default search action
Christian Grothoff
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c39]Özgür Kesim, Christian Grothoff:
Lost and Found in the Fog of Trust. JENSFEST 2024: 14-20 - 2023
- [i4]Martin Schanzenbach, Christian Grothoff, Bernd Fix:
The GNU Name System. RFC 9498: 1-74 (2023) - 2022
- [c38]Antoine d'Aligny, Emmanuel Benoist, Christian Grothoff:
Project Depolymerization: Tokenization of Blockchains. BRAINS 2022: 51-54 - [c37]Özgür Kesim, Christian Grothoff, Florian Dold, Martin Schanzenbach:
Zero-Knowledge Age Restriction for GNU Taler. ESORICS (1) 2022: 110-129 - 2021
- [c36]Martin Schanzenbach, Christian Grothoff, Hansjürg Wenger, Maximilian Kaul:
Decentralized Identities for Self-sovereign End-users (DISSENS). Open Identity Summit 2021: 47-58 - [i3]David Chaum, Christian Grothoff, Thomas Moser:
How to Issue a Central Bank Digital Currency. CoRR abs/2103.00254 (2021) - 2020
- [i2]Florian Dold, Christian Grothoff:
The 'payto' URI Scheme for Payments. RFC 8905: 1-12 (2020)
2010 – 2019
- 2018
- [j9]Christian Grothoff, Matthias Wachs, Monika Ermert, Jacob Appelbaum:
Toward secure name resolution on the internet. Comput. Secur. 77: 694-708 (2018) - 2017
- [b1]Christian Grothoff:
The GNUnet System. University of Rennes 1, France, 2017 - [j8]Florian Dold, Christian Grothoff:
Byzantine set-union consensus using efficient set reconciliation. EURASIP J. Inf. Secur. 2017: 14 (2017) - 2016
- [c35]Florian Dold, Christian Grothoff:
Byzantine Set-Union Consensus Using Efficient Set Reconciliation. ARES 2016: 29-38 - [c34]Álvaro García-Recuero, Jeffrey Burdges, Christian Grothoff:
Privacy-Preserving Abuse Detection in Future Decentralised Online Social Networks. DPM/QASA@ESORICS 2016: 78-93 - [c33]Jeffrey Burdges, Florian Dold, Christian Grothoff, Marcello Stanisci:
Enabling Secure Web Payments with GNU Taler. SPACE 2016: 251-270 - [i1]Florian Dold, Christian Grothoff:
GNU Taler: Ethical Online Payments for the Internet Age. ERCIM News 2016(106) (2016) - 2014
- [c32]Matthias Wachs, Martin Schanzenbach, Christian Grothoff:
A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System. CANS 2014: 127-142 - [c31]Alejandra Morales Ruiz, Wilfried Daniels, Danny Hughes, Christian Grothoff:
Cryogenic: Enabling Power-Aware Applications on Linux. ICT4S 2014 - [c30]Bartlomiej Polot, Christian Grothoff:
CADET: Confidential ad-hoc decentralized end-to-end transport. Med-Hoc-Net 2014: 71-78 - [c29]Matthias Wachs, Fabian Oehlmann, Christian Grothoff:
Automatic transport selection and resource allocation for resilient communication in decentralised networks. P2P 2014: 1-5 - 2013
- [c28]Matthias Wachs, Martin Schanzenbach, Christian Grothoff:
On the Feasibility of a Censorship Resistant Decentralized Name System. FPS 2013: 19-30 - 2012
- [j7]Kai Christian Bader, Mikhail J. Atallah, Christian Grothoff:
Efficient relaxed search in hierarchically clustered sequence datasets. ACM J. Exp. Algorithmics 17(1) (2012) - [c27]Matthias Wachs, Christian Grothoff, Ramakrishna Thurimella:
Partitioning the Internet. CRiSIS 2012: 1-8 - [c26]Nathan S. Evans, Bartlomiej Polot, Christian Grothoff:
Efficient and Secure Decentralized Network Size Estimation. Networking (1) 2012: 304-317 - 2011
- [j6]Kai Christian Bader, Christian Grothoff, Harald Meier:
Comprehensive and relaxed search for oligonucleotide signatures in hierarchically clustered sequence datasets. Bioinform. 27(11): 1546-1554 (2011) - [c25]Christian Grothoff:
The Free Secure Network Systems Group: Secure Peer-to-Peer Networking and Beyond. SysSec@DIMVA 2011: 57-58 - [c24]Nathan S. Evans, Christian Grothoff:
R5N: Randomized recursive routing for restricted-route networks. NSS 2011: 316-321 - [c23]Michael Herrmann, Christian Grothoff:
Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study Using I2P. PETS 2011: 155-174 - [c22]Nathan S. Evans, Christian Grothoff:
Beyond Simulation: Large-Scale Distributed Emulation of P2P Protocols. CSET 2011 - 2010
- [c21]Kai Christian Bader, Tilo Eißler, Nathan S. Evans, Chris GauthierDickey, Christian Grothoff, Krista Grothoff, Jeff Keene, Harald Meier, Craig Ritzdorf, Matthew J. Rutherford:
Distributed Stream Processing with DUP. NPC 2010: 232-246 - [c20]Andreas Müller, Nathan S. Evans, Christian Grothoff, Samy Kamkar:
Autonomous NAT Traversal. Peer-to-Peer Computing 2010: 1-4 - [c19]Nathan S. Evans, Chris GauthierDickey, Christian Grothoff, Krista Grothoff, Jeff Keene, Matthew J. Rutherford:
Simplifying parallel and distributed simulation with the DUP system. SpringSim 2010: 154
2000 – 2009
- 2009
- [j5]Christian Grothoff, Krista Grothoff, Ryan Stutsman, Ludmila Alkhutova, Mikhail J. Atallah:
Translation-based steganography. J. Comput. Secur. 17(3): 269-303 (2009) - [c18]Nathan S. Evans, Roger Dingledine, Christian Grothoff:
A Practical Congestion Attack on Tor Using Long Paths. USENIX Security Symposium 2009: 33-50 - 2008
- [j4]Christian Grothoff:
The Runabout. Softw. Pract. Exp. 38(14): 1531-1560 (2008) - [c17]Nathaniel Nystrom, Vijay A. Saraswat, Jens Palsberg, Christian Grothoff:
Constrained types for object-oriented languages. OOPSLA 2008: 457-474 - [c16]Chris GauthierDickey, Christian Grothoff:
Bootstrapping of Peer-to-Peer Networks. SAINT 2008: 205-208 - 2007
- [j3]Christian Grothoff, Jens Palsberg, Jan Vitek:
Encapsulating objects with confined types. ACM Trans. Program. Lang. Syst. 29(6): 32 (2007) - [c15]Nathan S. Evans, Chris GauthierDickey, Christian Grothoff:
Routing in the Dark: Pitch Black. ACSAC 2007: 305-314 - 2006
- [c14]Rajkishore Barik, Christian Grothoff, Rahul Gupta, Vinayaka Pandit, Raghavendra Udupa:
Optimal Bitwise Register Allocation Using Integer Linear Programming. LCPC 2006: 267-282 - [c13]Jeffrey Overbey, Brian Foote, Paul Adamczyk, Jonathan Aldrich, Elisa L. A. Baniassad, Christian Grothoff, Arvind Krishna, Sean McDirmid, Todd D. Millstein, Alex Potanin, Mandana Vaziri:
Young guns/object orientation: the next generation. OOPSLA Companion 2006: 940-942 - [c12]Ryan Stutsman, Christian Grothoff, Mikhail J. Atallah, Krista Grothoff:
Lost in just the translation. SAC 2006: 338-345 - 2005
- [j2]Krzysztof Palacz, Jason Baker, Chapman Flack, Christian Grothoff, Hiroshi Yamauchi, Jan Vitek:
Engineering a common intermediate representation for the Ovm framework. Sci. Comput. Program. 57(3): 357-378 (2005) - [c11]Christian Grothoff, Krista Grothoff, Ludmila Alkhutova, Ryan Stutsman, Mikhail J. Atallah:
Translation-Based Steganography. Information Hiding 2005: 219-233 - [c10]Mangala Gowri Nanda, Christian Grothoff, Satish Chandra:
Deriving object typestates in the presence of inter-object references. OOPSLA 2005: 77-96 - [c9]Philippe Charles, Christian Grothoff, Vijay A. Saraswat, Christopher Donawa, Allan Kielstra, Kemal Ebcioglu, Christoph von Praun, Vivek Sarkar:
X10: an object-oriented approach to non-uniform cluster computing. OOPSLA 2005: 519-538 - [c8]Neal Glew, Jens Palsberg, Christian Grothoff:
Type-Safe Optimisation of Plugin Architectures. SAS 2005: 135-154 - 2004
- [c7]Claudia Díaz, George Danezis, Christian Grothoff, Andreas Pfitzmann, Paul F. Syverson:
Panel Discussion - Mix Cascades Versus Peer-to-Peer: Is One Concept Superior? Privacy Enhancing Technologies 2004: 242-242 - 2003
- [j1]Christian Grothoff:
Resource allocation in peer-to-peer networks - An excess-based economic model. Wirtschaftsinf. 45(3): 285-292 (2003) - [c6]Ronaldo A. Ferreira, Christian Grothoff, Paul Ruth:
A Transport Layer A straction for Peer-to-Peer Networks. CCGRID 2003: 398-405 - [c5]Christian Grothoff:
Walkabout Revisited: The Runabout. ECOOP 2003: 103-125 - [c4]Krzysztof Palacz, Jason Baker, Chapman Flack, Christian Grothoff, Hiroshi Yamauchi, Jan Vitek:
Engineering a customizable intermediate representation. IVME 2003: 67-76 - [c3]Krista Bennett, Christian Grothoff:
gap - Practical Anonymous Networking. Privacy Enhancing Technologies 2003: 141-160 - 2002
- [c2]Krista Bennett, Christian Grothoff, Tzvetan Horozov, Ioana Patrascu:
Efficient Sharing of Encrypted Data. ACISP 2002: 107-120 - 2001
- [c1]Christian Grothoff, Jens Palsberg, Jan Vitek:
Encapsulating Objects with Confined Types. OOPSLA 2001: 241-253
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint