Thorsten Strufe
Thorsten Strufe
Professor of Privacy and Security, Karlsruhe Institute of Technology; Adjunct Professor TU Dresden
Verified email at - Homepage
Cited by
Cited by
All your contacts are belong to us: automated identity theft attacks on social networks
L Bilge, T Strufe, D Balzarotti, E Kirda
Proceedings of the 18th international conference on World wide web, 551-560, 2009
Safebook: A privacy-preserving online social network leveraging on real-life trust
LA Cutillo, R Molva, T Strufe
IEEE Communications Magazine 47 (12), 94-101, 2009
A recommendation system for spots in location-based online social networks
B Berjani, T Strufe
Proceedings of the 4th workshop on social network systems, 1-6, 2011
Privacy preserving social networking through decentralization
LA Cutillo, R Molva, T Strufe
2009 Sixth International Conference on Wireless On-Demand Network Systems …, 2009
Decentralized online social networks
A Datta, S Buchegger, LH Vu, T Strufe, K Rzadca
Handbook of social network technologies and applications, 349-378, 2010
Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network
LA Cutillo, R Molva, T Strufe
2009 IEEE International Symposium on a World of Wireless, Mobile and …, 2009
Privacy risks in named data networking: What is the cost of performance?
T Lauinger, N Laoutaris, P Rodriguez, T Strufe, E Biersack, E Kirda
ACM SIGCOMM Computer Communication Review 42 (5), 54-57, 2012
A survey on decentralized online social networks
T Paul, A Famulari, T Strufe
Computer Networks 75, 437-452, 2014
Optimally dos resistant p2p topologies for live multimedia streaming
M Brinkmeier, G Schäfer, T Strufe
IEEE Transactions on Parallel and Distributed Systems 20 (6), 831-844, 2009
Streamapprox: Approximate computing for stream analytics
DL Quoc, R Chen, P Bhatotia, C Fetzer, V Hilt, T Strufe
Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference, 185-197, 2017
PrivApprox: privacy-preserving stream analytics
M Beck, P Bhatotia, R Chen, C Fetzer, T Strufe
2017 {USENIX} Annual Technical Conference ({USENIX}{ATC} 17), 659-672, 2017
Privacy implications of ubiquitous caching in named data networking architectures
T Lauinger, N Laoutaris, P Rodriguez, T Strufe, E Biersack, E Kirda
ACM Sigcomm 42 (5), 54-57, 2012
Security and privacy in online social networks
LA Cutillo, M Manulis, T Strufe
Handbook of Social Network Technologies and Applications, 497-522, 2010
Content virality on online social networks: Empirical evidence from Twitter, Facebook, and Google+ on German news websites
I Heimbach, B Schiller, T Strufe, O Hinz
Proceedings of the 26th ACM Conference on Hypertext & Social Media, 39-47, 2015
Churn in social networks
M Karnstedt, T Hennessy, J Chan, P Basuchowdhuri, C Hayes, T Strufe
Handbook of social network technologies and applications, 185-220, 2010
Coordination supports security: A new defence mechanism against interest flooding in NDN
H Salah, J Wulfheide, T Strufe
2015 IEEE 40th Conference on Local Computer Networks (LCN), 73-81, 2015
Profile popularity in a business-oriented online social network
T Strufe
Proceedings of the 3rd workshop on social network systems, 1-6, 2010
An efficient distributed privacy-preserving recommendation system
F Armknecht, T Strufe
2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop, 65-70, 2011
Improving the usability of privacy settings in facebook
T Paul, D Puscher, T Strufe
arXiv preprint arXiv:1109.6046, 2011
PSP: Private and secure payment with RFID
EO Blass, A Kurmus, R Molva, T Strufe
Computer Communications 36 (4), 468-480, 2013
The system can't perform the operation now. Try again later.
Articles 1–20