Jan Seedorf

According to our database1, Jan Seedorf authored at least 43 papers between 2004 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Content Delivery Network Interconnection (CDNI) Footprint and Capabilities Advertisement Using Application-Layer Traffic Optimization (ALTO).
RFC, July, 2022

2021
TPM-Based Post-Quantum Cryptography: A Case Study on Quantum-Resistant and Mutually Authenticated TLS for IoT Environments.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Research Directions for Using Information-Centric Networking (ICN) in Disaster Scenarios.
RFC, October, 2020

2018
Standards News.
IEEE Commun. Stand. Mag., 2018

Assessing the benefit of ALTO-guidance for P2P live-streaming user experience in heterogeneous environments (Poster).
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018

2017
Adaptive ICN multipath forwarding for hybrid access.
Proceedings of the 2017 International Conference on Networked Systems, 2017

NDN DeLorean: an authentication system for data archives in named data networking.
Proceedings of the 4th ACM Conference on Information-Centric Networking, 2017

2016
Content Delivery Network Interconnection (CDNI) Request Routing: Footprint and Capabilities Semantics.
RFC, December, 2016

Decentralised Interest Counter Aggregation for ICN in Disaster Scenarios.
Proceedings of the 2016 IEEE Globecom Workshops, Washington, DC, USA, December 4-8, 2016, 2016

2015
Growing a Web of Trust.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

The Benefit of Information Centric Networking for Enabling Communications in Disaster Scenarios.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015

2014
Decentralised binding of self-certifying names to real-world identities for assessment of third-party messages in fragmented mobile networks.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

Demo overview: fully decentralised authentication scheme for ICN in disaster scenarios.
Proceedings of the 1st International Conference on Information-Centric Networking, 2014

2013
Security for Decentralised Service Location - Exemplified with Real-Time Communication Session Establishment.
PhD thesis, 2013

Experiences with large-scale operational trials of ALTO-enhanced P2P filesharing in an intra-ISP scenario.
Peer-to-Peer Netw. Appl., 2013

Enabling Information Centric Networking in IP Networks Using SDN.
Proceedings of the IEEE SDN for Future Networks and Services, 2013

Quality-of-Experience Driven Acceleration of Thin Client Connections.
Proceedings of the 2013 IEEE 12th International Symposium on Network Computing and Applications, 2013

Enabling ICN in IP networks using SDN.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013

Evaluation of ALTO-enhanced request routing for CDN interconnection.
Proceedings of IEEE International Conference on Communications, 2013

2012
Topology control strategies on P2P live video streaming service with peer churning.
Comput. Commun., 2012

Assisting Server for Secure Multi-Party Computation.
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012

Who profits from peer-to-peer file-sharing? Traffic optimization potential in BitTorrent swarms.
Proceedings of the 24th International Teletraffic Congress, 2012

2011
Session PEERing for Multimedia INTerconnect (SPEERMINT) Security Threats and Suggested Countermeasures.
RFC, November, 2011

Architecture of a network-aware P2P-TV application: the NAPA-WINE approach.
IEEE Commun. Mag., 2011

An architectural solution for data exchange in cooperative network security research.
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011

2010
The Legal Ramifications of Call-Filtering Solutions.
IEEE Secur. Priv., 2010

Network Friendly P2P-TV: The Napa-Wine Approach.
Proceedings of the IEEE Tenth International Conference on Peer-to-Peer Computing, 2010

Design and evaluation of an optimized overlay topology for a single operator video streaming service.
Proceedings of the 2010 ACM workshop on Advanced video streaming techniques for peer-to-peer networks and social networking, 2010

Quantifying Operational Cost-Savings through ALTO-Guidance for P2P Live Streaming.
Proceedings of the Incentives, 2010

2009
Application-Layer Traffic Optimization (ALTO) Problem Statement.
RFC, October, 2009

Single-message denial-of-service attacks against voice-over-internet protocol terminals.
Int. J. Electron. Secur. Digit. Forensics, 2009

Traffic Localization for P2P-Applications: The ALTO Approach.
Proceedings of the Proceedings P2P 2009, 2009

A policy framework for personalized and role-based SPIT prevention.
Proceedings of the Principles, 2009

Security Issues for P2P-Based Voice- and Video-Streaming Applications.
Proceedings of the iNetSec 2009 - Open Research Problems in Network Security, 2009

A Provider-Level Reputation System for Assessing the Quality of SPIT Mitigation Algorithms.
Proceedings of IEEE International Conference on Communications, 2009

Detecting Trustworthy Real-Time Communications Using a Web-of-Trust.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
Availability for DHT-Based Overlay Networks with Unidirectional Routing.
Proceedings of the Information Security Theory and Practices. Smart Devices, 2008

VoIP SEAL: A Research Prototype for Protecting Voice-over-IP Networks and Users.
Proceedings of the Sicherheit 2008: Sicherheit, 2008

Lawful Interception in P2P-Based VoIP Systems.
Proceedings of the Principles, 2008

Protecting SIP-Based Networks and Services from Unwanted Communications.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Evaluating P2PSIP under Attack: An Emulative Study.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2006
Security challenges for peer-to-peer SIP.
IEEE Netw., 2006

2004
Risiken der Nichterkennung von Malware in komprimierter Form.
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2004


  Loading...