Christian Grothoff

Orcid: 0000-0002-6858-6808

According to our database1, Christian Grothoff authored at least 49 papers between 2002 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
The GNU Name System.
RFC, November, 2023

2022
Zero-Knowledge Age Restriction for GNU Taler.
Proceedings of the Computer Security - ESORICS 2022, 2022

Project Depolymerization: Tokenization of Blockchains.
Proceedings of the 4th Conference on Blockchain Research & Applications for Innovative Networks and Services, 2022

2021
How to Issue a Central Bank Digital Currency.
CoRR, 2021

Decentralized Identities for Self-sovereign End-users (DISSENS).
Proceedings of the Open Identity Summit 2021, Copenhagen, Denmark, Juni 1-2, 2021., 2021

2020
The 'payto' URI Scheme for Payments.
RFC, October, 2020

2018
Toward secure name resolution on the internet.
Comput. Secur., 2018

2017
Byzantine set-union consensus using efficient set reconciliation.
EURASIP J. Inf. Secur., 2017

The GNUnet System.
, 2017

2016
GNU Taler: Ethical Online Payments for the Internet Age.
ERCIM News, 2016

Enabling Secure Web Payments with GNU Taler.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2016

Privacy-Preserving Abuse Detection in Future Decentralised Online Social Networks.
Proceedings of the Data Privacy Management and Security Assurance, 2016

2014
Automatic transport selection and resource allocation for resilient communication in decentralised networks.
Proceedings of the 14th IEEE International Conference on Peer-to-Peer Computing, 2014

CADET: Confidential ad-hoc decentralized end-to-end transport.
Proceedings of the 13th Annual Mediterranean Ad Hoc Networking Workshop, 2014

Cryogenic: Enabling Power-Aware Applications on Linux.
Proceedings of the ICT for Sustainability 2014 (ICT4S-14), 2014

A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System.
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014

2013
On the Feasibility of a Censorship Resistant Decentralized Name System.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

2012
Efficient relaxed search in hierarchically clustered sequence datasets.
ACM J. Exp. Algorithmics, 2012

Efficient and Secure Decentralized Network Size Estimation.
Proceedings of the NETWORKING 2012, 2012

Partitioning the Internet.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012

2011
Comprehensive and relaxed search for oligonucleotide signatures in hierarchically clustered sequence datasets.
Bioinform., 2011

Beyond Simulation: Large-Scale Distributed Emulation of P2P Protocols.
Proceedings of the 4th Workshop on Cyber Security Experimentation and Test, 2011

Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study Using I2P.
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

R<sup>5</sup>N: Randomized recursive routing for restricted-route networks.
Proceedings of the 5th International Conference on Network and System Security, 2011

The Free Secure Network Systems Group: Secure Peer-to-Peer Networking and Beyond.
Proceedings of the First SysSec Workshop 2011, 2011

2010
Simplifying parallel and distributed simulation with the DUP system.
Proceedings of the 2010 Spring Simulation Multiconference, 2010

Autonomous NAT Traversal.
Proceedings of the IEEE Tenth International Conference on Peer-to-Peer Computing, 2010

Distributed Stream Processing with DUP.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2010

2009
Translation-based steganography.
J. Comput. Secur., 2009

A Practical Congestion Attack on Tor Using Long Paths.
Proceedings of the 18th USENIX Security Symposium, 2009

2008
The Runabout.
Softw. Pract. Exp., 2008

Bootstrapping of Peer-to-Peer Networks.
Proceedings of the 2008 International Symposium on Applications and the Internet, 2008

Constrained types for object-oriented languages.
Proceedings of the 23rd Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2008

2007
Encapsulating objects with confined types.
ACM Trans. Program. Lang. Syst., 2007

Routing in the Dark: Pitch Black.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Lost in just the translation.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Young guns/object orientation: the next generation.
Proceedings of the Companion to the 21th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2006

Optimal Bitwise Register Allocation Using Integer Linear Programming.
Proceedings of the Languages and Compilers for Parallel Computing, 2006

2005
Engineering a common intermediate representation for the Ovm framework.
Sci. Comput. Program., 2005

Type-Safe Optimisation of Plugin Architectures.
Proceedings of the Static Analysis, 12th International Symposium, 2005

Deriving object typestates in the presence of inter-object references.
Proceedings of the 20th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2005

X10: an object-oriented approach to non-uniform cluster computing.
Proceedings of the 20th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2005

2004
Panel Discussion - Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004

2003
Resource allocation in peer-to-peer networks - An excess-based economic model.
Wirtschaftsinf., 2003

gap - Practical Anonymous Networking.
Proceedings of the Privacy Enhancing Technologies, Third International Workshop, 2003

Engineering a customizable intermediate representation.
Proceedings of the 2003 Workshop on Interpreters, Virtual Machines and Emulators, 2003

Walkabout Revisited: The Runabout.
Proceedings of the ECOOP 2003, 2003

A Transport Layer A straction for Peer-to-Peer Networks.
Proceedings of the 3rd IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2003), 2003

2002
Efficient Sharing of Encrypted Data.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002


  Loading...