X10: an object-oriented approach to non-uniform cluster computing P Charles, C Grothoff, V Saraswat, C Donawa, A Kielstra, K Ebcioglu, ... ACM SIGPLAN Notices 40 (10), 519-538, 2005 | 2066 | 2005 |
A practical congestion attack on Tor using long paths NS Evans, R Dingledine, C Grothoff Proceedings of the 18th conference on USENIX security symposium, 33-50, 2009 | 261 | 2009 |
GAP–practical anonymous networking K Bennett, C Grothoff International Workshop on Privacy Enhancing Technologies, 141-160, 2003 | 162 | 2003 |
Encapsulating objects with confined types C Grothoff, J Palsberg, J Vitek Proceedings of the 16th ACM SIGPLAN conference on Object-oriented …, 2001 | 144 | 2001 |
How to issue a central bank digital currency D Chaum, C Grothoff, T Moser arXiv preprint arXiv:2103.00254, 2021 | 118 | 2021 |
Lost in just the translation R Stutsman, C Grothoff, M Atallah, K Grothoff Proceedings of the 2006 ACM symposium on Applied computing, 338-345, 2006 | 86 | 2006 |
Translation-based steganography C Grothoff, K Grothoff, L Alkhutova, R Stutsman, M Atallah Information Hiding: 7th International Workshop, IH 2005, Barcelona, Spain …, 2005 | 82 | 2005 |
Efficient sharing of encrypted data K Bennett, C Grothoff, T Horozov, I Patrascu Information Security and Privacy: 7th Australasian Conference, ACISP 2002 …, 2002 | 73 | 2002 |
A censorship-resistant, privacy-enhancing and fully decentralized name system M Wachs, M Schanzenbach, C Grothoff Cryptology and Network Security: 13th International Conference, CANS 2014 …, 2014 | 71 | 2014 |
Privacy-implications of performance-based peer selection by onion-routers: A real-world case study using i2p M Herrmann, C Grothoff Privacy Enhancing Technologies, 155-174, 2011 | 71 | 2011 |
An excess-based economic model for resource allocation in peer-to-peer networks C Grothoff Wirtschaftsinformatik 45 (3), 285-292, 2003 | 70 | 2003 |
Constrained types for object-oriented languages N Nystrom, V Saraswat, J Palsberg, C Grothoff ACM SIGPLAN Notices 43 (10), 457-474, 2008 | 63 | 2008 |
R5N: Randomized recursive routing for restricted-route networks NS Evans, C Grothoff Network and System Security (NSS), 2011 5th International Conference on, 316-321, 2011 | 54 | 2011 |
Deriving object typestates in the presence of inter-object references MG Nanda, C Grothoff, S Chandra Proceedings of the 20th annual ACM SIGPLAN conference on Object-oriented …, 2005 | 52 | 2005 |
Walkabout revisited: The runabout C Grothoff European Conference on Object-Oriented Programming, 103-125, 2003 | 52 | 2003 |
Bootstrapping of peer-to-peer networks C GauthierDickey, C Grothoff Applications and the Internet, 2008. SAINT 2008. International Symposium on …, 2008 | 49 | 2008 |
Autonomous nat traversal A Müller, N Evans, C Grothoff, S Kamkar Peer-to-Peer Computing (P2P), 2010 IEEE Tenth International Conference on, 1-4, 2010 | 46 | 2010 |
The NSA’s SKYNET program may be killing thousands of innocent people C Grothoff, J Porup ARS Technica, 2016 | 41 | 2016 |
Routing in the dark: Pitch black NS Evans, C GauthierDickey, C Grothoff Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007 | 38 | 2007 |
Optimal bitwise register allocation using integer linear programming R Barik, C Grothoff, R Gupta, V Pandit, R Udupa International Workshop on Languages and Compilers for Parallel Computing …, 2006 | 36 | 2006 |