You are here

Bibliography

Export 34 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is GNUnet and Author is Christian Grothoff  [Clear All Filters]
2017
Ulrich C. Improving Voice over GNUnet. Elektrotechnik und Informatik. 2017 ;Bachelor:48.
2016
Dold F, Grothoff C. Byzantine Set-Union Consensus using Efficient Set Reconciliation. In: International Conference on Availability, Reliability and Security (ARES). International Conference on Availability, Reliability and Security (ARES). ; 2016.
Burdges J, Dold F, Grothoff C, Stanisci M. Enabling Secure Web Payments with GNU Taler. In: 6th International Conference on Security, Privacy and Applied Cryptographic Engineering. 6th International Conference on Security, Privacy and Applied Cryptographic Engineering. Hyderabad: Springer; 2016.
García-Recuero Á, Burdges J, Grothoff C. Privacy-Preserving Abuse Detection in Future Decentralised Online Social Networks. In: Data Privacy Management (DPM). Data Privacy Management (DPM). Heraklion, Greece: Springer; 2016.
2014
Beneš N. An Approach for Home Routers to Securely Erase Sensitive Data. Informatics. 2014 ;Bachelor:64.
Wachs M, Oehlmann F, Grothoff C. Automatic Transport Selection and Resource Allocation for Resilient Communication in Decentralised Networks. In: 14-th IEEE International Conference on Peer-to-Peer Computing. 14-th IEEE International Conference on Peer-to-Peer Computing. London. England; 2014.
Polot B, Grothoff C. CADET: Confidential Ad-hoc Decentralized End-to-End Transport. In: Med-Hoc-Net 2014. Med-Hoc-Net 2014. ; 2014.
Wachs M, Schanzenbach M, Grothoff C. A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System. In: International Conference on Cryptology and Network Security (CANS). International Conference on Cryptology and Network Security (CANS). Springer Verlag; 2014.
Morales A. Cryogenic: Enabling Power-Aware Applications on Linux. Department of Computer Science. 2014 ;M. Sc.:106.
Dold F. Cryptographically Secure, Distributed Electronic Voting. Computer Science. 2014 ;B.S.:49.
Singh S. Experimental comparison of Byzantine fault tolerant distributed hash tables. Computer Science. 2014 ;M.S.:42.
Kirsch J. Improved Kernel-Based Port-Knocking in Linux. Computer Science. 2014 ;M.S.
Grothoff C, Polot B, von Loesch C. The Internet is Broken: Idealistic Ideas for Building a GNU Network. In: W3C/IAB Workshop on Strengthening the Internet Against Pervasive Monitoring (STRINT). W3C/IAB Workshop on Strengthening the Internet Against Pervasive Monitoring (STRINT). London, UK: W3C/IAB; 2014.
Oehlmann F. Machine Learning for Bandwidth Management in Decentralized Networks. Department of Computer Science. 2014 ;M. Sc.:91.
2013
Toth GX. Design of a Social Messaging System Using Stateful Multicast. 2013 ;M.Sc.:76.
Wachs M, Schanzenbach M, Grothoff C. On the Feasibility of a Censorship Resistant Decentralized Name System. In: 6th International Symposium on Foundations & Practice of Security (FPS 2013). 6th International Symposium on Foundations & Practice of Security (FPS 2013). La Rochelle, France: Springer Verlag; 2013.
2012
Szengel M. Decentralized Evaluation of Regular Expressions for Capability Discovery in Peer-to-Peer Networks. Department of Computer Science. 2012 ;M.S.:100.
Schanzenbach M. Design and Implementation of a Censorship Resistant and Fully Decentralized Name System. Fakultaet fuer Informatik. 2012 ;M.Sc.:116.
Evans NS, Polot B, Grothoff C. Efficient and Secure Decentralized Network Size Estimation. In: IFIP International Conferences on Networking (Networking 2012). IFIP International Conferences on Networking (Networking 2012). Prague, CZ: Springer Verlag; 2012. p. 304--317. Available from: http://grothoff.org/christian/rrsize2012.pdf
Evans NS, Polot B, Grothoff C. Efficient and Secure Decentralized Network Size Estimation. Garching bei Muenchen: Technische Universitaet Muenchen; 2012.
2011
Evans NS, Grothoff C. Beyond Simulation: Large-Scale Distributed Emulation of P2P Protocols. In: 4th Workshop on Cyber Security Experimentation and Test (CSET 2011). 4th Workshop on Cyber Security Experimentation and Test (CSET 2011). San Francisco, California: USENIX Association; 2011.
Grothoff C. The Free Secure Network Systems Group: Secure Peer-to-Peer Networking and Beyond. In: SysSec 2011. SysSec 2011. Amsterdam, Netherlands; 2011.
Evans NS. Methods for Secure Decentralized Routing in Open Networks. Network Architectures and Services, Department of Computer Science. 2011 ;Dr. rer. nat.:234.
Polot B, Grothoff C. Performance Regression Monitoring with Gauger. LinuxJournal [Internet]. 2011 ;(209). Available from: http://www.linuxjournaldigital.com/linuxjournal/201109#pg68

Pages