Follow
Christian Grothoff
Christian Grothoff
Bern University of Applied Sciences
Verified email at grothoff.org - Homepage
Title
Cited by
Cited by
Year
X10: an object-oriented approach to non-uniform cluster computing
P Charles, C Grothoff, V Saraswat, C Donawa, A Kielstra, K Ebcioglu, ...
ACM SIGPLAN Notices 40 (10), 519-538, 2005
20302005
A practical congestion attack on Tor using long paths
NS Evans, R Dingledine, C Grothoff
Proceedings of the 18th conference on USENIX security symposium, 33-50, 2009
2492009
GAP–practical anonymous networking
K Bennett, C Grothoff
International Workshop on Privacy Enhancing Technologies, 141-160, 2003
1612003
Encapsulating objects with confined types
C Grothoff, J Palsberg, J Vitek
ACM SIGPLAN Notices 36 (11), 241-255, 2001
1412001
Lost in just the translation
R Stutsman, C Grothoff, M Atallah, K Grothoff
Proceedings of the 2006 ACM symposium on Applied computing, 338-345, 2006
772006
Translation-based steganography
C Grothoff, K Grothoff, L Alkhutova, R Stutsman, M Atallah
International Workshop on Information Hiding, 219-233, 2005
752005
Efficient sharing of encrypted data
K Bennett, C Grothoff, T Horozov, I Patrascu
Australasian Conference on Information Security and Privacy, 107-120, 2002
732002
An excess-based economic model for resource allocation in peer-to-peer networks
C Grothoff
Wirtschaftsinformatik 45 (3), 285-292, 2003
712003
Privacy-implications of performance-based peer selection by onion-routers: A real-world case study using i2p
M Herrmann, C Grothoff
Privacy Enhancing Technologies, 155-174, 2011
692011
A censorship-resistant, privacy-enhancing and fully decentralized name system
M Wachs, M Schanzenbach, C Grothoff
International Conference on Cryptology and Network Security, 127-142, 2014
662014
How to issue a central bank digital currency
D Chaum, C Grothoff, T Moser
arXiv preprint arXiv:2103.00254, 2021
642021
Constrained types for object-oriented languages
N Nystrom, V Saraswat, J Palsberg, C Grothoff
ACM SIGPLAN Notices 43 (10), 457-474, 2008
612008
Walkabout revisited: The runabout
C Grothoff
European Conference on Object-Oriented Programming, 103-125, 2003
532003
Deriving object typestates in the presence of inter-object references
MG Nanda, C Grothoff, S Chandra
ACM SIGPLAN Notices 40 (10), 77-96, 2005
522005
R5N: Randomized recursive routing for restricted-route networks
NS Evans, C Grothoff
Network and System Security (NSS), 2011 5th International Conference on, 316-321, 2011
512011
Bootstrapping of peer-to-peer networks
C GauthierDickey, C Grothoff
Applications and the Internet, 2008. SAINT 2008. International Symposium on …, 2008
472008
Autonomous nat traversal
A Müller, N Evans, C Grothoff, S Kamkar
Peer-to-Peer Computing (P2P), 2010 IEEE Tenth International Conference on, 1-4, 2010
412010
The NSA’s SKYNET program may be killing thousands of innocent people
C Grothoff, J Porup
ARS Technica, 2016
402016
Routing in the dark: Pitch black
NS Evans, C GauthierDickey, C Grothoff
Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third …, 2007
382007
Optimal bitwise register allocation using integer linear programming
R Barik, C Grothoff, R Gupta, V Pandit, R Udupa
International Workshop on Languages and Compilers for Parallel Computing …, 2006
362006
The system can't perform the operation now. Try again later.
Articles 1–20