Bibliography
Publications of the year
Invited Conferences
-
1C. Grothoff.
Design Requirements for Civil Internetworking (Position paper), in: Protecting online privacy by enhancing IT security and strengthening EU IT capabilities, Brussels, Belgium, LIBE committee and the STOA panel together with the Luxembourg Presidency, December 2015.
https://hal.inria.fr/hal-01244744
Scientific Books (or Scientific Book chapters)
-
2H. Wolf, J. Jaromil, R. Radium, C. Grothoff.
Free Software Economics, in: Cost of Freedom: A Collective Inquiry, Julien Taquet, 2015, pp. 131-136.
https://hal.inria.fr/hal-01239072
Other Publications
-
3M. Ermert, C. Grothoff.
Über Umwege ans Ziel, August 2015, pp. 66-67, c't 19/2015.
https://hal.inria.fr/hal-01239077 -
4C. Grothoff, Y. Eudes.
Comment fonctionne Skynet, le programme ultra-secret de la NSA créé pour tuer, October 2015, Le Monde.
https://hal.inria.fr/hal-01239089 -
5C. Grothoff, M. Wachs, M. Ermert, J. Appelbaum, L. Courtès.
Le programme MORECOWBELL de la NSA sonne le glas du DNS, January 2015, Cet article décrit le programme « MORECOWBELL » de l'agence d'espionnage étasunienne NSA et montre les défauts du protocole DNS qu'il exploite. Un état de l'art des alternatives à DNS est ensuite donné, en évaluant l'efficiacité contre les attaques telles que celles perpétrées par la NSA.
https://hal.inria.fr/hal-01114307
-
6A. Amirbekyan, V. Estivill-Castro.
A new efficient privacy-preserving scalar product protocol, in: Proceedings of the sixth Australasian conference on Data mining and analytics - Volume 70, Australian Computer Society, Inc., 2007, pp. 209–214. -
7G. Danezis, I. Goldberg.
Sphinx: A Compact and Provably Secure Mix Format, in: Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), IEEE Computer Society, May 2009, pp. 269–282. -
8I. Ioannidis, A. Grama, M. Atallah.
A Secure Protocol for Computing Dot-Products in Clustered and Distributed Environments, in: Proceedings of the 2002 International Conference on Parallel Processing, IEEE Computer Society, 2002, pp. 379–384. -
9J. Victors.
The Onion Name System: Tor-Powered Distributed DNS For Tor Hidden Services, Utah State University, Logan, Utah, 2014.
https://github.com/Jesse-V/OnioNS-literature/blob/master/thesis/thesis.pdf