Members
Overall Objectives
Research Program
Application Domains
New Software and Platforms
New Results
Partnerships and Cooperations
Dissemination
Bibliography
XML PDF e-pub
PDF e-Pub


Bibliography

Publications of the year

Invited Conferences

  • 1C. Grothoff.
    Design Requirements for Civil Internetworking (Position paper), in: Protecting online privacy by enhancing IT security and strengthening EU IT capabilities, Brussels, Belgium, LIBE committee and the STOA panel together with the Luxembourg Presidency, December 2015.
    https://hal.inria.fr/hal-01244744

Scientific Books (or Scientific Book chapters)

  • 2H. Wolf, J. Jaromil, R. Radium, C. Grothoff.
    Free Software Economics, in: Cost of Freedom: A Collective Inquiry, Julien Taquet, 2015, pp. 131-136.
    https://hal.inria.fr/hal-01239072

Other Publications

  • 3M. Ermert, C. Grothoff.
    Über Umwege ans Ziel, August 2015, pp. 66-67, c't 19/2015.
    https://hal.inria.fr/hal-01239077
  • 4C. Grothoff, Y. Eudes.
    Comment fonctionne Skynet, le programme ultra-secret de la NSA créé pour tuer, October 2015, Le Monde.
    https://hal.inria.fr/hal-01239089
  • 5C. Grothoff, M. Wachs, M. Ermert, J. Appelbaum, L. Courtès.
    Le programme MORECOWBELL de la NSA sonne le glas du DNS, January 2015, Cet article décrit le programme « MORECOWBELL » de l'agence d'espionnage étasunienne NSA et montre les défauts du protocole DNS qu'il exploite. Un état de l'art des alternatives à DNS est ensuite donné, en évaluant l'efficiacité contre les attaques telles que celles perpétrées par la NSA.
    https://hal.inria.fr/hal-01114307
References in notes
  • 6A. Amirbekyan, V. Estivill-Castro.
    A new efficient privacy-preserving scalar product protocol, in: Proceedings of the sixth Australasian conference on Data mining and analytics - Volume 70, Australian Computer Society, Inc., 2007, pp. 209–214.
  • 7G. Danezis, I. Goldberg.
    Sphinx: A Compact and Provably Secure Mix Format, in: Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), IEEE Computer Society, May 2009, pp. 269–282.
  • 8I. Ioannidis, A. Grama, M. Atallah.
    A Secure Protocol for Computing Dot-Products in Clustered and Distributed Environments, in: Proceedings of the 2002 International Conference on Parallel Processing, IEEE Computer Society, 2002, pp. 379–384.
  • 9J. Victors.
    The Onion Name System: Tor-Powered Distributed DNS For Tor Hidden Services, Utah State University, Logan, Utah, 2014.
    https://github.com/Jesse-V/OnioNS-literature/blob/master/thesis/thesis.pdf