Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Thorsten Strufe
2010 – today
- 2013
[j9]Erik-Oliver Blass, Anil Kurmus, Refik Molva, Thorsten Strufe: PSP: Private and secure payment with RFID. Computer Communications 36(4): 468-480 (2013)
[c25]Damiano Carra, Thorsten Strufe, György Dán, Marcel Karnstedt: Topic 7: Peer-to-Peer Computing - (Introduction). Euro-Par 2013: 353
[c24]Stefanie Roos, Thorsten Strufe: A contribution to analyzing and enhancing Darknet routing. INFOCOM 2013: 615-619
[c23]Andreas Hofer, Stefanie Roos, Thorsten Strufe: Greedy Embedding, Routing and Content Addressing for Darknets. NetSys 2013: 43-50
[p5]Kamill Panitzek, Thorsten Strufe: A Formal Model for Peer-to-Peer Systems. Benchmarking Peer-to-Peer Systems 2013: 15-18
[p4]Wolfgang Effelsberg, Thorsten Strufe: Summary and Conclusion. Benchmarking Peer-to-Peer Systems 2013: 195-197
[e2]Wolfgang Effelsberg, Ralf Steinmetz, Thorsten Strufe (Eds.): Benchmarking Peer-to-Peer Systems - Understanding Quality of Service in Large-Scale Distributed Systems. Lecture Notes in Computer Science 7847, Springer 2013, ISBN 978-3-642-38672-5
[i7]Stefanie Roos, Hani Salah, Thorsten Strufe: Comprehending Kademlia Routing - A Theoretical Framework for the Hop Count Distribution. CoRR abs/1307.7000 (2013)
[i6]Frederik Armknecht, Manuel Hauptmann, Stefanie Roos, Thorsten Strufe: Protecting Public OSN Posts from Unintended Access. CoRR abs/1309.3647 (2013)
[i5]Sonja Buchegger, Jon Crowcroft, Balachander Krishnamurthy, Thorsten Strufe: Decentralized Systems for Privacy Preservation (Dagstuhl Seminar 13062). Dagstuhl Reports 3(2): 22-44 (2013)- 2012
[j8]Tobias Lauinger, Nikolaos Laoutaris, Pablo Rodriguez, Thorsten Strufe, Ernst Biersack, Engin Kirda: Privacy risks in named data networking: what is the cost of performance? Computer Communication Review 42(5): 54-57 (2012)
[j7]Melek Önen, Thorsten Strufe: Special section on Security and Social Networking. Computer Communications 35(1): 47 (2012)
[j6]Kamill Panitzek, Muhammad Ikram, Max Mühlhäuser, Thorsten Strufe: Smooth Resilient Service Provision in Large Heterogeneous Networks. Praxis der Informationsverarbeitung und Kommunikation 35(3): 167-173 (2012)
[c22]Pablo Ezequiel Guerrero, Alejandro P. Buchmann, Kristof Van Laerhoven, Immanuel Schweizer, Max Mühlhäuser, Thorsten Strufe, Stefan Schneckenburger, Manfred Hegger, Birgitt Kretzschmar: A Metropolitan-Scale Testbed for Heterogeneous Wireless Sensor Networks to Support CO2 Reduction. GreeNets 2012: 112-120
[c21]Immanuel Schweizer, Michael Wagner, Dirk Bradler, Max Mühlhäuser, Thorsten Strufe: kTC - Robust and Adaptive Wireless Ad-Hoc Topology Control. ICCCN 2012: 1-9
[c20]Stefanie Roos, Thorsten Strufe: Provable Polylog Routing for Darknets. ICDCS Workshops 2012: 140-146
[c19]Thomas Paul, Martin Stopczynski, Daniel Puscher, Melanie Volkamer, Thorsten Strufe: C4PS - Helping Facebookers Manage Their Privacy Settings. SocInfo 2012: 188-201
[c18]Thomas Paul, Martin Stopczynski, Daniel Puscher, Melanie Volkamer, Thorsten Strufe: C4PS: colors for privacy settings. WWW (Companion Volume) 2012: 585-586
[e1]Sabu M. Thampi, Albert Y. Zomaya, Thorsten Strufe, Jose M. Alcaraz Calero, Tony Thomas (Eds.): Recent Trends in Computer Networks and Distributed Systems Security - International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012. Proceedings. Communications in Computer and Information Science 335, Springer 2012, ISBN 978-3-642-34134-2- 2011
[c17]Felix Günther, Mark Manulis, Thorsten Strufe: Cryptographic Treatment of Private User Profiles. Financial Cryptography Workshops 2011: 40-54
[c16]Immanuel Schweizer, Nils Fleischhacker, Max Mühlhäuser, Thorsten Strufe: SDF - Solar-aware distributed flow in wireless sensor networks. LCN 2011: 382-390
[c15]Frederik Armknecht, Thorsten Strufe: An efficient distributed privacy-preserving recommendation system. Med-Hoc-Net 2011: 65-70
[c14]Betim Berjani, Thorsten Strufe: A recommendation system for spots in location-based online social networks. SNS 2011: 4
[c13]Felix Günther, Mark Manulis, Thorsten Strufe: Key management in distributed online social networks. WOWMOM 2011: 1-7
[i4]Thomas Paul, Daniel Puscher, Thorsten Strufe: Improving the Usability of Privacy Settings in Facebook. CoRR abs/1109.6046 (2011)
[i3]Felix Günther, Mark Manulis, Thorsten Strufe: Cryptographic Treatment of Private User Profiles. IACR Cryptology ePrint Archive 2011: 64 (2011)- 2010
[j5]Michael Rossberg, Guenter Schaefer, Thorsten Strufe: Distributed Automatic Configuration of Complex IPsec-Infrastructures. J. Network Syst. Manage. 18(3): 300-326 (2010)
[c12]Lachezar Krumov, Immanuel Schweizer, Dirk Bradler, Thorsten Strufe: Leveraging Network Motifs for the Adaptation of Structured Peer-to-Peer-Networks. GLOBECOM 2010: 1-5
[c11]Konstantin Pussep, Osama Abboud, Florian Gerlach, Ralf Steinmetz, Thorsten Strufe: Adaptive server allocation for peer-assisted Video-on-Demand. IPDPS Workshops 2010: 1-8
[c10]
[c9]Lachezar Krumov, Adriana Andreeva, Thorsten Strufe: Resilient Peer-to-Peer live-streaming using motifs. WOWMOM 2010: 1-8
[p3]Marcel Karnstedt, Tara Hennessy, Jeffrey Chan, Partha Basuchowdhuri, Conor Hayes, Thorsten Strufe: Churn in Social Networks. Handbook of Social Network Technologies 2010: 185-220
[p2]Anwitaman Datta, Sonja Buchegger, Le-Hung Vu, Thorsten Strufe, Krzysztof Rzadca: Decentralized Online Social Networks. Handbook of Social Network Technologies 2010: 349-378
[p1]Leucio Antonio Cutillo, Mark Manulis, Thorsten Strufe: Security and Privacy in Online Social Networks. Handbook of Social Network Technologies 2010: 497-522
[i2]Thorsten Strufe: Profile Popularity in a Business-oriented Online Social Network. CoRR abs/1003.0466 (2010)
2000 – 2009
- 2009
[j4]Michael Brinkmeier, Mathias Fischer, Sascha Grau, Günter Schäfer, Thorsten Strufe: Methods for Improving Resilience in Communication Networks and P2P Overlays. Praxis der Informationsverarbeitung und Kommunikation 32(1): 64-78 (2009)
[j3]Michael Brinkmeier, Günter Schäfer, Thorsten Strufe: Optimally DoS Resistant P2P Topologies for Live Multimedia Streaming. IEEE Trans. Parallel Distrib. Syst. 20(6): 831-844 (2009)
[c8]Leucio Antonio Cutillo, Refik Molva, Thorsten Strufe: Leveraging Social Links for Trust and Privacy in Networks. iNetSeC 2009: 27-36
[c7]Leucio Antonio Cutillo, Refik Molva, Thorsten Strufe: On the Security and Feasibility of Safebook: A Distributed Privacy-Preserving Online Social Network. PrimeLife 2009: 86-101
[c6]Leucio Antonio Cutillo, Refik Molva, Thorsten Strufe: Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network. WOWMOM 2009: 1-6
[c5]Erik-Oliver Blass, Anil Kurmus, Refik Molva, Thorsten Strufe: PSP: private and secure payment with RFID. WPES 2009: 51-60
[c4]Leyla Bilge, Thorsten Strufe, Davide Balzarotti, Engin Kirda: All your contacts are belong to us: automated identity theft attacks on social networks. WWW 2009: 551-560
[i1]Erik-Oliver Blass, Anil Kurmus, Refik Molva, Thorsten Strufe: PSP: Private and Secure Payment with RFID. IACR Cryptology ePrint Archive 2009: 181 (2009)- 2007
[b1]Thorsten Strufe: Ein Peer-to-Peer-basierter Ansatz für die Live-Übertragung multimedialer Datenströme. Ilmenau University of Technology 2007, ISBN 978-3-86727-358-9, pp. 1-209
[j2]Thorsten Strufe, Jens Wildhagen, Günter Schäfer: Towards the Construction of Attack Resistant and Efficient Overlay Streaming Topologies. Electr. Notes Theor. Comput. Sci. 179: 111-121 (2007)
[j1]Jens Wildhagen, Thorsten Strufe, Günter Schäfer: Netzwerkeffizienz stabiler Overlay-Streaming-Topologien (Network Efficiency of Stable Overlay Streaming Topologies). it - Information Technology 49(5): 304-311 (2007)
[c3]Thorsten Strufe, Jens Wildhagen, Günter Schäfer: Netzwerkeffizienz stabiler Overlay-Streaming-Topologien. KiVS 2007: 3-14
[c2]Michael Rossberg, Guenter Schaefer, Thorsten Strufe: Using recurring costs for reputation management in peer-to-peer streaming systems. SecureComm 2007: 283-292- 2006
[c1]Thorsten Strufe, Günter Schäfer, Arthur Chang: BCBS: An Efficient Load Balancing Strategy for Cooperative Overlay Live-Streaming. ICC 2006: 304-309
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-16 21:28 CEST by the dblp team



