2011 Zucchetti Kos Tennis Cup – Doubles
Robin Haase and Rogier Wassen were the defending champions, but Haase decided not to participate.
Wassen played alongside Jesse Huta Galung. They were eliminated already in the first round.
Doubles | |
---|---|
2011 Zucchetti Kos Tennis Cup | |
Champions | |
Runners-up | |
Final score | 2–6, 7–5, [10–5] |
Julian Knowle and Michael Kohlmann won the title, defeating Colin Ebelthite and Adam Feeney 2–6, 7–5, [10–5] in the final.
Seeds
Julian Knowle / Michael Kohlmann (Champions) Dustin Brown / Lovro Zovko (First Round) Johan Brunström / Andreas Siljeström (Semifinals) Frank Moser / Ken Skupski (Quarterfinals)
Draw
Key
- Q = Qualifier
- WC = Wild Card
- LL = Lucky Loser
- Alt = Alternate
- SE = Special Exempt
- PR = Protected Ranking
- ITF = ITF entry
- JE = Junior Exempt
- w/o = Walkover
- r = Retired
- d = Defaulted
Draw
First Round | Quarterfinals | Semifinals | Final | ||||||||||||||||||||||||
1 | 6 | 6 | |||||||||||||||||||||||||
3 | 4 | 1 | w/o | ||||||||||||||||||||||||
4 | 2 | ||||||||||||||||||||||||||
6 | 6 | 1 | 6 | 5 | [14] | ||||||||||||||||||||||
4 | 6 | 6 | WC | 3 | 7 | [12] | |||||||||||||||||||||
WC | 1 | 4 | 4 | 4 | 77 | [7] | |||||||||||||||||||||
WC | 6 | 6 | WC | 6 | 65 | [10] | |||||||||||||||||||||
2 | 4 | 1 | 2 | 7 | [10] | ||||||||||||||||||||||
WC | 4 | 5 | 6 | 5 | [5] | ||||||||||||||||||||||
6 | 7 | 4 | 3 | ||||||||||||||||||||||||
2 | 66 | 3 | 6 | 6 | |||||||||||||||||||||||
3 | 6 | 78 | 3 | 5 | 2 | ||||||||||||||||||||||
6 | 6 | 7 | 6 | ||||||||||||||||||||||||
3 | 2 | 6 | 4 | [10] | |||||||||||||||||||||||
6 | 78 | 3 | 6 | [6] | |||||||||||||||||||||||
2 | 2 | 66 |
gollark: Any well-designed thing will provide forward secrecy, so they won't have that unless they deliberately log things, which is entirely possible.
gollark: And here. It's quite bad.
gollark: You can also rent a VPS and host a VPN server on that, which doesn't really provide anonymity but does allow you to use it to evade local blocking of stuff.
gollark: Yes, your ISP can't do anything but traffic analysis probably.
gollark: > subpoening the vpn company for the encryption algorityhmsI'm pretty sure this is not actually a thing. But they totally could (and probably do often) keep logs.
References
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.