You are here

Bibliography

Export 4 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is installation  [Clear All Filters]
2009
Evans NS, Dingledine R, Grothoff C. A Practical Congestion Attack on Tor Using Long Paths. In: 18th USENIX Security Symposium. 18th USENIX Security Symposium. USENIX; 2009. pp. 33–50. Available from: http://grothoff.org/christian/tor.pdf
2008
GauthierDickey C, Grothoff C. Bootstrapping of Peer-to-Peer Networks. In: Proceedings of DAS-P2P. Proceedings of DAS-P2P. Turku, Finland: IEEE; 2008. Available from: http://grothoff.org/christian/bootstrap.pdf
2007
Evans NS, GauthierDickey C, Grothoff C. Routing in the Dark: Pitch Black. In: 23rd Annual Computer Security Applications Conference (ACSAC 2007). 23rd Annual Computer Security Applications Conference (ACSAC 2007). IEEE Computer Society; 2007. pp. 305–314. Available from: http://grothoff.org/christian/pitchblack.pdf
2003
Bennett K, Grothoff C. gap - Practical Anonymous Networking. In: Designing Privacy Enhancing Technologies. Designing Privacy Enhancing Technologies. Springer-Verlag; 2003. pp. 141–160. Available from: http://grothoff.org/christian/aff.pdf