default search action
Thorsten Strufe
Person information
- affiliation: Karlsruhe Institute of Technology, Germany
- affiliation: TU Dresden, Germany
- affiliation (former): Darmstadt University of Technology, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [c143]Yushan Yang, Simon Hanisch, Mingyu Ma, Stefanie Roos, Thorsten Strufe, Giang T. Nguyen:
First Steps Towards Game and Activity Inference on Encrypted VR Datastreams. WoWMoM 2025: 105-110 - 2024
- [j37]Ladan Khaloopour, Yanpeng Su, Florian Raskob, Tobias Meuser, Roland Bless, Leon Janzen, Kamyar Abedi, Marko S. Andjelkovic, Hekma Chaari, Pousali Chakraborty, Michael Kreutzer, Matthias Hollick, Thorsten Strufe, Norman Franchi, Vahid Jamali:
Resilience-by-Design in 6G Networks: Literature Review and Novel Enabling Concepts. IEEE Access 12: 155666-155695 (2024) - [j36]Àlex Miranda-Pascual, Patricia Guerra-Balboa, Javier Parra-Arnau, Jordi Forné, Thorsten Strufe:
An overview of proposals towards the privacy-preserving publication of trajectory data. Int. J. Inf. Sec. 23(6): 3711-3747 (2024) - [j35]Avinash Kumar Chaurasia, Matin Fallahi, Thorsten Strufe, Philipp Terhörst, Patricia Arias Cabarcos:
NeuroIDBench: An open-source benchmark framework for the standardization of methodology in brainwave-based authentication research. J. Inf. Secur. Appl. 85: 103832 (2024) - [j34]Simon Hanisch, Julian Todt, Jose Patino, Nicholas W. D. Evans, Thorsten Strufe:
A False Sense of Privacy: Towards a Reliable Evaluation Methodology for the Anonymization of Biometric Data. Proc. Priv. Enhancing Technol. 2024(1): 116-132 (2024) - [j33]Philip Scherer, Christiane Weis, Thorsten Strufe:
A Framework for Provably Secure Onion Routing against a Global Adversary. Proc. Priv. Enhancing Technol. 2024(2): 141-159 (2024) - [j32]Julian Todt, Simon Hanisch, Thorsten Strufe:
Fantômas: Understanding Face Anonymization Reversibility. Proc. Priv. Enhancing Technol. 2024(4): 24-43 (2024) - [j31]Philip Scherer, Christiane Weis, Thorsten Strufe:
Provable Security for the Onion Routing and Mix Network Packet Format Sphinx. Proc. Priv. Enhancing Technol. 2024(4): 755-783 (2024) - [c142]Christoph Coijanovic, Akim Stark, Daniel Schadt, Thorsten Strufe:
Pirates: Anonymous Group Calls over Fully Untrusted Infrastructure. ACISP (3) 2024: 193-212 - [c141]Patricia Guerra-Balboa, Àlex Miranda-Pascual, Javier Parra-Arnau, Thorsten Strufe:
Composition in Differential Privacy for General Granularity Notions. CSF 2024: 680-696 - [c140]Kamyar Abedi, Giang T. Nguyen, Thorsten Strufe:
Improving Resilience of Future Mobile Network Generations Implementing Zero Trust Paradigm. NOMS 2024: 1-5 - [c139]Fritz Windisch, Kamyar Abedi, Giang T. Nguyen, Thorsten Strufe:
Demo: Towards Rapid Prototyping Network-Slicing Solutions in Software-Defined Networks. NOMS 2024: 1-3 - [c138]Daniel Schadt, Christoph Coijanovic, Christiane Weis, Thorsten Strufe:
PolySphinx: Extending the Sphinx Mix Format With Better Multicast Support. SP 2024: 4386-4404 - [i48]Avinash Kumar Chaurasia, Matin Fallahi, Thorsten Strufe, Philipp Terhörst, Patricia Arias Cabarcos:
NeuroBench: An Open-Source Benchmark Framework for the Standardization of Methodology in Brainwave-based Authentication Research. CoRR abs/2402.08656 (2024) - [i47]Matin Fallahi, Patricia Arias Cabarcos, Thorsten Strufe:
On the Usability of Next-Generation Authentication: A Study on Eye Movement and Brainwave-based Mechanisms. CoRR abs/2402.15388 (2024) - [i46]Christoph Coijanovic, Akim Stark, Daniel Schadt, Thorsten Strufe:
Pirates: Anonymous Group Calls Over Fully Untrusted Infrastructure. CoRR abs/2404.09095 (2024) - [i45]Matin Fallahi, Patricia Arias Cabarcos, Thorsten Strufe:
Beyond Gaze Points: Augmenting Eye Movement with Brainwave Data for Multimodal User Authentication in Extended Reality. CoRR abs/2404.18694 (2024) - [i44]Ladan Khaloopour, Yanpeng Su, Florian Raskob, Tobias Meuser, Roland Bless, Leon Würsching, Kamyar Abedi, Marko S. Andjelkovic, Hekma Chaari, Pousali Chakraborty, Michael Kreutzer, Matthias Hollick, Thorsten Strufe, Norman Franchi, Vahid Jamali:
Resilience-by-Design Concepts for 6G Communication Networks. CoRR abs/2405.17480 (2024) - [i43]Julian Todt, Simon Hanisch, Thorsten Strufe:
SEBA: Strong Evaluation of Biometric Anonymizations. CoRR abs/2407.06648 (2024) - [i42]Michael Klooß, Andy Rupp, Daniel Schadt, Thorsten Strufe, Christiane Weis:
EROR: Efficient Repliable Onion Routing with Strong Provable Privacy. IACR Cryptol. ePrint Arch. 2024: 20 (2024) - 2023
- [j30]Zarina Chokparova, Kilian Becher, Anselm Klose, Thorsten Strufe, Leon Urbas:
Cryptographic protocol for privacy-preserving integration of HAZOPs in modular process plants. Comput. Chem. Eng. 176: 108295 (2023) - [j29]Simon Hanisch, Evelyn Muschter, Admantini Hatzipanayioti, Shu-Chen Li, Thorsten Strufe:
Understanding Person Identification Through Gait. Proc. Priv. Enhancing Technol. 2023(1): 177-189 (2023) - [j28]Patricia Arias Cabarcos, Saina Khalili, Thorsten Strufe:
'Surprised, Shocked, Worried'}: User Reactions to Facebook Data Collection from Third Parties. Proc. Priv. Enhancing Technol. 2023(1): 384-399 (2023) - [j27]Àlex Miranda-Pascual, Patricia Guerra-Balboa, Javier Parra-Arnau, Jordi Forné, Thorsten Strufe:
SoK: Differentially Private Publication of Trajectory Data. Proc. Priv. Enhancing Technol. 2023(2): 496-516 (2023) - [j26]Patricia Arias Cabarcos, Matin Fallahi, Thilo Habrich, Karen Schulze, Christian Becker, Thorsten Strufe:
Performance and Usability Evaluation of Brainwave Authentication Techniques with Consumer Devices. ACM Trans. Priv. Secur. 26(3): 26:1-26:36 (2023) - [c137]Kilian Becher, J. A. Gregor Lagodzinski, Javier Parra-Arnau, Thorsten Strufe:
Analysis and Prevention of Averaging Attacks Against Obfuscation Protocols. ACNS (1) 2023: 451-475 - [c136]Matin Fallahi, Patricia Arias Cabarcos, Thorsten Strufe:
Poster: Towards Practical Brainwave-based User Authentication. CCS 2023: 3627-3629 - [c135]Christoph Coijanovic, Christiane Weis, Thorsten Strufe:
Panini - Anonymous Anycast and an Instantiation. ESORICS (2) 2023: 193-211 - [c134]Fritz Windisch, Kamyar Abedi, Tung T. Doan, Thorsten Strufe, Giang T. Nguyen:
Hybrid Testbed for Security Research in Software-Defined Networks. NFV-SDN 2023: 147-152 - [c133]Matin Fallahi, Thorsten Strufe, Patricia Arias Cabarcos:
BrainNet: Improving Brainwave-based Biometric Recognition with Siamese Networks. PERCOM 2023: 53-60 - [c132]Christoph Coijanovic, Daniel Schadt, Christiane Weis, Thorsten Strufe:
BAZAAR: Anonymous Resource Sharing. WPES@CCS 2023: 135-139 - [i41]Simon Hanisch, Julian Todt, Jose Patino, Nicholas W. D. Evans, Thorsten Strufe:
A False Sense of Privacy: Towards a Reliable Evaluation Methodology for the Anonymization of Biometric Data. CoRR abs/2304.01635 (2023) - [i40]Christoph Coijanovic, Christiane Kuhn, Thorsten Strufe:
Panini - Anonymous Anycast and an Instantiation. CoRR abs/2305.16629 (2023) - [i39]Patricia Guerra-Balboa, Àlex Miranda-Pascual, Javier Parra-Arnau, Thorsten Strufe:
Composition in Differential Privacy for General Granularity Notions (Long Version). CoRR abs/2308.14649 (2023) - [i38]Philip Scherer, Christiane Weis, Thorsten Strufe:
Provable Security for the Onion Routing and Mix Network Packet Format Sphinx. CoRR abs/2312.08028 (2023) - [i37]Mirko Günther, Lars Schütze, Kilian Becher, Thorsten Strufe, Jerónimo Castrillón:
HElium: A Language and Compiler for Fully Homomorphic Encryption with Support for Proxy Re-Encryption. CoRR abs/2312.14250 (2023) - 2022
- [j25]Martin Byrenheid, Stefanie Roos, Thorsten Strufe:
Improvements to the Secure Construction and Utilization of Greedy Embeddings in Friend-to-Friend Overlays. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 80 (2022) - [j24]Andrés Marín López, Patricia Arias Cabarcos, Thorsten Strufe, Gabriel Barceló-Soteras, Florina Almenárez Mendoza, Daniel Díaz Sánchez:
Implementing DNSSEC soft delegation for microservices. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 80 (2022) - [j23]Paul Walther, Markus Richter, Thorsten Strufe:
Ray-tracing based Inference Attacks on Physical Layer Security. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 80 (2022) - [j22]Javier Parra-Arnau, Thorsten Strufe, Josep Domingo-Ferrer:
Differentially private publication of database streams via hybrid video coding. Knowl. Based Syst. 247: 108778 (2022) - [j21]Jan Ludwig Reubold, Stephan Escher, Johannes Pflugmacher, Thorsten Strufe:
Dissecting chirping patterns of invasive Tweeter flocks in the German Twitter forest. Online Soc. Networks Media 31: 100228 (2022) - [c131]Jan Ludwig Reubold, Stephan Escher, Christian Wressnegger, Thorsten Strufe:
to Protect the Public Opinion Against New Types of Bots? IEEE Big Data 2022: 1671-1680 - [c130]Kilian Becher, Mirko Schäfer, Axel Schröpfer, Thorsten Strufe:
Efficient Public Verification of Confidential Supply-Chain Transactions. CNS 2022: 308-316 - [c129]Martin Byrenheid, Stefanie Roos, Thorsten Strufe:
Topology Inference of Networks utilizing Rooted Spanning Tree Embeddings. ICDCN 2022: 107-116 - [c128]Sebastian Rettlinger, Bastian Knaus, Florian Wieczorek, Nikolas Ivakko, Simon Hanisch, Giang T. Nguyen, Thorsten Strufe, Frank H. P. Fitzek:
MPER - a Motion Profiling Experiment and Research system for human body movement. PerCom Workshops 2022: 88-90 - [c127]Stephan Escher, Katrin Etzrodt, Benjamin Weller, Stefan Köpsell, Thorsten Strufe:
Transparency for Bystanders in IoT regarding audiovisual Recordings. PerCom Workshops 2022: 649-654 - [c126]Oualid Zari, Javier Parra-Arnau, Ayse Ünsal, Thorsten Strufe, Melek Önen:
Membership Inference Attack Against Principal Component Analysis. PSD 2022: 269-282 - [i36]Simon Hanisch, Evelyn Muschter, Adamantini Chatzipanagioti, Shu-Chen Li, Thorsten Strufe:
Understanding person identification via gait. CoRR abs/2203.04179 (2022) - [i35]Christiane Kuhn, Aniket Kate, Thorsten Strufe:
The Danger of Small Anonymity Sets in Privacy-Preserving Payment Systems. CoRR abs/2204.09282 (2022) - [i34]Patricia Arias Cabarcos, Saina Khalili, Thorsten Strufe:
'Surprised, Shocked, Worried': User Reactions to Facebook Data Collection from Third Parties. CoRR abs/2209.08048 (2022) - [i33]Julian Todt, Simon Hanisch, Thorsten Strufe:
Fantômas: Evaluating Reversibility of Face Anonymizations Using a General Deep Learning Attacker. CoRR abs/2210.10651 (2022) - 2021
- [j20]Christiane Kuhn, Martin Beck, Thorsten Strufe:
Covid notions: Towards formal definitions - and documented understanding - of privacy goals and claimed protection in proximity-tracing services. Online Soc. Networks Media 22: 100125 (2021) - [c125]Christiane Kuhn, Dennis Hofheinz, Andy Rupp, Thorsten Strufe:
Onion Routing with Replies. ASIACRYPT (2) 2021: 573-604 - [c124]Wasilij Beskorovajnov, Felix Dörre, Gunnar Hartung, Alexander Koch, Jörn Müller-Quade, Thorsten Strufe:
ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized-Decentralized Divide for Stronger Privacy. ASIACRYPT (2) 2021: 665-695 - [c123]Frank H. P. Fitzek, Shu-Chen Li, Stefanie Speidel, Thorsten Strufe, Patrick Seeling:
Frontiers of Transdisciplinary Research in Tactile Internet with Human-in-the-Loop. ISWCS 2021: 1-6 - [c122]Sarah Abdelwahab Gaballah, Christoph Coijanovic, Thorsten Strufe, Max Mühlhäuser:
2PPS - Publish/Subscribe with Provable Privacy. SRDS 2021: 198-209 - [c121]Amr Osman, Jeannine Born, Thorsten Strufe:
Mitigating Internal, Stealthy DoS Attacks in Microservice Networks. SSS 2021: 500-504 - [c120]Reyhan Duezguen, Peter Mayer, Benjamin Berens, Christopher Beckmann, Lukas Aldag, Mattia Mossano, Melanie Volkamer, Thorsten Strufe:
How to Increase Smart Home Security and Privacy Risk Perception. TrustCom 2021: 997-1004 - [c119]Patricia Arias Cabarcos, Thilo Habrich, Karen Becker, Christian Becker, Thorsten Strufe:
Inexpensive Brainwave Authentication: New Techniques and Insights on User Acceptance. USENIX Security Symposium 2021: 55-72 - [c118]Stephan Escher, Markus Sontowski, Knut Berling, Stefan Köpsell, Thorsten Strufe:
How well can your car be tracked: Analysis of the European C-ITS pseudonym scheme. VTC Spring 2021: 1-6 - [c117]Christiane Kuhn, Maximilian Noppel, Christian Wressnegger, Thorsten Strufe:
Plausible Deniability for Anonymous Communication. WPES@CCS 2021: 17-32 - [d1]Paul Walther, Robert Knauer, Thorsten Strufe:
Ultra-Wideband Channel State Information and Localization for Physical Layer Security. IEEE DataPort, 2021 - [i32]Dominik Wunderlich, Daniel Bernau, Francesco Aldà, Javier Parra-Arnau, Thorsten Strufe:
On the privacy-utility trade-off in differentially private hierarchical text classification. CoRR abs/2103.02895 (2021) - [i31]Martin Byrenheid, Stefanie Roos, Thorsten Strufe:
Topology Inference of Networks utilizing Rooted Spanning Tree Embeddings. CoRR abs/2108.04374 (2021) - [i30]Sarah Abdelwahab Gaballah, Christoph Coijanovic, Thorsten Strufe, Max Mühlhäuser:
2PPS - Publish/Subscribe with Provable Privacy. CoRR abs/2108.08624 (2021) - [i29]Simon Hanisch, Patricia Arias Cabarcos, Javier Parra-Arnau, Thorsten Strufe:
Privacy-Protecting Techniques for Behavioral Data: A Survey. CoRR abs/2109.04120 (2021) - [i28]Christiane Kuhn, Dennis Hofheinz, Andy Rupp, Thorsten Strufe:
Onion Routing with Replies. IACR Cryptol. ePrint Arch. 2021: 1178 (2021) - 2020
- [c116]Stephan Escher, Benjamin Weller, Stefan Köpsell, Thorsten Strufe:
Towards Transparency in the Internet of Things. APF 2020: 186-200 - [c115]Frederik Armknecht, Paul Walther, Gene Tsudik, Martin Beck, Thorsten Strufe:
ProMACs: Progressive and Resynchronizing MACs for Continuous Efficient Authentication of Message Streams. CCS 2020: 211-223 - [c114]Stephan Escher, Patrick Teufert, Robin Herrmann, Thorsten Strufe:
Twizzle - A Multi-purpose Benchmarking Framework for Semantic Comparisons of Multimedia Object Pairs. DETIPS/DeSECSys/MPS/SPOSE@ESORICS 2020: 223-230 - [c113]Stephan Escher, Patrick Teufert, Lukas Hain, Thorsten Strufe:
You've Got Nothing on Me! Privacy Friendly Face Recognition Reloaded. DETIPS/DeSECSys/MPS/SPOSE@ESORICS 2020: 231-242 - [c112]Amr Osman, Armin Wasicek, Stefan Köpsell, Thorsten Strufe:
Transparent Microsegmentation in Smart Home IoT Networks. HotEdge 2020 - [c111]Martin Byrenheid, Thorsten Strufe, Stefanie Roos:
Attack resistant Leader Election in Social Overlay Networks by Leveraging Local Voting. ICDCN 2020: 7:1-7:10 - [c110]Johannes Pflugmacher, Stephan Escher, Jan Reubold, Thorsten Strufe:
The German-Speaking Twitter Community Reference Data Set. INFOCOM Workshops 2020: 1172-1177 - [c109]Kilian Becher, Thorsten Strufe:
Efficient Cloud-based Secret Shuffling via Homomorphic Encryption. ISCC 2020: 1-7 - [c108]Paul Walther, Thorsten Strufe:
Blind Twins: Siamese Networks for Non-Interactive Information Reconciliation. PIMRC 2020: 1-7 - [c107]Paul Walther, Robert Knauer, Thorsten Strufe:
Passive Angriffe auf kanalbasierten Schlüsselaustausch. Sicherheit 2020: 41-51 - [c106]Christiane Kuhn, Martin Beck, Thorsten Strufe:
Breaking and (Partially) Fixing Provably Secure Onion Routing. SP 2020: 168-185 - [c105]Clemens Deußer, Steffen Passmann, Thorsten Strufe:
Browsing Unicity: On the Limits of Anonymizing Web Tracking Data. SP 2020: 777-790 - [c104]Martin Byrenheid, Thorsten Strufe, Stefanie Roos:
Secure Embedding of Rooted Spanning Trees for Scalable Routing in Topology-Restricted Networks. SRDS 2020: 175-184 - [c103]Paul Walther, Thorsten Strufe:
Inference Attacks on Physical Layer Channel State Information. TrustCom 2020: 935-942 - [c102]Kilian Becher, J. A. Gregor Lagodzinski, Thorsten Strufe:
Privacy-Preserving Public Verification of Ethical Cobalt Sourcing. TrustCom 2020: 998-1005 - [c101]Christiane Kuhn, Friederike Kitzing, Thorsten Strufe:
SoK on Performance Bounds in Anonymous Communication. WPES@CCS 2020: 21-39 - [i27]Kilian Becher, Thorsten Strufe:
Efficient Cloud-based Secret Shuffling via Homomorphic Encryption. CoRR abs/2002.05231 (2020) - [i26]Christiane Kuhn, Martin Beck, Thorsten Strufe:
Covid Notions: Towards Formal Definitions - and Documented Understanding - of Privacy Goals and Claimed Protection in Proximity-Tracing Services. CoRR abs/2004.07723 (2020) - [i25]Christiane Kuhn, Friederike Kitzing, Thorsten Strufe:
SoK on Performance Bounds in Anonymous Communication. CoRR abs/2011.08536 (2020) - [i24]Wasilij Beskorovajnov, Felix Dörre, Gunnar Hartung, Alexander Koch, Jörn Müller-Quade, Thorsten Strufe:
ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized - Decentralized Divide for Stronger Privacy. IACR Cryptol. ePrint Arch. 2020: 505 (2020)
2010 – 2019
- 2019
- [j19]Do Le Quoc, Martin Beck, Pramod Bhatotia, Ruichuan Chen, Christof Fetzer, Thorsten Strufe:
PrivApprox: Privacy-Preserving Stream Analytics - (Extended Abstract). Inform. Spektrum 42(5): 358-359 (2019) - [j18]Gerhard P. Fettweis, Meik Dorpinghaus, Jerónimo Castrillón, Akash Kumar, Christel Baier, Karlheinz Bock, Frank Ellinger, Andreas Fery, Frank H. P. Fitzek, Hermann Härtig, Kambiz Jamshidi, Thomas Kissinger, Wolfgang Lehner, Michael Mertig, Wolfgang E. Nagel, Giang T. Nguyen, Dirk Plettemeier, Michael Schröter, Thorsten Strufe:
Architecture and Advanced Electronics Pathways Toward Highly Adaptive Energy- Efficient Computing. Proc. IEEE 107(1): 204-231 (2019) - [j17]Christiane Kuhn, Martin Beck, Stefan Schiffner, Eduard A. Jorswieck, Thorsten Strufe:
On Privacy Notions in Anonymous Communication. Proc. Priv. Enhancing Technol. 2019(2): 105-125 (2019) - [c100]Amr Osman, Simon Hanisch, Thorsten Strufe:
SeCoNetBench: A modular framework for Secure Container Networking Benchmarks. EuroS&P Workshops 2019: 21-28 - [c99]Tobias Reiher, Alexander Senier, Jerónimo Castrillón, Thorsten Strufe:
RecordFlux: Formal Message Specification and Generation of Verifiable Binary Parsers. FACS 2019: 170-190 - [c98]Amr Osman, Pascal Bruckner, Hani Salah, Frank H. P. Fitzek, Thorsten Strufe, Mathias Fischer:
Sandnet: Towards High Quality of Deception in Container-Based Microservice Architectures. ICC 2019: 1-7 - [c97]Tao Li, Hani Salah, Xin Ding, Thorsten Strufe, Frank H. P. Fitzek, Silvia Santini:
INFAS: In-Network Flow mAnagement Scheme for SDN Control Plane Protection. IM 2019: 367-373 - [c96]Muhammad Hassan, Hani Salah, Mauro Conti, Frank H. P. Fitzek, Thorsten Strufe:
CoMon-DAS: A Framework for Efficient and Robust Dynamic Adaptive Streaming over NDN. ISCC 2019: 1-7 - [c95]Kilian Becher, Martin Beck, Thorsten Strufe:
An Enhanced Approach to Cloud-based Privacy-preserving Benchmarking. NetSys 2019: 1-8 - [c94]Paul Walther, Elke Franz, Thorsten Strufe:
Blind Synchronization of Channel Impulse Responses for Channel Reciprocity-based Key Generation. LCN 2019: 76-83 - [c93]Martin Byrenheid, Stefanie Roos, Thorsten Strufe:
Attack-Resistant Spanning Tree Construction in Route-Restricted Overlay Networks. SRDS 2019: 251-260 - [c92]Markus Sontowski, Stefan Köpsell, Thorsten Strufe, Christian Zimmermann, Andreas Weinand, Hans D. Schotten, Norbert Bissmeyer:
Towards Secure Communication for High-Density Longitudinal Platooning. VTC Fall 2019: 1-7 - [c91]Tim Lackorzynski, Stefan Köpsell, Thorsten Strufe:
A Comparative Study on Virtual Private Networks for Future Industrial Communication Systems. WFCS 2019: 1-8 - [c90]Pin-Hsun Lin, Christiane Kuhn, Thorsten Strufe, Eduard A. Jorswieck:
Physical Layer Privacy in Broadcast Channels. WIFS 2019: 1-6 - [r2]Do Le Quoc, Martin Beck, Pramod Bhatotia, Ruichuan Chen, Christof Fetzer, Thorsten Strufe:
Privacy-Preserving Data Analytics. Encyclopedia of Big Data Technologies 2019 - [r1]Do Le Quoc, Ruichuan Chen, Pramod Bhatotia, Christof Fetzer, Volker Hilt, Thorsten Strufe:
Approximate Computing for Stream Analytics. Encyclopedia of Big Data Technologies 2019 - [i23]Martin Byrenheid, Stefanie Roos, Thorsten Strufe:
On the Limits of Byzantine-tolerant Spanning Tree Construction in Route-Restricted Overlay Networks. CoRR abs/1901.02729 (2019) - [i22]Tobias Reiher, Alexander Senier, Jerónimo Castrillón, Thorsten Strufe:
RecordFlux: Formal Message Specification and Generation of Verifiable Binary Parsers. CoRR abs/1910.02146 (2019) - [i21]Christiane Kuhn, Martin Beck, Thorsten Strufe:
Breaking and (Partially) Fixing Provably Secure Onion Routing. CoRR abs/1910.13772 (2019) - 2018
- [c89]Do Le Quoc, Istemi Ekin Akkus, Pramod Bhatotia, Spyros Blanas, Ruichuan Chen, Christof Fetzer, Thorsten Strufe:
ApproxJoin: Approximate Distributed Joins. SoCC 2018: 426-438 - [c88]Nora Jansen, Oliver Hinz, Thorsten Strufe:
"Police - to Protect and Serve" Online: Factors contributing to Modern Ways of Interaction between Citizens and Law Enforcement Agencies. ECIS 2018: 48 - [c87]Christiane Kuhn, Friederike Kitzing, Thorsten Strufe:
An Attack on Untraceable Linear Network Coding. GLOBECOM 2018: 1-6 - [c86]Sadia Moriam, Elke Franz, Paul Walther, Akash Kumar, Thorsten Strufe, Gerhard P. Fettweis:
Protecting Communication in Many-Core Systems against Active Attackers. ACM Great Lakes Symposium on VLSI 2018: 45-50 - [c85]Timo Richter, Stephan Escher, Dagmar Schönfeld, Thorsten Strufe:
Forensic Analysis and Anonymisation of Printed Documents. IH&MMSec 2018: 127-138 - [c84]Paul Walther, Stefan Köpsell, Frederik Armknecht, Gene Tsudik, Thorsten Strufe:
Chains and Whips - An approach to lighweight MACs. Krypto-Tag 2018 - [c83]Paul Walther, Carsten Rudolf Janda, Elke Franz, Mathias Pelka, Horst Hellbrück, Thorsten Strufe, Eduard A. Jorswieck:
Improving Quantization for Channel Reciprocity based Key Generation. LCN 2018: 545-552 - [c82]Tao Li, Hani Salah, Mu He, Thorsten Strufe, Silvia Santini:
REMO: Resource efficient distributed network monitoring. NOMS 2018: 1-9 - [c81]Tao Li, Yuanjun Sun, Marek Sobe, Thorsten Strufe, Silvia Santini:
Energy-efficient SDN control and visualization. NOMS 2018: 1-2 - [c80]Eemil Lagerspetz, Huber Flores, Niko Mäkitalo, Pan Hui, Petteri Nurmi, Sasu Tarkoma, Andrea Passarella, Jörg Ott, Peter Reichl, Marco Conti, Markus Fiedler, Jatinder Singh, Thorsten Strufe, Tobias Hoßfeld, Anders Lindgren, Daniele Quercia:
Pervasive Communities in the Internet of People. PerCom Workshops 2018: 40-45 - [c79]Martin Byrenheid, Stefan Köpsell, Alexander Naumenko, Thorsten Strufe:
Transparent Low-Latency Network Anonymisation for Mobile Devices. SecureComm (1) 2018: 193-209 - [c78]Clemens Deusser, Nora Jansen, Jan Reubold, Benjamin Schiller, Oliver Hinz, Thorsten Strufe:
Buzz in Social Media: Detection of Short-lived Viral Phenomena. WWW (Companion Volume) 2018: 1443-1449 - [i20]Do Le Quoc, Istemi Ekin Akkus, Pramod Bhatotia, Spyros Blanas, Ruichuan Chen, Christof Fetzer, Thorsten Strufe:
Approximate Distributed Joins in Apache Spark. CoRR abs/1805.05874 (2018) - [i19]Kilian Becher, Martin Beck, Thorsten Strufe:
An Enhanced Approach to Cloud-based Privacy-preserving Benchmarking (Long Version). CoRR abs/1810.04971 (2018) - [i18]Christiane Kuhn, Martin Beck, Stefan Schiffner, Eduard A. Jorswieck, Thorsten Strufe:
On Privacy Notion in Anonymous Communication. CoRR abs/1812.05638 (2018) - 2017
- [j16]Sven Jager, Benjamin Schiller, Philipp Babel, Malte Blumenroth, Thorsten Strufe, Kay Hamacher:
StreAM-Tg: algorithms for analyzing coarse grained RNA dynamics based on Markov models of connectivity-graphs. Algorithms Mol. Biol. 12(1): 15:1-15:16 (2017) - [c77]Steffen Passmann, Anne Lauber-Roensberg, Thorsten Strufe:
Privacy-preserving audience measurement in practice - Opportunities and challenges. CNS 2017: 444-449 - [c76]Thomas Paul, Niklas Lochschmidt, Hani Salah, Anwitaman Datta, Thorsten Strufe:
Lilliput: A Storage Service for Lightweight Peer-to-Peer Online Social Networks. ICCCN 2017: 1-10 - [c75]Stephan Escher, Thorsten Strufe:
Robustness analysis of a passive printer identification scheme for halftone images. ICIP 2017: 4357-4361 - [c74]Bho Matthiesen, Stefan Pfennig, Mario Bielert, Thomas Ilsche, Andrew Lonnstrom, Tao Li, Juan A. Cabrera, Christian Scheunert, Elke Franz, Silvia Santini, Thorsten Strufe, Eduard A. Jorswieck, Wolfgang E. Nagel, Giang T. Nguyen, Frank H. P. Fitzek:
Secure and energy-efficient interconnects for board-to-board communication. ICUWB 2017: 1-7 - [c73]Stefanie Roos, Martin Byrenheid, Clemens Deusser, Thorsten Strufe:
BD-CAT: Balanced dynamic content addressing in trees. INFOCOM 2017: 1-9 - [c72]Hani Salah, Mohammed Alfatafta, Saed SayedAhmed, Thorsten Strufe:
CoMon++: Preventing Cache Pollution in NDN Efficiently and Effectively. LCN 2017: 43-51 - [c71]Do Le Quoc, Ruichuan Chen, Pramod Bhatotia, Christof Fetzer, Volker Hilt, Thorsten Strufe:
StreamApprox: approximate computing for stream analytics. Middleware 2017: 185-197 - [c70]Jan Reubold, Ahcène Boubekki, Thorsten Strufe, Ulf Brefeld:
Infinite Mixtures of Markov Chains. NFMCP@PKDD/ECML 2017: 167-181 - [c69]Do Le Quoc, Martin Beck, Pramod Bhatotia, Ruichuan Chen, Christof Fetzer, Thorsten Strufe:
PrivApprox: Privacy-Preserving Stream Analytics. USENIX ATC 2017: 659-672 - [i17]Stefanie Roos, Martin Byrenheid, Clemens Deusser, Thorsten Strufe:
Balanced Dynamic Content Addressing in Trees. CoRR abs/1701.03522 (2017) - [i16]Do Le Quoc, Martin Beck, Pramod Bhatotia, Ruichuan Chen, Christof Fetzer, Thorsten Strufe:
Privacy Preserving Stream Analytics: The Marriage of Randomized Response and Approximate Computing. CoRR abs/1701.05403 (2017) - [i15]Alexander Senier, Martin Beck, Thorsten Strufe:
PrettyCat: Adaptive guarantee-controlled software partitioning of security protocols. CoRR abs/1706.04759 (2017) - [i14]Do Le Quoc, Ruichuan Chen, Pramod Bhatotia, Christof Fetzer, Volker Hilt, Thorsten Strufe:
Approximate Stream Analytics in Apache Flink and Apache Spark Streaming. CoRR abs/1709.02946 (2017) - [i13]Jeremy Blackburn, Emiliano De Cristofaro, Michael Sirivianos, Thorsten Strufe:
Cybersafety in Modern Online Social Networks (Dagstuhl Reports 17372). Dagstuhl Reports 7(9): 47-61 (2017) - 2016
- [j15]Benjamin Schiller, Clemens Deusser, Jerónimo Castrillón, Thorsten Strufe:
Compile- and run-time approaches for the selection of efficient data structures for dynamic graph analysis. Appl. Netw. Sci. 1: 9 (2016) - [j14]Xiaoming Fu, Andrea Passarella, Daniele Quercia, Alessandra Sala, Thorsten Strufe:
Online Social Networks. Comput. Commun. 73: 163-166 (2016) - [j13]Stefanie Roos, Thorsten Strufe:
Dealing with Dead Ends: Efficient Routing in Darknets. ACM Trans. Model. Perform. Evaluation Comput. Syst. 1(1): 4:1-4:30 (2016) - [c68]Stefanie Roos, Martin Beck, Thorsten Strufe:
Anonymous addresses for efficient and resilient routing in F2F overlays. INFOCOM 2016: 1-9 - [c67]Hani Salah, Thorsten Strufe:
Evaluating and mitigating a Collusive version of the Interest Flooding Attack in NDN. ISCC 2016: 938-945 - [c66]Sven Jager, Benjamin Schiller, Thorsten Strufe, Kay Hamacher:
StreAM- T_g : Algorithms for Analyzing Coarse Grained RNA Dynamics Based on Markov Models of Connectivity-Graphs. WABI 2016: 197-209 - [c65]Giang Nguyen, Stefanie Roos, Benjamin Schiller, Thorsten Strufe:
SWAP: Protecting pull-based P2P video streaming systems from inference attacks. WoWMoM 2016: 1-9 - [i12]Stefanie Roos, Martin Beck, Thorsten Strufe:
VOUTE-Virtual Overlays Using Tree Embeddings. CoRR abs/1601.06119 (2016) - 2015
- [j12]Paul Gebelein, Thomas Paul, Thorsten Strufe, Wolfgang Effelsberg:
Interdisziplinäre Forschung zwischen Informatikern und Soziologen. Prax. Inf.verarb. Kommun. 38(1-2): 83-87 (2015) - [c64]Benjamin Schiller, Sven Jager, Kay Hamacher, Thorsten Strufe:
StreaM - A Stream-Based Algorithm for Counting Motifs in Dynamic Graphs. AlCoB 2015: 53-67 - [c63]Hani Salah, Thorsten Strufe:
CoMon: An architecture for coordinated caching and cache-aware routing in CCN. CCNC 2015: 663-670 - [c62]Thomas Paul, Daniel Puscher, Stefan Wilk, Thorsten Strufe:
Systematic, large-scale analysis on the feasibility of media prefetching in Online Social Networks. CCNC 2015: 755-760 - [c61]Axel Schulz, Benedikt Schmidt, Thorsten Strufe:
Small-Scale Incident Detection based on Microposts. HT 2015: 3-12 - [c60]Irina Heimbach, Benjamin Schiller, Thorsten Strufe, Oliver Hinz:
Content Virality on Online Social Networks: Empirical Evidence from Twitter, Facebook, and Google+ on German News Websites. HT 2015: 39-47 - [c59]Hani Salah, Julian Wulfheide, Thorsten Strufe:
Lightweight coordinated defence against interest flooding attacks in NDN. INFOCOM Workshops 2015: 103-104 - [c58]Stefanie Roos, Thorsten Strufe:
On the impossibility of efficient self-stabilization in virtual overlays with churn. INFOCOM 2015: 298-306 - [c57]Stefanie Roos, Giang T. Nguyen, Thorsten Strufe:
Integrating churn into the formal analysis of routing algorithms. NetSys 2015: 1-5 - [c56]Stefanie Roos, Florian Platzer, Jan-Michael Heller, Thorsten Strufe:
Inferring obfuscated values in Freenet. NetSys 2015: 1-8 - [c55]Hani Salah, Julian Wulfheide, Thorsten Strufe:
Coordination supports security: A new defence mechanism against interest flooding in NDN. LCN 2015: 73-81 - [c54]Benjamin Schiller, Thorsten Strufe, Dirk Kohlweyer, Jan Seedorf:
Growing a Web of Trust. LCN 2015: 100-108 - [c53]Giang Nguyen, Stefanie Roos, Thorsten Strufe, Mathias Fischer:
RBCS: A resilient backbone construction scheme for hybrid Peer-To-Peer streaming. LCN 2015: 261-269 - [c52]Benjamin Schiller, Jerónimo Castrillón, Thorsten Strufe:
Efficient Data Structures for Dynamic Graph Analysis. SITIS 2015: 497-504 - [i11]Thomas Paul, Daniel Puscher, Thorsten Strufe:
The User Behavior in Facebook and its Development from 2009 until 2014. CoRR abs/1505.04943 (2015) - [i10]Thomas Paul, Daniel Puscher, Thorsten Strufe:
Private Date Exposure in Facebook and the Impact of Comprehensible Audience Selection Controls. CoRR abs/1505.06178 (2015) - 2014
- [j11]Thomas Paul, Antonino Famulari, Thorsten Strufe:
A survey on decentralized Online Social Networks. Comput. Networks 75: 437-452 (2014) - [c51]Daniel Germanus, Stefanie Roos, Thorsten Strufe, Neeraj Suri:
Mitigating Eclipse attacks in Peer-To-Peer networks. CNS 2014: 400-408 - [c50]Thomas Paul, Marius Hornung, Thorsten Strufe:
Distributed discovery of user handles with privacy. GLOBECOM 2014: 2947-2953 - [c49]Frederik Armknecht, Manuel Hauptmann, Stefanie Roos, Thorsten Strufe:
An additional protection layer for confidential OSNs posts. ICC 2014: 3746-3752 - [c48]Hani Salah, Benjamin Schiller, Thorsten Strufe:
CoMon: A system architecture for improving caching in CCN. INFOCOM Workshops 2014: 213-214 - [c47]Hani Salah, Stefanie Roos, Thorsten Strufe:
Characterizing graph-theoretic properties of a large-scale DHT: Measurements vs. simulations. ISCC 2014: 1-7 - [c46]Stefanie Roos, Liang Wang, Thorsten Strufe, Jussi Kangasharju:
Enhancing compact routing in CCN with prefix embedding and topology-aware hashing. MobiArch 2014: 49-54 - [c45]Hani Salah, Stefanie Roos, Thorsten Strufe:
Diversity entails improvement: A new neighbour selection scheme for Kademlia-type systems. P2P 2014: 1-10 - [c44]Benjamin Schiller, Giang Nguyen, Thorsten Strufe:
Resilient tree-based live streaming for mobile scenarios. PerCom Workshops 2014: 160-162 - [c43]Stefanie Roos, Benjamin Schiller, Stefan Hacker, Thorsten Strufe:
Measuring Freenet in the Wild: Censorship-Resilience under Observation. Privacy Enhancing Technologies 2014: 263-282 - [c42]Tim Grube, Benjamin Schiller, Thorsten Strufe:
Monotone Sampling of Networks. DyNaK 2014 - [c41]Sebastian Biedermann, Nikolaos P. Karvelas, Stefan Katzenbeisser, Thorsten Strufe, Andreas Peter:
ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation. SOFSEM 2014: 114-125 - [c40]Patrick Welzel, Stefanie Roos, Andreas Höfer, Thorsten Strufe:
DarknetSim: a simulation framework for social overlays. SpringSim (CNS) 2014: 2 - [c39]Giang Nguyen, Mathias Fischer, Thorsten Strufe:
On the Resilience of Pull-Based P2P Streaming Systems against DoS Attacks. SSS 2014: 33-47 - [c38]Max Schmachtenberg, Thorsten Strufe, Heiko Paulheim:
Enhancing a Location-based Recommendation System by Enrichment with Structured Data from the Web. WIMS 2014: 17:1-17:12 - [i9]Stefanie Roos, Thorsten Strufe:
NextBestOnce: Achieving Polylog Routing despite Non-greedy Embeddings. CoRR abs/1401.2165 (2014) - [i8]Hani Salah, Stefanie Roos, Thorsten Strufe:
A Lightweight Approach for Improving the Lookup Performance in Kademlia-type Systems. CoRR abs/1408.3079 (2014) - 2013
- [j10]Erik-Oliver Blass, Anil Kurmus, Refik Molva, Thorsten Strufe:
PSP: Private and secure payment with RFID. Comput. Commun. 36(4): 468-480 (2013) - [j9]Damiano Carra, Pietro Michiardi, Hani Salah, Thorsten Strufe:
On the Impact of Incentives in eMule {Analysis and Measurements of a Popular File-Sharing Application}. IEEE J. Sel. Areas Commun. 31(9-Supplement): 94-104 (2013) - [c37]Damiano Carra, Thorsten Strufe, György Dán, Marcel Karnstedt:
Topic 7: Peer-to-Peer Computing - (Introduction). Euro-Par 2013: 353 - [c36]Stephan Schulz, Thorsten Strufe:
d2 Deleting Diaspora: Practical attacks for profile discovery and deletion. ICC 2013: 2042-2046 - [c35]Hani Salah, Thorsten Strufe:
Capturing Connectivity Graphs of a Large-Scale P2P Overlay Network. ICDCS Workshops 2013: 172-177 - [c34]Stefanie Roos, Thorsten Strufe:
A contribution to analyzing and enhancing Darknet routing. INFOCOM 2013: 615-619 - [c33]Andreas Höfer, Stefanie Roos, Thorsten Strufe:
Greedy Embedding, Routing and Content Addressing for Darknets. NetSys 2013: 43-50 - [c32]Dang-Hai Hoang, Thorsten Strufe, Quang Duc Le, Phong Thanh Bui, Thieu Nga Pham, Nguyet Thi Thai, Thuy Duong Le, Immanuel Schweizer:
Processing and visualizing traffic pollution data in Hanoi City from a wireless sensor network. LCN Workshops 2013: 48-55 - [c31]Dang-Hai Hoang, Thorsten Strufe, Thieu Nga Pham, Hong-Ngoc Hoang, Chung Tien Nguyen, Van Tho Tran, Immanuel Schweizer:
A smart data forwarding method based on adaptive levels in wireless sensor networks. LCN Workshops 2013: 100-103 - [c30]Benjamin Schiller, Giang Nguyen, Thorsten Strufe:
Resilient tree-based live streaming in reality. P2P 2013: 1-2 - [c29]Benjamin Schiller, Thorsten Strufe:
GTNA 2.0 - a framework for rapid prototyping and evaluation of routing algorithms. SummerSim 2013: 23 - [c28]Giang Nguyen, Mathias Fischer, Thorsten Strufe:
OSSim: a generic simulation framework for overlay streaming. SummerSim 2013: 30 - [c27]Benjamin Schiller, Thorsten Strufe:
Dynamic network analyzer building a framework for the graph-theoretic analysis of dynamic networks. SummerSim 2013: 49 - [p5]Kamill Panitzek, Thorsten Strufe:
A Formal Model for Peer-to-Peer Systems. Benchmarking Peer-to-Peer Systems 2013: 15-18 - [p4]Wolfgang Effelsberg, Thorsten Strufe:
Summary and Conclusion. Benchmarking Peer-to-Peer Systems 2013: 195-197 - [e2]Wolfgang Effelsberg, Ralf Steinmetz, Thorsten Strufe:
Benchmarking Peer-to-Peer Systems - Understanding Quality of Service in Large-Scale Distributed Systems. Lecture Notes in Computer Science 7847, Springer 2013, ISBN 978-3-642-38672-5 [contents] - [i7]Stefanie Roos, Hani Salah, Thorsten Strufe:
Comprehending Kademlia Routing - A Theoretical Framework for the Hop Count Distribution. CoRR abs/1307.7000 (2013) - [i6]Frederik Armknecht, Manuel Hauptmann, Stefanie Roos, Thorsten Strufe:
Protecting Public OSN Posts from Unintended Access. CoRR abs/1309.3647 (2013) - [i5]Sonja Buchegger, Jon Crowcroft, Balachander Krishnamurthy, Thorsten Strufe:
Decentralized Systems for Privacy Preservation (Dagstuhl Seminar 13062). Dagstuhl Reports 3(2): 22-44 (2013) - 2012
- [j8]Tobias Lauinger, Nikolaos Laoutaris, Pablo Rodriguez, Thorsten Strufe, Ernst W. Biersack, Engin Kirda:
Privacy risks in named data networking: what is the cost of performance? Comput. Commun. Rev. 42(5): 54-57 (2012) - [j7]Melek Önen, Thorsten Strufe:
Special section on Security and Social Networking. Comput. Commun. 35(1): 47 (2012) - [j6]Kamill Panitzek, Muhammad Ikram, Max Mühlhäuser, Thorsten Strufe:
Smooth Resilient Service Provision in Large Heterogeneous Networks. Prax. Inf.verarb. Kommun. 35(3): 167-173 (2012) - [c26]Pablo Ezequiel Guerrero, Alejandro P. Buchmann, Kristof Van Laerhoven, Immanuel Schweizer, Max Mühlhäuser, Thorsten Strufe, Stefan Schneckenburger, Manfred Hegger, Birgitt Kretzschmar:
A Metropolitan-Scale Testbed for Heterogeneous Wireless Sensor Networks to Support CO2 Reduction. GreeNets 2012: 112-120 - [c25]Immanuel Schweizer, Michael Wagner, Dirk Bradler, Max Mühlhäuser, Thorsten Strufe:
kTC - Robust and Adaptive Wireless Ad-Hoc Topology Control. ICCCN 2012: 1-9 - [c24]Stefanie Roos, Thorsten Strufe:
Provable Polylog Routing for Darknets. ICDCS Workshops 2012: 140-146 - [c23]Thomas Paul, Martin Stopczynski, Daniel Puscher, Melanie Volkamer, Thorsten Strufe:
C4PS - Helping Facebookers Manage Their Privacy Settings. SocInfo 2012: 188-201 - [c22]Thomas Paul, Martin Stopczynski, Daniel Puscher, Melanie Volkamer, Thorsten Strufe:
C4PS: colors for privacy settings. WWW (Companion Volume) 2012: 585-586 - [e1]Sabu M. Thampi, Albert Y. Zomaya, Thorsten Strufe, José M. Alcaraz Calero, Tony Thomas:
Recent Trends in Computer Networks and Distributed Systems Security - International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012. Proceedings. Communications in Computer and Information Science 335, Springer 2012, ISBN 978-3-642-34134-2 [contents] - 2011
- [c21]Felix Günther, Mark Manulis, Thorsten Strufe:
Cryptographic Treatment of Private User Profiles. Financial Cryptography Workshops 2011: 40-54 - [c20]Immanuel Schweizer, Nils Fleischhacker, Max Mühlhäuser, Thorsten Strufe:
SDF - Solar-aware distributed flow in wireless sensor networks. LCN 2011: 382-390 - [c19]Frederik Armknecht, Thorsten Strufe:
An efficient distributed privacy-preserving recommendation system. Med-Hoc-Net 2011: 65-70 - [c18]Betim Berjani, Thorsten Strufe:
A recommendation system for spots in location-based online social networks. SNS 2011: 4 - [c17]Benjamin Schiller, Stefanie Roos, Andreas Höfer, Thorsten Strufe:
Attack Resistant Network Embeddings for Darknets. SRDS Workshops 2011: 90-95 - [c16]Felix Günther, Mark Manulis, Thorsten Strufe:
Key management in distributed online social networks. WOWMOM 2011: 1-7 - [i4]Thomas Paul, Daniel Puscher, Thorsten Strufe:
Improving the Usability of Privacy Settings in Facebook. CoRR abs/1109.6046 (2011) - [i3]Felix Günther, Mark Manulis, Thorsten Strufe:
Cryptographic Treatment of Private User Profiles. IACR Cryptol. ePrint Arch. 2011: 64 (2011) - 2010
- [j5]Michael Rossberg, Guenter Schaefer, Thorsten Strufe:
Distributed Automatic Configuration of Complex IPsec-Infrastructures. J. Netw. Syst. Manag. 18(3): 300-326 (2010) - [c15]Lachezar Krumov, Immanuel Schweizer, Dirk Bradler, Thorsten Strufe:
Leveraging Network Motifs for the Adaptation of Structured Peer-to-Peer-Networks. GLOBECOM 2010: 1-5 - [c14]Konstantin Pussep, Osama Abboud, Florian Gerlach, Ralf Steinmetz, Thorsten Strufe:
Adaptive server allocation for peer-assisted Video-on-Demand. IPDPS Workshops 2010: 1-8 - [c13]Daniel Schreiber, Osama Abboud, Sandra Kovacevic, Andreas Höfer, Thorsten Strufe:
Social IPTV: a Survey on Chances and User-Acceptance. LWA 2010: 337-340 - [c12]Thorsten Strufe:
Profile popularity in a business-oriented online social network. SNS 2010: 2 - [c11]Lachezar Krumov, Adriana Andreeva, Thorsten Strufe:
Resilient Peer-to-Peer live-streaming using motifs. WOWMOM 2010: 1-8 - [p3]Marcel Karnstedt, Tara Hennessy, Jeffrey Chan, Partha Basuchowdhuri, Conor Hayes, Thorsten Strufe:
Churn in Social Networks. Handbook of Social Network Technologies 2010: 185-220 - [p2]Anwitaman Datta, Sonja Buchegger, Le-Hung Vu, Thorsten Strufe, Krzysztof Rzadca:
Decentralized Online Social Networks. Handbook of Social Network Technologies 2010: 349-378 - [p1]Leucio Antonio Cutillo, Mark Manulis, Thorsten Strufe:
Security and Privacy in Online Social Networks. Handbook of Social Network Technologies 2010: 497-522 - [i2]Thorsten Strufe:
Profile Popularity in a Business-oriented Online Social Network. CoRR abs/1003.0466 (2010)
2000 – 2009
- 2009
- [j4]Leucio Antonio Cutillo, Refik Molva, Thorsten Strufe:
Safebook: A privacy-preserving online social network leveraging on real-life trust. IEEE Commun. Mag. 47(12): 94-101 (2009) - [j3]Michael Brinkmeier, Mathias Fischer, Sascha Grau, Günter Schäfer, Thorsten Strufe:
Methods for Improving Resilience in Communication Networks and P2P Overlays. Prax. Inf.verarb. Kommun. 32(1): 64-78 (2009) - [j2]Michael Brinkmeier, Günter Schäfer, Thorsten Strufe:
Optimally DoS Resistant P2P Topologies for Live Multimedia Streaming. IEEE Trans. Parallel Distributed Syst. 20(6): 831-844 (2009) - [c10]Leucio Antonio Cutillo, Refik Molva, Thorsten Strufe:
Leveraging Social Links for Trust and Privacy in Networks. iNetSeC 2009: 27-36 - [c9]Leucio Antonio Cutillo, Refik Molva, Thorsten Strufe:
On the Security and Feasibility of Safebook: A Distributed Privacy-Preserving Online Social Network. PrimeLife 2009: 86-101 - [c8]Leucio Antonio Cutillo, Refik Molva, Thorsten Strufe:
Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network. WOWMOM 2009: 1-6 - [c7]Erik-Oliver Blass, Anil Kurmus, Refik Molva, Thorsten Strufe:
PSP: private and secure payment with RFID. WPES 2009: 51-60 - [c6]Leyla Bilge, Thorsten Strufe, Davide Balzarotti, Engin Kirda:
All your contacts are belong to us: automated identity theft attacks on social networks. WWW 2009: 551-560 - [i1]Erik-Oliver Blass, Anil Kurmus, Refik Molva, Thorsten Strufe:
PSP: Private and Secure Payment with RFID. IACR Cryptol. ePrint Arch. 2009: 181 (2009) - 2008
- [c5]Mathias Fischer, Guenter Schaefer, Robert Karl Schmidt, Thorsten Strufe:
A Key Management Solution for Overlay-Live-Streaming. SecureComm 2008 - 2007
- [b1]Thorsten Strufe:
Ein Peer-to-Peer-basierter Ansatz für die Live-Übertragung multimedialer Datenströme. Technische Universität Ilmenau, Germany, 2007, ISBN 978-3-86727-358-9, pp. 1-209 - [j1]Jens Wildhagen, Thorsten Strufe, Günter Schäfer:
Netzwerkeffizienz stabiler Overlay-Streaming-Topologien (Network Efficiency of Stable Overlay Streaming Topologies). it Inf. Technol. 49(5): 304-311 (2007) - [c4]Thorsten Strufe, Jens Wildhagen, Günter Schäfer:
Netzwerkeffizienz stabiler Overlay-Streaming-Topologien. KiVS 2007: 3-14 - [c3]Michael Rossberg, Guenter Schaefer, Thorsten Strufe:
Using recurring costs for reputation management in peer-to-peer streaming systems. SecureComm 2007: 283-292 - 2006
- [c2]Thorsten Strufe, Günter Schäfer, Arthur Chang:
BCBS: An Efficient Load Balancing Strategy for Cooperative Overlay Live-Streaming. ICC 2006: 304-309 - [c1]Thorsten Strufe, Jens Wildhagen, Günter Schäfer:
Towards the Construction of Attack Resistant and Efficient Overlay Streaming Topologies. STM 2006: 111-121
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint