H-Index & Metrics Best Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science D-index 54 Citations 12,540 136 World Ranking 2371 National Ranking 133

Overview

What is he best known for?

The fields of study he is best known for:

  • The Internet
  • Computer network
  • Computer security

George Danezis mostly deals with Computer security, Anonymity, Traffic analysis, Location data and Internet privacy. In general Computer security study, his work on Onion routing, Cryptography and Adversary often relates to the realm of Electric power distribution, thereby connecting several areas of interest. His Adversary study combines topics from a wide range of disciplines, such as Hash table and Distributed computing.

George Danezis has researched Anonymity in several fields, including Telecommunications network and Set. His studies deal with areas such as Variety, Algorithm, Real-time computing and Data science as well as Traffic analysis. His work carried out in the field of Internet privacy brings together such families of science as World Wide Web, Web crawler and User privacy.

His most cited work include:

  • Mixminion: design of a type III anonymous remailer protocol (628 citations)
  • Low-cost traffic analysis of Tor (447 citations)
  • Towards an information theoretic metric for anonymity (421 citations)

What are the main themes of his work throughout his whole career to date?

The scientist’s investigation covers issues in Computer security, Anonymity, Internet privacy, Cryptography and World Wide Web. His studies in Computer security integrate themes in fields like Protocol and Covert channel. His Anonymity study combines topics in areas such as Telecommunications network, Security analysis, Traffic analysis and Communications system.

His Traffic analysis study integrates concerns from other disciplines, such as Crowds, Bayesian inference and Anonymity system. George Danezis regularly links together related areas like The Internet in his Internet privacy studies. His research in Cryptography is mostly focused on Mix network.

He most often published in these fields:

  • Computer security (54.81%)
  • Anonymity (23.01%)
  • Internet privacy (18.83%)

What were the highlights of his more recent work (between 2015-2020)?

  • Computer security (54.81%)
  • Anonymity (23.01%)
  • Machine learning (5.02%)

In recent papers he was focusing on the following fields of study:

His primary areas of investigation include Computer security, Anonymity, Machine learning, Artificial intelligence and Scalability. His Computer security study incorporates themes from Protocol and Internet privacy. His Anonymity research incorporates themes from Overhead, Private information retrieval, Traffic analysis, Adversary and Differential privacy.

His Machine learning research is multidisciplinary, incorporating elements of Adversarial system, Generative grammar and Steganography. His study in Scalability is interdisciplinary in nature, drawing from both Computer architecture, Database transaction and Hash function. His research integrates issues of Service provider and Key, Public-key cryptography in his study of Cryptography.

Between 2015 and 2020, his most popular works were:

  • Centrally Banked Cryptocurrencies (125 citations)
  • LOGAN: Membership Inference Attacks Against Generative Models (119 citations)
  • Consensus in the Age of Blockchains. (118 citations)

In his most recent research, the most cited papers focused on:

  • The Internet
  • Computer network
  • Operating system

Scalability, Artificial intelligence, Machine learning, Generative grammar and Computer security are his primary areas of study. His research in Scalability intersects with topics in Computer architecture, Verifiable secret sharing and Smart contract. His Generative grammar research incorporates elements of Stability, Inference, Leverage and Robustness.

In his work, George Danezis performs multidisciplinary research in Computer security and Byzantine fault tolerance. His Artificial neural network research is multidisciplinary, relying on both Scheme and Steganography. George Danezis has included themes like Cryptography, Peer-to-peer, Information technology and Decentralised system in his Key study.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Towards an information theoretic metric for anonymity

Andrei Serjantov;George Danezis.
privacy enhancing technologies (2002)

989 Citations

Mixminion: design of a type III anonymous remailer protocol

G. Danezis;R. Dingledine;N. Mathewson.
ieee symposium on security and privacy (2003)

926 Citations

Low-cost traffic analysis of Tor

S.J. Murdoch;G. Danezis.
ieee symposium on security and privacy (2005)

762 Citations

SybilInfer: Detecting Sybil Nodes using Social Networks.

George Danezis;Prateek Mittal.
network and distributed system security symposium (2009)

577 Citations

Privacy-friendly aggregation for the smart-grid

Klaus Kursawe;George Danezis;Markulf Kohlweiss.
privacy enhancing technologies (2011)

420 Citations

Privacy-preserving smart metering

Alfredo Rial;George Danezis.
workshop on privacy in the electronic society (2011)

414 Citations

Prying Data out of a Social Network

Joseph Bonneau;Jonathan Anderson;George Danezis.
advances in social networks analysis and mining (2009)

275 Citations

Statistical Disclosure Attacks

George Danezis.
information security conference (2003)

248 Citations

Sybil-resistant DHT routing

George Danezis;Chris Lesniewski-Laas;M. Frans Kaashoek;Ross Anderson.
european symposium on research in computer security (2005)

221 Citations

A study on the value of location privacy

Dan Cvrcek;Marek Kumpost;Vashek Matyas;George Danezis.
workshop on privacy in the electronic society (2006)

221 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing George Danezis

Prateek Mittal

Prateek Mittal

Princeton University

Publications: 55

Jean-Pierre Hubaux

Jean-Pierre Hubaux

École Polytechnique Fédérale de Lausanne

Publications: 44

Nikita Borisov

Nikita Borisov

University of Illinois at Urbana-Champaign

Publications: 39

Nicholas Hopper

Nicholas Hopper

University of Minnesota

Publications: 39

Xinwen Fu

Xinwen Fu

University of Massachusetts Lowell

Publications: 37

Bryan Ford

Bryan Ford

École Polytechnique Fédérale de Lausanne

Publications: 34

Paul Syverson

Paul Syverson

United States Naval Research Laboratory

Publications: 33

Emiliano De Cristofaro

Emiliano De Cristofaro

University College London

Publications: 30

Reza Shokri

Reza Shokri

National University of Singapore

Publications: 26

Ian Goldberg

Ian Goldberg

University of Waterloo

Publications: 24

Wei Yu

Wei Yu

Towson University

Publications: 23

Yongdae Kim

Yongdae Kim

Korea Advanced Institute of Science and Technology

Publications: 21

Andrew Miller

Andrew Miller

University of Illinois at Urbana-Champaign

Publications: 20

Bart Preneel

Bart Preneel

KU Leuven

Publications: 18

Catuscia Palamidessi

Catuscia Palamidessi

French Institute for Research in Computer Science and Automation - INRIA

Publications: 18

Ben Y. Zhao

Ben Y. Zhao

University of Chicago

Publications: 17

Something went wrong. Please try again later.