You are here

Bibliography

Export 55 results:
Author [ Title(Desc)] Type Year
Filters: Keyword is GNUnet  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Polot B. Adapting Blackhat Approaches to Increase the Resilience of Whitehat Application Scenarios. Computer Science. 2010 ;M.S.
Kügler D. An Analysis of GNUnet and the Implications for Anonymous, Censorship-Resistant Networks. In: Proceedings of the 3rd International Workshop on Privacy Enhancing Technologies (PET 2003. Proceedings of the 3rd International Workshop on Privacy Enhancing Technologies (PET 2003. Springer-Verlag; 2003. pp. 161–176.
Beneš N. An Approach for Home Routers to Securely Erase Sensitive Data. Informatics. 2014 ;Bachelor:64.
Wachs M, Oehlmann F, Grothoff C. Automatic Transport Selection and Resource Allocation for Resilient Communication in Decentralised Networks. In: 14-th IEEE International Conference on Peer-to-Peer Computing. 14-th IEEE International Conference on Peer-to-Peer Computing. London. England; 2014.
Müller A, Evans NS, Grothoff C, Kamkar S. Autonomous NAT Traversal. In: 10th IEEE International Conference on Peer-to-Peer Computing (IEEE P2P'10). 10th IEEE International Conference on Peer-to-Peer Computing (IEEE P2P'10). Delft, The Netherlands: IEEE; 2010. Available from: http://grothoff.org/christian/pwnat.pdf
B
Evans NS, Grothoff C. Beyond Simulation: Large-Scale Distributed Emulation of P2P Protocols. In: 4th Workshop on Cyber Security Experimentation and Test (CSET 2011). 4th Workshop on Cyber Security Experimentation and Test (CSET 2011). San Francisco, California: USENIX Association; 2011.
Dold F. Byzantine Fault Tolerant Set Consensus with Efficient Set Reconciliation. Computer Science. 2015 ;M.S.:69.
Dold F, Grothoff C. Byzantine Set-Union Consensus using Efficient Set Reconciliation. In: International Conference on Availability, Reliability and Security (ARES). International Conference on Availability, Reliability and Security (ARES). ; 2016.
E
Evans NS, Polot B, Grothoff C. Efficient and Secure Decentralized Network Size Estimation. In: IFIP International Conferences on Networking (Networking 2012). IFIP International Conferences on Networking (Networking 2012). Prague, CZ: Springer Verlag; 2012. p. 304--317. Available from: http://grothoff.org/christian/rrsize2012.pdf
Evans NS, Polot B, Grothoff C. Efficient and Secure Decentralized Network Size Estimation. Garching bei Muenchen: Technische Universitaet Muenchen; 2012.
Bennett K, Grothoff C, Horozov T, Patrascu I. Efficient Sharing of Encrypted Data. In: Proceedings of ACSIP 2002. Proceedings of ACSIP 2002. Melbourne, Australia: Springer-Verlag; 2002. pp. 107–120. Available from: http://grothoff.org/christian/esed.pdf
Burdges J, Dold F, Grothoff C, Stanisci M. Enabling Secure Web Payments with GNU Taler. In: 6th International Conference on Security, Privacy and Applied Cryptographic Engineering. 6th International Conference on Security, Privacy and Applied Cryptographic Engineering. Hyderabad: Springer; 2016.
Gritzalis S. Enhancing Web privacy and anonymity in the digital era. Information Management & Computer Security. 2004 ;12(3):255--287.

Pages