You are here

Bibliography

Export 55 results:
[ Author(Desc)] Title Type Year
Filters: Keyword is GNUnet  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
Beneš N. An Approach for Home Routers to Securely Erase Sensitive Data. Informatics. 2014 ;Bachelor:64.
Bennett K, Grothoff C. gap - Practical Anonymous Networking. In: Designing Privacy Enhancing Technologies. Designing Privacy Enhancing Technologies. Springer-Verlag; 2003. pp. 141–160. Available from: http://grothoff.org/christian/aff.pdf
Bennett K, Stef T, Grothoff C, Horozov T, Patrascu I. The GNet Whitepaper. Purdue University; 2002.
Bennett K, Grothoff C, Horozov T, Patrascu I. Efficient Sharing of Encrypted Data. In: Proceedings of ACSIP 2002. Proceedings of ACSIP 2002. Melbourne, Australia: Springer-Verlag; 2002. pp. 107–120. Available from: http://grothoff.org/christian/esed.pdf
Bernstein DJ. Curve25519: new Diffie-Hellman speed records. In: PKC. PKC. ; 2006.
Bernstein DJ, Duif N, Lange T, Schwabe P, Hang B-Y. High-speed high-security signatures. Journal of Cryptographic Engineering [Internet]. 2011 ;2:77--89. Available from: http://ed25519.cr.yp.to/papers.html
Burdges J, Dold F, Grothoff C, Stanisci M. Enabling Secure Web Payments with GNU Taler. In: 6th International Conference on Security, Privacy and Applied Cryptographic Engineering. 6th International Conference on Security, Privacy and Applied Cryptographic Engineering. Hyderabad: Springer; 2016.
D
Dold F. Byzantine Fault Tolerant Set Consensus with Efficient Set Reconciliation. Computer Science. 2015 ;M.S.:69.
Dold F. Cryptographically Secure, Distributed Electronic Voting. Computer Science. 2014 ;B.S.:49.
Dold F, Grothoff C. Byzantine Set-Union Consensus using Efficient Set Reconciliation. In: International Conference on Availability, Reliability and Security (ARES). International Conference on Availability, Reliability and Security (ARES). ; 2016.
E
Eppstein D, Goodrich MT, Uyeda F, Varghese G. What's the difference?: efficient set reconciliation without prior context. In: Proceedings of the ACM SIGCOMM 2011 conference. Proceedings of the ACM SIGCOMM 2011 conference. New York, NY, USA: ACM; 2011. pp. 218–229. Available from: http://doi.acm.org/10.1145/2018436.2018462
Evans NS, Grothoff C. Beyond Simulation: Large-Scale Distributed Emulation of P2P Protocols. In: 4th Workshop on Cyber Security Experimentation and Test (CSET 2011). 4th Workshop on Cyber Security Experimentation and Test (CSET 2011). San Francisco, California: USENIX Association; 2011.
Evans NS. Methods for Secure Decentralized Routing in Open Networks. Network Architectures and Services, Department of Computer Science. 2011 ;Dr. rer. nat.:234.
Evans NS, Polot B, Grothoff C. Efficient and Secure Decentralized Network Size Estimation. Garching bei Muenchen: Technische Universitaet Muenchen; 2012.
Evans NS, Polot B, Grothoff C. Efficient and Secure Decentralized Network Size Estimation. In: IFIP International Conferences on Networking (Networking 2012). IFIP International Conferences on Networking (Networking 2012). Prague, CZ: Springer Verlag; 2012. p. 304--317. Available from: http://grothoff.org/christian/rrsize2012.pdf
Evans NS, Grothoff C. R5N : Randomized Recursive Routing for Restricted-Route Networks. In: 5th International Conference on Network and System Security (NSS 2011). 5th International Conference on Network and System Security (NSS 2011). Milan, Italy: IEEE; 2011.
F
Ferreira RA, Grothoff C, Ruth P. A Transport Layer Abstraction for Peer-to-Peer Networks. In: Proceedings of the 3rd International Symposium on Cluster Computing and the Grid (GRID 2003). Proceedings of the 3rd International Symposium on Cluster Computing and the Grid (GRID 2003). IEEE Computer Society; 2003. pp. 398–403. Available from: http://grothoff.org/christian/transport.pdf
G
García-Recuero Á, Burdges J, Grothoff C. Privacy-Preserving Abuse Detection in Future Decentralised Online Social Networks. In: Data Privacy Management (DPM). Data Privacy Management (DPM). Heraklion, Greece: Springer; 2016.
Gritzalis S. Enhancing Web privacy and anonymity in the digital era. Information Management & Computer Security. 2004 ;12(3):255--287.
Grothoff C. A Quick Introduction to Bloom Filters. The GNUnet Project; 2005.
Grothoff C. Reading File Metadata with extract and libextractor. Linux Journal [Internet]. 2005 ;6-2005. Available from: http://www.linuxjournal.com/article/7552
Grothoff C. The Free Secure Network Systems Group: Secure Peer-to-Peer Networking and Beyond. In: SysSec 2011. SysSec 2011. Amsterdam, Netherlands; 2011.
Grothoff C. The GNUnet System. Informatique [Internet]. 2017 ;HDR:181. Available from: https://grothoff.org/christian/habil.pdf
Grothoff C, Polot B, von Loesch C. The Internet is Broken: Idealistic Ideas for Building a GNU Network. In: W3C/IAB Workshop on Strengthening the Internet Against Pervasive Monitoring (STRINT). W3C/IAB Workshop on Strengthening the Internet Against Pervasive Monitoring (STRINT). London, UK: W3C/IAB; 2014.

Pages