You are here

Bibliography

Export 54 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is GNUnet  [Clear All Filters]
2012
Szengel M. Decentralized Evaluation of Regular Expressions for Capability Discovery in Peer-to-Peer Networks. Department of Computer Science. 2012 ;M.S.:100.
Schanzenbach M. Design and Implementation of a Censorship Resistant and Fully Decentralized Name System. Fakultaet fuer Informatik. 2012 ;M.Sc.:116.
Evans NS, Polot B, Grothoff C. Efficient and Secure Decentralized Network Size Estimation. Garching bei Muenchen: Technische Universitaet Muenchen; 2012.
Evans NS, Polot B, Grothoff C. Efficient and Secure Decentralized Network Size Estimation. In: IFIP International Conferences on Networking (Networking 2012). IFIP International Conferences on Networking (Networking 2012). Prague, CZ: Springer Verlag; 2012. p. 304--317. Available from: http://grothoff.org/christian/rrsize2012.pdf
2011
Evans NS, Grothoff C. Beyond Simulation: Large-Scale Distributed Emulation of P2P Protocols. In: 4th Workshop on Cyber Security Experimentation and Test (CSET 2011). 4th Workshop on Cyber Security Experimentation and Test (CSET 2011). San Francisco, California: USENIX Association; 2011.
Grothoff C. The Free Secure Network Systems Group: Secure Peer-to-Peer Networking and Beyond. In: SysSec 2011. SysSec 2011. Amsterdam, Netherlands; 2011.
Bernstein DJ, Duif N, Lange T, Schwabe P, Hang B-Y. High-speed high-security signatures. Journal of Cryptographic Engineering [Internet]. 2011 ;2:77--89. Available from: http://ed25519.cr.yp.to/papers.html
Evans NS. Methods for Secure Decentralized Routing in Open Networks. Network Architectures and Services, Department of Computer Science. 2011 ;Dr. rer. nat.:234.
Polot B, Grothoff C. Performance Regression Monitoring with Gauger. LinuxJournal [Internet]. 2011 ;(209). Available from: http://www.linuxjournaldigital.com/linuxjournal/201109#pg68
Evans NS, Grothoff C. R5N : Randomized Recursive Routing for Restricted-Route Networks. In: 5th International Conference on Network and System Security (NSS 2011). 5th International Conference on Network and System Security (NSS 2011). Milan, Italy: IEEE; 2011.
v. Loesch C, Toth GX, Baumann M. Scalability & Paranoia in a Decentralized Social Network. In: Federated Social Web. Federated Social Web. Berlin, Germany; 2011. Available from: http://secushare.org/2011-FSW-Scalability-Paranoia
Eppstein D, Goodrich MT, Uyeda F, Varghese G. What's the difference?: efficient set reconciliation without prior context. In: Proceedings of the ACM SIGCOMM 2011 conference. Proceedings of the ACM SIGCOMM 2011 conference. New York, NY, USA: ACM; 2011. pp. 218–229. Available from: http://doi.acm.org/10.1145/2018436.2018462
2010
Polot B. Adapting Blackhat Approaches to Increase the Resilience of Whitehat Application Scenarios. Computer Science. 2010 ;M.S.
Müller A, Evans NS, Grothoff C, Kamkar S. Autonomous NAT Traversal. In: 10th IEEE International Conference on Peer-to-Peer Computing (IEEE P2P'10). 10th IEEE International Conference on Peer-to-Peer Computing (IEEE P2P'10). Delft, The Netherlands: IEEE; 2010. Available from: http://grothoff.org/christian/pwnat.pdf
Krawczyk H. Cryptographic Extraction and Key Derivation: The HKDF Scheme. [Internet]. 2010 . Available from: http://eprint.iacr.org/2010/264
Ruottu T. Developing Peer-to-Peer Web Applications. Computer Science. 2010 ;M.S.:66.
2005
Tatara K, Hori Yoshiaki, Sakurai K. Query Forwarding Algorithm Supporting Initiator Anonymity in GNUnet. In: Parallel and Distributed Systems, 2005. Proceedings. 11th International Conference on. Vol. 2. Parallel and Distributed Systems, 2005. Proceedings. 11th International Conference on. ; 2005. pp. 235-239.
Grothoff C. A Quick Introduction to Bloom Filters. The GNUnet Project; 2005.
Grothoff C. Reading File Metadata with extract and libextractor. Linux Journal [Internet]. 2005 ;6-2005. Available from: http://www.linuxjournal.com/article/7552
2004
Gritzalis S. Enhancing Web privacy and anonymity in the digital era. Information Management & Computer Security. 2004 ;12(3):255--287.
2003
Kügler D. An Analysis of GNUnet and the Implications for Anonymous, Censorship-Resistant Networks. In: Proceedings of the 3rd International Workshop on Privacy Enhancing Technologies (PET 2003. Proceedings of the 3rd International Workshop on Privacy Enhancing Technologies (PET 2003. Springer-Verlag; 2003. pp. 161–176.
Grothoff C. An Excess-Based Economic Model for Resource Allocation in Peer-to-Peer Networks. Wirtschaftsinformatik [Internet]. 2003 ;3-2003. Available from: http://grothoff.org/christian/ebe.pdf

Pages