Browse by UCL people
Group by: Type | Date
Number of items: 39.
Article
Brandão, LTAN;
Christin, N;
Danezis, G;
(2015)
Toward Mending Two Nation-Scale Brokered Identification Systems.
Proceedings on Privacy Enhancing Technologies
, 2015
(2)
pp. 135-155.
10.1515/popets-2015-0022.
|
Danezis, G;
Borisov, N;
Goldberg, I;
(2015)
DP5: A Private Presence Service.
Proceedings on Privacy Enhancing Technologies
, 2015
(2)
pp. 4-24.
10.1515/popets-2015-0008.
|
Danezis, G;
Hayes, J;
(2015)
Guard Sets for Onion Routing.
Guard Sets for Onion Routing
, 2015
(2)
pp. 65-80.
10.1515/popets-2015-0017.
|
Danezis, G;
Meiklejohn, S;
(2016)
Centrally Banked Cryptocurrencies.
Journal of Cryptology
, Article 502.
|
Lopez-Neira, I;
Patel, T;
Parkin, S;
Danezis, G;
Tanczer, L;
(2019)
‘Internet of Things’: How abuse is getting smarter.
Safe – The Domestic Abuse Quarterly
, 63
pp. 22-26.
|
Rashid, A;
Danezis, G;
Chivers, H;
Lupu, E;
Martin, A;
Lewis, M;
Peersman, C;
(2018)
Scoping the Cyber Security Body of Knowledge.
IEEE Security & Privacy
, 16
(3)
pp. 96-102.
10.1109/MSP.2018.2701150.
|
Rial, A;
Danezis, G;
Kohlweiss, M;
(2018)
Privacy-preserving smart metering revisited.
International Journal of Information Security
, 17
pp. 1-31.
10.1007/s10207-016-0355-8.
|
Toledo, RR;
Danezis, G;
Goldberg, I;
(2016)
Lower-Cost ∈-Private Information Retrieval.
Proceedings on Privacy Enhancing Technologies
, 2016
(4)
10.1515/popets-2016-0035.
|
Proceedings paper
Azouvi, S;
Danezis, G;
Nikolaenko, V;
(2020)
Winkle: Foiling Long-Range Attacks in Proof-of-Stake Systems.
In:
AFT 2020 - Proceedings of the 2nd ACM Conference on Advances in Financial Technologies.
(pp. pp. 189-201).
ACM: Association for Computing Machinery: New York, NY, USA.
|
|
Babel, Kushal;
Chursin, Andrey;
Danezis, George;
Kichidis, Anastasios;
Kokoris-Kogias, Lefteris;
Koshy, Arun;
Sonnino, Alberto;
(2025)
Mysticeti: Reaching the Latency Limits with
Uncertified DAGs.
In:
Proceedings of the 2025 Network and Distributed System Security Symposium.
(pp. pp. 1-18).
Internet Society: San Diego, CA, USA.
|
Bano, S;
Sonnino, A;
Al-Bassam, M;
Azouvi, S;
McCorry, P;
Meiklejohn, S;
Danezis, G;
(2019)
SoK: Consensus in the Age of Blockchains.
In:
AFT '19: Proceedings of the 1st ACM Conference on Advances in Financial Technologies.
(pp. pp. 183-198).
ACM: Association for Computing Machinery: New York, NY, USA.
|
Baudet, M;
Danezis, G;
Sonnino, A;
(2020)
FastPay: High-Performance Byzantine Fault Tolerant Settlement.
In:
AFT '20: Proceedings of the 2nd ACM Conference on Advances in Financial Technologies.
(pp. pp. 163-177).
ACM: Association for Computing Machinery
|
Baudet, Mathieu;
Sonnino, Alberto;
Kelkar, Mahimna;
Danezis, George;
(2023)
Zef: Low-latency, Scalable, Private Payments.
In:
WPES '23: Proceedings of the 22nd Workshop on Privacy in the Electronic Society.
(pp. pp. 1-16).
ACM (Association for Computing Machinery): New York, NY, USA.
|
Blackshear, S;
Chursin, A;
Danezis, G;
Kichidis, A;
Kokoris-Kogias, L;
Li, X;
Logan, M;
... Zhang, L; + view all
(2024)
Sui Lutris: A Blockchain Combining Broadcast and Consensus.
In:
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security.
(pp. pp. 2606-2620).
ACM: Association for Computing Machinery: New York, NY, USA.
|
Danezis, George;
De Cristofaro, Emiliano;
(2014)
Simpler protocols for privacy-preserving disease susceptibility testing.
In: De Cristofaro, Emiliano and Murdoch, Steven J, (eds.)
Papers from the 1st PETS Workshop on Genome Privacy, held in conjunction with the 14th Privacy Enhancing Technologies Symposium.
School of Informatics and Computing, Indiana University: Indianapolis, IN, USA.
|
Danezis, George;
Kokoris-Kogias, Lefteris;
Sonnino, Alberto;
Spiegelman, Alexander;
(2022)
Narwhal and Tusk: A DAG-based Mempool and Efficient BFT Consensus.
In:
EuroSys '22: Proceedings of the Seventeenth European Conference on Computer Systems.
(pp. pp. 34-50).
Association for Computing Machinery: Rennes, France.
|
Danezis, G;
Groth, J;
Fournet, C;
Kohlweiss, M;
(2014)
Square span programs with applications to succinct NIZK arguments.
In: Sarkar, P and Iwata, T, (eds.)
Advances in Cryptology – ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I.
(pp. 532 - 550).
Springer Berlin Heidelberg: Berlin, Germany.
|
Danezis, G;
Meiklejohn, S;
(2016)
Centrally Banked Cryptocurrencies.
In:
Proceedings of the NDSS Symposium 2016.
Internet Society: San Diego, CA, USA.
|
Elahi, T;
Goldberg, I;
Danezis, G;
(2014)
PrivEx: Private collection of traffic statistics for anonymous communication networks.
In: Dimitrakakis, C, (ed.)
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security.
(pp. 1068 - 1079).
ACM: New York, US.
|
Gelashvili, R;
Spiegelman, A;
Xiang, Z;
Danezis, G;
Li, Z;
Malkhi, D;
Xia, Y;
(2023)
Block-STM Scaling Blockchain Execution by Turning Ordering Curse to a Performance Blessing.
In:
Proceedings of the ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, PPOPP.
(pp. pp. 232-244).
ACM: Montreal, QC, Canada.
|
Hayes, J;
Danezis, G;
(2018)
Learning Universal Adversarial Perturbations with Generative Models.
In:
Proceedings of the Security and Privacy Workshops (SPW) 2018 IEEE.
(pp. pp. 43-49).
IEEE: San Francisco (CA), USA.
|
Hayes, J;
Danezis, G;
(2017)
Generating Steganographic Images via Adversarial Training.
In: Guyon, I and Luxburg, UV and Bengio, S and Wallach, H and Fergus, R and Vishwanathan, S and Garnett, R, (eds.)
Advances in Neural Information Processing Systems 30 (NIPS 2017).
(pp. pp. 1951-1960).
Neural Information Processing Systems Foundation: La Jolla, California, USA.
|
Hayes, J;
Danezis, G;
(2016)
k-fingerprinting: a Robust Scalable Website Fingerprinting Technique.
In:
Proceedings of the 25th USENIX Security Symposium.
(pp. pp. 1187-1203).
USENIX: Austin, TX, USA.
|
Hayes, J;
Melis, L;
Danezis, G;
De Cristofaro, E;
(2019)
LOGAN: Membership Inference Attacks Against Generative Models.
In:
Proceedings on Privacy Enhancing Technologies.
(pp. pp. 133-152).
De Gruyter
|
Hayes, J;
Troncoso, C;
Danezis, G;
(2016)
TASP: Towards anonymity sets that persist.
In: Weippl, E and Katzenbeisser, S and De Capitani di Vimercati, S, (eds.)
WPES '16: Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society.
(pp. pp. 177-180).
Association for Computing Machinery (ACM): New York, NY, USA.
|
Isaakidis, M;
Halpin, H;
Danezis, G;
(2016)
UnlimitID: Privacy-preserving federated identity management using algebraic MACs.
In: Weippl, E and Katzenbeisser, S and De Capitani di Vimercati, S, (eds.)
WPES '16: Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society.
(pp. pp. 139-142).
Association for Computing Machinery (ACM): New York, NY, USA.
|
Kulynych, B;
Lueks, W;
Isaakidis, M;
Danezis, G;
Troncoso, C;
(2018)
ClaimChain: Improving the security and privacy of in-band key distribution for messaging.
In:
Proceeding of Workshop on Privacy in the Electronic Society 2018 (WPES'18).
(pp. pp. 86-103).
ACM: Toronto, Canada.
|
Leibowitz, H;
Piotrowska, AM;
Danezis, G;
Herzberg, A;
(2019)
No Right to Remain Silent: Isolating Malicious Mixes.
In:
Proceedings of the 28th USENIX Security Symposium.
(pp. pp. 1841-1858).
USENIX Association: Santa Clara, CA, USA.
|
Mavroudis, V;
Cerulli, A;
Svenda, P;
Cvrcek, D;
Klinec, D;
Danezis, G;
(2017)
A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components.
In: Evans, D and Malkin, T and Xu, D, (eds.)
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security.
(pp. pp. 1583-1600).
ACM: New York, USA.
|
Melis, L;
Danezis, G;
Cristofaro, ED;
(2016)
Efficient Private Statistics with Succinct Sketches.
In:
Proceedings of the NDSS Symposium 2016.
Internet Society: San Diego, CA, USA.
|
Piotrowska, A;
Hayes, J;
Elahi, T;
Meiser, S;
Danezis, G;
(2017)
The Loopix Anonymity System.
In: Kirda, E and Ristenpart, T, (eds.)
Proceedings of the 26th USENIX Security Symposium.
(pp. pp. 1199-1216).
USENIX Association
|
Piotrowska, AM;
Hayes, J;
Gelernter, N;
Danezis, G;
Herzberg, A;
(2017)
AnNotify: A Private Notification Service.
In: Thuraisingham, B and Lee, AJ, (eds.)
Proceedings of the 2017 Workshop on Privacy in the Electronic Society (WPES '17).
(pp. pp. 5-15).
Association for Computing Machinery (ACM): New York, NY, USA.
|
Sonnino, A;
Bano, S;
Al-Bassam, M;
Danezis, G;
(2020)
Replay Attacks and Defenses Against Cross-shard Consensus in Sharded Distributed Ledgers.
In:
Proceedings of the 2020 IEEE European Symposium on Security and Privacy (EuroS&P).
(pp. pp. 294-308).
Institute of Electrical and Electronics Engineers (IEEE)
|
Toledo, RR;
Danezis, GD;
Echizen, IE;
(2017)
Mix-ORAM: Using Delegated Shuffles.
In: Thuraisingham, B and Lee, AJ, (eds.)
Proceedings of the 2017 Workshop on Privacy in the Electronic Society.
(pp. pp. 51-61).
ACM: New York, USA.
|
Troncoso, C;
Isaakidis, M;
Danezis, G;
Halpin, H;
(2017)
Systematizing Decentralization and Privacy: Lessons from 15 years of research and deployments.
In:
(Proceedings) Privacy Enhancing Technologies Symposium 2017.
(pp. pp. 404-426).
De Gruyter
|
Report
Danezis, G;
Domingo-Ferrer, J;
Hansen, M;
Hoepman, JH;
Metayer, DL;
Tirtea, R;
Schiffner, S;
(2014)
Privacy and Data Protection by Design - from policy to engineering.
European Union Agency for Network and Information Security (ENISA): Heraklion, Greece.
|
Working / discussion paper
Al-Bassam, M;
Sonnino, A;
Bano, S;
Hrycyszyn, D;
Danezis, G;
(2017)
Chainspace: A Sharded Smart Contracts Platform.
ArXiv: Ithaca, NY, USA.
|
Alshahwan, N;
Barr, ET;
Clark, D;
Danezis, G;
(2015)
Detecting Malware with Information Complexity.
|
Chen, C;
Asoni, DE;
Barrera, D;
Danezis, G;
Perrig, A;
(2015)
HORNET: High-speed Onion Routing at the Network Layer.
|