George Danezis mostly deals with Computer security, Anonymity, Traffic analysis, Location data and Internet privacy. In general Computer security study, his work on Onion routing, Cryptography and Adversary often relates to the realm of Electric power distribution, thereby connecting several areas of interest. His Adversary study combines topics from a wide range of disciplines, such as Hash table and Distributed computing.
George Danezis has researched Anonymity in several fields, including Telecommunications network and Set. His studies deal with areas such as Variety, Algorithm, Real-time computing and Data science as well as Traffic analysis. His work carried out in the field of Internet privacy brings together such families of science as World Wide Web, Web crawler and User privacy.
The scientist’s investigation covers issues in Computer security, Anonymity, Internet privacy, Cryptography and World Wide Web. His studies in Computer security integrate themes in fields like Protocol and Covert channel. His Anonymity study combines topics in areas such as Telecommunications network, Security analysis, Traffic analysis and Communications system.
His Traffic analysis study integrates concerns from other disciplines, such as Crowds, Bayesian inference and Anonymity system. George Danezis regularly links together related areas like The Internet in his Internet privacy studies. His research in Cryptography is mostly focused on Mix network.
His primary areas of investigation include Computer security, Anonymity, Machine learning, Artificial intelligence and Scalability. His Computer security study incorporates themes from Protocol and Internet privacy. His Anonymity research incorporates themes from Overhead, Private information retrieval, Traffic analysis, Adversary and Differential privacy.
His Machine learning research is multidisciplinary, incorporating elements of Adversarial system, Generative grammar and Steganography. His study in Scalability is interdisciplinary in nature, drawing from both Computer architecture, Database transaction and Hash function. His research integrates issues of Service provider and Key, Public-key cryptography in his study of Cryptography.
Scalability, Artificial intelligence, Machine learning, Generative grammar and Computer security are his primary areas of study. His research in Scalability intersects with topics in Computer architecture, Verifiable secret sharing and Smart contract. His Generative grammar research incorporates elements of Stability, Inference, Leverage and Robustness.
In his work, George Danezis performs multidisciplinary research in Computer security and Byzantine fault tolerance. His Artificial neural network research is multidisciplinary, relying on both Scheme and Steganography. George Danezis has included themes like Cryptography, Peer-to-peer, Information technology and Decentralised system in his Key study.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Towards an information theoretic metric for anonymity
Andrei Serjantov;George Danezis.
privacy enhancing technologies (2002)
Mixminion: design of a type III anonymous remailer protocol
G. Danezis;R. Dingledine;N. Mathewson.
ieee symposium on security and privacy (2003)
Low-cost traffic analysis of Tor
S.J. Murdoch;G. Danezis.
ieee symposium on security and privacy (2005)
Towards an information theoretic metric for anonymity
Andrei Serjantov;George Danezis.
Lecture Notes in Computer Science (2003)
SybilInfer: Detecting Sybil Nodes using Social Networks.
George Danezis;Prateek Mittal.
network and distributed system security symposium (2009)
Privacy-friendly aggregation for the smart-grid
Klaus Kursawe;George Danezis;Markulf Kohlweiss.
privacy enhancing technologies (2011)
Privacy-preserving smart metering
Alfredo Rial;George Danezis.
workshop on privacy in the electronic society (2011)
Privacy-preserving smart metering
Alfredo Rial;George Danezis.
workshop on privacy in the electronic society (2011)
Statistical disclosure or intersection attacks on anonymity systems
George Danezis;Andrei Serjantov.
information hiding (2004)
Prying Data out of a Social Network
Joseph Bonneau;Jonathan Anderson;George Danezis.
advances in social networks analysis and mining (2009)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Aalto University
University of Edinburgh
University of Cambridge
Carnegie Mellon University
University of Trento
University of Cambridge
KU Leuven
University College London
University of Waterloo
Royal Holloway University of London
French Institute for Research in Computer Science and Automation - INRIA
Publications: 18
International Institute of Information Technology, Hyderabad
Federal Reserve System
IBM (United States)
University of Würzburg
United States Department of Agriculture
University of Montpellier
University of Connecticut Health Center
University of Oxford
Radboud University Nijmegen
University of Toyama
National Institutes of Health
University of Mannheim
University of London
City Of Hope National Medical Center
University of Toronto
Nanjing University