Christian Grothoff (original ) (raw )
"Lost and Found in the Fog of Trust", joint work with Özgür Kesim.JENSFEST , 2024 (bib ,pdf )
"The GNU Name System", joint work with Martin Schanzenbach and Bernd Fix,RFC 9498 November 2023 (bib )
"Practical Offline Payments Using One-Time Passcodes", joint work with Priscilla Huang, Emmanuel Benoist, and Sebastian Javier Marchano.SUERF Policy Notes ,622/2023 (bib ,pdf )
"Zero-Knowledge Age Restriction for GNU Taler", joint work with Özgür Kesim, Florian Dold and Martin Schanzenbach.27th European Symposium on Research in Computer Security (ESORICS) , 2022 (bib ,pdf )
"Project Depolymerization: Tokenization of Blockchains", joint work with Antoine d’Aligny and Emmanuel Benoist.4th Conference on Blockchain Research & Applications for Innovative Networks and Services , 2022 (bib ,pdf )
"Who comes after us? The correct mindset for designing a Central Bank Digital Currency", joint work with Antoine d’Aligny, Emmanuel Benoist, Florian Dold, Özgür Kesim and Martin Schanzenbach.SUERF Policy Notes ,279/2022 (bib ,pdf )
"Come emettere una moneta digitale di banca centrale", joint work with David Chaum and Thomas MoserSNB Working Papers ,3/2021 (bib ,pdf )
"Cómo Emitir una Moneda Digital del Banco Central", joint work with David Chaum and Thomas MoserSNB Working Papers ,3/2021 (bib ,pdf )
"Comment émettre une monnaie numérique de banque centrale", joint work with David Chaum and Thomas MoserSNB Working Papers ,3/2021 (bib ,pdf )
"How to issue a privacy-preserving central bank digital currency", joint work with Thomas MoserSUERF Policy Notes ,114/2021 (bib ,pdf )
"How to Issue a Central Bank Digital Currency", joint work with David Chaum and Thomas MoserSNB Working Papers ,3/2021 (bib ,pdf )
"Decentralized Identities for Self-sovereign End-users (DISSENS)", joint work with Martin Schanzenbach, Hansjürg Wenger and Maximilian KaulOpen Identity Summit 2021 (bib , pdf )
"GNU Taler – weit mehr als eine Spielerei", joint work with Andreas Habeggerspirit , 3/2020 (bib ,html )
"GNU Taler: bien plus qu’un simple gadget", joint work with Andreas Habeggerspirit , 3/2020 (bib ,html )
"The 'payto' URI Scheme for Payments", joint work withFlorian Dold ,RFC 8905 October 2020 (bib )
"Was brauchen wir als Zivilgesellschaft eigentlich für eine Art von Netzwerk und was für eine Technik hätten wir den gerne?", Verschriftlichung des Vortrags von Christian Grothoff an der FiFF Konferenz 2018.FiFF Kommunikation ,1/19 (bib )
"Digital cash and privacy: What are the alternatives to Libra?", joint work with Alex Pentland (@MIT ,@Medium ,bib ), 7/2019
"Monnaie numérique et vie privée: quels sont les alternatives à Libra?", joint work with Alex Pentland (@BFH bib ), 9/2019
"Digitales Geld und Datenschutz: Welche Alternativen zu Libra gibt es?", joint work with Alex Pentland (@BFH bib ), 9/2019
"Decentralized Authentication for Self-Sovereign Identities using Name Systems" , joint work with Martin Schanzenbach,Annett Laube ,Emmanuel Benoist andPascal Mainini (bib )
"Vertrauen im Nebel",spirit , 1/2018 (bib ,pdf )
"Faire confiance dans le brouillard", translated by Gabriella Scorrano,spirit , 1/2018 (bib ,pdf )
"Towards Secure Name Resolution on the Internet", joint work withMatthias Wachs ,Monika Ermert andJacob Appelbaum ,Computers & Security 2018 (bib ,doi , pdf )
"Enabling Secure Web Payments with GNU Taler", joint work withJeffrey Burdges ,Florian Dold and Marcello Stanisci,SPACE 2016 (bib ,pdf )
"A Quantitative Analysis of Cell Tower Trace Data for Understanding Human Mobility and Mobile Networks", joint work withNeal Walfield andJohn Linwood Griffin ,6th International Workshop on Mobile Entity Localization, Tracking and Analysis (MELT) 2016 (bib , pdf )
"Privacy-Preserving Abuse Detection in Future Decentralised Online Social Networks", joint work withÁlvaro García-Recuero andJeffrey Burdges ,DPM 2016 (bib ,pdf )
"Enabling Secure Web Payments with GNU Taler", joint work withJeffrey Burdges ,Florian Dold and Marcello Stanisci,HotPETs 2016 (bib ,pdf )
"Byzantine Set-Union Consensus using Efficient Set Reconciliation", joint work withFlorian Dold ,ARES 2016 (bib , pdf )
"GNU Taler: Ethical Online Payments for the Internet Age" , joint work withFlorian Dold ,ERCIM News No. 106 (bib )
"The NSA’s SKYNET program may be killing thousands of innocent people" , joint work withJens Porup ,ARS Technica , 3/2016 (bib )
"Data Mining für den Drohnenkrieg" , joint work withMonika Ermert ,c't 3/2016 (bib )
"Design Requirements for Civil Internetworking" , forProtecting online privacy by enhancing IT security and strengthening EU IT capabilities (bib )
"Free Software Economics" , joint work withHellekin Wolf ,Jaromil and Radium, inCost of Freedom: A Collective Inquiry (bib )
"Comment fonctionne Skynet, le programme ultra-secret de la NSA créé pour tuer" , joint work withYves Eudes ,Le Monde 20.10.2015 (bib )
"Über Umwege ans Ziel" , joint work withMonika Ermert ,c't 19'2015 (bib )
"MoreCowBells: Nouvelles révélations sur les pratiques de la NSA" , joint work withYves Eudes ,Jacob Appelbaum ,Monika Ermert ,Laura Poitras andMatthias Wachs ,Le Monde 24.1.2015 (bib )
"Prying Eyes: Inside the NSA's War on Internet Security" / Snowden-Dokumente: Was die NSA knacken kann - und was nicht , joint work withJacob Appelbaum , Aaron Gibson,Andy Müller-Maghun ,Laura Poitras ,Michael Sontheimer ,Marcel Rosenbach andChristian Stöcker ,Der Spiegel 12'2014 (bib )
"NSA-System Treasuremap: 'Jedes Gerät, überall, jederzeit'" , joint work withJudith Horchert andChristian Stöcker ,Spiegel Online Netzwelt 17.9.2014 (bib )
"Map of the Stars: The NSA and GCHQ Campaign Against German Satellite Companies" , joint work withAndy Müller-Maghun ,Laura Poitras ,Marcel Rosenbach andMichael Sontheimer ,The Intercept 8'2014 (bib )
"Treasure Map: The NSA Breach of Telekom and Other German Firms" , joint work withAndy Müller-Maghun ,Laura Poitras ,Marcel Rosenbach andMichael Sontheimer ,Der Spiegel International 14.9.2014 (bib )
"NSA/GCHQ: The HACIENDA Program for Internet Colonization" , joint work withJulian Kirsch ,Monika Ermert ,Jacob Appelbaum ,Laura Poitras andHenrik Moltke ,Heise Online 8'2014 (bib )
"Das Five-Eyes-Botnetz: Die Besetzung des Internet durch die westlichen Geheimdienste", joint work withJulian Kirsch ,Monika Ermert ,Jacob Appelbaum ,Laura Poitras andHenrik Moltke ,c't magazin für computer technik 22/2014 (bib )
"TCP Stealth vs. Five Eyes: Mit Technik gegen staatliche Geheimdienst-Botnetze", joint work withJulian Kirsch ,Monika Ermert ,Jacob Appelbaum ,Laura Poitras andHenrik Moltke ,c't magazin für computer technik 22/2014 (bib )
"Gut verschlossen: Unsichtbare Server mit TCP Stealth", joint work withJulian Kirsch iX magazin für professionelle Informationstechnik 10'2014 (bib )
"TCP Stealth", joint work withJulian Kirsch ,Jacob Appelbaum andHolger Kenn ,draft-kirsch-ietf-tcp-stealth-00
"The Internet is Broken: Idealistic Ideas for Building a NEWGNU Network", joint work withBart Polot andCarlo von Loesch ,W3C/IAB Workshop on Strengthening the Internet Against Pervasive Monitoring (STRINT) 2014 (bib , pdf )
"CADET: Confidential Ad-hoc Decentralized End-to-End Transport", joint work withBart Polot 13th IEEE IFIP Annual Mediterranean Ad Hoc Networking Workshop (MedHocNet) 2014 (bib , pdf )
"Cryogenic: Enabling Power-Aware Applications on Linux", joint work with Alejandra Morales Ruiz,Wilfried Daniels andDanny Hughes ,2nd International Conference on ICT for Sustainability (ICT4S) 2014 (bib , pdf )
"Automatic Selection and Resource Allocation for Resilient Communication in Decentralized Networks", joint work withMatthias Wachs and Fabian Oelmann,IEEE International Conference on Peer-to-Peer Computing (P2P 2014) (bib , pdf )
"A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System", joint work withMatthias Wachs and Martin Schanzenbach,13th International Conference on Cryptology and Network Security (CANS 2014) (bib , pdf )
"Efficient and Secure Decentralized Network Size Estimation", joint work withNathan S. Evans andBart Polot ,IFIP Networking 2012 (bib , pdf ,technical report )
"Efficient Relaxed Search in Hierarchically-Clustered Sequence Datasets", joint work withKai Christian Bader andMikhail J. Atallah ,ACM Journal of Experimental Algorithmics 2012 (bib , pdf )
"Partitioning the Internet", joint work withMatthias Wachs andRamakrishna Thurimella ,7th International Conference on Risks and Security of Internet and Systems (CRISIS 2012) (bib , pdf )
"Decentralized Open Network Services for a Resillient Economy and Free Society", FP8 Expert Group on Services in the future Internet, European Commission 2011 (bib , pdf )
"Comprehensive and relaxed search for oligonucleotide signatures in hierarchically-clustered sequence datasets", joint work withKai Christian Bader andHarald Meier , Bioinformatics, Oxford University Press 2011 (pdf , bib )
"Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study using I2P", joint work withMichael Herrmann ,Privacy Enhancing Technologies Symposium (PETS 2011 ) (bib , pdf )
"The Free Secure Network Systems Group: Secure Peer-to-Peer Networking and Beyond",Proceedings of the First SysSec Workshop (SysSec 2011) (bib , pdf )
"Beyond Simulation: Large-Scale Distributed Emulation of P2P Protocols", joint work withNathan S. Evans ,4th Workshop on Cyber Security Experimentation and Test (CSET '11) (bib , pdf )
"R5N: Randomized Recursive Routing for Restricted-Route Networks", joint work withNathan S. Evans ,5th International Conference on Network and System Security (NSS '11) (bib , pdf )
"Performance Regression Monitoring with Gauger", joint work withBart Polot ,LinuxJournal , 9, 2011 , (html , bibtex )
"Simplifying Parallel and Distributed Simulation with the DUP System", joint work withNathan S. Evans ,Chris GauthierDickey ,Krista Grothoff , Jeff Keene andMatthew J. Rutherford ,SpringSim Annual Simulation Symposium 2010 (pdf , bibtex )
"DUP: A Distributed Stream Processing Language", joint work withKai Christian Bader ,Tilo Eißler ,Nathan S. Evans ,Chris GauthierDickey ,Krista Grothoff , Jeff Keene,Harald Meier ,Craig Ritzdorf andMatthew J. Rutherford ,IFIP International Conference on Network and Parallel Computing (NPC 2010 ) (pdf , bibtex )
"Autonomous NAT Traversal", joint work withNathan S. Evans ,Andreas Müller andSamy Kamkar ,IEEE P2P'10 Conference (bib , pdf )
"Lost in Translation", joint work withKrista Grothoff ,Ryan Stutsman , Ludmila Alkhutova andMikhail Atallah ,Journal of Computer Security, Volume 17 Issue 3, 2009 , (pdf , bibtex )
"A Practical Congestion Attack on Tor Using Long Paths", joint work withNathan S. Evans andRoger Dingledine ,USENIX Security Symposium 2009 (bib , pdf )
"The Runabout",Software: Practice and Experience 2008 (pdf , bibtex )
"Bootstrapping of Peer-to-Peer Networks", joint work withChris GauthierDickey ,International Workshop on Dependable and Sustainable Peer-to-Peer Systems 2008 (pdf , bibtex , slides )
"Anonyme Peer-to-Peer-Netze im Überblick", joint work withNils Durner andNathan S. Evans ,iX magazin für professionelle informationstechnik 9'2008 (bibtex ,buy )
"Constrained Types for Object-Oriented Languages", joint work withNathaniel Nystrom ,Vijay Saraswat andJens Palsberg ,OOPSLA 2008 (pdf , bibtex )
"Unerkannt im Internet", joint work withNils Durner andNathan S. Evans ,iX special: Sicher im Netz 2008 (bibtex )
"Lost in Just the Translation", joint work withRyan Stutsman ,Mikhail Atallah andKrista Grothoff ,SAC 2006 (Security Track ) (pdf , bibtex )
"Expressive Type Systems for Object-Oriented Languages", PhD dissertation, UCLA , 2006 (pdf , bibtex )
"Optimal Bitwise Register Allocation using Integer Linear Programming", joint work withRajkishore Barik ,Rahul Gupta andVinayaka Pandit ,LCPC 2006 (pdf , bibtex )
"Engineering a Customizable Intermediate Representation", joint work withKrzysztof Palacz , Jason Baker, Chapman Flack, Hiroshi Yamauchi andJan Vitek ,Science of Computer Programming Volume 57, Issue 3, 2005 (pdf , bibtex )
"Translation-Based Steganography", joint work withKrista Grothoff , Ludmila Alkhutova,Ryan Stutsman andMikhail Atallah ,Information Hiding Workshop 2005 (pdf , bibtex ); CSD TR# 05-009, (pdf , bibtex )
"Reading File Metadata with extract and libextractor",LinuxJournal , June, 2005 , (html , bibtex )
"Type-Safe Optimization of Plugin Architectures", joint work withNeal Glew andJens Palsberg ,Static Analysis Symposium 2005 (pdf , bibtex )
"Deriving Object Typestates in the Presence of Inter-Object References", joint work withMangala Gowri andSatish Chandra ,OOPSLA 2005 (pdf , bibtex )
"X10: An Object-Oriented Approach to Non-Uniform Cluster Computing", joint work withPhilippe Charles ,Christopher Donawa ,Kemal Ebcioglu ,Allan Kielstra ,Vijay Saraswat ,Vivek Sarkar andChristoph Von Praun ,OOPSLA 2005 (pdf , bibtex )
"Recycling Garbage Theory", CSD TR# 04-012 (pdf , bibtex )
"An Excess-Based Economic Model for Resource Allocation in Peer-to-Peer Networks",Wirtschaftsinformatik , June 2003 (pdf , bibtex )
"A Transport Layer Abstraction for Peer-to-Peer Networks", joint work withRonaldo Ferreira andPaul Ruth ,GP2PC 2003 (pdf , bibtex )
"Walkabout revisited: The Runabout",ECOOP 2003 (pdf , bibtex )
"gap - practical anonymous networking", joint work withKrista Bennett ,Workshop on Privacy Enhancing Technologies ,March 2003 (pdf , bibtex )
"Engineering a Customizable Intermediate Representation", joint work withKrzysztof Palacz , Jason Baker, Chapman Flack, Hiroshi Yamauchi andJan Vitek ,IVME 2003 (pdf , bibtex )