Veröffentlichungen

2018

Timo Richter*, Stephan Escher*, Dagmar Schönfeld, Thorsten Strufe. Forensic Analysis and Anonymisation of Printed Documents. In Proceedings of 6th ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec ’18), 2018

C Deusser, N Jansen, J Reubold, B Schiller, O Hinz, T Strufe. Buzz in Social Media: Detection of Short-lived Viral Phenomena. The Web Conference (WWW) 2018, 1443-1449

Stephan C. Escher, Jan L. Reubold, Richard Kwasnicki, Joachim Scharloth, Lutz M. Hagen and Thorsten Strufe. Towards Automated Contextualization of News Articles. In MIS2: Misinformation and Misbehavior Mining on the Web, WSDM Workshops, 2018

S Moriam, E Franz, P Walther, A Kumar, T Strufe, G Fettweis. Protecting Communication in Many-Core Systems against Active Attackers. Proceedings of the 2018 on Great Lakes Symposium on VLSI, 45-50

Tao Li and Hani Salah and Mu He and Thorsten Strufe and Silvia Santini. REMO: Resource Efficient Distributed Network Monitoring. In IEEE Network Operations and Management Symposium (NOMS), 2018

Eemil Lagerspetz and Huber Flores and Niko Mäkitalo and Pan Hui and Petteri Nurmi and Sasu Tarkoma and Andrea Passarella and Jörg Ott and Peter Reichl and Marco Conti and Markus Fiedler and Jatinder Singh and Thorsten Strufe and Tobias Hossfeld and Anders Lindgren and Daniele Quercia. Pervasive Communities in the Internet of People. In PerCrowd'18 - International Workshop on Context-Awareness for Multi-Device Pervasive Computing, PerCom Workshops, 2018

2017

Do Le Quoc, Martin Beck, Pramod Bhatotia, Ruichuan Chen, Christof Fetzer, and Thorsten Strufe.
PrivApprox: Privacy-Preserving Stream Analytics. In USENIX ATC, 2017

Stefanie Roos, and Martin Byrenheid, and Clemens Deusser, and Thorsten Strufe. BD-CAT: Balanced Dynamic Content Addressing in Trees. In IEEE INFOCOM 2017

Ruichuan Chen and Do Le Quoc and Pramod Bhatotia and Christof Fetzer and Volker Hilt and Thorsten Strufe
StreamApprox: Approximate Computing for Stream Analytics
In ACM/Usenix Middleware, 2017

Jan Reubold, Stephan Escher, and Thorsten Strufe: The Latent Behavior Space – A Vector Space for Time-Series Data, In Proceedings of the Workshop on Time-Series at the International Conference of Machine Learning (ICML), 2017.

Steffen Passmann, Anne Lauber-Roensberg, and Thorsten Strufe. Privacy-Preserving Audience Measurement in Practice -- Opportunities and Challenges, In Proceedings of the IEEE Workshop on Security and Privacy in Advertisement (IEEE CNS), 2017

Sven Jager, Benjamin Schiller, Philipp Babel, Malte Blumenroth, Thorsten Strufe, and Kay Hamacher.
StreAM-T g : Algorithms for Analyzing Coarse Grained RNA Dynamics Based on Markov Models of Connectivity-Graphs. Algorithms for Molecular Biology, 2017.

Stephan Escher and Thorsten Strufe.
Revisiting a printer identification scheme for halftone images.
In IEEE International Conference on Image Processing (ICIP), 2017

Hani Salah, Mohammed Alfatafta, Saed SayedAhmed, and Thorsten Strufe. CoMon++: Preventing Cache Pollution in NDN Efficiently and Effectively. In International Conference on Local Computer Networks (LCN), 2017

Thomas Paul, Niklas Lochschmidt, Anwitaman Datta, Hani Salah, and Thorsten Strufe.
Lilliput: A Storage Service for Lightweight Peer-to-Peer Online Social Networks.
In International Conference on Computer Communications and Networks (ICCCN), 2017

Bho Matthiesen, Stefan Pfennig, Mario Bielert, Thomas Ilsche, Andrew Lonnstrom, Tao Li, Juan A. Cabrera, Christian Scheunert, Elke Franz, Silvia Santini, Thorsten Strufe, Eduard A. Jorswieck, Wolfgang E. Nagel, Giang T. Nguyen, and Frank H.P. Fitzek. Secure and Energy-Efficient Interconnects for Board-to-Board Communication. In International Workshop on Broadband Wireless Communication between Computer Boards (attonets), 2017

Stefanie Roos, Hani Salah, and Thorsten Strufe.

Advances in Computer Communications and Networks, chapter On the Routing of Kademlia-type Systems. River Publishers, 2017.

2016

Andrea Passarella, Xiaoming Fu, Daniele Quercia, Alessandra Sala, and Thorsten Strufe.
Online Social Networks.
Computer Communications Special Issues. Elsevier, 2016

Stefanie Roos, Martin Beck, and Thorsten Strufe. Anonymous Addresses
for Efficient and Resilient Routing in F2F Overlays. In IEEE INFOCOM,
2016.

Stefanie Roos and Thorsten Strufe. Dealing with dead ends -- efficient routing in darknets. In Transactions on Modeling and Performance Evaluation of Computing Systems (ToMPECS). ACM, 2016. [ bib ]

Andrea Passarella, Xiaoming Fu, Daniele Quercia, Alessandra Sala, and
Thorsten Strufe. Online social networks (editorial). Elsevier Computer
Communications, 73:163 – 166, 2016.

Pascal Brueckner, Martin Beck, and Thorsten Strufe. Poster: Increasing
the exposure of honeypots. In Research in Attack, Intrusions, and Defenses (RAID), 2016.

Benjamin Schiller, Clemens Deusser, Jeronimo Castrillon, and Thorsten
Strufe. Efficient data structures for dynamic graph analysis. Applied
Network Science, 2016.

Giang Nguyen, Stefanie Roos, Benjamin Schiller, and Thorsten Strufe.
Swap: protecting pull-based p2p video streaming systems from inference
attacks. In World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2016.

Hani Salah and Thorsten Strufe. Evaluating and mitigating a collusive
version of the interest flooding attack in ndn. In IEEE ISCC, 2016.

Sven Jager, Benjamin Schiller, Thorsten Strufe, and Kay Hamacher.
StreAM-Tg : Algorithms for Analyzing Coarse Grained RNA Dynamics
based on Markov Models of Connectivity-Graphs. In Workshop on Algorithms in Bioinformatics (WABI), 2016.

Stefanie Roos, Martin Beck, and Thorsten Strufe. VOUTE-Virtual Overlays Using Tree Embeddings. Technical report, CoRR abs/1601.06119,
2016.

Christoph Hofmann, Elke Franz, and Silvia Santini. Open Problems in
Network Security: IFIP WG 11.4 International Workshop, iNetSec 2015,
Zurich, Switzerland, October 29, 2015, Revised Selected Papers, chapter A
Metric for Adaptive Routing on Trustworthy Paths, pages 11–25. Springer
International Publishing, Cham, 2016.

Stefan Pfennig, Kim Feldhoff, Florina M. Ciorba, Elke Franz, Tobias Rei-
her, Mario Bielert, Thomas Ilsche, and Wolfgang E. Nagel. Simulation
Models Verification for Resilient Communication on a Highly Adaptive
Energy-Efficient Computer. In Proc. of the 24th High Performance Computing Symposium (HPC 2016), part of the 2016 Spring Simulation Multi Conference, SpringSim’16, 2016.

S. Pfennig and E. Franz. eSPOC: enhanced Secure Practical Network
Coding for Better Efficiency and Lower Latency. In Proc. of GlobeCom
NetCod 2016 (to appear), 2016.

Stefan Pfennig, Elke Franz, Sabrina Engelmann, and Anne Wolf. End-to-End Key Establishment with Physical Layer Key Generation and Specific
Attacker Models, pages 93–110. Springer International Publishing, Cham,
2016.

2015 (14)

Benjamin Schiller, Sven Jager, Kay Hamacher, and Thorsten Strufe. StreaM - a Stream-based Algorithm for Counting Motifs in Dynamic Graphs. In Algorithms for Computational Biology (AlCoB), 2015. [ bib ]

Axel Schulz, Benedikt Schmidt, and Thorsten Strufe. Small-Scale Incident Detection based on Microposts. In Proceedings of the 26th ACM Conference on Hypertext and Social Media (ht), 2015. Best Paper Award. [ bib ]

Benjamin Schiller, Thorsten Strufe, Iryna Heimbach, and Oliver Hinz. Content Virality on Online Social Networks - Empirical Evidence from Twitter, Facebook, and Google+. In Proceedings of the 26th ACM Conference on Hypertext and Social Media (ht), 2015. [ bib ]

Paul Gebelein, Thomas Paul, Thorsten Strufe, and Wolfgang Effelsberg. Interdisziplin"are Forschung zwischen Informatikern und Soziologen. Praxis in der Informationsverarbeitung und Kommunikation, 2015. [ bib ]

Stefanie Roos, Hani Salah, and Thorsten Strufe. Determining the Hop-Count in Kademlia-Type Systems. In IEEE ICCCN, 2015. [ bib ]

Hani Salah, Julian Wulfheide, and Thorsten Strufe. Lightweight Coordinated Defence Against Interest Flooding Attacks in NDN. In INFOCOM (Posters), 2015. [ bib ]

Hani Salah and Thorsten Strufe. Comon: An architecture for coordinated caching and cache-aware routing in ccn. In IEEE CCNC, 2015. [ bib ]

Stefanie Roos, Florian Platzer, Jan-Michael Heller, and Thorsten Strufe. Inferring obfuscated values in freenet. In GI/IEEE NetSys, 2015. [ bib ]

Stefanie Roos, Giang Truong Nguyen, and Thorsten Strufe. Integrating churn into the formal analysis of routing algorithms. In GI/IEEE NetSys, 2015. [ bib ]

Stefanie Roos and Thorsten Strufe. On the impossibility of efficient self-stabilization in virtual overlays with churn. In IEEE INFOCOM, 2015. [ bib ]

Thomas Paul, Daniel Puscher, Stefan Wilk, and Thorsten Strufe. Systematic, large-scale analysis on the feasibility of media prefetching in online social networks. In IEEE CCNC, 2015. [ bib ]

Giang Truong Nguyen, Stefanie Roos, Thorsten Strufe, and Mathias Fischer. Rbcs: A resilient backbone construction scheme for hybrid peer-to-peer streaming. In LCN. IEEE, 2015. [ bib ]

Benjamin Schiller, Thorsten Strufe, Martin Kohlweyer, and Jan Seedorf. Growing a web of trust. In LCN. IEEE, 2015. [ bib ]

Hani Salah, Julian Wulfheide, and Thorsten Strufe. Coordination supports security: A new defence mechanism against interest flooding in NDN. In Local Computer Networks (LCN), IEEE, 2015

Martin Beck. Randomized Decryption (RD) Mode of Operation for Homomorphic Cryptography - Increasing Encryption, Communication and Storage Efficiency. In The Third International Workshop on Security and Privacy in Big Data (BigSecurity 2015), 2015. [ bib ]

2014 (19)

Martin Beck, V. Joachim Haupt, Janine Roy, Jan Moennich, René Jäkel, Michael Schroeder, and Zerrin Isik. GeneCloud: Secure Cloud Computing for Biomedical Research. Trusted Cloud Computing, pages 3--14, November 2014. [ bib ]

Martin Beck, V Joachim Haupt, Janine Roy, Jan Moennich, René Jäkel, Michael Schroeder, and Zerrin Isik. Privacy-Preserving Cloud Computing for Biomedical Research. Trusted Cloud Computing, pages 259--282, November 2014. [ bib ]

Florian Kerschbaum, Martin Beck, and Dagmar Schönfeld. Inference Control for Privacy-Preserving Genome Matching. Technical report, CoRR, July 2014. [ bib | http ]

Benjamin Schiller, Giang Truong Nguyen, and Thorsten Strufe. Resilient tree-based live streaming for mobile scenarios. In Proceedings of the IEEE PerCom Workshops, March 2014. [ bib ]

Thomas Paul, Antonio Famulari, and Thorsten Strufe. A survey on decentralized online social networks. Elsevier Computer Networks, 2014. [ bib ]

Stefanie Roos, Benjamin Schiller, Stefan Hacker, and Thorsten Strufe. Measuring freenet in the wild: Censorship-resilience under observation. In PETS, 2014. [ bib ]

Daniel Germanus, Stefanie Roos, Thorsten Strufe, and Neeraj Suri. Mitigating eclipse attacks in peer-to-peer networks. In IEEE Conference on Communication and Network Security (CNS), 2014. [ bib ]

Frederik Armknecht, Manuel Hauptmann, Stefanie Roos, and Thorsten Strufe. An additional protection layer for confidential osns posts. In IEEE ICC, 2014. [ bib ]

Hani Salah, Stefanie Roos, and Thorsten Strufe. Characterizing Graph-Theoretic Properties of a Large-Scale DHT: Measurements vs. Simulations. In IEEE ISCC, 2014. Best Paper Award. [ bib ]

Giang Truong Nguyen, Matthias Fischer, and Thorsten Strufe. On the Resilience of Pull-based P2P Streaming Systems against DoS Attacks. In International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS), 2014. Best Paper Award. [ bib ]

Hani Salah, Benjamin Schiller, and Thorsten Strufe. Comon: A system architecture for improving caching in ccn. In Infocom (posters), 2014. [ bib ]

Hani Salah, Stefanie Roos, and Thorsten Strufe. Diversity entails improvement: A new neighbour selection scheme for kademlia-type systems. In IEEE International Conference on Peer-to-Peer Computing (IEEE P2P), 2014. [ bib ]

Stefanie Roos, Liang Wang, Thorsten Strufe, and Jussi Kangasharju. Enhancing compact routing in ccn with prefix embedding and topology-aware hashing. In Proceedings of MobiArch@MobiCom, pages 49--54, 2014. [ bib | http ]

Max Schmachtenberg, Thorsten Strufe, and Heiko Paulheim. Enhancing a Location-based Recommendation System by Enrichment with Structured Data from the Web. In International Conference on Web Intelligence, Mining and Semantics, 2014. [ bib ]

Thomas Paul, Marius Hornung, and Thorsten Strufe. Distributed discovery of user-handles with privacy. In IEEE Globecom, 2014. [ bib ]

Sebastian Biedermann, Nikolaos P. Karvelas, Stefan Katzenbeisser, Thorsten Strufe, and Andreas Peter. ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation. In SOFSEM 2014: Theory and Practice of Computer Science, 2014. [ bib ]

Tim Grube, Benjamin Schiller, and Thorsten Strufe. Monotone sampling in networks. In Dynamic Networks and Knowledge Discovery (DyNaK), 2014. [ bib ]

Stefanie Roos, Patrick Welzel, Andreas Höfer, and Thorsten Strufe. DarknetSim - A Simulation Framework for Social Overlays. In SpringSim, 2014. Best Paper Award. [ bib ]

Hani Salah, Stefanie Roos, and Thorsten Strufe. A lightweight approach for improving the lookup performance in kademlia-type systems. CoRR, abs/1408.3079, 2014. [ bib | http ]

2013 (22)

Benjamin Schiller, Giang Truong Nguyen, and Thorsten Strufe. Resilient tree-based live streaming in reality. In Proceedings of the 2013 IEEE P2P. IEEE, September 2013. [ bib ]

Kamill Panitzek and Thorsten Strufe. A formal model for peer-to-peer systems. In Wolfgang Effelsberg, Ralf Steinmetz, and Thorsten Strufe, editors, Benchmarking Peer-to-Peer Systems, volume 7847 of Lecture Notes in Computer Science, pages 15--18. Springer Berlin Heidelberg, June 2013. [ bib ]

Wolfgang Effelsberg, Ralf Steinmetz, and Thorsten Strufe. Benchmarking Peer-to-Peer Systems. LNCS State of the Art Surveys. Springer, 2013. [ bib ]

Erik-Oliver Blass, Anil Kurmus, Refik Molva, and Thorsten Strufe. PSP: Private and Secure Payment with RFID. Elsevier's Computer Communications, 36(4):468 -- 480, 2013. [ bib ]

Stefanie Roos and Thorsten Strufe. A Contribution to Analyzing and Enhancing Darknet Routing. In INFOCOM (mini conference), 2013. [ bib ]

Stephan Schulz and Thorsten Strufe. d<sup>2</sup> Deleting Diaspora: Practical Attacks for Profile Discovery and Deletion. In IEEE ICC, 2013. [ bib ]

Andreas Hoefer, Stefanie Roos, and Thorsten Strufe. Greedy Embedding, Routing and Content Addressing for Darknets. In KiVS/NetSys, 2013. [ bib ]

Benjamin Schiller and Thorsten Strufe. GTNA 2.0 - A Framework for Rapid Prototyping and Evaluation of Routing Algorithms. In Summersim, 2013. [ bib ]

Benjamin Schiller and Thorsten Strufe. Dynamic Network Analyzer -- Building a Framework for the Graph-theoretic Analysis of Dynamic Networks. In Summersim, 2013. [ bib ]

Giang Truong Nguyen, Mathias Fischer, and Thorsten Strufe. OSSim: A Generic Simulation Framework for Overlay Streaming. In Summersim, 2013. [ bib ]

Wolfgang Effelsberg and Thorsten Strufe. Summary and conclusion. In Benchmarking Peer-to-Peer Systems, pages 195--197. 2013. [ bib | http ]

Stefanie Roos, Hani Salah, and Thorsten Strufe. Comprehending kademlia routing - a theoretical framework for the hop count distribution. Technical report, 2013. [ bib ]

Topic 7: Peer-to-Peer Computing - (Introduction), 2013. [ bib ]

Dang Hai Hoang, Thorsten Strufe, Thieu Nga Pham, Hong Ngoc Hoang, Chung Tien Nguyen, Van Tho Tran, and Immanuel Schweizer. A smart data forwarding method based on adaptive levels in wireless sensor networks. In IEEE Local Computer Networks, Workshops (SenseApp), 2013. [ bib ]

Thieu Nga Pham, Dang Hai Hoang, Thorsten Strufe, Duc Le Quang, Phong Thanh Bui, Nguyet Thi Thai, Duong Le Thuy, and Immanuel Schweizer. Processing and visualizing traffic pollution data in hanoi city from a wireless sensor network. In IEEE Local Computer Networks, Workshops (SenseApp), 2013. [ bib ]

Sonja Buchegger, Jon Crowcroft, Balachander Krishnamurthy, and Thorsten Strufe. Decentralized Systems for Privacy Preservation (Dagstuhl Seminar 13062). Dagstuhl Reports, 3(2):22--44, 2013. [ bib | DOI | http ]

Hani Salah and Thorsten Strufe. Capturing Connectivity Graphs of a Large-Scale Structured P2P Overlay Network. In ICDCS/HotPost, 2013. [ bib ]

Damiano Carra, Pietro Michiardi, Hani Salah, and Thorsten Strufe. On the Impact of Incentives in eMule. IEEE Journal on Selected Areas in Communications (JSAC), pages 1 -- 11, 2013. [ bib ]

IEEE. Proceedings of the PerCom Workshop on Security and Social Networks, 2013. [ bib ]

Martin Beck and Florian Kerschbaum. Approximate two-party privacy-preserving string matching with linear complexity. In Proceedings of the 2013 IEEE International Congress on Big Data (BigData Congress 2013), pages 31--37, 2013. [ bib ]

Jakob Hasse, Thomas Gloe, and Martin Beck. Forensic identification of GSM mobile phones. In Proceedings of the first ACM workshop on Information hiding and multimedia security (IH&MMSec '13), pages 131--140, 2013. [ bib ]

Martin Beck, V Joachim Haupt, Jan Moennich, Janine Roy, René Jäkel, Michael Schroeder, and Zerrin Isik. Secure Algorithms for Biomedical Research in Public Clouds. In 5. Workshop „Grid-, Cloud- und Big-Data-Technologien für Systementwurf und -analyse“, 2013. [ bib ]

2012 (19)

Recent Trends in Computer Networks and Distributed Systems Security - International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012. Proceedings, 2012. [ bib | http ]

Pablo E. Guerrero, Alejandro Buchmann, Kristof Van Laerhoven, Immanuel Schweizer, Max M"uhlh"auser, Thorsten Strufe, Stefan Schneckenburger, Manfred Hegger, and Birgitt Kretzschmar. A Metropolitan-Scale Testbed for Heterogeneous Wireless Sensor Networks to Support CO2 Reduction. In Green Communications and Networking, 2012. [ bib ]

Thomas Paul, Martin Stopczynski, Daniel Puscher, Melanie Volkamer, and Thorsten Strufe. C4PS -- Helping Facebookers Manage their Privacy Settings. In SocInfo, 2012. [ bib ]

Tobias Lauinger, Nikolaos Laoutaris, Pablo Rodriguez, Thorsten Strufe, Ernst Biersack, and Engin Kirda. Privacy risks in named data networking: What is the cost of performance? ACM CCR - editorial note, Oct 2012. [ bib ]

Tobias Lauinger, Nikolaos Laoutaris, Pablo Rodriguez, Thorsten Strufe, Ernst Biersack, and Engin Kirda. Privacy implications of ubiquitous caching in named data networking architectures. Technical Report 0812-001, iSecLab, 2012. [ bib ]

Felix Günther, Mark Manulis, and Thorsten Strufe. Cryptographic Treatment of Private User Profiles. Lecture Notes in Computer Science (LNCS), 7126, 2012. [ bib ]

Kamill Panitzek, Muhammad Ikram, Max Mühlhäuser, and Thorsten Strufe. Smooth Resilient Service Provision in Large Heterogeneous Networks. Praxis der Informationsverarbeitung und Kommunikation, 2012. [ bib ]

Immanuel Schweizer, Michael Wagner, Dirk Bradler, Max Muehlhaeuser, and Thorsten Strufe. kTC - Robust and Adaptive Wireless Ad-hoc Topology Control. In International Conference on Computer Communication Networks (ICCCN), 2012. [ bib ]

Thomas Paul, Martin Stopczynski, Daniel Puscher, Melanie Volkamer, and Thorsten Strufe. C4PS -- Colors for Privacy Settings. In 21st Intl. World Wide Web Conference (WWW '12), Poster, 2012. [ bib ]

Nadina Hintz, Zinaida Benenson, and Thorsten Strufe. Friendship in German Online Social Networks. In SOUPS, Poster, 2012. [ bib ]

Stefanie Roos and Thorsten Strufe. Provable Polylog Routing for Darknets. In ICDCS/HotPost, 2012. [ bib ]

Muhammad Ikram, Kamill Panitzek, Max Lehn, and Thorsten Strufe. Cheating Resistance in P2P Gaming Overlays. In GI/ITG Fachgespräch Kommunikation und Verteilte Systeme, 2012. [ bib ]

Thomas Paul, Benjamin Greschbach, Sonja Buchegger, and Thorsten Strufe. Exploring Decentralization Dimensions of Social Networking Services: Adversaries and Availability. In SIGKDD/HotSocial, 2012. [ bib ]

Proceedings of the 14th International Symposium on Stabilization, Safety, and Security of Distributed Systems. Springer, 2012. [ bib ]

Proceedings of the 21st International Conference on Computer Communication Networks. IEEE, 2012. [ bib ]

IEEE. Proceedings of the PerCom Workshop on Security and Social Networks, 2012. [ bib ]

Ivan Gudymenko, Katrin Borcea-Pfitzmann, and Katja Tietze. Privacy implications of the internet of things. In Constructing Ambient Intelligence. 2012. [ bib ]

Martin Beck and Michael Marhöfer. Do-Not-Track Techniques for Browsers and Their Implications for Consumers. pages 187--196, 2012. [ bib ]

Martin Beck and Michael Marhöfer. Privacy-preserving data mining demonstrator. In 2012 16th International Conference on Intelligence in Next Generation Networks, pages 210--216, 2012. [ bib ]

2011 (12)

Immanuel Schweizer, Nils Fleischhacker, Max Muehlhaeuser, and Thorsten Strufe. SDF - Solar-Aware Distributed Flow in Wireless Sensor Networks. In IEEE Local Computer Networks (LCN), 2011. [ bib ]

Benjamin Schiller, Stefanie Roos, Andreas Hoefer, and Thorsten Strufe. Attack Resistant Embeddings for Darknets. In IEEE International Symposium on Reliable Distributed Systems (SRDS)/WNR, 2011. [ bib ]

Frederik Armknecht and Thorsten Strufe. An Efficient Distributed Privacy-preserving Recommendation System. In IEEE Med-Hoc-Net, 2011. [ bib ]

Thomas Paul and Thorsten Strufe. Improving the Usability of Privacy Settings in Facebook. In Human Computer Interaction (HCI)/Health, Wealth and Identity Theft, 2011. [ bib ]

Felix Guenther, Mark Manulis, and Thorsten Strufe. Key Management in Distributed Online Social Networks. In WoWMoM Workshop on Data Security and Privacy in Wireless Networks, 2011. [ bib ]

Betim Berjani and Thorsten Strufe. A Recommendation System for Spots in Location-Based Online Social Networks. In EuroSys/SNS, 2011. [ bib ]

Felix Günther, Mark Manulis, and Thorsten Strufe. Cryptographic Treatment of Private User Profiles. In Conference on Financial Cryptography and Data Security (FC 2011), RLCPS, 2011. [ bib ]

Thomas Paul, Sonja Buchegger, and Thorsten Strufe. Handbook on the Trustworthy Internet, chapter Decentralizing Social Networking Services. Springer, 2011. [ bib ]

Proceedings of the 8th International Conference on Mobile Ad-Hoc and Sensor Systems. IEEE, 2011. [ bib ]

IEEE. Proceedings of the PerCom Workshop on Security and Social Networks, 2011. [ bib ]

Ivan Gudymenko and Katrin Borcea-Pfitzmann. A Framework for Transforming Abstract Privacy Model into Implementable UbiComp System Requirements. In Proceedings of the 1st International Workshop on Model-based Interactive Ubiquitous Systems (MODIQUITOUS) 2011, 2011. [ bib ]

Katrin Borcea-Pfitzmann, Andreas Pfitzmann, and Manuela Berg. Privacy 3.0 := data minimization + user control + contextual integrity. it - Information Technology, 53:34--40, 2011. [ bib ]

2010 (21)

Martin Beck. Enhanced TKIP Michael Attacks. Technical report, TU Dresden, February 2010. [ bib ]

Erwin Aitenbichler, Alexander Behring, Dirk Bradler, Melanie Hartmann, Max Muehlhaeuser, Sebastian Ries, Dirk Schnelle-Walka, Daniel Schreiber, Juergen Steimle, and Thorsten Strufe. Shaping the future internet. Ubiquitous Computing and Communication Journal, Jun 2010. [ bib ]

Leucio-Antonio Cutillo, Mark Manulis, and Thorsten Strufe. Handbook of Social Network Technologies and Applications, chapter Security and Privacy in Online Social Networks. Springer, 2010. [ bib ]

Anwitaman Datta, Sonja Buchegger, Le-Hung Vu, Krzysztof Rzadca, and Thorsten Strufe. Handbook of Social Network Technologies and Applications, chapter Decentralized Online Social Networks. Springer, 2010. [ bib ]

Marcel Karnstedt, Tara Hennessy, Jeffrey Chan, Partha Basuchowdhury, Conor Hayes, and Thorsten Strufe. Handbook of Social Network Technologies and Applications, chapter Churn in Social Networks. Springer, 2010. [ bib ]

Thomas Paul, Sonja Buchegger, and Thorsten Strufe. Decentralizing Social Networking Services. In International Tyrrhenian Workshop on Digital Communications, 2010. Invited Paper. [ bib ]

Daniel Schreiber, Andreas Höfer, and Thorsten Strufe. Social IPTV: a Survey on Chances and User-Acceptance. In International Workshop on Personalization and Recommendation on the Web and Beyond, 2010. [ bib ]

Leucio-Antonio Cutillo, Refik Molva, and Thorsten Strufe. On the Security and Feasibility of Safebook : a Distributed privacy-preserving online social network. In Proceedings of PrimeLife, 2010. [ bib ]

Benjamin Schiller, Dirk Bradler, Immanuel Schweizer, Max Mühlhäuser, and Thorsten Strufe. GTNA - A Framework for the Graph-Theoretic Network Analysis. In Spring Simulation Multi-Conference - 13th Communications and Networking Symposium (CNS), 2010. [ bib ]

Konstantin Pussep, Osama Abboud, F Gerlach, Ralf Steinmetz, and Thorsten Strufe. Adaptive Server Allocation for Peer-assisted Video-on-Demand. In International Parallel and Distributed Processing Symposium (IPDPS)/HotP2P, 2010. [ bib ]

Thorsten Strufe. Profile Popularity in a Business-oriented Online Social Network. In EuroSys/SNS, 2010. [ bib ]

Thorsten Strufe. Profile Popularity in a Business-oriented Online Social Network. Technical Report TUD-CS-2010-40, TU Darmstadt, 2010. [ bib ]

Michael Rossberg, Guenter Schaefer, and Thorsten Strufe. Distributed Automatic Configuration of Complex IPsec-Infrastructures. IEEE Journal of Network and Systems Management, pages 300 -- 326, 2010. [ bib ]

Lachezar Krumov, Adriana Andreeva, and Thorsten Strufe. Resilient Peer-to-Peer Live-Streaming using Motifs. In 11th IEEE World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2010. [ bib ]

Lachezar Krumov, Immanuel Schweizer, Dirk Bradler, and Thorsten Strufe. Leveraging Network Motifs for the Adaptation of Structured Peer-to-Peer-Networks. In IEEE Globecom, 2010. [ bib ]

Daniel Schreiber, Osama Abboud, Sandra Kovacevic, Andreas Höfer, and Thorsten Strufe. Social iptv: a survey on chances and user-acceptance. In Proceedings of Lernen, Wissensentdeckung und Adaptivität (LWA), pages 337--340, 2010. [ bib | .pdf ]

IEEE. Proceedings of 11th Symposium on a World of Wireless, Mobile, and Multimedia Communications, 2010. [ bib ]

IEEE. Proceedings of the PerCom Workshop on Security and Social Networks, 2010. [ bib ]

Anja Lorenz and Katrin Borcea-Pfitzmann. Role Management in a Privacy-Enhanced Collaborative Environment. In Proceedings of the International Conference e-Society 2010, Porto, 2010. [ bib ]

Andreas Pfitzmann and Katrin Borcea-Pfitzmann. Lifelong Privacy: Privacy and Identity Management for Life, volume 320/2010 of IFIP Advances in Information and Communication Technology, pages 1--17. Springer, Boston, 2010. [ bib ]

Stefanie Pötzsch and Katrin Borcea-Pfitzmann. Privacy-Respecting Access Control in Collaborative Workspaces, volume 320/2010 of IFIP Advances in Information and Communication Technology, pages 102--111. Springer, Boston, 2010. [ bib ]

2009 (11)

Leucio-Antonio Cutillo, Refik Molva, and Thorsten Strufe. Safebook: a Privacy Preserving Online Social Network Leveraging on Real-Life Trust. IEEE Communications Magazine, 47(12):94 -- 101, December 2009. [ bib ]

Lachezar Krumov, Immanuel Schweizer, Dirk Bradler, and Thorsten Strufe. MOPS: Optimizing Structured Peer-to-Peer Networks Based on their Local Motif-Signature. Technical Report TUD-CS-2009-0022, TU Darmstadt, 2009. [ bib ]

Leyla Bilge, Thorsten Strufe, Davide Balzarotti, and Engin Kirda. All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks. In 18th Intl. World Wide Web Conference (WWW'09), pages 551 -- 560, 2009. [ bib ]

Erik-Oliver Blass, Anil Kurmus, Refik Molva, and Thorsten Strufe. PSP: Private and Secure Payment with RFID. In ACM CCS/Workshop on Privacy in the Electronic Society, 2009. [ bib ]

Erik-Oliver Blass, Anil Kurmus, Refik Molva, and Thorsten Strufe. PSP: Private and Secure Payment with RFID. Technical Report 2009/181, Cryptology ePrint archive, 2009. [ bib ]

Michael Brinkmeier, Mathias Fischer, Sascha Grau, Guenter Schaefer, and Thorsten Strufe. Methods for Improving Resilience in Communication Networks and P2P Overlays. Praxis der Informationsverarbeitung und Kommunikation (PIK), 33(1), 2009. [ bib ]

Michael Brinkmeier, Günter Schäfer, and Thorsten Strufe. Optimally DoS--resistant P2P Topologies for Live Multimedia Streaming. IEEE Transactions on Parallel and Distributed Systems, 99, 2009. [ bib ]

Leucio Antonio Cutillo, Refik Molva, and Thorsten Strufe. Leveraging Social Links for Trust and Privacy in Networks. In INetSec, Open Research Problems in Network Security, 2009. [ bib ]

Leucio-Antonio Cutillo, Refik Molva, and Thorsten Strufe. Privacy Preserving Social Networking Through Decentralization. In 6th International Conference on Wireless On-demand Network Systems and Services (WONS), pages 145 -- 152, 2009. [ bib ]

Leucio-Antonio Cutillo, Refik Molva, and Thorsten Strufe. Safebook: Feasibility of Transitive Cooperation for Privacy on a Decentralized Social Network . In 3rd IEEE World of Wireless, Mobile and Multimedia Networks (WoWMoM), Autonomic and Opportunistic Communications, 2009. [ bib ]

Martin Beck and Erik Tews. Practical attacks against WEP and WPA. In Proceedings of the second ACM conference on Wireless network security (WiSec'09), pages 79--86, 2009. [ bib ]

2008 (2)

Mathias Fischer, Robert Schmidt, Günter Schäfer, and Thorsten Strufe. A Key Management Solution for Overlay-Live-Streaming. In Workshop on Security in Opportunistic and Social Networks at the 4th ACM SecureComm, 2008. [ bib ]

ACM. Proceedings of the SecureComm Workshop on Security in Opportunistic and Social Networks, 2008. [ bib ]

2007 (7)

Michael Rossberg, Thorsten Strufe, and Günter Schäfer. Using Recurring Costs for Reputation Management in Peer-to-Peer Streaming Systems. In 3rd IEEE International Conference on Security and Privacy in Communication Networks (SecureComm), 2007. [ bib ]

Thorsten Strufe. Ein Peer-to-Peer-basierter Ansatz für die Live-Übertragung multimedialer Daten. PhD thesis, TU Ilmenau, 2007. [ bib ]

Thorsten Strufe, Jens Wildhagen, and Günter Schäfer. Netzwerkeffizienz stabiler Overlay-Streaming-Topologien. In GI Fachtagung Kommunikation in Verteilten Systemen (KIVS), pages 3--14, 2007. [ bib ]

Thorsten Strufe, Jens Wildhagen, and Günter Schäfer. Towards the construction of Attack Resistant and Efficient Overlay Streaming Topologies. Electronic Notes in Theoretical Computer Science, ENTCS1692(179C):111--121, 2007. [ bib ]

Jens Wildhagen, Thorsten Strufe, and Günter Schäfer. Netzwerkeffizienz stabiler Overlay-Streaming-Topologien. it - Information Technology, 49:304--311, 2007. [ bib ]

Katrin Borcea-Pfitzmann and Anne-Katrin Stange. Privacy - an issue for elearning?: A trend analysis reflecting the attitude of european elearning users. Technical report, Technische Universität Dresden, Institut für Systemarchitektur, 2007. [ bib ]

Katrin Borcea-Pfitzmann, Marit Hansen, Katja Liesebach, Andreas Pfitzmann, and Sandra Steinbrecher. Managing one's identities in organisational and social settings. Datenschutz und Datensicherheit, 9, 2007. [ bib ]

2006 (7)

Thorsten Strufe, Günter Schäfer, and Arthur Chang. BCBS: An Efficient Load Balancing Strategy for Cooperative Overlay Live-Streaming. In IEEE International Congress on Communications (ICC), pages 304--309, 2006. [ bib ]

Thorsten Strufe, Jens Wildhagen, and Günter Schäfer. Towards the construction of Attack Resistant and Efficient Overlay Streaming Topologies. In 2nd International Workshop on Security and Trust Management, pages 108--118, 2006. [ bib ]

Michael Brinkmeier, Thorsten Strufe, and Günter Schäfer. Towards Stable P2P-Streaming-Topologies. Technical report, Technische Universität Ilmenau, 2006. [ bib ]

Katrin Borcea-Pfitzmann, Marit Hansen, Katja Liesebach, Sandra Steinbrecher, and Andreas Pfitzmann. What user-controlled identity management should learn from communities. Information Security Technical Report, 11(3):119--128, 2006. [ bib ]

Elke Franz, Katja Liesebach, and Katrin Borcea-Pfitzmann. Privacy-aware user interfaces within collaborative environments. In AVI '06: Proceedings of the international workshop in conjunciton with AVI 2006 on Context in advanced interfaces, pages 45--48, 2006. [ bib ]

Elke Franz, Hagen Wahrig, Alexander Böttcher, and Katrin Borcea-Pfitzmann. Access control in a privacy-aware elearning environment. In First International Conference on Availability, Reliability and Security, pages 879--886, 2006. [ bib ]

Andreas Pfitzmann and Katrin Borcea-Pfitzmann. Identitätsmanagement und informationelle Selbstbestimmung, pages 83--91. 2006. [ bib ]

2005 (6)

Katrin Borcea, Hilko Donker, Elke Franz, Andreas Pfitzmann, and Hagen Wahrig. Towards privacy-aware elearning. In Workshop on Privacy Enhancing Technologies, 2005. [ bib ]

Katrin Borcea, Hilko Donker, Elke Franz, Katja Liesebach, Hilko Donker, and Hagen Wahrig. Intra-application partitioning of personal data. In Workshop on Privacy-Enhanced Personalization, 2005. [ bib ]

Marit Hansen, Katrin Borcea-Pfitzmann, and Andreas Pfitzmann. Prime ? ein europäisches projekt für nutzerbestimmtes identitätsmanagement. it - Information Technology, Oldenbourg, 6(47):352--359, 2005. [ bib ]

Katrin Borcea, Hilko Donker, Elke Franz, Andreas Pfitzmann, and Hagen Wahrig. Privacy-aware elearning: Why and how. In World Conference on Educational Multimedia, Hypermedia & Telecommunications, 2005. [ bib ]

Katrin Borcea-Pfitzmann, Katja Liesebach, and Andreas Pfitzmann. Establishing a privacy-aware collaborative elearning environment. In EADTU Working Conference, 2005. [ bib ]

Katrin Borcea, Elke Franz, and Andreas Pfitzmann. Usable presentation of secure pseudonyms. In Workshop on Digital Identity Management, 2005. [ bib ]

2004 (1)

Thorsten Strufe. IlmStream: Efficient Multimedia Streaming in Decentralised Distributed Systems. In IEEE World Automation Congress, pages 63--68, June 2004. [ bib ]

2003 (1)

Thorsten Strufe. Namens- und Lokalisierungsdienste in dezentralen, verteilten Systemen. In Tagungsband des 9. Workshop ,,Multimediale Informations- und Kommunikationssysteme“ im Rahmen der net.objectdays, pages 322 -- 335, 2003. [ bib ]

2002 (2)

Thorsten Strufe and Dietrich Reschke. Efficient Content Distribution in semi-decentralized Peer-to-Peer-Networks. In 8th International Netties Conference, pages 33 -- 38, 2002. [ bib ]

Thorsten Strufe. Effizientes Peer-to-Peer-Distributionssystem für multimediale Inhalte. In Tagungsband des 8. Workshop ,,Multimediale Informations- und Kommunikationssysteme“ im Rahmen der net.objectdays, pages 704--709, 2002. [ bib ]

Zu dieser Seite

Thorsten Strufe
Letzte Änderung: 27.06.2018