George Danezis
Orcid: 0000-0002-8923-4860Affiliations:
- Microsoft Research
According to our database1,
George Danezis
authored at least 129 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
IACR Cryptol. ePrint Arch., 2023
Block-STM: Scaling Blockchain Execution by Turning Ordering Curse to a Performance Blessing.
Proceedings of the 28th ACM SIGPLAN Annual Symposium on Principles and Practice of Parallel Programming, 2023
2022
Proceedings of the EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5, 2022
2021
Proceedings of the PODC '21: ACM Symposium on Principles of Distributed Computing, 2021
2020
Replay Attacks and Defenses Against Cross-shard Consensus in Sharded Distributed Ledgers.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
Proceedings of the AFT '20: 2nd ACM Conference on Advances in Financial Technologies, 2020
2019
Proc. Priv. Enhancing Technol., 2019
IACR Cryptol. ePrint Arch., 2019
Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 1st ACM Conference on Advances in Financial Technologies, 2019
2018
Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers.
CoRR, 2018
ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging.
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
2017
Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments.
Proc. Priv. Enhancing Technol., 2017
IACR Cryptol. ePrint Arch., 2017
CoRR, 2017
LOGAN: Evaluating Privacy Leakage of Generative Models Using Generative Adversarial Networks.
CoRR, 2017
CoRR, 2017
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
Proceedings of the Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Dagstuhl Reports, 2016
CoRR, 2016
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
2015
Proc. Priv. Enhancing Technol., 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014
PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the 2013 IEEE 26th Computer Security Foundations Symposium, 2013
Proceedings of the PETShop'13, 2013
2012
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012
Proceedings of the Information Hiding - 14th International Conference, 2012
2011
IEEE Trans. Dependable Secur. Comput., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011
Proceedings of the 3rd ACM Cloud Computing Security Workshop, 2011
2010
Proceedings of the Handbook of Financial Cryptography and Security., 2010
Generating Channel Ids in Virtual World Operating Systems (Transcript of Discussion).
Proceedings of the Security Protocols XVIII, 2010
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010
2009
Proceedings of the Second ACM Conference on Wireless Network Security, 2009
Proceedings of the Security Protocols XVII, 2009
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009
Proceedings of the Network and Distributed System Security Symposium, 2009
Proceedings of the Computer Security, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, 2009
Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining, 2009
2008
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008
Proceedings of the Security Protocols XVI, 2008
Proceedings of the Security Protocols XVI, 2008
Proceedings of the Privacy Enhancing Technologies, 2008
Proceedings of the Privacy Enhancing Technologies, 2008
2007
Int. J. Inf. Sec., 2007
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007
Proceedings of the Security Protocols, 2007
Proceedings of the Security Protocols, 2007
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007
Proceedings of the Information Security, 10th International Conference, 2007
Proceedings of the Financial Cryptography and Data Security, 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, 2006
The Economics of Mass Surveillance and the Questionable Value of Anonymous Communications.
Proceedings of the 5th Annual Workshop on the Economics of Information Security, 2006
Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing (P2P 2006), 2006
2005
Proceedings of the 4th Annual Workshop on the Economics of Information Security, 2005
Proceedings of the Security Protocols, 2005
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005
Proceedings of the Information Hiding, 7th International Workshop, 2005
2004
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004
On the PET Workshop Panel "Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?".
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004
Proceedings of the Information Hiding, 6th International Workshop, 2004
2003
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, 2003
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003
Statistical Disclosure Attacks.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
Proceedings of the Privacy Enhancing Technologies, Third International Workshop, 2003
2002
Proceedings of the Privacy Enhancing Technologies, Second International Workshop, 2002
Proceedings of the Information Hiding, 5th International Workshop, 2002
2001
Proceedings of the Information Hiding, 4th International Workshop, 2001
2000
Proceedings of the Security Protocols, 2000