Thorsten Strufe
Orcid: 0000-0002-8723-9692Affiliations:
- Karlsruhe Institute of Technology, Germany
- TU Dresden, Germany
- Darmstadt University of Technology, Germany (former)
According to our database1,
Thorsten Strufe
authored at least 222 papers
between 2006 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2025
Proceedings of the 25th IEEE International Symposium on a World of Wireless, 2025
2024
An overview of proposals towards the privacy-preserving publication of trajectory data.
Int. J. Inf. Sec., December, 2024
A False Sense of Privacy: Towards a Reliable Evaluation Methodology for the Anonymization of Biometric Data.
Proc. Priv. Enhancing Technol., January, 2024
Proc. Priv. Enhancing Technol., 2024
Proc. Priv. Enhancing Technol., 2024
Proc. Priv. Enhancing Technol., 2024
NeuroIDBench: An open-source benchmark framework for the standardization of methodology in brainwave-based authentication research.
J. Inf. Secur. Appl., 2024
IACR Cryptol. ePrint Arch., 2024
Beyond Gaze Points: Augmenting Eye Movement with Brainwave Data for Multimodal User Authentication in Extended Reality.
CoRR, 2024
On the Usability of Next-Generation Authentication: A Study on Eye Movement and Brainwave-based Mechanisms.
CoRR, 2024
NeuroBench: An Open-Source Benchmark Framework for the Standardization of Methodology in Brainwave-based Authentication Research.
CoRR, 2024
IEEE Access, 2024
Proceedings of the 23rd Workshop on Privacy in the Electronic Society, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Demo: Towards Rapid Prototyping Network-Slicing Solutions in Software-Defined Networks.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024
Improving Resilience of Future Mobile Network Generations Implementing Zero Trust Paradigm.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
Performance and Usability Evaluation of Brainwave Authentication Techniques with Consumer Devices.
ACM Trans. Priv. Secur., August, 2023
Cryptographic protocol for privacy-preserving integration of HAZOPs in modular process plants.
Comput. Chem. Eng., August, 2023
Proc. Priv. Enhancing Technol., April, 2023
Proc. Priv. Enhancing Technol., January, 2023
'Surprised, Shocked, Worried'}: User Reactions to Facebook Data Collection from Third Parties.
Proc. Priv. Enhancing Technol., January, 2023
HElium: A Language and Compiler for Fully Homomorphic Encryption with Support for Proxy Re-Encryption.
CoRR, 2023
CoRR, 2023
Proceedings of the 22nd Workshop on Privacy in the Electronic Society, 2023
Proceedings of the IEEE International Conference on Pervasive Computing and Communications, 2023
Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks, 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the Applied Cryptography and Network Security, 2023
2022
Dissecting chirping patterns of invasive Tweeter flocks in the German Twitter forest.
Online Soc. Networks Media, 2022
Knowl. Based Syst., 2022
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2022
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2022
Improvements to the Secure Construction and Utilization of Greedy Embeddings in Friend-to-Friend Overlays.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2022
Fantômas: Evaluating Reversibility of Face Anonymizations Using a General Deep Learning Attacker.
CoRR, 2022
Proceedings of the Privacy in Statistical Databases - International Conference, 2022
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022
Proceedings of the ICDCN '22: 23rd International Conference on Distributed Computing and Networking, Delhi, AA, India, January 4, 2022
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
Proceedings of the IEEE International Conference on Big Data, 2022
2021
Ultra-Wideband Channel State Information and Localization for Physical Layer Security.
Dataset, May, 2021
Covid notions: Towards formal definitions - and documented understanding - of privacy goals and claimed protection in proximity-tracing services.
Online Soc. Networks Media, 2021
On the privacy-utility trade-off in differentially private hierarchical text classification.
CoRR, 2021
Proceedings of the WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, 2021
Proceedings of the 93rd IEEE Vehicular Technology Conference, 2021
Inexpensive Brainwave Authentication: New Techniques and Insights on User Acceptance.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2021
Proceedings of the 40th International Symposium on Reliable Distributed Systems, 2021
Proceedings of the 17th International Symposium on Wireless Communication Systems, 2021
2020
ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized - Decentralized Divide for Stronger Privacy.
IACR Cryptol. ePrint Arch., 2020
Proceedings of the WPES'20: Proceedings of the 19th Workshop on Privacy in the Electronic Society, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Secure Embedding of Rooted Spanning Trees for Scalable Routing in Topology-Restricted Networks.
Proceedings of the International Symposium on Reliable Distributed Systems, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the Sicherheit 2020, Sicherheit, 2020
Proceedings of the 31st IEEE Annual International Symposium on Personal, 2020
Proceedings of the IEEE Symposium on Computers and Communications, 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Attack resistant Leader Election in Social Overlay Networks by Leveraging Local Voting.
Proceedings of the ICDCN 2020: 21st International Conference on Distributed Computing and Networking, 2020
Proceedings of the 3rd USENIX Workshop on Hot Topics in Edge Computing, 2020
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020
Twizzle - A Multi-purpose Benchmarking Framework for Semantic Comparisons of Multimedia Object Pairs.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020
ProMACs: Progressive and Resynchronizing MACs for Continuous Efficient Authentication of Message Streams.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the Privacy Technologies and Policy - 8th Annual Privacy Forum, 2020
2019
Proceedings of the Encyclopedia of Big Data Technologies., 2019
Proceedings of the Encyclopedia of Big Data Technologies., 2019
Architecture and Advanced Electronics Pathways Toward Highly Adaptive Energy- Efficient Computing.
Proc. IEEE, 2019
Inform. Spektrum, 2019
On the Limits of Byzantine-tolerant Spanning Tree Construction in Route-Restricted Overlay Networks.
CoRR, 2019
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2019
A Comparative Study on Virtual Private Networks for Future Industrial Communication Systems.
Proceedings of the 15th IEEE International Workshop on Factory Communication Systems, 2019
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019
Proceedings of the 38th Symposium on Reliable Distributed Systems, 2019
Blind Synchronization of Channel Impulse Responses for Channel Reciprocity-based Key Generation.
Proceedings of the 44th IEEE Conference on Local Computer Networks, 2019
Proceedings of the 2019 International Conference on Networked Systems, 2019
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019
Sandnet: Towards High Quality of Deception in Container-Based Microservice Architectures.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
RecordFlux: Formal Message Specification and Generation of Verifiable Binary Parsers.
Proceedings of the Formal Aspects of Component Software - 16th International Conference, 2019
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019
2018
CoRR, 2018
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, 2018
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018
Proceedings of the 28. Krypto-Tag, 2018
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018
Proceedings of the 2018 on Great Lakes Symposium on VLSI, 2018
Proceedings of the IEEE Global Communications Conference, 2018
"Police - to Protect and Serve" Online: Factors contributing to Modern Ways of Interaction between Citizens and Law Enforcement Agencies.
Proceedings of the 26th European Conference on Information Systems: Beyond Digitization, 2018
Proceedings of the ACM Symposium on Cloud Computing, 2018
2017
Dagstuhl Reports, 2017
PrettyCat: Adaptive guarantee-controlled software partitioning of security protocols.
CoRR, 2017
Privacy Preserving Stream Analytics: The Marriage of Randomized Response and Approximate Computing.
CoRR, 2017
StreAM-T<sub>g</sub>: algorithms for analyzing coarse grained RNA dynamics based on Markov models of connectivity-graphs.
Algorithms Mol. Biol., 2017
Proceedings of the 2017 USENIX Annual Technical Conference, 2017
Proceedings of the New Frontiers in Mining Complex Patterns - 6th International Workshop, 2017
Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference, Las Vegas, NV, USA, December 11, 2017
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Proceedings of the 17th IEEE International Conference on Ubiquitous Wireless Broadband, 2017
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
2016
ACM Trans. Model. Perform. Evaluation Comput. Syst., 2016
Compile- and run-time approaches for the selection of efficient data structures for dynamic graph analysis.
Appl. Netw. Sci., 2016
Proceedings of the 17th IEEE International Symposium on A World of Wireless, 2016
StreAM- T_g : Algorithms for Analyzing Coarse Grained RNA Dynamics Based on Markov Models of Connectivity-Graphs.
Proceedings of the Algorithms in Bioinformatics - 16th International Workshop, 2016
Evaluating and mitigating a Collusive version of the Interest Flooding Attack in NDN.
Proceedings of the IEEE Symposium on Computers and Communication, 2016
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
2015
Prax. Inf.verarb. Kommun., 2015
Private Date Exposure in Facebook and the Impact of Comprehensible Audience Selection Controls.
CoRR, 2015
Proceedings of the 11th International Conference on Signal-Image Technology & Internet-Based Systems, 2015
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015
Coordination supports security: A new defence mechanism against interest flooding in NDN.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015
Proceedings of the 2015 International Conference and Workshops on Networked Systems, 2015
Proceedings of the 2015 International Conference and Workshops on Networked Systems, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Proceedings of the 26th ACM Conference on Hypertext & Social Media, 2015
Content Virality on Online Social Networks: Empirical Evidence from Twitter, Facebook, and Google+ on German News Websites.
Proceedings of the 26th ACM Conference on Hypertext & Social Media, 2015
Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, 2015
Systematic, large-scale analysis on the feasibility of media prefetching in Online Social Networks.
Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, 2015
Proceedings of the Algorithms for Computational Biology, 2015
2014
A Lightweight Approach for Improving the Lookup Performance in Kademlia-type Systems.
CoRR, 2014
Enhancing a Location-based Recommendation System by Enrichment with Structured Data from the Web.
Proceedings of the 4th International Conference on Web Intelligence, 2014
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2014
Proceedings of the 17th Communications & Networking Symposium, 2014
Proceedings of the SOFSEM 2014: Theory and Practice of Computer Science, 2014
Proceedings of the 2nd International Workshop on Dynamic Networks and Knowledge Discovery, 2014
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014
Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, 2014
Diversity entails improvement: A new neighbour selection scheme for Kademlia-type systems.
Proceedings of the 14th IEEE International Conference on Peer-to-Peer Computing, 2014
Proceedings of the 9th ACM Workshop on Mobility in the Evolving Internet Architecture, 2014
Characterizing graph-theoretic properties of a large-scale DHT: Measurements vs. simulations.
Proceedings of the IEEE Symposium on Computers and Communications, 2014
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the IEEE Global Communications Conference, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
2013
Proceedings of the Benchmarking Peer-to-Peer Systems, 2013
On the Impact of Incentives in eMule {Analysis and Measurements of a Popular File-Sharing Application}.
IEEE J. Sel. Areas Commun., 2013
Dagstuhl Reports, 2013
Comprehending Kademlia Routing - A Theoretical Framework for the Hop Count Distribution.
CoRR, 2013
Dynamic network analyzer building a framework for the graph-theoretic analysis of dynamic networks.
Proceedings of the 2013 Summer Simulation Multiconference, 2013
Proceedings of the 2013 Summer Simulation Multiconference, 2013
Proceedings of the 2013 Summer Simulation Multiconference, 2013
Proceedings of the 13th IEEE International Conference on Peer-to-Peer Computing, 2013
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, Sydney, Australia, October 21-24, 2013, 2013
Processing and visualizing traffic pollution data in Hanoi City from a wireless sensor network.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, Sydney, Australia, October 21-24, 2013, 2013
Proceedings of the 2013 Conference on Networked Systems, 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013
d<sup>2</sup> Deleting Diaspora: Practical attacks for profile discovery and deletion.
Proceedings of IEEE International Conference on Communications, 2013
Proceedings of the Euro-Par 2013 Parallel Processing, 2013
2012
Prax. Inf.verarb. Kommun., 2012
Comput. Commun. Rev., 2012
Proceedings of the 21st World Wide Web Conference, 2012
Proceedings of the Social Informatics, 2012
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012
A Metropolitan-Scale Testbed for Heterogeneous Wireless Sensor Networks to Support CO2 Reduction.
Proceedings of the Green Communication and Networking, 2012
2011
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems Workshops, 2011
Proceedings of the 4th Workshop on Social Network Systems, 2011
Proceedings of the 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop, 2011
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011
2010
Proceedings of the Handbook of Social Network Technologies and Applications, 2010
Proceedings of the Handbook of Social Network Technologies and Applications, 2010
Proceedings of the Handbook of Social Network Technologies and Applications, 2010
J. Netw. Syst. Manag., 2010
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010
Proceedings of the 3rd Workshop on Social Network Systems, Paris, France, April 13, 2010, 2010
Proceedings of the LWA 2010, 2010
Proceedings of the 24th IEEE International Symposium on Parallel and Distributed Processing, 2010
Proceedings of the Global Communications Conference, 2010
2009
IEEE Trans. Parallel Distributed Syst., 2009
Prax. Inf.verarb. Kommun., 2009
IEEE Commun. Mag., 2009
All your contacts are belong to us: automated identity theft attacks on social networks.
Proceedings of the 18th International Conference on World Wide Web, 2009
Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network.
Proceedings of the 10th IEEE International Symposium on a World of Wireless, 2009
On the Security and Feasibility of Safebook: A Distributed Privacy-Preserving Online Social Network.
Proceedings of the Privacy and Identity Management for Life, 2009
Proceedings of the iNetSec 2009 - Open Research Problems in Network Security, 2009
2008
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008
2007
Ein Peer-to-Peer-basierter Ansatz für die Live-Übertragung multimedialer Datenströme.
PhD thesis, 2007
Netzwerkeffizienz stabiler Overlay-Streaming-Topologien (Network Efficiency of Stable Overlay Streaming Topologies).
it Inf. Technol., 2007
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2007
2006
Towards the Construction of Attack Resistant and Efficient Overlay Streaming Topologies.
Proceedings of the Second International Workshop on Security and Trust Management, 2006
Proceedings of IEEE International Conference on Communications, 2006