
Thorsten Strufe
Person information
- affiliation: TU Dresden, Germany
- affiliation (former): Darmstadt University of Technology, Germany
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2021
- [j21]Christiane Kuhn
, Martin Beck, Thorsten Strufe:
Covid notions: Towards formal definitions - and documented understanding - of privacy goals and claimed protection in proximity-tracing services. Online Soc. Networks Media 22: 100125 (2021) - [i28]Dominik Wunderlich, Daniel Bernau, Francesco Aldà, Javier Parra-Arnau, Thorsten Strufe:
On the privacy-utility trade-off in differentially private hierarchical text classification. CoRR abs/2103.02895 (2021) - 2020
- [c115]Stephan Escher, Benjamin Weller, Stefan Köpsell, Thorsten Strufe:
Towards Transparency in the Internet of Things. APF 2020: 186-200 - [c114]Frederik Armknecht, Paul Walther, Gene Tsudik, Martin Beck, Thorsten Strufe:
ProMACs: Progressive and Resynchronizing MACs for Continuous Efficient Authentication of Message Streams. CCS 2020: 211-223 - [c113]Stephan Escher, Patrick Teufert, Robin Herrmann, Thorsten Strufe:
Twizzle - A Multi-purpose Benchmarking Framework for Semantic Comparisons of Multimedia Object Pairs. DETIPS/DeSECSys/MPS/SPOSE@ESORICS 2020: 223-230 - [c112]Stephan Escher, Patrick Teufert, Lukas Hain, Thorsten Strufe:
You've Got Nothing on Me! Privacy Friendly Face Recognition Reloaded. DETIPS/DeSECSys/MPS/SPOSE@ESORICS 2020: 231-242 - [c111]Amr Osman, Armin Wasicek, Stefan Köpsell, Thorsten Strufe:
Transparent Microsegmentation in Smart Home IoT Networks. HotEdge 2020 - [c110]Martin Byrenheid, Thorsten Strufe, Stefanie Roos:
Attack resistant Leader Election in Social Overlay Networks by Leveraging Local Voting. ICDCN 2020: 7:1-7:10 - [c109]Johannes Pflugmacher, Stephan Escher, Jan Reubold, Thorsten Strufe:
The German-Speaking Twitter Community Reference Data Set. INFOCOM Workshops 2020: 1172-1177 - [c108]Kilian Becher, Thorsten Strufe:
Efficient Cloud-based Secret Shuffling via Homomorphic Encryption. ISCC 2020: 1-7 - [c107]Paul Walther, Thorsten Strufe:
Blind Twins: Siamese Networks for Non-Interactive Information Reconciliation. PIMRC 2020: 1-7 - [c106]Paul Walther, Robert Knauer, Thorsten Strufe:
Passive Angriffe auf kanalbasierten Schlüsselaustausch. Sicherheit 2020: 41-51 - [c105]Christiane Kuhn, Martin Beck, Thorsten Strufe:
Breaking and (Partially) Fixing Provably Secure Onion Routing. IEEE Symposium on Security and Privacy 2020: 168-185 - [c104]Clemens Deußer, Steffen Passmann, Thorsten Strufe:
Browsing Unicity: On the Limits of Anonymizing Web Tracking Data. IEEE Symposium on Security and Privacy 2020: 777-790 - [c103]Martin Byrenheid, Thorsten Strufe, Stefanie Roos:
Secure Embedding of Rooted Spanning Trees for Scalable Routing in Topology-Restricted Networks. SRDS 2020: 175-184 - [c102]Paul Walther, Thorsten Strufe:
Inference Attacks on Physical Layer Channel State Information. TrustCom 2020: 935-942 - [c101]Kilian Becher, J. A. Gregor Lagodzinski, Thorsten Strufe:
Privacy-Preserving Public Verification of Ethical Cobalt Sourcing. TrustCom 2020: 998-1005 - [c100]Christiane Kuhn, Friederike Kitzing, Thorsten Strufe:
SoK on Performance Bounds in Anonymous Communication. WPES@CCS 2020: 21-39 - [i27]Kilian Becher, Thorsten Strufe:
Efficient Cloud-based Secret Shuffling via Homomorphic Encryption. CoRR abs/2002.05231 (2020) - [i26]Christiane Kuhn, Martin Beck, Thorsten Strufe:
Covid Notions: Towards Formal Definitions - and Documented Understanding - of Privacy Goals and Claimed Protection in Proximity-Tracing Services. CoRR abs/2004.07723 (2020) - [i25]Christiane Kuhn, Friederike Kitzing, Thorsten Strufe:
SoK on Performance Bounds in Anonymous Communication. CoRR abs/2011.08536 (2020) - [i24]Wasilij Beskorovajnov, Felix Dörre, Gunnar Hartung, Alexander Koch
, Jörn Müller-Quade, Thorsten Strufe:
ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized - Decentralized Divide for Stronger Privacy. IACR Cryptol. ePrint Arch. 2020: 505 (2020)
2010 – 2019
- 2019
- [j20]Do Le Quoc, Martin Beck, Pramod Bhatotia, Ruichuan Chen, Christof Fetzer, Thorsten Strufe:
PrivApprox: Privacy-Preserving Stream Analytics - (Extended Abstract). Inform. Spektrum 42(5): 358-359 (2019) - [j19]Gerhard P. Fettweis
, Meik Dorpinghaus
, Jerónimo Castrillón
, Akash Kumar
, Christel Baier
, Karlheinz Bock, Frank Ellinger, Andreas Fery, Frank H. P. Fitzek, Hermann Härtig, Kambiz Jamshidi
, Thomas Kissinger
, Wolfgang Lehner, Michael Mertig
, Wolfgang E. Nagel, Giang T. Nguyen
, Dirk Plettemeier, Michael Schröter, Thorsten Strufe:
Architecture and Advanced Electronics Pathways Toward Highly Adaptive Energy- Efficient Computing. Proc. IEEE 107(1): 204-231 (2019) - [j18]Christiane Kuhn, Martin Beck, Stefan Schiffner, Eduard A. Jorswieck, Thorsten Strufe:
On Privacy Notions in Anonymous Communication. Proc. Priv. Enhancing Technol. 2019(2): 105-125 (2019) - [c99]Amr Osman, Simon Hanisch, Thorsten Strufe:
SeCoNetBench: A modular framework for Secure Container Networking Benchmarks. EuroS&P Workshops 2019: 21-28 - [c98]Tobias Reiher, Alexander Senier, Jerónimo Castrillón, Thorsten Strufe:
RecordFlux: Formal Message Specification and Generation of Verifiable Binary Parsers. FACS 2019: 170-190 - [c97]Amr Osman, Pascal Bruckner, Hani Salah, Frank H. P. Fitzek, Thorsten Strufe, Mathias Fischer:
Sandnet: Towards High Quality of Deception in Container-Based Microservice Architectures. ICC 2019: 1-7 - [c96]Tao Li, Hani Salah, Xin Ding, Thorsten Strufe, Frank H. P. Fitzek, Silvia Santini:
INFAS: In-Network Flow mAnagement Scheme for SDN Control Plane Protection. IM 2019: 367-373 - [c95]Muhammad Hassan
, Hani Salah, Mauro Conti, Frank H. P. Fitzek, Thorsten Strufe:
CoMon-DAS: A Framework for Efficient and Robust Dynamic Adaptive Streaming over NDN. ISCC 2019: 1-7 - [c94]Kilian Becher, Martin Beck, Thorsten Strufe:
An Enhanced Approach to Cloud-based Privacy-preserving Benchmarking. NetSys 2019: 1-8 - [c93]Paul Walther, Elke Franz, Thorsten Strufe:
Blind Synchronization of Channel Impulse Responses for Channel Reciprocity-based Key Generation. LCN 2019: 76-83 - [c92]Martin Byrenheid, Stefanie Roos, Thorsten Strufe:
Attack-Resistant Spanning Tree Construction in Route-Restricted Overlay Networks. SRDS 2019: 251-260 - [c91]Markus Sontowski, Stefan Köpsell, Thorsten Strufe, Christian Zimmermann, Andreas Weinand, Hans D. Schotten, Norbert Bissmeyer:
Towards Secure Communication for High-Density Longitudinal Platooning. VTC-Fall 2019: 1-7 - [c90]Tim Lackorzynski, Stefan Köpsell, Thorsten Strufe:
A Comparative Study on Virtual Private Networks for Future Industrial Communication Systems. WFCS 2019: 1-8 - [c89]Pin-Hsun Lin, Christiane Kuhn, Thorsten Strufe, Eduard A. Jorswieck:
Physical Layer Privacy in Broadcast Channels. WIFS 2019: 1-6 - [r2]Do Le Quoc, Martin Beck, Pramod Bhatotia, Ruichuan Chen, Christof Fetzer, Thorsten Strufe:
Privacy-Preserving Data Analytics. Encyclopedia of Big Data Technologies 2019 - [r1]Do Le Quoc, Ruichuan Chen, Pramod Bhatotia, Christof Fetzer, Volker Hilt, Thorsten Strufe:
Approximate Computing for Stream Analytics. Encyclopedia of Big Data Technologies 2019 - [i23]Martin Byrenheid, Stefanie Roos, Thorsten Strufe:
On the Limits of Byzantine-tolerant Spanning Tree Construction in Route-Restricted Overlay Networks. CoRR abs/1901.02729 (2019) - [i22]Tobias Reiher, Alexander Senier, Jerónimo Castrillón, Thorsten Strufe:
RecordFlux: Formal Message Specification and Generation of Verifiable Binary Parsers. CoRR abs/1910.02146 (2019) - [i21]Christiane Kuhn, Martin Beck, Thorsten Strufe:
Breaking and (Partially) Fixing Provably Secure Onion Routing. CoRR abs/1910.13772 (2019) - 2018
- [c88]Do Le Quoc, Istemi Ekin Akkus, Pramod Bhatotia, Spyros Blanas, Ruichuan Chen, Christof Fetzer, Thorsten Strufe:
ApproxJoin: Approximate Distributed Joins. SoCC 2018: 426-438 - [c87]Nora Jansen, Oliver Hinz, Thorsten Strufe:
"Police - to Protect and Serve" Online: Factors contributing to Modern Ways of Interaction between Citizens and Law Enforcement Agencies. ECIS 2018: 48 - [c86]Christiane Kuhn, Friederike Kitzing, Thorsten Strufe:
An Attack on Untraceable Linear Network Coding. GLOBECOM 2018: 1-6 - [c85]Sadia Moriam, Elke Franz, Paul Walther, Akash Kumar, Thorsten Strufe, Gerhard P. Fettweis:
Protecting Communication in Many-Core Systems against Active Attackers. ACM Great Lakes Symposium on VLSI 2018: 45-50 - [c84]Timo Richter, Stephan Escher, Dagmar Schönfeld, Thorsten Strufe:
Forensic Analysis and Anonymisation of Printed Documents. IH&MMSec 2018: 127-138 - [c83]Paul Walther, Stefan Köpsell, Frederik Armknecht, Gene Tsudik, Thorsten Strufe:
Chains and Whips - An approach to lighweight MACs. Krypto-Tag 2018 - [c82]Paul Walther, Carsten Rudolf Janda, Elke Franz, Mathias Pelka, Horst Hellbrück, Thorsten Strufe, Eduard A. Jorswieck:
Improving Quantization for Channel Reciprocity based Key Generation. LCN 2018: 545-552 - [c81]Tao Li, Hani Salah, Mu He
, Thorsten Strufe, Silvia Santini:
REMO: Resource efficient distributed network monitoring. NOMS 2018: 1-9 - [c80]Tao Li, Yuanjun Sun, Marek Sobe, Thorsten Strufe, Silvia Santini:
Energy-efficient SDN control and visualization. NOMS 2018: 1-2 - [c79]Eemil Lagerspetz
, Huber Flores
, Niko Mäkitalo
, Pan Hui, Petteri Nurmi
, Sasu Tarkoma
, Andrea Passarella, Jörg Ott, Peter Reichl, Marco Conti, Markus Fiedler, Jatinder Singh, Thorsten Strufe, Tobias Hoßfeld, Anders Lindgren, Daniele Quercia:
Pervasive Communities in the Internet of People. PerCom Workshops 2018: 40-45 - [c78]Martin Byrenheid, Stefan Köpsell, Alexander Naumenko, Thorsten Strufe:
Transparent Low-Latency Network Anonymisation for Mobile Devices. SecureComm (1) 2018: 193-209 - [c77]Clemens Deusser, Nora Jansen, Jan Reubold, Benjamin Schiller, Oliver Hinz, Thorsten Strufe:
Buzz in Social Media: Detection of Short-lived Viral Phenomena. WWW (Companion Volume) 2018: 1443-1449 - [i20]Do Le Quoc, Istemi Ekin Akkus, Pramod Bhatotia, Spyros Blanas, Ruichuan Chen, Christof Fetzer, Thorsten Strufe:
Approximate Distributed Joins in Apache Spark. CoRR abs/1805.05874 (2018) - [i19]Kilian Becher, Martin Beck, Thorsten Strufe:
An Enhanced Approach to Cloud-based Privacy-preserving Benchmarking (Long Version). CoRR abs/1810.04971 (2018) - [i18]Christiane Kuhn, Martin Beck, Stefan Schiffner, Eduard A. Jorswieck, Thorsten Strufe:
On Privacy Notion in Anonymous Communication. CoRR abs/1812.05638 (2018) - 2017
- [j17]Sven Jager
, Benjamin Schiller, Philipp Babel, Malte Blumenroth, Thorsten Strufe, Kay Hamacher:
StreAM-Tg: algorithms for analyzing coarse grained RNA dynamics based on Markov models of connectivity-graphs. Algorithms Mol. Biol. 12(1): 15:1-15:16 (2017) - [c76]Steffen Passmann, Anne Lauber-Roensberg, Thorsten Strufe:
Privacy-preserving audience measurement in practice - Opportunities and challenges. CNS 2017: 444-449 - [c75]Thomas Paul, Niklas Lochschmidt, Hani Salah, Anwitaman Datta
, Thorsten Strufe:
Lilliput: A Storage Service for Lightweight Peer-to-Peer Online Social Networks. ICCCN 2017: 1-10 - [c74]Stephan Escher, Thorsten Strufe:
Robustness analysis of a passive printer identification scheme for halftone images. ICIP 2017: 4357-4361 - [c73]Bho Matthiesen
, Stefan Pfennig, Mario Bielert, Thomas Ilsche, Andrew Lonnstrom, Tao Li, Juan Antonio Cabrera Carrillo, Christian Scheunert, Elke Franz, Silvia Santini, Thorsten Strufe, Eduard A. Jorswieck, Wolfgang E. Nagel, Giang T. Nguyen, Frank H. P. Fitzek:
Secure and energy-efficient interconnects for board-to-board communication. ICUWB 2017: 1-7 - [c72]Stefanie Roos, Martin Byrenheid, Clemens Deusser, Thorsten Strufe:
BD-CAT: Balanced dynamic content addressing in trees. INFOCOM 2017: 1-9 - [c71]Hani Salah, Mohammed Alfatafta, Saed SayedAhmed, Thorsten Strufe:
CoMon++: Preventing Cache Pollution in NDN Efficiently and Effectively. LCN 2017: 43-51 - [c70]Do Le Quoc, Ruichuan Chen, Pramod Bhatotia, Christof Fetzer, Volker Hilt, Thorsten Strufe:
StreamApprox: approximate computing for stream analytics. Middleware 2017: 185-197 - [c69]Jan Reubold, Ahcène Boubekki, Thorsten Strufe, Ulf Brefeld:
Infinite Mixtures of Markov Chains. NFMCP@PKDD/ECML 2017: 167-181 - [c68]Do Le Quoc, Martin Beck, Pramod Bhatotia, Ruichuan Chen, Christof Fetzer, Thorsten Strufe:
PrivApprox: Privacy-Preserving Stream Analytics. USENIX Annual Technical Conference 2017: 659-672 - [i17]Stefanie Roos, Martin Byrenheid, Clemens Deusser, Thorsten Strufe:
Balanced Dynamic Content Addressing in Trees. CoRR abs/1701.03522 (2017) - [i16]Do Le Quoc, Martin Beck, Pramod Bhatotia, Ruichuan Chen, Christof Fetzer, Thorsten Strufe:
Privacy Preserving Stream Analytics: The Marriage of Randomized Response and Approximate Computing. CoRR abs/1701.05403 (2017) - [i15]Alexander Senier, Martin Beck, Thorsten Strufe:
PrettyCat: Adaptive guarantee-controlled software partitioning of security protocols. CoRR abs/1706.04759 (2017) - [i14]Do Le Quoc, Ruichuan Chen, Pramod Bhatotia, Christof Fetzer, Volker Hilt, Thorsten Strufe:
Approximate Stream Analytics in Apache Flink and Apache Spark Streaming. CoRR abs/1709.02946 (2017) - [i13]Jeremy Blackburn, Emiliano De Cristofaro, Michael Sirivianos, Thorsten Strufe:
Cybersafety in Modern Online Social Networks (Dagstuhl Reports 17372). Dagstuhl Reports 7(9): 47-61 (2017) - 2016
- [j16]Benjamin Schiller
, Clemens Deusser, Jerónimo Castrillón, Thorsten Strufe:
Compile- and run-time approaches for the selection of efficient data structures for dynamic graph analysis. Appl. Netw. Sci. 1: 9 (2016) - [j15]Xiaoming Fu
, Andrea Passarella
, Daniele Quercia, Alessandra Sala, Thorsten Strufe:
Online Social Networks. Comput. Commun. 73: 163-166 (2016) - [j14]Stefanie Roos, Thorsten Strufe:
Dealing with Dead Ends: Efficient Routing in Darknets. ACM Trans. Model. Perform. Evaluation Comput. Syst. 1(1): 4:1-4:30 (2016) - [c67]Stefanie Roos, Martin Beck, Thorsten Strufe:
Anonymous addresses for efficient and resilient routing in F2F overlays. INFOCOM 2016: 1-9 - [c66]Hani Salah, Thorsten Strufe:
Evaluating and mitigating a Collusive version of the Interest Flooding Attack in NDN. ISCC 2016: 938-945 - [c65]Sven Jager, Benjamin Schiller, Thorsten Strufe, Kay Hamacher:
StreAM- T_g : Algorithms for Analyzing Coarse Grained RNA Dynamics Based on Markov Models of Connectivity-Graphs. WABI 2016: 197-209 - [c64]Giang Nguyen, Stefanie Roos, Benjamin Schiller, Thorsten Strufe:
SWAP: Protecting pull-based P2P video streaming systems from inference attacks. WoWMoM 2016: 1-9 - [i12]Stefanie Roos, Martin Beck, Thorsten Strufe:
VOUTE-Virtual Overlays Using Tree Embeddings. CoRR abs/1601.06119 (2016) - 2015
- [j13]Paul Gebelein, Thomas Paul, Thorsten Strufe, Wolfgang Effelsberg:
Interdisziplinäre Forschung zwischen Informatikern und Soziologen. PIK Prax. Informationsverarbeitung Kommun. 38(1-2): 83-87 (2015) - [c63]Benjamin Schiller, Sven Jager, Kay Hamacher, Thorsten Strufe:
StreaM - A Stream-Based Algorithm for Counting Motifs in Dynamic Graphs. AlCoB 2015: 53-67 - [c62]Hani Salah, Thorsten Strufe:
CoMon: An architecture for coordinated caching and cache-aware routing in CCN. CCNC 2015: 663-670 - [c61]Thomas Paul, Daniel Puscher, Stefan Wilk, Thorsten Strufe:
Systematic, large-scale analysis on the feasibility of media prefetching in Online Social Networks. CCNC 2015: 755-760 - [c60]Axel Schulz, Benedikt Schmidt, Thorsten Strufe:
Small-Scale Incident Detection based on Microposts. HT 2015: 3-12 - [c59]Irina Heimbach, Benjamin Schiller, Thorsten Strufe, Oliver Hinz:
Content Virality on Online Social Networks: Empirical Evidence from Twitter, Facebook, and Google+ on German News Websites. HT 2015: 39-47 - [c58]Hani Salah, Julian Wulfheide, Thorsten Strufe:
Lightweight coordinated defence against interest flooding attacks in NDN. INFOCOM Workshops 2015: 103-104 - [c57]Stefanie Roos, Thorsten Strufe:
On the impossibility of efficient self-stabilization in virtual overlays with churn. INFOCOM 2015: 298-306 - [c56]Stefanie Roos, Giang T. Nguyen, Thorsten Strufe:
Integrating churn into the formal analysis of routing algorithms. NetSys 2015: 1-5 - [c55]Stefanie Roos, Florian Platzer, Jan-Michael Heller, Thorsten Strufe:
Inferring obfuscated values in Freenet. NetSys 2015: 1-8 - [c54]Hani Salah, Julian Wulfheide, Thorsten Strufe:
Coordination supports security: A new defence mechanism against interest flooding in NDN. LCN 2015: 73-81 - [c53]Benjamin Schiller, Thorsten Strufe, Dirk Kohlweyer, Jan Seedorf:
Growing a Web of Trust. LCN 2015: 100-108 - [c52]Giang Nguyen, Stefanie Roos, Thorsten Strufe, Mathias Fischer:
RBCS: A resilient backbone construction scheme for hybrid Peer-To-Peer streaming. LCN 2015: 261-269 - [c51]Benjamin Schiller, Jerónimo Castrillón, Thorsten Strufe:
Efficient Data Structures for Dynamic Graph Analysis. SITIS 2015: 497-504 - [i11]Thomas Paul, Daniel Puscher, Thorsten Strufe:
The User Behavior in Facebook and its Development from 2009 until 2014. CoRR abs/1505.04943 (2015) - [i10]Thomas Paul, Daniel Puscher, Thorsten Strufe:
Private Date Exposure in Facebook and the Impact of Comprehensible Audience Selection Controls. CoRR abs/1505.06178 (2015) - 2014
- [j12]Thomas Paul, Antonino Famulari, Thorsten Strufe:
A survey on decentralized Online Social Networks. Comput. Networks 75: 437-452 (2014) - [c50]Daniel Germanus, Stefanie Roos, Thorsten Strufe, Neeraj Suri
:
Mitigating Eclipse attacks in Peer-To-Peer networks. CNS 2014: 400-408 - [c49]Thomas Paul, Marius Hornung, Thorsten Strufe:
Distributed discovery of user handles with privacy. GLOBECOM 2014: 2947-2953 - [c48]Frederik Armknecht, Manuel Hauptmann, Stefanie Roos, Thorsten Strufe:
An additional protection layer for confidential OSNs posts. ICC 2014: 3746-3752 - [c47]Hani Salah, Benjamin Schiller, Thorsten Strufe:
CoMon: A system architecture for improving caching in CCN. INFOCOM Workshops 2014: 213-214 - [c46]Hani Salah, Stefanie Roos, Thorsten Strufe:
Characterizing graph-theoretic properties of a large-scale DHT: Measurements vs. simulations. ISCC 2014: 1-7 - [c45]Stefanie Roos, Liang Wang, Thorsten Strufe, Jussi Kangasharju
:
Enhancing compact routing in CCN with prefix embedding and topology-aware hashing. MobiArch@MobiCom 2014: 49-54 - [c44]Hani Salah, Stefanie Roos, Thorsten Strufe:
Diversity entails improvement: A new neighbour selection scheme for Kademlia-type systems. P2P 2014: 1-10 - [c43]Benjamin Schiller, Giang Nguyen, Thorsten Strufe:
Resilient tree-based live streaming for mobile scenarios. PerCom Workshops 2014: 160-162 - [c42]Stefanie Roos, Benjamin Schiller, Stefan Hacker, Thorsten Strufe:
Measuring Freenet in the Wild: Censorship-Resilience under Observation. Privacy Enhancing Technologies 2014: 263-282 - [c41]Tim Grube, Benjamin Schiller, Thorsten Strufe:
Monotone Sampling of Networks. DyNaK 2014 - [c40]Sebastian Biedermann, Nikolaos P. Karvelas, Stefan Katzenbeisser, Thorsten Strufe, Andreas Peter:
ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation. SOFSEM 2014: 114-125 - [c39]Patrick Welzel, Stefanie Roos, Andreas Höfer, Thorsten Strufe:
DarknetSim: a simulation framework for social overlays. SpringSim (CNS) 2014: 2 - [c38]Giang Nguyen, Mathias Fischer, Thorsten Strufe:
On the Resilience of Pull-Based P2P Streaming Systems against DoS Attacks. SSS 2014: 33-47 - [c37]Max Schmachtenberg, Thorsten Strufe, Heiko Paulheim
:
Enhancing a Location-based Recommendation System by Enrichment with Structured Data from the Web. WIMS 2014: 17:1-17:12 - [i9]Stefanie Roos, Thorsten Strufe:
NextBestOnce: Achieving Polylog Routing despite Non-greedy Embeddings. CoRR abs/1401.2165 (2014) - [i8]Hani Salah, Stefanie Roos, Thorsten Strufe:
A Lightweight Approach for Improving the Lookup Performance in Kademlia-type Systems. CoRR abs/1408.3079 (2014) - 2013
- [j11]Erik-Oliver Blass, Anil Kurmus, Refik Molva
, Thorsten Strufe:
PSP: Private and secure payment with RFID. Comput. Commun. 36(4): 468-480 (2013) - [j10]Damiano Carra, Pietro Michiardi, Hani Salah, Thorsten Strufe:
On the Impact of Incentives in eMule {Analysis and Measurements of a Popular File-Sharing Application}. IEEE J. Sel. Areas Commun. 31(9-Supplement): 94-104 (2013) - [c36]Damiano Carra, Thorsten Strufe, György Dán, Marcel Karnstedt:
Topic 7: Peer-to-Peer Computing - (Introduction). Euro-Par 2013: 353 - [c35]Stephan Schulz, Thorsten Strufe:
d2 Deleting Diaspora: Practical attacks for profile discovery and deletion. ICC 2013: 2042-2046 - [c34]Hani Salah, Thorsten Strufe:
Capturing Connectivity Graphs of a Large-Scale P2P Overlay Network. ICDCS Workshops 2013: 172-177 - [c33]Stefanie Roos, Thorsten Strufe:
A contribution to analyzing and enhancing Darknet routing. INFOCOM 2013: 615-619 - [c32]Andreas Höfer, Stefanie Roos, Thorsten Strufe:
Greedy Embedding, Routing and Content Addressing for Darknets. NetSys 2013: 43-50 - [c31]Dang-Hai Hoang, Thorsten Strufe, Quang Duc Le, Phong Thanh Bui, Thieu Nga Pham, Nguyet Thi Thai, Thuy Duong Le, Immanuel Schweizer:
Processing and visualizing traffic pollution data in Hanoi City from a wireless sensor network. LCN Workshops 2013: 48-55 - [c30]Dang-Hai Hoang, Thorsten Strufe, Thieu Nga Pham, Hong-Ngoc Hoang, Chung Tien Nguyen, Van Tho Tran, Immanuel Schweizer:
A smart data forwarding method based on adaptive levels in wireless sensor networks. LCN Workshops 2013: 100-103 - [c29]Benjamin Schiller, Giang Nguyen, Thorsten Strufe:
Resilient tree-based live streaming in reality. P2P 2013: 1-2 - [c28]Benjamin Schiller, Thorsten Strufe:
GTNA 2.0 - a framework for rapid prototyping and evaluation of routing algorithms. SummerSim 2013: 23 - [c27]Giang Nguyen, Mathias Fischer, Thorsten Strufe:
OSSim: a generic simulation framework for overlay streaming. SummerSim 2013: 30 - [c26]Benjamin Schiller, Thorsten Strufe:
Dynamic network analyzer building a framework for the graph-theoretic analysis of dynamic networks. SummerSim 2013: 49 - [p5]Kamill Panitzek, Thorsten Strufe:
A Formal Model for Peer-to-Peer Systems. Benchmarking Peer-to-Peer Systems 2013: 15-18 - [p4]Wolfgang Effelsberg, Thorsten Strufe:
Summary and Conclusion. Benchmarking Peer-to-Peer Systems 2013: 195-197 - [e2]Wolfgang Effelsberg, Ralf Steinmetz, Thorsten Strufe:
Benchmarking Peer-to-Peer Systems - Understanding Quality of Service in Large-Scale Distributed Systems. Lecture Notes in Computer Science 7847, Springer 2013, ISBN 978-3-642-38672-5 [contents] - [i7]Stefanie Roos, Hani Salah, Thorsten Strufe:
Comprehending Kademlia Routing - A Theoretical Framework for the Hop Count Distribution. CoRR abs/1307.7000 (2013) - [i6]Frederik Armknecht, Manuel Hauptmann, Stefanie Roos, Thorsten Strufe:
Protecting Public OSN Posts from Unintended Access. CoRR abs/1309.3647 (2013) - [i5]