You are here

Bibliography

Export 55 results:
Author Title [ Type(Desc)] Year
Filters: Keyword is GNUnet  [Clear All Filters]
Conference Paper
Kügler D. An Analysis of GNUnet and the Implications for Anonymous, Censorship-Resistant Networks. In: Proceedings of the 3rd International Workshop on Privacy Enhancing Technologies (PET 2003. Proceedings of the 3rd International Workshop on Privacy Enhancing Technologies (PET 2003. Springer-Verlag; 2003. pp. 161–176.
Wachs M, Oehlmann F, Grothoff C. Automatic Transport Selection and Resource Allocation for Resilient Communication in Decentralised Networks. In: 14-th IEEE International Conference on Peer-to-Peer Computing. 14-th IEEE International Conference on Peer-to-Peer Computing. London. England; 2014.
Müller A, Evans NS, Grothoff C, Kamkar S. Autonomous NAT Traversal. In: 10th IEEE International Conference on Peer-to-Peer Computing (IEEE P2P'10). 10th IEEE International Conference on Peer-to-Peer Computing (IEEE P2P'10). Delft, The Netherlands: IEEE; 2010. Available from: http://grothoff.org/christian/pwnat.pdf
Evans NS, Grothoff C. Beyond Simulation: Large-Scale Distributed Emulation of P2P Protocols. In: 4th Workshop on Cyber Security Experimentation and Test (CSET 2011). 4th Workshop on Cyber Security Experimentation and Test (CSET 2011). San Francisco, California: USENIX Association; 2011.
Dold F, Grothoff C. Byzantine Set-Union Consensus using Efficient Set Reconciliation. In: International Conference on Availability, Reliability and Security (ARES). International Conference on Availability, Reliability and Security (ARES). ; 2016.
Polot B, Grothoff C. CADET: Confidential Ad-hoc Decentralized End-to-End Transport. In: Med-Hoc-Net 2014. Med-Hoc-Net 2014. ; 2014.
Wachs M, Schanzenbach M, Grothoff C. A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System. In: International Conference on Cryptology and Network Security (CANS). International Conference on Cryptology and Network Security (CANS). Springer Verlag; 2014.
Bernstein DJ. Curve25519: new Diffie-Hellman speed records. In: PKC. PKC. ; 2006.
Evans NS, Polot B, Grothoff C. Efficient and Secure Decentralized Network Size Estimation. In: IFIP International Conferences on Networking (Networking 2012). IFIP International Conferences on Networking (Networking 2012). Prague, CZ: Springer Verlag; 2012. p. 304--317. Available from: http://grothoff.org/christian/rrsize2012.pdf
Bennett K, Grothoff C, Horozov T, Patrascu I. Efficient Sharing of Encrypted Data. In: Proceedings of ACSIP 2002. Proceedings of ACSIP 2002. Melbourne, Australia: Springer-Verlag; 2002. pp. 107–120. Available from: http://grothoff.org/christian/esed.pdf
Burdges J, Dold F, Grothoff C, Stanisci M. Enabling Secure Web Payments with GNU Taler. In: 6th International Conference on Security, Privacy and Applied Cryptographic Engineering. 6th International Conference on Security, Privacy and Applied Cryptographic Engineering. Hyderabad: Springer; 2016.
Wachs M, Schanzenbach M, Grothoff C. On the Feasibility of a Censorship Resistant Decentralized Name System. In: 6th International Symposium on Foundations & Practice of Security (FPS 2013). 6th International Symposium on Foundations & Practice of Security (FPS 2013). La Rochelle, France: Springer Verlag; 2013.
Grothoff C. The Free Secure Network Systems Group: Secure Peer-to-Peer Networking and Beyond. In: SysSec 2011. SysSec 2011. Amsterdam, Netherlands; 2011.
Bennett K, Grothoff C. gap - Practical Anonymous Networking. In: Designing Privacy Enhancing Technologies. Designing Privacy Enhancing Technologies. Springer-Verlag; 2003. pp. 141–160. Available from: http://grothoff.org/christian/aff.pdf
Grothoff C, Polot B, von Loesch C. The Internet is Broken: Idealistic Ideas for Building a GNU Network. In: W3C/IAB Workshop on Strengthening the Internet Against Pervasive Monitoring (STRINT). W3C/IAB Workshop on Strengthening the Internet Against Pervasive Monitoring (STRINT). London, UK: W3C/IAB; 2014.
Schanzenbach M, Banse C. Managing and Presenting User Attributes over a Decentralized Secure Name System. In: Data Privacy Management and Security Assurance - 11th International Workshop, {DPM} 2016 and 5th International Workshop, {QASA} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings. Data Privacy Management and Security Assurance - 11th International Workshop, {DPM} 2016 and 5th International Workshop, {QASA} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings. Crete, Greece: Springer; 2016.
García-Recuero Á, Burdges J, Grothoff C. Privacy-Preserving Abuse Detection in Future Decentralised Online Social Networks. In: Data Privacy Management (DPM). Data Privacy Management (DPM). Heraklion, Greece: Springer; 2016.
Tatara K, Hori Yoshiaki, Sakurai K. Query Forwarding Algorithm Supporting Initiator Anonymity in GNUnet. In: Parallel and Distributed Systems, 2005. Proceedings. 11th International Conference on. Vol. 2. Parallel and Distributed Systems, 2005. Proceedings. 11th International Conference on. ; 2005. pp. 235-239.
Evans NS, Grothoff C. R5N : Randomized Recursive Routing for Restricted-Route Networks. In: 5th International Conference on Network and System Security (NSS 2011). 5th International Conference on Network and System Security (NSS 2011). Milan, Italy: IEEE; 2011.
v. Loesch C, Toth GX, Baumann M. Scalability & Paranoia in a Decentralized Social Network. In: Federated Social Web. Federated Social Web. Berlin, Germany; 2011. Available from: http://secushare.org/2011-FSW-Scalability-Paranoia
Ferreira RA, Grothoff C, Ruth P. A Transport Layer Abstraction for Peer-to-Peer Networks. In: Proceedings of the 3rd International Symposium on Cluster Computing and the Grid (GRID 2003). Proceedings of the 3rd International Symposium on Cluster Computing and the Grid (GRID 2003). IEEE Computer Society; 2003. pp. 398–403. Available from: http://grothoff.org/christian/transport.pdf
Eppstein D, Goodrich MT, Uyeda F, Varghese G. What's the difference?: efficient set reconciliation without prior context. In: Proceedings of the ACM SIGCOMM 2011 conference. Proceedings of the ACM SIGCOMM 2011 conference. New York, NY, USA: ACM; 2011. pp. 218–229. Available from: http://doi.acm.org/10.1145/2018436.2018462

Pages