You are here

Bibliography

Export 11 results:
Author Title Type [ Year(Asc)]
Filters: Author is Nathan S Evans  [Clear All Filters]
2012
Evans NS, Polot B, Grothoff C. Efficient and Secure Decentralized Network Size Estimation. Garching bei Muenchen: Technische Universitaet Muenchen; 2012.
Evans NS, Polot B, Grothoff C. Efficient and Secure Decentralized Network Size Estimation. In: IFIP International Conferences on Networking (Networking 2012). IFIP International Conferences on Networking (Networking 2012). Prague, CZ: Springer Verlag; 2012. p. 304--317. Available from: http://grothoff.org/christian/rrsize2012.pdf
2011
Evans NS, Grothoff C. Beyond Simulation: Large-Scale Distributed Emulation of P2P Protocols. In: 4th Workshop on Cyber Security Experimentation and Test (CSET 2011). 4th Workshop on Cyber Security Experimentation and Test (CSET 2011). San Francisco, California: USENIX Association; 2011.
Evans NS. Methods for Secure Decentralized Routing in Open Networks. Network Architectures and Services, Department of Computer Science. 2011 ;Dr. rer. nat.:234.
Evans NS, Grothoff C. R5N : Randomized Recursive Routing for Restricted-Route Networks. In: 5th International Conference on Network and System Security (NSS 2011). 5th International Conference on Network and System Security (NSS 2011). Milan, Italy: IEEE; 2011.
2010
Müller A, Evans NS, Grothoff C, Kamkar S. Autonomous NAT Traversal. In: 10th IEEE International Conference on Peer-to-Peer Computing (IEEE P2P'10). 10th IEEE International Conference on Peer-to-Peer Computing (IEEE P2P'10). Delft, The Netherlands: IEEE; 2010. Available from: http://grothoff.org/christian/pwnat.pdf
Fessi A, Evans NS, Niedermayer H, Holz R. Pr2-P2PSIP: Privacy Preserving P2P Signaling for VoIP and IM. In: Principles, Systems and Applications of IP Telecommunications (IPTComm), Munich. Principles, Systems and Applications of IP Telecommunications (IPTComm), Munich. Munich, Germany; 2010. pp. 141–152.
2009
Evans NS, Dingledine R, Grothoff C. A Practical Congestion Attack on Tor Using Long Paths. In: 18th USENIX Security Symposium. 18th USENIX Security Symposium. USENIX; 2009. pp. 33–50. Available from: http://grothoff.org/christian/tor.pdf
2007
Evans NS, GauthierDickey C, Grothoff C. Routing in the Dark: Pitch Black. In: 23rd Annual Computer Security Applications Conference (ACSAC 2007). 23rd Annual Computer Security Applications Conference (ACSAC 2007). IEEE Computer Society; 2007. pp. 305–314. Available from: http://grothoff.org/christian/pitchblack.pdf
Durner N, Evans NS, Grothoff C. Vielleicht anonym? Die Enttarnung von StealthNet-Nutzern. c't magazin für computer technik [Internet]. 2007 ;(21). Available from: http://www.heise.de/kiosk/archiv/ct/2007/21/218_Die-Enttarnung-von-StealthNet-Nutzern