus in the age of blockchains
S Bano, A Sonnino, M Al-Bassam, S Azouvi, P McCorry, S Meiklejohn, ...
Proceedings of the 1st ACM Conference on Advances in Financial Technologies …, 2019
694*2019
Sybilinfer: Detecting sybil nodes using social networks.
G Danezis, P Mittal
Ndss 9, 1-15, 2009
6272009
Privacy-friendly aggregation for the smart-grid
K Kursawe, G Danezis, M Kohlweiss
Privacy Enhancing Technologies: 11th International Symposium, PETS 2011 …, 2011
5202011
k-fingerprinting: A robust scalable website fingerprinting technique
J Hayes, G Danezis
25th USENIX Security Symposium (USENIX Security 16), 1187-1203, 2016
4972016
Centrally banked cryptocurrencies
G Danezis, S Meiklejohn
arXiv preprint arXiv:1505.06895, 2015
4802015
Privacy-preserving smart metering
A Rial, G Danezis
Proceedings of the 10th annual ACM workshop on Privacy in the electronic …, 2011
4642011
Chainspace: A sharded smart contracts platform
M Al-Bassam, A Sonnino, S Bano, D Hrycyszyn, G Danezis
arXiv preprint arXiv:1708.03778, 2017
4302017
Privacy and data protection by design-from policy to engineering
G Danezis, J Domingo-Ferrer, M Hansen, JH Hoepman, DL Metayer, ...
arXiv preprint arXiv:1501.03726, 2015
4292015
Generating steganographic images via adversarial training
J Hayes, G Danezis
Advances in neural information processing systems 30, 2017
3582017
How much is location privacy worth?
G Danezis, S Lewis, RJ Anderson
WEIS 5, 56, 2005
2902005
Statistical disclosure attacks: Traffic confirmation in open environments
G Danezis
Security and Privacy in the Age of Uncertainty: IFIP TC11 18 th …, 2003
2872003
Prying data out of a social network
J Bonneau, J Anderson, G Danezis
2009 international conference on advances in social network analysis and …, 2009
2842009
Narwhal and tusk: a dag-based mempool and efficient bft consensus
G Danezis, L Kokoris-Kogias, A Sonnino, A Spiegelman
Proceedings of the Seventeenth European Conference on Computer Systems, 34-50, 2022
2672022
A study on the value of location privacy
D Cvrcek, M Kumpost, V Matyas, G Danezis
Proceedings of the 5th ACM workshop on Privacy in electronic society, 109-118, 2006
2622006
Denial of service or denial of security?
N Borisov, G Danezis, P Mittal, P Tabriz
Proceedings of the 14th ACM conference on Computer and communications …, 2007
2552007
The loopix anonymity system
AM Piotrowska, J Hayes, T Elahi, S Meiser, G Danezis
26th USENIX Security Symposium (USENIX Security 17), 1199-1216, 2017
2432017
The system can't perform the operation now. Try again later.
Articles 1–20