Thorsten Strufe

According to our database1, Thorsten Strufe authored at least 140 papers between 2006 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Approximate Computing for Stream Analytics.
Proceedings of the Encyclopedia of Big Data Technologies., 2019

Privacy-Preserving Data Analytics.
Proceedings of the Encyclopedia of Big Data Technologies., 2019

On Privacy Notions in Anonymous Communication.
PoPETs, 2019

Architecture and Advanced Electronics Pathways Toward Highly Adaptive Energy- Efficient Computing.
Proceedings of the IEEE, 2019

On the Limits of Byzantine-tolerant Spanning Tree Construction in Route-Restricted Overlay Networks.
CoRR, 2019

A Comparative Study on Virtual Private Networks for Future Industrial Communication Systems.
Proceedings of the 15th IEEE International Workshop on Factory Communication Systems, 2019

An Enhanced Approach to Cloud-based Privacy-preserving Benchmarking.
Proceedings of the 2019 International Conference on Networked Systems, 2019

INFAS: In-Network Flow mAnagement Scheme for SDN Control Plane Protection.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Sandnet: Towards High Quality of Deception in Container-Based Microservice Architectures.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

SeCoNetBench: A modular framework for Secure Container Networking Benchmarks.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

2018
On Privacy Notion in Anonymous Communication.
CoRR, 2018

An Enhanced Approach to Cloud-based Privacy-preserving Benchmarking (Long Version).
CoRR, 2018

Approximate Distributed Joins in Apache Spark.
CoRR, 2018

Buzz in Social Media: Detection of Short-lived Viral Phenomena.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

Transparent Low-Latency Network Anonymisation for Mobile Devices.
Proceedings of the Security and Privacy in Communication Networks, 2018

Pervasive Communities in the Internet of People.
Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, 2018

Energy-efficient SDN control and visualization.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

REMO: Resource efficient distributed network monitoring.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Improving Quantization for Channel Reciprocity based Key Generation.
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018

Forensic Analysis and Anonymisation of Printed Documents.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

Protecting Communication in Many-Core Systems against Active Attackers.
Proceedings of the 2018 on Great Lakes Symposium on VLSI, 2018

An Attack on Untraceable Linear Network Coding.
Proceedings of the IEEE Global Communications Conference, 2018

"Police - to Protect and Serve" Online: Factors contributing to Modern Ways of Interaction between Citizens and Law Enforcement Agencies.
Proceedings of the 26th European Conference on Information Systems: Beyond Digitization, 2018

ApproxJoin: Approximate Distributed Joins.
Proceedings of the ACM Symposium on Cloud Computing, 2018

2017
Cybersafety in Modern Online Social Networks (Dagstuhl Reports 17372).
Dagstuhl Reports, 2017

Approximate Stream Analytics in Apache Flink and Apache Spark Streaming.
CoRR, 2017

PrettyCat: Adaptive guarantee-controlled software partitioning of security protocols.
CoRR, 2017

Balanced Dynamic Content Addressing in Trees.
CoRR, 2017

Privacy Preserving Stream Analytics: The Marriage of Randomized Response and Approximate Computing.
CoRR, 2017

StreAM-Tg: algorithms for analyzing coarse grained RNA dynamics based on Markov models of connectivity-graphs.
Algorithms for Molecular Biology, 2017

PrivApprox: Privacy-Preserving Stream Analytics.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017

Infinite Mixtures of Markov Chains.
Proceedings of the New Frontiers in Mining Complex Patterns - 6th International Workshop, 2017

StreamApprox: approximate computing for stream analytics.
Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference, Las Vegas, NV, USA, December 11, 2017

CoMon++: Preventing Cache Pollution in NDN Efficiently and Effectively.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

BD-CAT: Balanced dynamic content addressing in trees.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Secure and energy-efficient interconnects for board-to-board communication.
Proceedings of the 17th IEEE International Conference on Ubiquitous Wireless Broadband, 2017

Robustness analysis of a passive printer identification scheme for halftone images.
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017

Lilliput: A Storage Service for Lightweight Peer-to-Peer Online Social Networks.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

Privacy-preserving audience measurement in practice - Opportunities and challenges.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
Dealing with Dead Ends: Efficient Routing in Darknets.
TOMPECS, 2016

VOUTE-Virtual Overlays Using Tree Embeddings.
CoRR, 2016

Online Social Networks.
Computer Communications, 2016

Compile- and run-time approaches for the selection of efficient data structures for dynamic graph analysis.
Applied Network Science, 2016

SWAP: Protecting pull-based P2P video streaming systems from inference attacks.
Proceedings of the 17th IEEE International Symposium on A World of Wireless, 2016

StreAM- T_g : Algorithms for Analyzing Coarse Grained RNA Dynamics Based on Markov Models of Connectivity-Graphs.
Proceedings of the Algorithms in Bioinformatics - 16th International Workshop, 2016

Evaluating and mitigating a Collusive version of the Interest Flooding Attack in NDN.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Anonymous addresses for efficient and resilient routing in F2F overlays.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

2015
Interdisziplinäre Forschung zwischen Informatikern und Soziologen.
Praxis der Informationsverarbeitung und Kommunikation, 2015

Private Date Exposure in Facebook and the Impact of Comprehensible Audience Selection Controls.
CoRR, 2015

The User Behavior in Facebook and its Development from 2009 until 2014.
CoRR, 2015

Efficient Data Structures for Dynamic Graph Analysis.
Proceedings of the 11th International Conference on Signal-Image Technology & Internet-Based Systems, 2015

Growing a Web of Trust.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

Coordination supports security: A new defence mechanism against interest flooding in NDN.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

RBCS: A resilient backbone construction scheme for hybrid Peer-To-Peer streaming.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

Inferring obfuscated values in Freenet.
Proceedings of the 2015 International Conference and Workshops on Networked Systems, 2015

Integrating churn into the formal analysis of routing algorithms.
Proceedings of the 2015 International Conference and Workshops on Networked Systems, 2015

Lightweight coordinated defence against interest flooding attacks in NDN.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

On the impossibility of efficient self-stabilization in virtual overlays with churn.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Small-Scale Incident Detection based on Microposts.
Proceedings of the 26th ACM Conference on Hypertext & Social Media, 2015

Content Virality on Online Social Networks: Empirical Evidence from Twitter, Facebook, and Google+ on German News Websites.
Proceedings of the 26th ACM Conference on Hypertext & Social Media, 2015

CoMon: An architecture for coordinated caching and cache-aware routing in CCN.
Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, 2015

Systematic, large-scale analysis on the feasibility of media prefetching in Online Social Networks.
Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, 2015

StreaM - A Stream-Based Algorithm for Counting Motifs in Dynamic Graphs.
Proceedings of the Algorithms for Computational Biology, 2015

2014
A Lightweight Approach for Improving the Lookup Performance in Kademlia-type Systems.
CoRR, 2014

NextBestOnce: Achieving Polylog Routing despite Non-greedy Embeddings.
CoRR, 2014

A survey on decentralized Online Social Networks.
Computer Networks, 2014

Enhancing a Location-based Recommendation System by Enrichment with Structured Data from the Web.
Proceedings of the 4th International Conference on Web Intelligence, 2014

On the Resilience of Pull-Based P2P Streaming Systems against DoS Attacks.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2014

DarknetSim: a simulation framework for social overlays.
Proceedings of the 17th Communications & Networking Symposium, 2014

ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation.
Proceedings of the SOFSEM 2014: Theory and Practice of Computer Science, 2014

Monotone Sampling of Networks.
Proceedings of the 2nd International Workshop on Dynamic Networks and Knowledge Discovery, 2014

Measuring Freenet in the Wild: Censorship-Resilience under Observation.
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014

Resilient tree-based live streaming for mobile scenarios.
Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, 2014

Diversity entails improvement: A new neighbour selection scheme for Kademlia-type systems.
Proceedings of the 14th IEEE International Conference on Peer-to-Peer Computing, 2014

Enhancing compact routing in CCN with prefix embedding and topology-aware hashing.
Proceedings of the 9th ACM Workshop on Mobility in the Evolving Internet Architecture, 2014

Characterizing graph-theoretic properties of a large-scale DHT: Measurements vs. simulations.
Proceedings of the IEEE Symposium on Computers and Communications, 2014

CoMon: A system architecture for improving caching in CCN.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

An additional protection layer for confidential OSNs posts.
Proceedings of the IEEE International Conference on Communications, 2014

Distributed discovery of user handles with privacy.
Proceedings of the IEEE Global Communications Conference, 2014

Mitigating Eclipse attacks in Peer-To-Peer networks.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
A Formal Model for Peer-to-Peer Systems.
Proceedings of the Benchmarking Peer-to-Peer Systems, 2013

Summary and Conclusion.
Proceedings of the Benchmarking Peer-to-Peer Systems, 2013

On the Impact of Incentives in eMule {Analysis and Measurements of a Popular File-Sharing Application}.
IEEE Journal on Selected Areas in Communications, 2013

Decentralized Systems for Privacy Preservation (Dagstuhl Seminar 13062).
Dagstuhl Reports, 2013

Comprehending Kademlia Routing - A Theoretical Framework for the Hop Count Distribution.
CoRR, 2013

Protecting Public OSN Posts from Unintended Access.
CoRR, 2013

PSP: Private and secure payment with RFID.
Computer Communications, 2013

Dynamic network analyzer building a framework for the graph-theoretic analysis of dynamic networks.
Proceedings of the 2013 Summer Simulation Multiconference, 2013

GTNA 2.0 - a framework for rapid prototyping and evaluation of routing algorithms.
Proceedings of the 2013 Summer Simulation Multiconference, 2013

OSSim: a generic simulation framework for overlay streaming.
Proceedings of the 2013 Summer Simulation Multiconference, 2013

Resilient tree-based live streaming in reality.
Proceedings of the 13th IEEE International Conference on Peer-to-Peer Computing, 2013

A smart data forwarding method based on adaptive levels in wireless sensor networks.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, Sydney, Australia, October 21-24, 2013, 2013

Processing and visualizing traffic pollution data in Hanoi City from a wireless sensor network.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, Sydney, Australia, October 21-24, 2013, 2013

Greedy Embedding, Routing and Content Addressing for Darknets.
Proceedings of the 2013 Conference on Networked Systems, 2013

A contribution to analyzing and enhancing Darknet routing.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Capturing Connectivity Graphs of a Large-Scale P2P Overlay Network.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

d2 Deleting Diaspora: Practical attacks for profile discovery and deletion.
Proceedings of IEEE International Conference on Communications, 2013

Topic 7: Peer-to-Peer Computing - (Introduction).
Proceedings of the Euro-Par 2013 Parallel Processing, 2013

2012
Smooth Resilient Service Provision in Large Heterogeneous Networks.
Praxis der Informationsverarbeitung und Kommunikation, 2012

Special section on Security and Social Networking.
Computer Communications, 2012

Privacy risks in named data networking: what is the cost of performance?
Computer Communication Review, 2012

C4PS: colors for privacy settings.
Proceedings of the 21st World Wide Web Conference, 2012

C4PS - Helping Facebookers Manage Their Privacy Settings.
Proceedings of the Social Informatics, 2012

Provable Polylog Routing for Darknets.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

kTC - Robust and Adaptive Wireless Ad-Hoc Topology Control.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

A Metropolitan-Scale Testbed for Heterogeneous Wireless Sensor Networks to Support CO2 Reduction.
Proceedings of the Green Communication and Networking, 2012

2011
Cryptographic Treatment of Private User Profiles.
IACR Cryptology ePrint Archive, 2011

Improving the Usability of Privacy Settings in Facebook
CoRR, 2011

Key management in distributed online social networks.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Attack Resistant Network Embeddings for Darknets.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems Workshops, 2011

A recommendation system for spots in location-based online social networks.
Proceedings of the 4th Workshop on Social Network Systems, 2011

An efficient distributed privacy-preserving recommendation system.
Proceedings of the 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop, 2011

SDF - Solar-aware distributed flow in wireless sensor networks.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

Cryptographic Treatment of Private User Profiles.
Proceedings of the Financial Cryptography and Data Security, 2011

2010
Churn in Social Networks.
Proceedings of the Handbook of Social Network Technologies and Applications, 2010

Decentralized Online Social Networks.
Proceedings of the Handbook of Social Network Technologies and Applications, 2010

Security and Privacy in Online Social Networks.
Proceedings of the Handbook of Social Network Technologies and Applications, 2010

Distributed Automatic Configuration of Complex IPsec-Infrastructures.
J. Network Syst. Manage., 2010

Profile Popularity in a Business-oriented Online Social Network
CoRR, 2010

Resilient Peer-to-Peer live-streaming using motifs.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010

Profile popularity in a business-oriented online social network.
Proceedings of the 3rd Workshop on Social Network Systems, Paris, France, April 13, 2010, 2010

Social IPTV: a Survey on Chances and User-Acceptance.
Proceedings of the LWA 2010, 2010

Adaptive server allocation for peer-assisted Video-on-Demand.
Proceedings of the 24th IEEE International Symposium on Parallel and Distributed Processing, 2010

Leveraging Network Motifs for the Adaptation of Structured Peer-to-Peer-Networks.
Proceedings of the Global Communications Conference, 2010

2009
Optimally DoS Resistant P2P Topologies for Live Multimedia Streaming.
IEEE Trans. Parallel Distrib. Syst., 2009

Methods for Improving Resilience in Communication Networks and P2P Overlays.
Praxis der Informationsverarbeitung und Kommunikation, 2009

PSP: Private and Secure Payment with RFID.
IACR Cryptology ePrint Archive, 2009

Safebook: A privacy-preserving online social network leveraging on real-life trust.
IEEE Communications Magazine, 2009

All your contacts are belong to us: automated identity theft attacks on social networks.
Proceedings of the 18th International Conference on World Wide Web, 2009

PSP: private and secure payment with RFID.
Proceedings of the 2009 ACM Workshop on Privacy in the Electronic Society, 2009

Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network.
Proceedings of the 10th IEEE International Symposium on a World of Wireless, 2009

On the Security and Feasibility of Safebook: A Distributed Privacy-Preserving Online Social Network.
Proceedings of the Privacy and Identity Management for Life, 2009

Leveraging Social Links for Trust and Privacy in Networks.
Proceedings of the iNetSec 2009 - Open Research Problems in Network Security, 2009

2008
A Key Management Solution for Overlay-Live-Streaming.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

2007
Ein Peer-to-Peer-basierter Ansatz für die Live-Übertragung multimedialer Datenströme.
PhD thesis, 2007

Netzwerkeffizienz stabiler Overlay-Streaming-Topologien (Network Efficiency of Stable Overlay Streaming Topologies).
it - Information Technology, 2007

Towards the Construction of Attack Resistant and Efficient Overlay Streaming Topologies.
Electr. Notes Theor. Comput. Sci., 2007

Using recurring costs for reputation management in peer-to-peer streaming systems.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Netzwerkeffizienz stabiler Overlay-Streaming-Topologien.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2007

2006
BCBS: An Efficient Load Balancing Strategy for Cooperative Overlay Live-Streaming.
Proceedings of IEEE International Conference on Communications, 2006


  Loading...