Christian Grothoff
Christian Grothoff
Bern University of Applied Sciences
Verified email at - Homepage
Cited by
Cited by
X10: an object-oriented approach to non-uniform cluster computing
P Charles, C Grothoff, V Saraswat, C Donawa, A Kielstra, K Ebcioglu, ...
ACM SIGPLAN Notices 40 (10), 519-538, 2005
A practical congestion attack on Tor using long paths
NS Evans, R Dingledine, C Grothoff
Proceedings of the 18th conference on USENIX security symposium, 33-50, 2009
GAP–practical anonymous networking
K Bennett, C Grothoff
International Workshop on Privacy Enhancing Technologies, 141-160, 2003
Encapsulating objects with confined types
C Grothoff, J Palsberg, J Vitek
Proceedings of the 16th ACM SIGPLAN conference on Object-oriented …, 2001
How to issue a central bank digital currency
D Chaum, C Grothoff, T Moser
arXiv preprint arXiv:2103.00254, 2021
Lost in just the translation
R Stutsman, C Grothoff, M Atallah, K Grothoff
Proceedings of the 2006 ACM symposium on Applied computing, 338-345, 2006
Translation-based steganography
C Grothoff, K Grothoff, L Alkhutova, R Stutsman, M Atallah
Information Hiding: 7th International Workshop, IH 2005, Barcelona, Spain …, 2005
Efficient sharing of encrypted data
K Bennett, C Grothoff, T Horozov, I Patrascu
Information Security and Privacy: 7th Australasian Conference, ACISP 2002 …, 2002
A censorship-resistant, privacy-enhancing and fully decentralized name system
M Wachs, M Schanzenbach, C Grothoff
Cryptology and Network Security: 13th International Conference, CANS 2014 …, 2014
Privacy-implications of performance-based peer selection by onion-routers: A real-world case study using i2p
M Herrmann, C Grothoff
Privacy Enhancing Technologies, 155-174, 2011
An excess-based economic model for resource allocation in peer-to-peer networks
C Grothoff
Wirtschaftsinformatik 45 (3), 285-292, 2003
Constrained types for object-oriented languages
N Nystrom, V Saraswat, J Palsberg, C Grothoff
ACM SIGPLAN Notices 43 (10), 457-474, 2008
R5N: Randomized recursive routing for restricted-route networks
NS Evans, C Grothoff
Network and System Security (NSS), 2011 5th International Conference on, 316-321, 2011
Deriving object typestates in the presence of inter-object references
MG Nanda, C Grothoff, S Chandra
Proceedings of the 20th annual ACM SIGPLAN conference on Object-oriented …, 2005
Walkabout revisited: The runabout
C Grothoff
European Conference on Object-Oriented Programming, 103-125, 2003
Bootstrapping of peer-to-peer networks
C GauthierDickey, C Grothoff
Applications and the Internet, 2008. SAINT 2008. International Symposium on …, 2008
Autonomous nat traversal
A Müller, N Evans, C Grothoff, S Kamkar
Peer-to-Peer Computing (P2P), 2010 IEEE Tenth International Conference on, 1-4, 2010
The NSA’s SKYNET program may be killing thousands of innocent people
C Grothoff, J Porup
ARS Technica, 2016
Routing in the dark: Pitch black
NS Evans, C GauthierDickey, C Grothoff
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007
Optimal bitwise register allocation using integer linear programming
R Barik, C Grothoff, R Gupta, V Pandit, R Udupa
International Workshop on Languages and Compilers for Parallel Computing …, 2006
The system can't perform the operation now. Try again later.
Articles 1–20