You are here

Bibliography

Export 53 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is GNUnet  [Clear All Filters]
2016
Dold F, Grothoff C. Byzantine Set-Union Consensus using Efficient Set Reconciliation. In: International Conference on Availability, Reliability and Security (ARES). International Conference on Availability, Reliability and Security (ARES). ; 2016.
Burdges J, Dold F, Grothoff C, Stanisci M. Enabling Secure Web Payments with GNU Taler. In: 6th International Conference on Security, Privacy and Applied Cryptographic Engineering. 6th International Conference on Security, Privacy and Applied Cryptographic Engineering. Hyderabad: Springer; 2016.
Kühne CRicardo. GNUnet und Informationsmacht: Analyse einer P2P-Technologie und ihrer sozialen Wirkung. Humboldt-Universitaet zu Berlin, Institut fuer Informatik. 2016 ;Diplominformatiker:103.
Schanzenbach M, Banse C. Managing and Presenting User Attributes over a Decentralized Secure Name System. In: Data Privacy Management and Security Assurance - 11th International Workshop, {DPM} 2016 and 5th International Workshop, {QASA} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings. Data Privacy Management and Security Assurance - 11th International Workshop, {DPM} 2016 and 5th International Workshop, {QASA} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings. Crete, Greece: Springer; 2016.
García-Recuero Á, Burdges J, Grothoff C. Privacy-Preserving Abuse Detection in Future Decentralised Online Social Networks. In: Data Privacy Management (DPM). Data Privacy Management (DPM). Heraklion, Greece: Springer; 2016.
Kühne CRicardo. Zur Idee herrschaftsfreier kooperativer Internetdienste. FIfF-Kommunikation. 2016 ;(1/2016).
2014
Beneš N. An Approach for Home Routers to Securely Erase Sensitive Data. Informatics. 2014 ;Bachelor:64.
Wachs M, Oehlmann F, Grothoff C. Automatic Transport Selection and Resource Allocation for Resilient Communication in Decentralised Networks. In: 14-th IEEE International Conference on Peer-to-Peer Computing. 14-th IEEE International Conference on Peer-to-Peer Computing. London. England; 2014.
Polot B, Grothoff C. CADET: Confidential Ad-hoc Decentralized End-to-End Transport. In: Med-Hoc-Net 2014. Med-Hoc-Net 2014. ; 2014.
Wachs M, Schanzenbach M, Grothoff C. A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System. In: International Conference on Cryptology and Network Security (CANS). International Conference on Cryptology and Network Security (CANS). Springer Verlag; 2014.
Scheibner F. Control Flow Analysis for Event-Driven Programs. Department of Computer Sceince. 2014 ;B.Sc:71.
Morales A. Cryogenic: Enabling Power-Aware Applications on Linux. Department of Computer Science. 2014 ;M. Sc.:106.
Dold F. Cryptographically Secure, Distributed Electronic Voting. Computer Science. 2014 ;B.S.:49.
Tarabai O. A Decentralized and Autonomous Anomaly Detection Infrastructure for Decentralized Peer-to-Peer Networks. Technische Universität München. 2014 ;Master:63.
Singh S. Experimental comparison of Byzantine fault tolerant distributed hash tables. Computer Science. 2014 ;M.S.:42.
Kirsch J. Improved Kernel-Based Port-Knocking in Linux. Computer Science. 2014 ;M.S.
Grothoff C, Polot B, von Loesch C. The Internet is Broken: Idealistic Ideas for Building a GNU Network. In: W3C/IAB Workshop on Strengthening the Internet Against Pervasive Monitoring (STRINT). W3C/IAB Workshop on Strengthening the Internet Against Pervasive Monitoring (STRINT). London, UK: W3C/IAB; 2014.
Oehlmann F. Machine Learning for Bandwidth Management in Decentralized Networks. Department of Computer Science. 2014 ;M. Sc.:91.
Arias R. Numerical Stability and Scalability of Secure Private Linear Programming. Computer Science. 2014 ;B. Sc.:65.
2013
Toth GX. Design of a Social Messaging System Using Stateful Multicast. 2013 ;M.Sc.:76.
Wachs M, Schanzenbach M, Grothoff C. On the Feasibility of a Censorship Resistant Decentralized Name System. In: 6th International Symposium on Foundations & Practice of Security (FPS 2013). 6th International Symposium on Foundations & Practice of Security (FPS 2013). La Rochelle, France: Springer Verlag; 2013.
Totakura SHarsha. Large Scale Distributed Evaluation of Peer-to-Peer Protocols. Department of Computer Science. 2013 ;Master of Science:76.

Pages