Dr. Christian Grothoff

Image be67193f

Publications

2017.02 Christian Grothoff, Matthias Wachs, Monika Ermert, Jacob Appelbaum, “Towards Secure Name Resolution on the Internet,” in NDSS 2017 DNS Privacy Workshop DPRIV17 ’17, San Diego, CA, USA, Febuary 26, 2017, San Diego, USA, Feb. 2017, p. 20. [Pdf] [Bib]
2014 Matthias Wachs, Martin Schanzenbach, Christian Grothoff, “A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System,” in Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings, 2014, pp. 127–142. [Pdf] [Bib]
2014 Matthias Wachs, Fabian Oehlmann, Christian Grothoff, “Automatic transport selection and resource allocation for resilient communication in decentralised networks,” in 14th IEEE International Conference on Peer-to-Peer Computing, P2P 2014, London, United Kingdom, September 9-11, 2014, Proceedings, 2014, pp. 1–5. [Pdf] [Bib]
2013 Matthias Wachs, Martin Schanzenbach, Christian Grothoff, “On the Feasibility of a Censorship Resistant Decentralized Name System,” in Foundations and Practice of Security - 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers, 2013, pp. 19–30. [Pdf] [Bib]
2012.10 Christian Grothoff Matthias Wachs, Ramakrishna Thurimella, “Partitioning the Internet,” in 7th International Conference on Risks and Security of Internet and Systems CRiSIS2012, Cork, Ireland, Oct. 2012. [Pdf] [Bib]
2011.07 Michael Herrmann, Christian Grothoff, “Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study using I2P,” in Privacy Enhancing Technologies Symposium (PETS 2011), Waterloo, Canada, Jul. 2011. [Bib]
2011 Nathan Evans, Christian Grothoff, “Beyond Simulation: Large-Scale Distributed Emulation of P2P Protocols,” in 4th Workshop on Cyber Security Experimentation and Test (CSET 2011), 2011. [Url] [Pdf] [Bib]
2011 Nathan Evans, Christian Grothoff, “R5N: Randomized Recursive Routing for Restricted-Route Networks,” in 5th International Conference on Network and System Security, Milan, Italy, 2011, pp. 316–321. [Pdf] [Bib]
2011 Kai Christian Bader, Christian Grothoff, Harald Meier, “Comprehensive and relaxed search for oligonucleotide signatures in hierarchically-clustered sequence datasets,” Bioinformatics, 2011. [Bib]
2010.08 Andreas Müller, Nathan Evans, Christian Grothoff, Samy Kamkar, “Autonomous NAT Traversal,” in 10th IEEE International Conference on Peer-to-Peer Computing (IEEE P2P 2010), Delft, The Netherlands, Aug. 2010. [Url] [Pdf] [Bib]
2010.04 Nathan Evans, Chris GauthierDickey, Christian Grothoff, Krista Grothoff, Jeff Keene, Matthew J. Rutherford, “Simplifying parallel and Distributed Simulation with the DUP System,” in Proceedings 43rd Annual Simulation Symposium (ANSS-43 2010), Orlando, FL, USA, Apr. 2010, pp. 208–215. [Pdf] [Bib]
2010 Kai Christian Bader, Tilo Eißler, Nathan Evans, Chris GauthierDickey, Christian Grothoff, Krista Grothoff, Harald Meier, Craig Ritzdorf, Matthew J. Rutherford, “DUP: A Distributed Stream Processing Language,” in Proceedings of the IFIP International Conference on Network and Parallel Computing (NPC 2010), 2010. [Bib]
2009 Nathan S. Evans, Roger Dingledine, Christian Grothoff, “A Practical Congestion Attack on Tor Using Long Paths,” in 18th USENIX Security Symposium, 2009, pp. 33–50. [Pdf] [Bib]
2008.10 Nils Durner, Nathan S. Evans, Christian Grothoff, “Unerkannt im Internet,” iX special: Sicher im Netz, no. 1, pp. 42–49, Oct. 2008. [Bib]
2008.09 Nils Durner, Nathan S. Evans, Christian Grothoff, “Anonymisierende Peer-to-Peer-Netze im Überblick,” iX magazin fr̈ professionelle informationstechnik, no. 9, Sep. 2008. [Bib]
2007 Nils Durner, Nathan Evans, Christian Grothoff, “Vielleicht anonym? Die Enttarnung von StealthNet-Nutzern,” c’t magazin für computer technik, vol. 13, no. 21, pp. 218–221, 2007. [Bib]
2007 Nathan S. Evans, Chris GauthierDickey, Christian Grothoff, “Routing in the Dark: Pitch Black,” in ACSAC, 2007, pp. 305–314. [Pdf] [Bib]