Thorsten Strufe

Orcid: 0000-0002-8723-9692

Affiliations:
  • Karlsruhe Institute of Technology, Germany
  • TU Dresden, Germany
  • Darmstadt University of Technology, Germany (former)


According to our database1, Thorsten Strufe authored at least 221 papers between 2006 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
First Steps Towards Game and Activity Inference on Encrypted VR Datastreams.
Proceedings of the 25th IEEE International Symposium on a World of Wireless, 2025

2024
An overview of proposals towards the privacy-preserving publication of trajectory data.
Int. J. Inf. Sec., December, 2024

A False Sense of Privacy: Towards a Reliable Evaluation Methodology for the Anonymization of Biometric Data.
Proc. Priv. Enhancing Technol., January, 2024

Fantômas: Understanding Face Anonymization Reversibility.
Proc. Priv. Enhancing Technol., 2024

Provable Security for the Onion Routing and Mix Network Packet Format Sphinx.
Proc. Priv. Enhancing Technol., 2024

A Framework for Provably Secure Onion Routing against a Global Adversary.
Proc. Priv. Enhancing Technol., 2024

NeuroIDBench: An open-source benchmark framework for the standardization of methodology in brainwave-based authentication research.
J. Inf. Secur. Appl., 2024

EROR: Efficient Repliable Onion Routing with Strong Provable Privacy.
IACR Cryptol. ePrint Arch., 2024

SEBA: Strong Evaluation of Biometric Anonymizations.
CoRR, 2024

Resilience-by-Design Concepts for 6G Communication Networks.
CoRR, 2024

Beyond Gaze Points: Augmenting Eye Movement with Brainwave Data for Multimodal User Authentication in Extended Reality.
CoRR, 2024

On the Usability of Next-Generation Authentication: A Study on Eye Movement and Brainwave-based Mechanisms.
CoRR, 2024

NeuroBench: An Open-Source Benchmark Framework for the Standardization of Methodology in Brainwave-based Authentication Research.
CoRR, 2024

Resilience-by-Design in 6G Networks: Literature Review and Novel Enabling Concepts.
IEEE Access, 2024

Analysis and Measurement of Attack Resilience of Differential Privacy.
Proceedings of the 23rd Workshop on Privacy in the Electronic Society, 2024

PolySphinx: Extending the Sphinx Mix Format With Better Multicast Support.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Demo: Towards Rapid Prototyping Network-Slicing Solutions in Software-Defined Networks.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024

Improving Resilience of Future Mobile Network Generations Implementing Zero Trust Paradigm.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024

Composition in Differential Privacy for General Granularity Notions.
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024

Pirates: Anonymous Group Calls over Fully Untrusted Infrastructure.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

2023
Performance and Usability Evaluation of Brainwave Authentication Techniques with Consumer Devices.
ACM Trans. Priv. Secur., August, 2023

Cryptographic protocol for privacy-preserving integration of HAZOPs in modular process plants.
Comput. Chem. Eng., August, 2023

SoK: Differentially Private Publication of Trajectory Data.
Proc. Priv. Enhancing Technol., April, 2023

Understanding Person Identification Through Gait.
Proc. Priv. Enhancing Technol., January, 2023

'Surprised, Shocked, Worried'}: User Reactions to Facebook Data Collection from Third Parties.
Proc. Priv. Enhancing Technol., January, 2023

HElium: A Language and Compiler for Fully Homomorphic Encryption with Support for Proxy Re-Encryption.
CoRR, 2023

Composition in Differential Privacy for General Granularity Notions (Long Version).
CoRR, 2023

Panini - Anonymous Anycast and an Instantiation.
CoRR, 2023

BAZAAR: Anonymous Resource Sharing.
Proceedings of the 22nd Workshop on Privacy in the Electronic Society, 2023

BrainNet: Improving Brainwave-based Biometric Recognition with Siamese Networks.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications, 2023

Hybrid Testbed for Security Research in Software-Defined Networks.
Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks, 2023

Panini - Anonymous Anycast and an Instantiation.
Proceedings of the Computer Security - ESORICS 2023, 2023

Poster: Towards Practical Brainwave-based User Authentication.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Analysis and Prevention of Averaging Attacks Against Obfuscation Protocols.
Proceedings of the Applied Cryptography and Network Security, 2023

2022
Dissecting chirping patterns of invasive Tweeter flocks in the German Twitter forest.
Online Soc. Networks Media, 2022

Differentially private publication of database streams via hybrid video coding.
Knowl. Based Syst., 2022

Ray-tracing based Inference Attacks on Physical Layer Security.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2022

Implementing DNSSEC soft delegation for microservices.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2022

Improvements to the Secure Construction and Utilization of Greedy Embeddings in Friend-to-Friend Overlays.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2022

Fantômas: Evaluating Reversibility of Face Anonymizations Using a General Deep Learning Attacker.
CoRR, 2022

The Danger of Small Anonymity Sets in Privacy-Preserving Payment Systems.
CoRR, 2022

Understanding person identification via gait.
CoRR, 2022

Membership Inference Attack Against Principal Component Analysis.
Proceedings of the Privacy in Statistical Databases - International Conference, 2022

MPER - a Motion Profiling Experiment and Research system for human body movement.
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022

Transparency for Bystanders in IoT regarding audiovisual Recordings.
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022

Topology Inference of Networks utilizing Rooted Spanning Tree Embeddings.
Proceedings of the ICDCN '22: 23rd International Conference on Distributed Computing and Networking, Delhi, AA, India, January 4, 2022

Efficient Public Verification of Confidential Supply-Chain Transactions.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

to Protect the Public Opinion Against New Types of Bots?
Proceedings of the IEEE International Conference on Big Data, 2022

2021
Ultra-Wideband Channel State Information and Localization for Physical Layer Security.
Dataset, May, 2021

Covid notions: Towards formal definitions - and documented understanding - of privacy goals and claimed protection in proximity-tracing services.
Online Soc. Networks Media, 2021

Onion Routing with Replies.
IACR Cryptol. ePrint Arch., 2021

Privacy-Protecting Techniques for Behavioral Data: A Survey.
CoRR, 2021

On the privacy-utility trade-off in differentially private hierarchical text classification.
CoRR, 2021

Plausible Deniability for Anonymous Communication.
Proceedings of the WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, 2021

How well can your car be tracked: Analysis of the European C-ITS pseudonym scheme.
Proceedings of the 93rd IEEE Vehicular Technology Conference, 2021

Inexpensive Brainwave Authentication: New Techniques and Insights on User Acceptance.
Proceedings of the 30th USENIX Security Symposium, 2021

How to Increase Smart Home Security and Privacy Risk Perception.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Mitigating Internal, Stealthy DoS Attacks in Microservice Networks.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2021

2PPS - Publish/Subscribe with Provable Privacy.
Proceedings of the 40th International Symposium on Reliable Distributed Systems, 2021

Frontiers of Transdisciplinary Research in Tactile Internet with Human-in-the-Loop.
Proceedings of the 17th International Symposium on Wireless Communication Systems, 2021

2020
ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized - Decentralized Divide for Stronger Privacy.
IACR Cryptol. ePrint Arch., 2020

SoK on Performance Bounds in Anonymous Communication.
Proceedings of the WPES'20: Proceedings of the 19th Workshop on Privacy in the Electronic Society, 2020

Inference Attacks on Physical Layer Channel State Information.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Privacy-Preserving Public Verification of Ethical Cobalt Sourcing.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Secure Embedding of Rooted Spanning Trees for Scalable Routing in Topology-Restricted Networks.
Proceedings of the International Symposium on Reliable Distributed Systems, 2020

Breaking and (Partially) Fixing Provably Secure Onion Routing.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Browsing Unicity: On the Limits of Anonymizing Web Tracking Data.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Passive Angriffe auf kanalbasierten Schlüsselaustausch.
Proceedings of the Sicherheit 2020, Sicherheit, 2020

Blind Twins: Siamese Networks for Non-Interactive Information Reconciliation.
Proceedings of the 31st IEEE Annual International Symposium on Personal, 2020

Efficient Cloud-based Secret Shuffling via Homomorphic Encryption.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

The German-Speaking Twitter Community Reference Data Set.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Attack resistant Leader Election in Social Overlay Networks by Leveraging Local Voting.
Proceedings of the ICDCN 2020: 21st International Conference on Distributed Computing and Networking, 2020

Transparent Microsegmentation in Smart Home IoT Networks.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Edge Computing, 2020

You've Got Nothing on Me! Privacy Friendly Face Recognition Reloaded.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020

Twizzle - A Multi-purpose Benchmarking Framework for Semantic Comparisons of Multimedia Object Pairs.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020

ProMACs: Progressive and Resynchronizing MACs for Continuous Efficient Authentication of Message Streams.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Towards Transparency in the Internet of Things.
Proceedings of the Privacy Technologies and Policy - 8th Annual Privacy Forum, 2020

2019
Approximate Computing for Stream Analytics.
Proceedings of the Encyclopedia of Big Data Technologies., 2019

Privacy-Preserving Data Analytics.
Proceedings of the Encyclopedia of Big Data Technologies., 2019

On Privacy Notions in Anonymous Communication.
Proc. Priv. Enhancing Technol., 2019

Architecture and Advanced Electronics Pathways Toward Highly Adaptive Energy- Efficient Computing.
Proc. IEEE, 2019

PrivApprox: Privacy-Preserving Stream Analytics - (Extended Abstract).
Inform. Spektrum, 2019

On the Limits of Byzantine-tolerant Spanning Tree Construction in Route-Restricted Overlay Networks.
CoRR, 2019

Physical Layer Privacy in Broadcast Channels.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2019

A Comparative Study on Virtual Private Networks for Future Industrial Communication Systems.
Proceedings of the 15th IEEE International Workshop on Factory Communication Systems, 2019

Towards Secure Communication for High-Density Longitudinal Platooning.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

Attack-Resistant Spanning Tree Construction in Route-Restricted Overlay Networks.
Proceedings of the 38th Symposium on Reliable Distributed Systems, 2019

Blind Synchronization of Channel Impulse Responses for Channel Reciprocity-based Key Generation.
Proceedings of the 44th IEEE Conference on Local Computer Networks, 2019

An Enhanced Approach to Cloud-based Privacy-preserving Benchmarking.
Proceedings of the 2019 International Conference on Networked Systems, 2019

CoMon-DAS: A Framework for Efficient and Robust Dynamic Adaptive Streaming over NDN.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

INFAS: In-Network Flow mAnagement Scheme for SDN Control Plane Protection.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Sandnet: Towards High Quality of Deception in Container-Based Microservice Architectures.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

RecordFlux: Formal Message Specification and Generation of Verifiable Binary Parsers.
Proceedings of the Formal Aspects of Component Software - 16th International Conference, 2019

SeCoNetBench: A modular framework for Secure Container Networking Benchmarks.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

2018
On Privacy Notion in Anonymous Communication.
CoRR, 2018

An Enhanced Approach to Cloud-based Privacy-preserving Benchmarking (Long Version).
CoRR, 2018

Approximate Distributed Joins in Apache Spark.
CoRR, 2018

Buzz in Social Media: Detection of Short-lived Viral Phenomena.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

Transparent Low-Latency Network Anonymisation for Mobile Devices.
Proceedings of the Security and Privacy in Communication Networks, 2018

Pervasive Communities in the Internet of People.
Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, 2018

Energy-efficient SDN control and visualization.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

REMO: Resource efficient distributed network monitoring.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Improving Quantization for Channel Reciprocity based Key Generation.
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018

Chains and Whips - An approach to lighweight MACs.
Proceedings of the 28. Krypto-Tag, 2018

Forensic Analysis and Anonymisation of Printed Documents.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

Protecting Communication in Many-Core Systems against Active Attackers.
Proceedings of the 2018 on Great Lakes Symposium on VLSI, 2018

An Attack on Untraceable Linear Network Coding.
Proceedings of the IEEE Global Communications Conference, 2018

"Police - to Protect and Serve" Online: Factors contributing to Modern Ways of Interaction between Citizens and Law Enforcement Agencies.
Proceedings of the 26th European Conference on Information Systems: Beyond Digitization, 2018

ApproxJoin: Approximate Distributed Joins.
Proceedings of the ACM Symposium on Cloud Computing, 2018

2017
Cybersafety in Modern Online Social Networks (Dagstuhl Reports 17372).
Dagstuhl Reports, 2017

Approximate Stream Analytics in Apache Flink and Apache Spark Streaming.
CoRR, 2017

PrettyCat: Adaptive guarantee-controlled software partitioning of security protocols.
CoRR, 2017

Balanced Dynamic Content Addressing in Trees.
CoRR, 2017

Privacy Preserving Stream Analytics: The Marriage of Randomized Response and Approximate Computing.
CoRR, 2017

StreAM-T<sub>g</sub>: algorithms for analyzing coarse grained RNA dynamics based on Markov models of connectivity-graphs.
Algorithms Mol. Biol., 2017

PrivApprox: Privacy-Preserving Stream Analytics.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017

Infinite Mixtures of Markov Chains.
Proceedings of the New Frontiers in Mining Complex Patterns - 6th International Workshop, 2017

StreamApprox: approximate computing for stream analytics.
Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference, Las Vegas, NV, USA, December 11, 2017

CoMon++: Preventing Cache Pollution in NDN Efficiently and Effectively.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

BD-CAT: Balanced dynamic content addressing in trees.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Secure and energy-efficient interconnects for board-to-board communication.
Proceedings of the 17th IEEE International Conference on Ubiquitous Wireless Broadband, 2017

Robustness analysis of a passive printer identification scheme for halftone images.
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017

Lilliput: A Storage Service for Lightweight Peer-to-Peer Online Social Networks.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

Privacy-preserving audience measurement in practice - Opportunities and challenges.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
Dealing with Dead Ends: Efficient Routing in Darknets.
ACM Trans. Model. Perform. Evaluation Comput. Syst., 2016

VOUTE-Virtual Overlays Using Tree Embeddings.
CoRR, 2016

Online Social Networks.
Comput. Commun., 2016

Compile- and run-time approaches for the selection of efficient data structures for dynamic graph analysis.
Appl. Netw. Sci., 2016

SWAP: Protecting pull-based P2P video streaming systems from inference attacks.
Proceedings of the 17th IEEE International Symposium on A World of Wireless, 2016

StreAM- T_g : Algorithms for Analyzing Coarse Grained RNA Dynamics Based on Markov Models of Connectivity-Graphs.
Proceedings of the Algorithms in Bioinformatics - 16th International Workshop, 2016

Evaluating and mitigating a Collusive version of the Interest Flooding Attack in NDN.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Anonymous addresses for efficient and resilient routing in F2F overlays.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

2015
Interdisziplinäre Forschung zwischen Informatikern und Soziologen.
Prax. Inf.verarb. Kommun., 2015

Private Date Exposure in Facebook and the Impact of Comprehensible Audience Selection Controls.
CoRR, 2015

The User Behavior in Facebook and its Development from 2009 until 2014.
CoRR, 2015

Efficient Data Structures for Dynamic Graph Analysis.
Proceedings of the 11th International Conference on Signal-Image Technology & Internet-Based Systems, 2015

Growing a Web of Trust.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

Coordination supports security: A new defence mechanism against interest flooding in NDN.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

RBCS: A resilient backbone construction scheme for hybrid Peer-To-Peer streaming.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

Inferring obfuscated values in Freenet.
Proceedings of the 2015 International Conference and Workshops on Networked Systems, 2015

Integrating churn into the formal analysis of routing algorithms.
Proceedings of the 2015 International Conference and Workshops on Networked Systems, 2015

Lightweight coordinated defence against interest flooding attacks in NDN.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

On the impossibility of efficient self-stabilization in virtual overlays with churn.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Small-Scale Incident Detection based on Microposts.
Proceedings of the 26th ACM Conference on Hypertext & Social Media, 2015

Content Virality on Online Social Networks: Empirical Evidence from Twitter, Facebook, and Google+ on German News Websites.
Proceedings of the 26th ACM Conference on Hypertext & Social Media, 2015

CoMon: An architecture for coordinated caching and cache-aware routing in CCN.
Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, 2015

Systematic, large-scale analysis on the feasibility of media prefetching in Online Social Networks.
Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, 2015

StreaM - A Stream-Based Algorithm for Counting Motifs in Dynamic Graphs.
Proceedings of the Algorithms for Computational Biology, 2015

2014
A Lightweight Approach for Improving the Lookup Performance in Kademlia-type Systems.
CoRR, 2014

NextBestOnce: Achieving Polylog Routing despite Non-greedy Embeddings.
CoRR, 2014

A survey on decentralized Online Social Networks.
Comput. Networks, 2014

Enhancing a Location-based Recommendation System by Enrichment with Structured Data from the Web.
Proceedings of the 4th International Conference on Web Intelligence, 2014

On the Resilience of Pull-Based P2P Streaming Systems against DoS Attacks.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2014

DarknetSim: a simulation framework for social overlays.
Proceedings of the 17th Communications & Networking Symposium, 2014

ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation.
Proceedings of the SOFSEM 2014: Theory and Practice of Computer Science, 2014

Monotone Sampling of Networks.
Proceedings of the 2nd International Workshop on Dynamic Networks and Knowledge Discovery, 2014

Measuring Freenet in the Wild: Censorship-Resilience under Observation.
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014

Resilient tree-based live streaming for mobile scenarios.
Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, 2014

Diversity entails improvement: A new neighbour selection scheme for Kademlia-type systems.
Proceedings of the 14th IEEE International Conference on Peer-to-Peer Computing, 2014

Enhancing compact routing in CCN with prefix embedding and topology-aware hashing.
Proceedings of the 9th ACM Workshop on Mobility in the Evolving Internet Architecture, 2014

Characterizing graph-theoretic properties of a large-scale DHT: Measurements vs. simulations.
Proceedings of the IEEE Symposium on Computers and Communications, 2014

CoMon: A system architecture for improving caching in CCN.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

An additional protection layer for confidential OSNs posts.
Proceedings of the IEEE International Conference on Communications, 2014

Distributed discovery of user handles with privacy.
Proceedings of the IEEE Global Communications Conference, 2014

Mitigating Eclipse attacks in Peer-To-Peer networks.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
A Formal Model for Peer-to-Peer Systems.
Proceedings of the Benchmarking Peer-to-Peer Systems, 2013

Summary and Conclusion.
Proceedings of the Benchmarking Peer-to-Peer Systems, 2013

On the Impact of Incentives in eMule {Analysis and Measurements of a Popular File-Sharing Application}.
IEEE J. Sel. Areas Commun., 2013

Decentralized Systems for Privacy Preservation (Dagstuhl Seminar 13062).
Dagstuhl Reports, 2013

Comprehending Kademlia Routing - A Theoretical Framework for the Hop Count Distribution.
CoRR, 2013

Protecting Public OSN Posts from Unintended Access.
CoRR, 2013

PSP: Private and secure payment with RFID.
Comput. Commun., 2013

Dynamic network analyzer building a framework for the graph-theoretic analysis of dynamic networks.
Proceedings of the 2013 Summer Simulation Multiconference, 2013

GTNA 2.0 - a framework for rapid prototyping and evaluation of routing algorithms.
Proceedings of the 2013 Summer Simulation Multiconference, 2013

OSSim: a generic simulation framework for overlay streaming.
Proceedings of the 2013 Summer Simulation Multiconference, 2013

Resilient tree-based live streaming in reality.
Proceedings of the 13th IEEE International Conference on Peer-to-Peer Computing, 2013

A smart data forwarding method based on adaptive levels in wireless sensor networks.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, Sydney, Australia, October 21-24, 2013, 2013

Processing and visualizing traffic pollution data in Hanoi City from a wireless sensor network.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, Sydney, Australia, October 21-24, 2013, 2013

Greedy Embedding, Routing and Content Addressing for Darknets.
Proceedings of the 2013 Conference on Networked Systems, 2013

A contribution to analyzing and enhancing Darknet routing.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Capturing Connectivity Graphs of a Large-Scale P2P Overlay Network.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

d<sup>2</sup> Deleting Diaspora: Practical attacks for profile discovery and deletion.
Proceedings of IEEE International Conference on Communications, 2013

Topic 7: Peer-to-Peer Computing - (Introduction).
Proceedings of the Euro-Par 2013 Parallel Processing, 2013

2012
Smooth Resilient Service Provision in Large Heterogeneous Networks.
Prax. Inf.verarb. Kommun., 2012

Special section on Security and Social Networking.
Comput. Commun., 2012

Privacy risks in named data networking: what is the cost of performance?
Comput. Commun. Rev., 2012

C4PS: colors for privacy settings.
Proceedings of the 21st World Wide Web Conference, 2012

C4PS - Helping Facebookers Manage Their Privacy Settings.
Proceedings of the Social Informatics, 2012

Provable Polylog Routing for Darknets.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

kTC - Robust and Adaptive Wireless Ad-Hoc Topology Control.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

A Metropolitan-Scale Testbed for Heterogeneous Wireless Sensor Networks to Support CO2 Reduction.
Proceedings of the Green Communication and Networking, 2012

2011
Cryptographic Treatment of Private User Profiles.
IACR Cryptol. ePrint Arch., 2011

Improving the Usability of Privacy Settings in Facebook
CoRR, 2011

Key management in distributed online social networks.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Attack Resistant Network Embeddings for Darknets.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems Workshops, 2011

A recommendation system for spots in location-based online social networks.
Proceedings of the 4th Workshop on Social Network Systems, 2011

An efficient distributed privacy-preserving recommendation system.
Proceedings of the 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop, 2011

SDF - Solar-aware distributed flow in wireless sensor networks.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

2010
Churn in Social Networks.
Proceedings of the Handbook of Social Network Technologies and Applications, 2010

Decentralized Online Social Networks.
Proceedings of the Handbook of Social Network Technologies and Applications, 2010

Security and Privacy in Online Social Networks.
Proceedings of the Handbook of Social Network Technologies and Applications, 2010

Distributed Automatic Configuration of Complex IPsec-Infrastructures.
J. Netw. Syst. Manag., 2010

Resilient Peer-to-Peer live-streaming using motifs.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010

Profile popularity in a business-oriented online social network.
Proceedings of the 3rd Workshop on Social Network Systems, Paris, France, April 13, 2010, 2010

Social IPTV: a Survey on Chances and User-Acceptance.
Proceedings of the LWA 2010, 2010

Adaptive server allocation for peer-assisted Video-on-Demand.
Proceedings of the 24th IEEE International Symposium on Parallel and Distributed Processing, 2010

Leveraging Network Motifs for the Adaptation of Structured Peer-to-Peer-Networks.
Proceedings of the Global Communications Conference, 2010

2009
Optimally DoS Resistant P2P Topologies for Live Multimedia Streaming.
IEEE Trans. Parallel Distributed Syst., 2009

Methods for Improving Resilience in Communication Networks and P2P Overlays.
Prax. Inf.verarb. Kommun., 2009

Safebook: A privacy-preserving online social network leveraging on real-life trust.
IEEE Commun. Mag., 2009

All your contacts are belong to us: automated identity theft attacks on social networks.
Proceedings of the 18th International Conference on World Wide Web, 2009

Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network.
Proceedings of the 10th IEEE International Symposium on a World of Wireless, 2009

On the Security and Feasibility of Safebook: A Distributed Privacy-Preserving Online Social Network.
Proceedings of the Privacy and Identity Management for Life, 2009

Leveraging Social Links for Trust and Privacy in Networks.
Proceedings of the iNetSec 2009 - Open Research Problems in Network Security, 2009

2008
A Key Management Solution for Overlay-Live-Streaming.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

2007
Ein Peer-to-Peer-basierter Ansatz für die Live-Übertragung multimedialer Datenströme.
PhD thesis, 2007

Netzwerkeffizienz stabiler Overlay-Streaming-Topologien (Network Efficiency of Stable Overlay Streaming Topologies).
it Inf. Technol., 2007

Using recurring costs for reputation management in peer-to-peer streaming systems.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Netzwerkeffizienz stabiler Overlay-Streaming-Topologien.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2007

2006
Towards the Construction of Attack Resistant and Efficient Overlay Streaming Topologies.
Proceedings of the Second International Workshop on Security and Trust Management, 2006

BCBS: An Efficient Load Balancing Strategy for Cooperative Overlay Live-Streaming.
Proceedings of IEEE International Conference on Communications, 2006


  Loading...