gap – Practical Anonymous Networking
K Bennett, C Grothoff - International Workshop on Privacy Enhancing …, 2003 - Springer
This paper describes how anonymity is achieved in gnu net, a framework for anonymous
distributed and secure networking. The main focus of this work is gap, a simple protocol for …
distributed and secure networking. The main focus of this work is gap, a simple protocol for …
Thwarting web censorship with untrusted messenger discovery
All existing anti-censorship systems for the Web rely on proxies to grant clients access to
censored information. Therefore, they face the proxy discovery problem: how can clients …
censored information. Therefore, they face the proxy discovery problem: how can clients …
Autonomous nat traversal
Traditional NAT traversal methods require the help of a third party for signalling. This paper
investigates a new autonomous method for establishing connections to peers behind NAT …
investigates a new autonomous method for establishing connections to peers behind NAT …
Bootstrap** of peer-to-peer networks
CG Dickey, C Grothoff - 2008 International Symposium on …, 2008 - ieeexplore.ieee.org
In this paper, we present the first heuristic for fully distributed bootstrap** of peer-to-peer
networks. Our heuristic generates a stream of promising IP addresses to be probed as entry …
networks. Our heuristic generates a stream of promising IP addresses to be probed as entry …
The gnunet system
C Grothoff - 2017 - inria.hal.science
GNUnet is an alternative network stack for building secure, decentralized and privacy-
preserving distributed applications. Our goal is to replace the old insecure Internet protocol …
preserving distributed applications. Our goal is to replace the old insecure Internet protocol …
The minestrone architecture combining static and dynamic analysis techniques for software security
We present MINESTRONE, a novel architecture that integrates static analysis, dynamic
confinement, and code diversification techniques to enable the identification, mitigation and …
confinement, and code diversification techniques to enable the identification, mitigation and …
[BOOK][B] Methods for secure decentralized routing in open networks
NS Evans - 2011 - net.in.tum.de
The contribution of this thesis is the study and improvement of secure, decentralized, robust
routing algorithms for open networks including ad-hoc networks and peer-to-peer (P2P) …
routing algorithms for open networks including ad-hoc networks and peer-to-peer (P2P) …
Generic Distribution Support for Programming Systems
E Klintskog - 2005 - diva-portal.org
This dissertation provides constructive proof, through the implementation of a middleware,
that distribution transparency is practical, generic, and extensible. Fault tolerant distributed …
that distribution transparency is practical, generic, and extensible. Fault tolerant distributed …
Query forwarding algorithm supporting initiator anonymity in GNUnet
K Tatara, Y Hori, K Sakurai - 11th International Conference on …, 2005 - ieeexplore.ieee.org
Anonymity in Peer-to-Peer network means that it is diffi-cult to associate a particular
communication with a sender or a recipient. Recently, anonymous Peer-to-Peer framework …
communication with a sender or a recipient. Recently, anonymous Peer-to-Peer framework …
Secure communication over diverse transports: [short paper]
M Rogers, E Saitta - Proceedings of the 2012 ACM workshop on Privacy …, 2012 - dl.acm.org
This paper describes BTP, a protocol that ensures the confidentiality, integrity, authenticity
and forward secrecy of communication over diverse underlying transports, from low-latency …
and forward secrecy of communication over diverse underlying transports, from low-latency …