Schett, Maria A.; Danezis, George Embedding a deterministic BFT protocol in a block DAG. (English) Zbl 07824194 Korhonen, Janne H. (ed.), Proceedings of the 40th ACM symposium on principles of distributed computing, PODC ’21, virtual event, Italy, July 26–30, 2021. New York, NY: Association for Computing Machinery (ACM). 177-186 (2021). MSC: 68M14 68W15 PDFBibTeX XMLCite \textit{M. A. Schett} and \textit{G. Danezis}, in: Proceedings of the 40th ACM symposium on principles of distributed computing, PODC '21, virtual event, Italy, July 26--30, 2021. New York, NY: Association for Computing Machinery (ACM). 177--186 (2021; Zbl 07824194) Full Text: DOI arXiv
Danezis, George; Fournet, Cédric; Groth, Jens; Kohlweiss, Markulf Square span programs with applications to succinct NIZK arguments. (English) Zbl 1306.94042 Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 532-550 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{G. Danezis} et al., Lect. Notes Comput. Sci. 8873, 532--550 (2014; Zbl 1306.94042) Full Text: DOI
Danezis, George (ed.); Dietrich, Sven (ed.); Sako, Kazue (ed.) Financial cryptography and data security. FC 2011 workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28–March 4, 2011. Revised selected papers. (English) Zbl 1241.94003 Lecture Notes in Computer Science 7126. Berlin: Springer (ISBN 978-3-642-29888-2/pbk). xii, 185 p. (2012). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{G. Danezis} (ed.) et al., Financial cryptography and data security. FC 2011 workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28--March 4, 2011. Revised selected papers. Berlin: Springer (2012; Zbl 1241.94003) Full Text: DOI
Danezis, George (ed.) Financial cryptography and data security. 15th international conference, FC 2011, Gros Islet, St. Lucia, February 28–March 4, 2011. Revised selected papers. (English) Zbl 1234.94002 Lecture Notes in Computer Science 7035. Berlin: Springer (ISBN 978-3-642-27575-3/pbk). approx. 335 p. (2012). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{G. Danezis} (ed.), Financial cryptography and data security. 15th international conference, FC 2011, Gros Islet, St. Lucia, February 28--March 4, 2011. Revised selected papers. Berlin: Springer (2012; Zbl 1234.94002) Full Text: DOI
Danezis, George; Diaz, Claudia; Faust, Sebastian; Käsper, Emilia; Troncoso, Carmela; Preneel, Bart Efficient negative databases from cryptographic hash functions. (English) Zbl 1138.68390 Garay, Juan A. (ed.) et al., Information security. 10th international conference, ISC 2007, Valparaíso, Chile, October 9–12, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-75495-4/pbk). Lecture Notes in Computer Science 4779, 423-436 (2007). MSC: 68P15 94A60 PDFBibTeX XMLCite \textit{G. Danezis} et al., Lect. Notes Comput. Sci. 4779, 423--436 (2007; Zbl 1138.68390) Full Text: DOI Link
Danezis, George Breaking four mix-related schemes based on universal re-encryption. (English) Zbl 1156.94344 Katsikas, Sokratis K. (ed.) et al., Information security. 9th international conference, ISC 2006, Samos Island, Greece, August 30–September 2, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-38341-3/pbk). Lecture Notes in Computer Science 4176, 46-59 (2006). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{G. Danezis}, Lect. Notes Comput. Sci. 4176, 46--59 (2006; Zbl 1156.94344) Full Text: DOI
Serjantov, Andrei; Danezis, George Towards an information theoretic metric for anonymity. (English) Zbl 1045.68913 Dingledine, Roger (ed.) et al., Privacy enhancing technologies. Second international workshop, PET 2002, San Francisco, CA, USA, April 14–15, 2002. Revised papers. Berlin: Springer (ISBN 3-540-00565-X/pbk). Lect. Notes Comput. Sci. 2482, 41-53 (2003). MSC: 68U99 68P25 PDFBibTeX XMLCite \textit{A. Serjantov} and \textit{G. Danezis}, Lect. Notes Comput. Sci. 2482, 41--53 (2003; Zbl 1045.68913) Full Text: Link
Clayton, Richard; Danezis, George Chaffinch: Confidentiality in the face of legal threats. (English) Zbl 1022.68644 Petitcolas, Fabien A. P. (ed.), Information hiding. 5th international workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2578, 70-86 (2003). MSC: 68U99 68P25 PDFBibTeX XMLCite \textit{R. Clayton} and \textit{G. Danezis}, Lect. Notes Comput. Sci. 2578, 70--86 (2003; Zbl 1022.68644) Full Text: Link
Clayton, Richard; Danezis, George; Kuhn, Markus G. Real world patterns of failure in anonymity systems. (English) Zbl 1010.68782 Moskowitz, Ira S. (ed.), Information hiding. 4th international workshop, IH 2001, Pittsburgh, PA, USA, April 25-27, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2137, 230-244 (2001). MSC: 68U99 68P25 PDFBibTeX XMLCite \textit{R. Clayton} et al., Lect. Notes Comput. Sci. 2137, 230--244 (2001; Zbl 1010.68782)
Danezis, George An anonymous auction protocol using “money escrow” (transcript of discussion). (English) Zbl 1001.68636 Christianson, Bruce (ed.) et al., Security protocols. 8th international workshop, Cambridge, GB, April 3-5, 2000. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2133, 223-233 (2001). MSC: 68U99 68M12 68P25 PDFBibTeX XMLCite \textit{G. Danezis}, Lect. Notes Comput. Sci. 2133, 223--233 (2001; Zbl 1001.68636) Full Text: Link