All your contacts are belong to us: automated identity theft attacks on social networks L Bilge, T Strufe, D Balzarotti, E Kirda Proceedings of the 18th international conference on World wide web, 551-560, 2009 | 817 | 2009 |
Safebook: A privacy-preserving online social network leveraging on real-life trust LA Cutillo, R Molva, T Strufe IEEE Communications Magazine 47 (12), 94-101, 2009 | 667 | 2009 |
A recommendation system for spots in location-based online social networks B Berjani, T Strufe Proceedings of the 4th workshop on social network systems, 1-6, 2011 | 226 | 2011 |
Decentralized online social networks A Datta, S Buchegger, LH Vu, T Strufe, K Rzadca Handbook of social network technologies and applications, 349-378, 2010 | 210 | 2010 |
Privacy preserving social networking through decentralization LA Cutillo, R Molva, T Strufe 2009 Sixth International Conference on Wireless On-Demand Network Systems …, 2009 | 181 | 2009 |
Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network LA Cutillo, R Molva, T Strufe 2009 IEEE International Symposium on a World of Wireless, Mobile and …, 2009 | 106 | 2009 |
A survey on decentralized online social networks T Paul, A Famulari, T Strufe Computer Networks 75, 437-452, 2014 | 95 | 2014 |
Privacy risks in named data networking: What is the cost of performance? T Lauinger, N Laoutaris, P Rodriguez, T Strufe, E Biersack, E Kirda ACM SIGCOMM Computer Communication Review 42 (5), 54-57, 2012 | 91 | 2012 |
Streamapprox: Approximate computing for stream analytics DL Quoc, R Chen, P Bhatotia, C Fetzer, V Hilt, T Strufe Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference, 185-197, 2017 | 76* | 2017 |
{PrivApprox}:{Privacy-Preserving} Stream Analytics M Beck, P Bhatotia, R Chen, C Fetzer, T Strufe 2017 USENIX Annual Technical Conference (USENIX ATC 17), 659-672, 2017 | 75* | 2017 |
Content virality on online social networks: Empirical evidence from Twitter, Facebook, and Google+ on German news websites I Heimbach, B Schiller, T Strufe, O Hinz Proceedings of the 26th ACM Conference on Hypertext & Social Media, 39-47, 2015 | 65 | 2015 |
Tactile internet: With human-in-the-Loop FHP Fitzek, SC Li, S Speidel, T Strufe, M Simsek, M Reisslein Academic Press, 2021 | 62 | 2021 |
Security and privacy in online social networks LA Cutillo, M Manulis, T Strufe Handbook of social network technologies and applications, 497-522, 2010 | 59 | 2010 |
Optimally dos resistant p2p topologies for live multimedia streaming M Brinkmeier, G Schäfer, T Strufe IEEE Transactions on Parallel and Distributed Systems 20 (6), 831-844, 2009 | 57 | 2009 |
ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized–Decentralized Divide for Stronger Privacy W Beskorovajnov, F Dörre, G Hartung, A Koch, J Müller-Quade, T Strufe Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021 | 56 | 2021 |
Coordination supports security: A new defence mechanism against interest flooding in NDN H Salah, J Wulfheide, T Strufe 2015 IEEE 40th conference on local computer networks (LCN), 73-81, 2015 | 53 | 2015 |
Privacy implications of ubiquitous caching in named data networking architectures T Lauinger, N Laoutaris, P Rodriguez, T Strufe, E Biersack, E Kirda Acm Sigcomm 42 (5), 54-57, 2012 | 51 | 2012 |
On privacy notions in anonymous communication C Kuhn, M Beck, S Schiffner, E Jorswieck, T Strufe arXiv preprint arXiv:1812.05638, 2018 | 49 | 2018 |
CoMon++: Preventing cache pollution in NDN efficiently and effectively H Salah, M Alfatafta, S SayedAhmed, T Strufe 2017 IEEE 42nd Conference on Local Computer Networks (LCN), 43-51, 2017 | 49 | 2017 |
Evaluating and mitigating a collusive version of the interest flooding attack in NDN H Salah, T Strufe 2016 IEEE Symposium on Computers and Communication (ISCC), 938-945, 2016 | 48 | 2016 |