George Danezis

Orcid: 0000-0002-8923-4860

Affiliations:
  • Microsoft Research


According to our database1, George Danezis authored at least 129 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Obelia: Scaling DAG-Based Blockchains to Hundreds of Validators.
CoRR, 2024

Sui Lutris: A Blockchain Combining Broadcast and Consensus.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
BlindPerm: Efficient MEV Mitigation with an Encrypted Mempool and Permutation.
IACR Cryptol. ePrint Arch., 2023

Mysticeti: Low-Latency DAG Consensus with Fast Commit Path.
CoRR, 2023

Cuttlefish: Expressive Fast Path Blockchains with FastUnlock.
CoRR, 2023

Block-STM: Scaling Blockchain Execution by Turning Ordering Curse to a Performance Blessing.
Proceedings of the 28th ACM SIGPLAN Annual Symposium on Principles and Practice of Parallel Programming, 2023

2022
Zef: Low-latency, Scalable, Private Payments.
IACR Cryptol. ePrint Arch., 2022

Narwhal and Tusk: a DAG-based mempool and efficient BFT consensus.
Proceedings of the EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5, 2022

2021
Embedding a Deterministic BFT Protocol in a Block DAG.
Proceedings of the PODC '21: ACM Symposium on Principles of Distributed Computing, 2021

2020
Detecting Malware with Information Complexity.
Entropy, 2020

Replay Attacks and Defenses Against Cross-shard Consensus in Sharded Distributed Ledgers.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

FastPay: High-Performance Byzantine Fault Tolerant Settlement.
Proceedings of the AFT '20: 2nd ACM Conference on Advances in Financial Technologies, 2020

2019
LOGAN: Membership Inference Attacks Against Generative Models.
Proc. Priv. Enhancing Technol., 2019

Winkle: Foiling Long-Range Attacks in Proof-of-Stake Systems.
IACR Cryptol. ePrint Arch., 2019

SybilQuorum: Open Distributed Ledgers Through Trust Networks.
CoRR, 2019

Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

SoK: Consensus in the Age of Blockchains.
Proceedings of the 1st ACM Conference on Advances in Financial Technologies, 2019

2018
Privacy-preserving smart metering revisited.
Int. J. Inf. Sec., 2018

Scoping the Cyber Security Body of Knowledge.
IEEE Secur. Priv., 2018

Blockmania: from Block DAGs to Consensus.
CoRR, 2018

Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers.
CoRR, 2018

ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging.
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018

Learning Universal Adversarial Perturbations with Generative Models.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

Chainspace: A Sharded Smart Contracts Platform.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

2017
The Road to Scalable Blockchain Designs.
login Usenix Mag., 2017

Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments.
Proc. Priv. Enhancing Technol., 2017

No right to remain silent: Isolating Malicious Mixes.
IACR Cryptol. ePrint Arch., 2017

Consensus in the Age of Blockchains.
CoRR, 2017

Mix-ORAM: Using delegate shuffles.
CoRR, 2017

Machine Learning as an Adversarial Service: Learning Black-Box Adversarial Examples.
CoRR, 2017

ClaimChain: Decentralized Public Key Infrastructure.
CoRR, 2017

LOGAN: Evaluating Privacy Leakage of Generative Models Using Generative Adversarial Networks.
CoRR, 2017

ste-GAN-ography: Generating Steganographic Images via Adversarial Training.
CoRR, 2017

Mix-ORAM: Using Delegated Shuffles.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

AnNotify: A Private Notification Service.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

The Loopix Anonymity System.
Proceedings of the 26th USENIX Security Symposium, 2017

LiLAC: Lightweight Low-Latency Anonymous Chat.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Generating steganographic images via adversarial training.
Proceedings of the Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, 2017

A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Lower-Cost ∈-Private Information Retrieval.
Proc. Priv. Enhancing Technol., 2016

AnoNotify: A Private Notification Service.
IACR Cryptol. ePrint Arch., 2016

Privacy and Security in Smart Energy Grids (Dagstuhl Seminar 16032).
Dagstuhl Reports, 2016

Lower-Cost epsilon-Private Information Retrieval.
CoRR, 2016

A Public Comment on NCCoE's White Paper on Privacy-Enhancing Identity Brokers.
CoRR, 2016

UnlimitID: Privacy-Preserving Federated Identity Management using Algebraic MACs.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016

TASP: Towards Anonymity Sets that Persist.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016

k-fingerprinting: A Robust Scalable Website Fingerprinting Technique.
Proceedings of the 25th USENIX Security Symposium, 2016

Efficient Private Statistics with Succinct Sketches.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

2015
Guard Sets for Onion Routing.
Proc. Priv. Enhancing Technol., 2015

Toward Mending Two Nation-Scale Brokered Identification Systems.
Proc. Priv. Enhancing Technol., 2015

DP5: A Private Presence Service.
Proc. Priv. Enhancing Technol., 2015

Centrally Banked Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2015

Better open-world website fingerprinting.
CoRR, 2015

Privacy and Data Protection by Design - from policy to engineering.
CoRR, 2015

Detecting Malware with Information Complexity.
CoRR, 2015

HORNET: High-speed Onion Routing at the Network Layer.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Square Span Programs with Applications to Succinct NIZK Arguments.
IACR Cryptol. ePrint Arch., 2014

An Automated Social Graph De-anonymization Technique.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

Fast and Private Genomic Testing for Disease Susceptibility.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
You cannot hide for long: de-anonymization of real-world dynamic behaviour.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

ZQL: A Compiler for Privacy-Preserving Data Processing.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Verified Computational Differential Privacy with Applications to Smart Metering.
Proceedings of the 2013 IEEE 26th Computer Security Foundations Symposium, 2013

Pinocchio coin: building zerocoin from a succinct pairing-based proof system.
Proceedings of the PETShop'13, 2013

Smart meter aggregation via secret-sharing.
Proceedings of the SEGS'13, 2013

2012
Private Client-Side Profiling with Random Forests and Hidden Markov Models.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

The Dangers of Composing Anonymous Channels.
Proceedings of the Information Hiding - 14th International Conference, 2012

2011
PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance.
IEEE Trans. Dependable Secur. Comput., 2011

Designing Privacy-preserving Smart Meters with Low-cost Microcontrollers.
IACR Cryptol. ePrint Arch., 2011

Differentially Private Billing with Rebates.
IACR Cryptol. ePrint Arch., 2011

Privacy-preserving smart metering.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011

Quantifying Location Privacy: The Case of Sporadic Location Exposure.
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

Privacy-Friendly Aggregation for the Smart-Grid.
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

Towards ensuring client-side computational integrity.
Proceedings of the 3rd ACM Cloud Computing Security Workshop, 2011

2010
Anonymous Communication.
Proceedings of the Handbook of Financial Cryptography and Security., 2010

Generating Channel Ids in Virtual World Operating Systems (Transcript of Discussion).
Proceedings of the Security Protocols XVIII, 2010

Drac: An Architecture for Anonymous Low-Volume Communications.
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010

How to Share Your Favourite Search Results while Preserving Privacy and Quality.
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010

2009
Privacy-preserving 802.11 access-point discovery.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

The Least Privacy-Damaging Centralised Traffic Data Retention Architecture.
Proceedings of the Security Protocols XVII, 2009

Vida: How to Use Bayesian Inference to De-anonymize Persistent Communications.
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009

SybilInfer: Detecting Sybil Nodes using Social Networks.
Proceedings of the Network and Distributed System Security Symposium, 2009

The Wisdom of Crowds: Attacks and Optimal Constructions.
Proceedings of the Computer Security, 2009

The bayesian traffic analysis of mix networks.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

Inferring privacy policies for social networking services.
Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, 2009

Prying Data out of a Social Network.
Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining, 2009

2008
Sphinx: A Compact and Provably Secure Mix Format.
IACR Cryptol. ePrint Arch., 2008

Identification via location-profiling in GSM networks.
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008

Covert Communications Despite Traffic Data Retention (Transcript of Discussion).
Proceedings of the Security Protocols XVI, 2008

Covert Communications Despite Traffic Data Retention.
Proceedings of the Security Protocols XVI, 2008

Fighting the 'Good' Internet War.
Proceedings of the Security Protocols XVI, 2008

How to Bypass Two Anonymity Revocation Schemes.
Proceedings of the Privacy Enhancing Technologies, 2008

Bridging and Fingerprinting: Epistemic Attacks on Route Selection.
Proceedings of the Privacy Enhancing Technologies, 2008

2007
Breaking four mix-related schemes based on Universal Re-encryption.
Int. J. Inf. Sec., 2007

Pripayd: privacy friendly pay-as-you-drive insurance.
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007

Does additional information always reduce anonymity?
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007

Private Yet Abuse Resistant Open Publishing.
Proceedings of the Security Protocols, 2007

Private Yet Abuse Resistant Open Publishing (Transcript of Discussion).
Proceedings of the Security Protocols, 2007

Two-Sided Statistical Disclosure Attack.
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007

Efficient Negative Databases from Cryptographic Hash Functions.
Proceedings of the Information Security, 10th International Conference, 2007

Space-Efficient Private Search with Applications to Rateless Codes.
Proceedings of the Financial Cryptography and Data Security, 2007

Denial of service or denial of security?
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Improving the Decoding Efficiency of Private Search.
IACR Cryptol. ePrint Arch., 2006

A study on the value of location privacy.
Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, 2006

The Economics of Mass Surveillance and the Questionable Value of Anonymous Communications.
Proceedings of the 5th Annual Workshop on the Economics of Information Security, 2006

The Value of Location Information.
Proceedings of the Security Protocols, 2006

Route Fingerprinting in Anonymous Communications.
Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing (P2P 2006), 2006

A pact with the devil.
Proceedings of the New Security Paradigms Workshop 2006, 2006

2005
The Economics of Resisting Censorship.
IEEE Secur. Priv., 2005

How Much Is Location Privacy Worth?
Proceedings of the 4th Annual Workshop on the Economics of Information Security, 2005

The Dining Freemasons (Security Protocols for Secret Societies).
Proceedings of the Security Protocols, 2005

Low-Cost Traffic Analysis of Tor.
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005

Compulsion Resistant Anonymous Communications.
Proceedings of the Information Hiding, 7th International Workshop, 2005

Sybil-Resistant DHT Routing.
Proceedings of the Computer Security, 2005

2004
Better anonymous communications.
PhD thesis, 2004

Minx: a simple and efficient anonymous packet format.
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004

Panel Discussion - Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004

The Traffic Analysis of Continuous-Time Mixes.
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004

On the PET Workshop Panel "Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?".
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004

Statistical Disclosure or Intersection Attacks on Anonymity Systems.
Proceedings of the Information Hiding, 6th International Workshop, 2004

2003
Heartbeat traffic to counter (n-1) attacks: red-green-black mixes.
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, 2003

Mixminion: Design of a Type III Anonymous Remailer Protocol.
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003

Statistical Disclosure Attacks.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Mix-Networks with Restricted Routes.
Proceedings of the Privacy Enhancing Technologies, Third International Workshop, 2003

2002
Towards an Information Theoretic Metric for Anonymity.
Proceedings of the Privacy Enhancing Technologies, Second International Workshop, 2002

Chaffinch: Confidentiality in the Face of Legal Threats.
Proceedings of the Information Hiding, 5th International Workshop, 2002

2001
Real World Patterns of Failure in Anonymity Systems.
Proceedings of the Information Hiding, 4th International Workshop, 2001

2000
An Anonymous Auction Protocol Using "Money Escrow" (Transcript of Discussion).
Proceedings of the Security Protocols, 2000


  Loading...