Christian Grothoff
Christian Grothoff
Bern University of Applied Sciences
Dirección de correo verificada de grothoff.org - Página principal
Título
Citado por
Citado por
Año
X10: an object-oriented approach to non-uniform cluster computing
P Charles, C Grothoff, V Saraswat, C Donawa, A Kielstra, K Ebcioglu, ...
ACM SIGPLAN Notices 40 (10), 519-538, 2005
19612005
A practical congestion attack on Tor using long paths
NS Evans, R Dingledine, C Grothoff
Proceedings of the 18th conference on USENIX security symposium, 33-50, 2009
2292009
GAP–practical anonymous networking
K Bennett, C Grothoff
International Workshop on Privacy Enhancing Technologies, 141-160, 2003
1502003
Encapsulating objects with confined types
C Grothoff, J Palsberg, J Vitek
ACM SIGPLAN Notices 36 (11), 241-255, 2001
1422001
Lost in just the translation
R Stutsman, C Grothoff, M Atallah, K Grothoff
Proceedings of the 2006 ACM symposium on Applied computing, 338-345, 2006
742006
An excess-based economic model for resource allocation in peer-to-peer networks
C Grothoff
Wirtschaftsinformatik 45 (3), 285-292, 2003
742003
Translation-based steganography
C Grothoff, K Grothoff, L Alkhutova, R Stutsman, M Atallah
International Workshop on Information Hiding, 219-233, 2005
712005
Efficient sharing of encrypted data
K Bennett, C Grothoff, T Horozov, I Patrascu
Australasian Conference on Information Security and Privacy, 107-120, 2002
702002
Privacy-implications of performance-based peer selection by onion-routers: A real-world case study using i2p
M Herrmann, C Grothoff
Privacy Enhancing Technologies, 155-174, 2011
622011
Constrained types for object-oriented languages
N Nystrom, V Saraswat, J Palsberg, C Grothoff
ACM SIGPLAN Notices 43 (10), 457-474, 2008
602008
A censorship-resistant, privacy-enhancing and fully decentralized name system
M Wachs, M Schanzenbach, C Grothoff
International Conference on Cryptology and Network Security, 127-142, 2014
582014
Walkabout revisited: The runabout
C Grothoff
European Conference on Object-Oriented Programming, 103-125, 2003
512003
R5N: Randomized recursive routing for restricted-route networks
NS Evans, C Grothoff
Network and System Security (NSS), 2011 5th International Conference on, 316-321, 2011
492011
Deriving object typestates in the presence of inter-object references
MG Nanda, C Grothoff, S Chandra
ACM SIGPLAN Notices 40 (10), 77-96, 2005
492005
Bootstrapping of peer-to-peer networks
C GauthierDickey, C Grothoff
Applications and the Internet, 2008. SAINT 2008. International Symposium on …, 2008
452008
Routing in the dark: Pitch black
NS Evans, C GauthierDickey, C Grothoff
Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third …, 2007
382007
Autonomous nat traversal
A Müller, N Evans, C Grothoff, S Kamkar
Peer-to-Peer Computing (P2P), 2010 IEEE Tenth International Conference on, 1-4, 2010
372010
Optimal bitwise register allocation using integer linear programming
R Barik, C Grothoff, R Gupta, V Pandit, R Udupa
International Workshop on Languages and Compilers for Parallel Computing …, 2006
352006
The NSA’s SKYNET program may be killing thousands of innocent people
C Grothoff, J Porup
ARS Technica, 2016
342016
Encapsulating objects with confined types
C Grothoff, J Palsberg, J Vitek
ACM Transactions on Programming Languages and Systems (TOPLAS) 29 (6), 32, 2007
312007
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20