You are here

Bibliography

Export 1139 results:
Author Title Type [ Year(Asc)]
2014
Beneš N. An Approach for Home Routers to Securely Erase Sensitive Data. Informatics. 2014 ;Bachelor:64.
Wachs M, Oehlmann F, Grothoff C. Automatic Transport Selection and Resource Allocation for Resilient Communication in Decentralised Networks. In: 14-th IEEE International Conference on Peer-to-Peer Computing. 14-th IEEE International Conference on Peer-to-Peer Computing. London. England; 2014.
Devet C, Goldberg I. The Best of Both Worlds: Combining Information-Theoretic and Computational PIR for Communication Efficiency. In: De Cristofaro E, Murdoch SJ Privacy Enhancing Technologies. Vol. 8555. Privacy Enhancing Technologies. Springer International Publishing; 2014. pp. 63-82. Available from: http://dx.doi.org/10.1007/978-3-319-08506-7_4
Polot B, Grothoff C. CADET: Confidential Ad-hoc Decentralized End-to-End Transport. In: Med-Hoc-Net 2014. Med-Hoc-Net 2014. ; 2014.
Herrmann M, Zhang R, Ning K-C, Diaz C. Censorship-Resistant and Privacy-Preserving Distributed Web Search. In: IEEE International Conference on Peer to Peer computing. IEEE International Conference on Peer to Peer computing. ; 2014.
Wachs M, Schanzenbach M, Grothoff C. A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System. In: International Conference on Cryptology and Network Security (CANS). International Conference on Cryptology and Network Security (CANS). Springer Verlag; 2014.
Scheibner F. Control Flow Analysis for Event-Driven Programs. Department of Computer Sceince. 2014 ;B.Sc:71.
Morales A. Cryogenic: Enabling Power-Aware Applications on Linux. Department of Computer Science. 2014 ;M. Sc.:106.
Dold F. Cryptographically Secure, Distributed Electronic Voting. Computer Science. 2014 ;B.S.:49.
Tarabai O. A Decentralized and Autonomous Anomaly Detection Infrastructure for Decentralized Peer-to-Peer Networks. Technische Universität München. 2014 ;Master:63.
Oya S, Troncoso C, Pérez-González F. Do Dummies Pay Off? Limits of Dummy Traffic Protection in Anonymous Communications. In: De Cristofaro E, Murdoch SJ Privacy Enhancing Technologies. Vol. 8555. Privacy Enhancing Technologies. Springer International Publishing; 2014. pp. 204-223. Available from: http://dx.doi.org/10.1007/978-3-319-08506-7_11
Borisov N, Danezis G, Goldberg I. DP5: A Private Presence Service. Centre for Applied Cryptographic Research (CACR), University of Waterloo. 2014 .
Chen T, Boreli R, Kaafar M-A, Friedman A. On the Effectiveness of Obfuscation Techniques in Online Social Networks. In: De Cristofaro E, Murdoch SJ Privacy Enhancing Technologies. Vol. 8555. Privacy Enhancing Technologies. Springer International Publishing; 2014. pp. 42-62. Available from: http://dx.doi.org/10.1007/978-3-319-08506-7_3
Lueks W, Hoepman J-H, Kursawe K. Forward-Secure Distributed Encryption. In: De Cristofaro E, Murdoch SJ Privacy Enhancing Technologies. Vol. 8555. Privacy Enhancing Technologies. Springer International Publishing; 2014. pp. 123-142. Available from: http://dx.doi.org/10.1007/978-3-319-08506-7_7
Kirsch J. Improved Kernel-Based Port-Knocking in Linux. Computer Science. 2014 ;M.S.
Grothoff C, Polot B, von Loesch C. The Internet is Broken: Idealistic Ideas for Building a GNU Network. In: W3C/IAB Workshop on Strengthening the Internet Against Pervasive Monitoring (STRINT). W3C/IAB Workshop on Strengthening the Internet Against Pervasive Monitoring (STRINT). London, UK: W3C/IAB; 2014.
Oehlmann F. Machine Learning for Bandwidth Management in Decentralized Networks. Department of Computer Science. 2014 ;M. Sc.:91.
Arias R. Numerical Stability and Scalability of Secure Private Linear Programming. Computer Science. 2014 ;B. Sc.:65.

Pages