You are here

Bibliography

Export 56 results:
[ Author(Desc)] Title Type Year
Filters: Keyword is GNUnet  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
Beneš N. An Approach for Home Routers to Securely Erase Sensitive Data. Informatics. 2014 ;Bachelor:64.
Bennett K, Grothoff C. gap - Practical Anonymous Networking. In: Designing Privacy Enhancing Technologies. Designing Privacy Enhancing Technologies. Springer-Verlag; 2003. pp. 141–160. Available from: http://grothoff.org/christian/aff.pdf
Bennett K, Stef T, Grothoff C, Horozov T, Patrascu I. The GNet Whitepaper. Purdue University; 2002.
Bennett K, Grothoff C, Horozov T, Patrascu I. Efficient Sharing of Encrypted Data. In: Proceedings of ACSIP 2002. Proceedings of ACSIP 2002. Melbourne, Australia: Springer-Verlag; 2002. pp. 107–120. Available from: http://grothoff.org/christian/esed.pdf
Bernstein DJ, Duif N, Lange T, Schwabe P, Hang B-Y. High-speed high-security signatures. Journal of Cryptographic Engineering [Internet]. 2011 ;2:77--89. Available from: http://ed25519.cr.yp.to/papers.html
Bernstein DJ. Curve25519: new Diffie-Hellman speed records. In: PKC. PKC. ; 2006.
Burdges J, Dold F, Grothoff C, Stanisci M. Enabling Secure Web Payments with GNU Taler. In: 6th International Conference on Security, Privacy and Applied Cryptographic Engineering. 6th International Conference on Security, Privacy and Applied Cryptographic Engineering. Hyderabad: Springer; 2016.
D
Dold F, Grothoff C. Byzantine Set-Union Consensus using Efficient Set Reconciliation. In: International Conference on Availability, Reliability and Security (ARES). International Conference on Availability, Reliability and Security (ARES). ; 2016.
Dold F. Byzantine Fault Tolerant Set Consensus with Efficient Set Reconciliation. Computer Science. 2015 ;M.S.:69.
Dold F. Cryptographically Secure, Distributed Electronic Voting. Computer Science. 2014 ;B.S.:49.
E
Eppstein D, Goodrich MT, Uyeda F, Varghese G. What's the difference?: efficient set reconciliation without prior context. In: Proceedings of the ACM SIGCOMM 2011 conference. Proceedings of the ACM SIGCOMM 2011 conference. New York, NY, USA: ACM; 2011. pp. 218–229. Available from: http://doi.acm.org/10.1145/2018436.2018462
Evans NS, Polot B, Grothoff C. Efficient and Secure Decentralized Network Size Estimation. In: IFIP International Conferences on Networking (Networking 2012). IFIP International Conferences on Networking (Networking 2012). Prague, CZ: Springer Verlag; 2012. p. 304--317. Available from: http://grothoff.org/christian/rrsize2012.pdf
Evans NS, Grothoff C. R5N : Randomized Recursive Routing for Restricted-Route Networks. In: 5th International Conference on Network and System Security (NSS 2011). 5th International Conference on Network and System Security (NSS 2011). Milan, Italy: IEEE; 2011.
Evans NS, Grothoff C. Beyond Simulation: Large-Scale Distributed Emulation of P2P Protocols. In: 4th Workshop on Cyber Security Experimentation and Test (CSET 2011). 4th Workshop on Cyber Security Experimentation and Test (CSET 2011). San Francisco, California: USENIX Association; 2011.
Evans NS. Methods for Secure Decentralized Routing in Open Networks. Network Architectures and Services, Department of Computer Science. 2011 ;Dr. rer. nat.:234.
Evans NS, Polot B, Grothoff C. Efficient and Secure Decentralized Network Size Estimation. Garching bei Muenchen: Technische Universitaet Muenchen; 2012.
F
Ferreira RA, Grothoff C, Ruth P. A Transport Layer Abstraction for Peer-to-Peer Networks. In: Proceedings of the 3rd International Symposium on Cluster Computing and the Grid (GRID 2003). Proceedings of the 3rd International Symposium on Cluster Computing and the Grid (GRID 2003). IEEE Computer Society; 2003. pp. 398–403. Available from: http://grothoff.org/christian/transport.pdf

Pages