You are here

Bibliography

Export 47 results:
Author Title Type [ Year(Asc)]
Filters: Author is Christian Grothoff  [Clear All Filters]
2017
Ulrich C. Improving Voice over GNUnet. Elektrotechnik und Informatik. 2017 ;Bachelor:48.
2016
Dold F, Grothoff C. Byzantine Set-Union Consensus using Efficient Set Reconciliation. In: International Conference on Availability, Reliability and Security (ARES). International Conference on Availability, Reliability and Security (ARES). ; 2016.
Burdges J, Dold F, Grothoff C, Stanisci M. Enabling Secure Web Payments with GNU Taler. In: 6th International Conference on Security, Privacy and Applied Cryptographic Engineering. 6th International Conference on Security, Privacy and Applied Cryptographic Engineering. Hyderabad: Springer; 2016.
García-Recuero Á, Burdges J, Grothoff C. Privacy-Preserving Abuse Detection in Future Decentralised Online Social Networks. In: Data Privacy Management (DPM). Data Privacy Management (DPM). Heraklion, Greece: Springer; 2016.
2014
Beneš N. An Approach for Home Routers to Securely Erase Sensitive Data. Informatics. 2014 ;Bachelor:64.
Wachs M, Oehlmann F, Grothoff C. Automatic Transport Selection and Resource Allocation for Resilient Communication in Decentralised Networks. In: 14-th IEEE International Conference on Peer-to-Peer Computing. 14-th IEEE International Conference on Peer-to-Peer Computing. London. England; 2014.
Polot B, Grothoff C. CADET: Confidential Ad-hoc Decentralized End-to-End Transport. In: Med-Hoc-Net 2014. Med-Hoc-Net 2014. ; 2014.
Wachs M, Schanzenbach M, Grothoff C. A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System. In: International Conference on Cryptology and Network Security (CANS). International Conference on Cryptology and Network Security (CANS). Springer Verlag; 2014.
Morales A. Cryogenic: Enabling Power-Aware Applications on Linux. Department of Computer Science. 2014 ;M. Sc.:106.
Dold F. Cryptographically Secure, Distributed Electronic Voting. Computer Science. 2014 ;B.S.:49.
Singh S. Experimental comparison of Byzantine fault tolerant distributed hash tables. Computer Science. 2014 ;M.S.:42.
Kirsch J. Improved Kernel-Based Port-Knocking in Linux. Computer Science. 2014 ;M.S.
Grothoff C, Polot B, von Loesch C. The Internet is Broken: Idealistic Ideas for Building a GNU Network. In: W3C/IAB Workshop on Strengthening the Internet Against Pervasive Monitoring (STRINT). W3C/IAB Workshop on Strengthening the Internet Against Pervasive Monitoring (STRINT). London, UK: W3C/IAB; 2014.
Oehlmann F. Machine Learning for Bandwidth Management in Decentralized Networks. Department of Computer Science. 2014 ;M. Sc.:91.
2013
Toth GX. Design of a Social Messaging System Using Stateful Multicast. 2013 ;M.Sc.:76.
Wachs M, Schanzenbach M, Grothoff C. On the Feasibility of a Censorship Resistant Decentralized Name System. In: 6th International Symposium on Foundations & Practice of Security (FPS 2013). 6th International Symposium on Foundations & Practice of Security (FPS 2013). La Rochelle, France: Springer Verlag; 2013.
Uzunov A. Speeding Up Tor with SPDY. Computer Science. 2013 ;Master's in Computer Science:124.

Pages