Christian Grothoff
Christian Grothoff
Bern University of Applied Sciences
Verified email at grothoff.org - Homepage
TitleCited byYear
X10: an object-oriented approach to non-uniform cluster computing
P Charles, C Grothoff, V Saraswat, C Donawa, A Kielstra, K Ebcioglu, ...
ACM SIGPLAN Notices 40 (10), 519-538, 2005
16902005
A practical congestion attack on Tor using long paths
NS Evans, R Dingledine, C Grothoff
Proceedings of the 18th conference on USENIX security symposium, 33-50, 2009
2072009
GAP–practical anonymous networking
K Bennett, C Grothoff
International Workshop on Privacy Enhancing Technologies, 141-160, 2003
1422003
Encapsulating objects with confined types
C Grothoff, J Palsberg, J Vitek
ACM SIGPLAN Notices 36 (11), 241-255, 2001
1382001
Translation-based steganography
C Grothoff, K Grothoff, L Alkhutova, R Stutsman, M Atallah
International Workshop on Information Hiding, 219-233, 2005
712005
An excess-based economic model for resource allocation in peer-to-peer networks
C Grothoff
Wirtschaftsinformatik 45 (3), 285-292, 2003
712003
Lost in just the translation
R Stutsman, C Grothoff, M Atallah, K Grothoff
Proceedings of the 2006 ACM symposium on Applied computing, 338-345, 2006
682006
Efficient sharing of encrypted data
K Bennett, C Grothoff, T Horozov, I Patrascu
Australasian Conference on Information Security and Privacy, 107-120, 2002
632002
Constrained types for object-oriented languages
N Nystrom, V Saraswat, J Palsberg, C Grothoff
ACM SIGPLAN Notices 43 (10), 457-474, 2008
572008
Privacy-implications of performance-based peer selection by onion-routers: A real-world case study using i2p
M Herrmann, C Grothoff
Privacy Enhancing Technologies, 155-174, 2011
542011
Walkabout revisited: The runabout
C Grothoff
European Conference on Object-Oriented Programming, 103-125, 2003
482003
R5N: Randomized recursive routing for restricted-route networks
NS Evans, C Grothoff
Network and System Security (NSS), 2011 5th International Conference on, 316-321, 2011
462011
Deriving object typestates in the presence of inter-object references
MG Nanda, C Grothoff, S Chandra
ACM SIGPLAN Notices 40 (10), 77-96, 2005
432005
Bootstrapping of peer-to-peer networks
C GauthierDickey, C Grothoff
Applications and the Internet, 2008. SAINT 2008. International Symposium on …, 2008
392008
A censorship-resistant, privacy-enhancing and fully decentralized name system
M Wachs, M Schanzenbach, C Grothoff
International Conference on Cryptology and Network Security, 127-142, 2014
382014
Autonomous nat traversal
A Müller, N Evans, C Grothoff, S Kamkar
Peer-to-Peer Computing (P2P), 2010 IEEE Tenth International Conference on, 1-4, 2010
352010
Routing in the dark: Pitch black
NS Evans, C GauthierDickey, C Grothoff
Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third …, 2007
332007
Encapsulating objects with confined types
C Grothoff, J Palsberg, J Vitek
ACM Transactions on Programming Languages and Systems (TOPLAS) 29 (6), 32, 2007
312007
Optimal bitwise register allocation using integer linear programming
R Barik, C Grothoff, R Gupta, V Pandit, R Udupa
International Workshop on Languages and Compilers for Parallel Computing …, 2006
312006
On the feasibility of a censorship resistant decentralized name system
M Wachs, M Schanzenbach, C Grothoff
Foundations and Practice of Security, 19-30, 2014
262014
The system can't perform the operation now. Try again later.
Articles 1–20