You are here

Bibliography

Export 55 results:
Author Title Type [ Year(Desc)]
Filters: Keyword is GNUnet  [Clear All Filters]
2002
Bennett K, Grothoff C, Horozov T, Patrascu I. Efficient Sharing of Encrypted Data. In: Proceedings of ACSIP 2002. Proceedings of ACSIP 2002. Melbourne, Australia: Springer-Verlag; 2002. pp. 107–120. Available from: http://grothoff.org/christian/esed.pdf
Bennett K, Stef T, Grothoff C, Horozov T, Patrascu I. The GNet Whitepaper. Purdue University; 2002.
2003
Kügler D. An Analysis of GNUnet and the Implications for Anonymous, Censorship-Resistant Networks. In: Proceedings of the 3rd International Workshop on Privacy Enhancing Technologies (PET 2003. Proceedings of the 3rd International Workshop on Privacy Enhancing Technologies (PET 2003. Springer-Verlag; 2003. pp. 161–176.
Grothoff C. An Excess-Based Economic Model for Resource Allocation in Peer-to-Peer Networks. Wirtschaftsinformatik [Internet]. 2003 ;3-2003. Available from: http://grothoff.org/christian/ebe.pdf
Bennett K, Grothoff C. gap - Practical Anonymous Networking. In: Designing Privacy Enhancing Technologies. Designing Privacy Enhancing Technologies. Springer-Verlag; 2003. pp. 141–160. Available from: http://grothoff.org/christian/aff.pdf
Ferreira RA, Grothoff C, Ruth P. A Transport Layer Abstraction for Peer-to-Peer Networks. In: Proceedings of the 3rd International Symposium on Cluster Computing and the Grid (GRID 2003). Proceedings of the 3rd International Symposium on Cluster Computing and the Grid (GRID 2003). IEEE Computer Society; 2003. pp. 398–403. Available from: http://grothoff.org/christian/transport.pdf
2004
Gritzalis S. Enhancing Web privacy and anonymity in the digital era. Information Management & Computer Security. 2004 ;12(3):255--287.
2005
Tatara K, Hori Yoshiaki, Sakurai K. Query Forwarding Algorithm Supporting Initiator Anonymity in GNUnet. In: Parallel and Distributed Systems, 2005. Proceedings. 11th International Conference on. Vol. 2. Parallel and Distributed Systems, 2005. Proceedings. 11th International Conference on. ; 2005. pp. 235-239.
Grothoff C. A Quick Introduction to Bloom Filters. The GNUnet Project; 2005.
Grothoff C. Reading File Metadata with extract and libextractor. Linux Journal [Internet]. 2005 ;6-2005. Available from: http://www.linuxjournal.com/article/7552
2010
Polot B. Adapting Blackhat Approaches to Increase the Resilience of Whitehat Application Scenarios. Computer Science. 2010 ;M.S.
Müller A, Evans NS, Grothoff C, Kamkar S. Autonomous NAT Traversal. In: 10th IEEE International Conference on Peer-to-Peer Computing (IEEE P2P'10). 10th IEEE International Conference on Peer-to-Peer Computing (IEEE P2P'10). Delft, The Netherlands: IEEE; 2010. Available from: http://grothoff.org/christian/pwnat.pdf
Krawczyk H. Cryptographic Extraction and Key Derivation: The HKDF Scheme. [Internet]. 2010 . Available from: http://eprint.iacr.org/2010/264
Ruottu T. Developing Peer-to-Peer Web Applications. Computer Science. 2010 ;M.S.:66.
2011
Evans NS, Grothoff C. Beyond Simulation: Large-Scale Distributed Emulation of P2P Protocols. In: 4th Workshop on Cyber Security Experimentation and Test (CSET 2011). 4th Workshop on Cyber Security Experimentation and Test (CSET 2011). San Francisco, California: USENIX Association; 2011.
Grothoff C. The Free Secure Network Systems Group: Secure Peer-to-Peer Networking and Beyond. In: SysSec 2011. SysSec 2011. Amsterdam, Netherlands; 2011.
Bernstein DJ, Duif N, Lange T, Schwabe P, Hang B-Y. High-speed high-security signatures. Journal of Cryptographic Engineering [Internet]. 2011 ;2:77--89. Available from: http://ed25519.cr.yp.to/papers.html
Evans NS. Methods for Secure Decentralized Routing in Open Networks. Network Architectures and Services, Department of Computer Science. 2011 ;Dr. rer. nat.:234.
Polot B, Grothoff C. Performance Regression Monitoring with Gauger. LinuxJournal [Internet]. 2011 ;(209). Available from: http://www.linuxjournaldigital.com/linuxjournal/201109#pg68
Evans NS, Grothoff C. R5N : Randomized Recursive Routing for Restricted-Route Networks. In: 5th International Conference on Network and System Security (NSS 2011). 5th International Conference on Network and System Security (NSS 2011). Milan, Italy: IEEE; 2011.
v. Loesch C, Toth GX, Baumann M. Scalability & Paranoia in a Decentralized Social Network. In: Federated Social Web. Federated Social Web. Berlin, Germany; 2011. Available from: http://secushare.org/2011-FSW-Scalability-Paranoia
Eppstein D, Goodrich MT, Uyeda F, Varghese G. What's the difference?: efficient set reconciliation without prior context. In: Proceedings of the ACM SIGCOMM 2011 conference. Proceedings of the ACM SIGCOMM 2011 conference. New York, NY, USA: ACM; 2011. pp. 218–229. Available from: http://doi.acm.org/10.1145/2018436.2018462

Pages