Publikationen
[1] S. Escher, B. Weller, S. Köpsell, and T. Strufe, “Towards transparency in the internet of things,” in Privacy technologies and policy - 8th annual privacy forum, APF 2020, lisbon, portugal, october 22-23, 2020, proceedings, 2020, vol. 12121, pp. 186–200.
[2] F. Armknecht, P. Walther, G. Tsudik, M. Beck, and T. Strufe, “ProMACs: Progressive and resynchronizing macs for continuous efficient authentication of message streams,” in CCS ’20: 2020 ACM SIGSAC conference on computer and communications security, virtual event, usa, november 9-13, 2020, 2020, pp. 211–223.
[3] S. Escher, P. Teufert, R. Herrmann, and T. Strufe, “Twizzle - A multi-purpose benchmarking framework for semantic comparisons of multimedia object pairs,” in Computer security - ESORICS 2020 international workshops, detips, desecsys, mps, and spose, guildford, uk, september 17-18, 2020, revised selected papers, 2020, vol. 12580, pp. 223–230.
[4] S. Escher, P. Teufert, L. Hain, and T. Strufe, “You’ve got nothing on me! Privacy friendly face recognition reloaded,” in Computer security - ESORICS 2020 international workshops, detips, desecsys, mps, and spose, guildford, uk, september 17-18, 2020, revised selected papers, 2020, vol. 12580, pp. 231–242.
[5] A. Osman, A. Wasicek, S. Köpsell, and T. Strufe, “Transparent microsegmentation in smart home iot networks,” in 3rd USENIX workshop on hot topics in edge computing, hotedge 2020, june 25-26, 2020, 2020.
[6] M. Byrenheid, T. Strufe, and S. Roos, “Attack resistant leader election in social overlay networks by leveraging local voting,” in ICDCN 2020: 21st international conference on distributed computing and networking, kolkata, india, january 4-7, 2020, 2020, pp. 7:1–7:10.
[7] J. Pflugmacher, S. Escher, J. Reubold, and T. Strufe, “The german-speaking twitter community reference data set,” in 39th IEEE conference on computer communications, INFOCOM workshops 2020, toronto, on, canada, july 6-9, 2020, 2020, pp. 1172–1177.
[8] K. Becher and T. Strufe, “Efficient cloud-based secret shuffling via homomorphic encryption,” in IEEE symposium on computers and communications, ISCC 2020, rennes, france, july 7-10, 2020, 2020, pp. 1–7.
[9] P. Walther and T. Strufe, “Blind twins: Siamese networks for non-interactive information reconciliation,” in 31st IEEE annual international symposium on personal, indoor and mobile radio communications, PIMRC 2020, london, united kingdom, august 31 - september 3, 2020, 2020, pp. 1–7.
[10] P. Walther, R. Knauer, and T. Strufe, “Passive angriffe auf kanalbasierten schlüsselaustausch,” in Sicherheit 2020, sicherheit, schutz und zuverlässigkeit, konferenzband der 10. Jahrestagung des fachbereichs sicherheit der gesellschaft für informatik e.V. (GI), 17.-20. März 2020, göttingen, 2020, vols. P-301, pp. 41–51.
[11] C. Kuhn, M. Beck, and T. Strufe, “Breaking and (partially) fixing provably secure onion routing,” in 2020 IEEE symposium on security and privacy, SP 2020, san francisco, ca, usa, may 18-21, 2020, 2020, pp. 168–185.
[12] C. Deußer, S. Passmann, and T. Strufe, “Browsing unicity: On the limits of anonymizing web tracking data,” in 2020 IEEE symposium on security and privacy, SP 2020, san francisco, ca, usa, may 18-21, 2020, 2020, pp. 777–790.
[13] M. Byrenheid, T. Strufe, and S. Roos, “Secure embedding of rooted spanning trees for scalable routing in topology-restricted networks,” in International symposium on reliable distributed systems, SRDS 2020, shanghai, china, september 21-24, 2020, 2020, pp. 175–184.
[14] C. Kuhn, F. Kitzing, and T. Strufe, “SoK on performance bounds in anonymous communication,” in WPES’20: Proceedings of the 19th workshop on privacy in the electronic society, virtual event, usa, november 9, 2020, 2020, pp. 21–39.
[15] K. Becher and T. Strufe, “Efficient cloud-based secret shuffling via homomorphic encryption,” CoRR, vol. abs/2002.05231, 2020.
[16] C. Kuhn, M. Beck, and T. Strufe, “Covid notions: Towards formal definitions - and documented understanding - of privacy goals and claimed protection in proximity-tracing services,” CoRR, vol. abs/2004.07723, 2020.
[17] C. Kuhn, F. Kitzing, and T. Strufe, “SoK on performance bounds in anonymous communication,” CoRR, vol. abs/2011.08536, 2020.
[18] W. Beskorovajnov, F. Dörre, G. Hartung, A. Koch, J. Müller-Quade, and T. Strufe, “ConTra corona: Contact tracing against the coronavirus by bridging the centralized - decentralized divide for stronger privacy,” IACR Cryptol. ePrint Arch., vol. 2020, p. 505, 2020.
[19] D. L. Quoc, M. Beck, P. Bhatotia, R. Chen, C. Fetzer, and T. Strufe, “PrivApprox: Privacy-preserving stream analytics - (extended abstract),” Inform. Spektrum, vol. 42, no. 5, pp. 358–359, 2019.
[20] G. P. Fettweis et al., “Architecture and advanced electronics pathways toward highly adaptive energy- efficient computing,” Proc. IEEE, vol. 107, no. 1, pp. 204–231, 2019.
[21] C. Kuhn, M. Beck, S. Schiffner, E. A. Jorswieck, and T. Strufe, “On privacy notions in anonymous communication,” Proc. Priv. Enhancing Technol., vol. 2019, no. 2, pp. 105–125, 2019.
[22] A. Osman, S. Hanisch, and T. Strufe, “SeCoNetBench: A modular framework for secure container networking benchmarks,” in 2019 IEEE european symposium on security and privacy workshops, euros&P workshops 2019, stockholm, sweden, june 17-19, 2019, 2019, pp. 21–28.
[23] T. Reiher, A. Senier, J. Castrillón, and T. Strufe, “RecordFlux: Formal message specification and generation of verifiable binary parsers,” in Formal aspects of component software - 16th international conference, FACS 2019, amsterdam, the netherlands, october 23-25, 2019, proceedings, 2019, vol. 12018, pp. 170–190.
[24] A. Osman, P. Bruckner, H. Salah, F. H. P. Fitzek, T. Strufe, and M. Fischer, “Sandnet: Towards high quality of deception in container-based microservice architectures,” in 2019 IEEE international conference on communications, ICC 2019, shanghai, china, may 20-24, 2019, 2019, pp. 1–7.
[25] T. Li, H. Salah, X. Ding, T. Strufe, F. H. P. Fitzek, and S. Santini, “INFAS: in-network flow mAnagement scheme for SDN control plane protection,” in IFIP/IEEE international symposium on integrated network management, IM 2019, washington, dc, usa, april 09-11, 2019, 2019, pp. 367–373.
[26] M. Hassan, H. Salah, M. Conti, F. H. P. Fitzek, and T. Strufe, “CoMon-das: A framework for efficient and robust dynamic adaptive streaming over NDN,” in 2019 IEEE symposium on computers and communications, ISCC 2019, barcelona, spain, june 29 - july 3, 2019, 2019, pp. 1–7.
[27] K. Becher, M. Beck, and T. Strufe, “An enhanced approach to cloud-based privacy-preserving benchmarking,” in 2019 international conference on networked systems, netsys 2019, munich, germany, march 18-21, 2019, 2019, pp. 1–8.
[28] P. Walther, E. Franz, and T. Strufe, “Blind synchronization of channel impulse responses for channel reciprocity-based key generation,” in 44th IEEE conference on local computer networks, LCN 2019, osnabrueck, germany, october 14-17, 2019, 2019, pp. 76–83.
[29] M. Byrenheid, S. Roos, and T. Strufe, “Attack-resistant spanning tree construction in route-restricted overlay networks,” in 38th symposium on reliable distributed systems, SRDS 2019, lyon, france, october 1-4, 2019, 2019, pp. 251–260.
[30] M. Sontowski et al., “Towards secure communication for high-density longitudinal platooning,” in 90th IEEE vehicular technology conference, VTC fall 2019, honolulu, hi, usa, september 22-25, 2019, 2019, pp. 1–7.
[31] T. Lackorzynski, S. Köpsell, and T. Strufe, “A comparative study on virtual private networks for future industrial communication systems,” in 15th IEEE international workshop on factory communication systems, WFCS 2019, sundsvall, sweden, may 27-29, 2019, 2019, pp. 1–8.
[32] P. Lin, C. Kuhn, T. Strufe, and E. A. Jorswieck, “Physical layer privacy in broadcast channels,” in IEEE international workshop on information forensics and security, WIFS 2019, delft, the netherlands, december 9-12, 2019, 2019, pp. 1–6.
[33] D. L. Quoc, M. Beck, P. Bhatotia, R. Chen, C. Fetzer, and T. Strufe, “Privacy-preserving data analytics,” in Encyclopedia of big data technologies, S. Sakr and A. Y. Zomaya, Eds. Springer, 2019.
[34] D. L. Quoc, R. Chen, P. Bhatotia, C. Fetzer, V. Hilt, and T. Strufe, “Approximate computing for stream analytics,” in Encyclopedia of big data technologies, S. Sakr and A. Y. Zomaya, Eds. Springer, 2019.
[35] M. Byrenheid, S. Roos, and T. Strufe, “On the limits of byzantine-tolerant spanning tree construction in route-restricted overlay networks,” CoRR, vol. abs/1901.02729, 2019.
[36] T. Reiher, A. Senier, J. Castrillón, and T. Strufe, “RecordFlux: Formal message specification and generation of verifiable binary parsers,” CoRR, vol. abs/1910.02146, 2019.
[37] C. Kuhn, M. Beck, and T. Strufe, “Breaking and (partially) fixing provably secure onion routing,” CoRR, vol. abs/1910.13772, 2019.
[38] D. L. Quoc et al., “ApproxJoin: Approximate distributed joins,” in Proceedings of the ACM symposium on cloud computing, socc 2018, carlsbad, ca, usa, october 11-13, 2018, 2018, pp. 426–438.
[39] N. Jansen, O. Hinz, and T. Strufe, “"Police - to protect and serve" online: Factors contributing to modern ways of interaction between citizens and law enforcement agencies,” in 26th european conference on information systems: Beyond digitization - facets of socio-technical change, ECIS 2018, portsmouth, uk, june 23-28, 2018, 2018, p. 48.
[40] C. Kuhn, F. Kitzing, and T. Strufe, “An attack on untraceable linear network coding,” in IEEE global communications conference, GLOBECOM 2018, abu dhabi, united arab emirates, december 9-13, 2018, 2018, pp. 1–6.
[41] S. Moriam, E. Franz, P. Walther, A. Kumar, T. Strufe, and G. P. Fettweis, “Protecting communication in many-core systems against active attackers,” in Proceedings of the 2018 on great lakes symposium on vlsi, GLSVLSI 2018, chicago, il, usa, may 23-25, 2018, 2018, pp. 45–50.
[42] T. Richter, S. Escher, D. Schönfeld, and T. Strufe, “Forensic analysis and anonymisation of printed documents,” in Proceedings of the 6th ACM workshop on information hiding and multimedia security, innsbruck, austria, june 20-22, 2018, 2018, pp. 127–138.
[43] P. Walther, S. Köpsell, F. Armknecht, G. Tsudik, and T. Strufe, “Chains and whips - an approach to lighweight macs,” in 28. Krypto-tag, kirchheim bei münchen, germany, june 7-8, 2018, 2018.
[44] P. Walther et al., “Improving quantization for channel reciprocity based key generation,” in 43rd IEEE conference on local computer networks, LCN 2018, chicago, il, usa, october 1-4, 2018, 2018, pp. 545–552.
[45] T. Li, H. Salah, M. He, T. Strufe, and S. Santini, “REMO: resource efficient distributed network monitoring,” in 2018 IEEE/IFIP network operations and management symposium, NOMS 2018, taipei, taiwan, april 23-27, 2018, 2018, pp. 1–9.
[46] T. Li, Y. Sun, M. Sobe, T. Strufe, and S. Santini, “Energy-efficient SDN control and visualization,” in 2018 IEEE/IFIP network operations and management symposium, NOMS 2018, taipei, taiwan, april 23-27, 2018, 2018, pp. 1–2.
[47] E. Lagerspetz et al., “Pervasive communities in the internet of people,” in 2018 IEEE international conference on pervasive computing and communications workshops, percom workshops 2018, athens, greece, march 19-23, 2018, 2018, pp. 40–45.
[48] M. Byrenheid, S. Köpsell, A. Naumenko, and T. Strufe, “Transparent low-latency network anonymisation for mobile devices,” in Security and privacy in communication networks - 14th international conference, securecomm 2018, singapore, august 8-10, 2018, proceedings, part I, 2018, vol. 254, pp. 193–209.
[49] C. Deusser, N. Jansen, J. Reubold, B. Schiller, O. Hinz, and T. Strufe, “Buzz in social media: Detection of short-lived viral phenomena,” in Companion of the the web conference 2018 on the web conference 2018, WWW 2018, lyon , france, april 23-27, 2018, 2018, pp. 1443–1449.
[50] D. L. Quoc et al., “Approximate distributed joins in apache spark,” CoRR, vol. abs/1805.05874, 2018.
[51] K. Becher, M. Beck, and T. Strufe, “An enhanced approach to cloud-based privacy-preserving benchmarking (long version),” CoRR, vol. abs/1810.04971, 2018.
[52] C. Kuhn, M. Beck, S. Schiffner, E. A. Jorswieck, and T. Strufe, “On privacy notion in anonymous communication,” CoRR, vol. abs/1812.05638, 2018.
[53] S. Jager, B. Schiller, P. Babel, M. Blumenroth, T. Strufe, and K. Hamacher, “StreAM-tg: Algorithms for analyzing coarse grained RNA dynamics based on markov models of connectivity-graphs,” Algorithms Mol. Biol., vol. 12, no. 1, pp. 15:1–15:16, 2017.
[54] S. Passmann, A. Lauber-Roensberg, and T. Strufe, “Privacy-preserving audience measurement in practice - opportunities and challenges,” in 2017 IEEE conference on communications and network security, CNS 2017, las vegas, nv, usa, october 9-11, 2017, 2017, pp. 444–449.
[55] T. Paul, N. Lochschmidt, H. Salah, A. Datta, and T. Strufe, “Lilliput: A storage service for lightweight peer-to-peer online social networks,” in 26th international conference on computer communication and networks, ICCCN 2017, vancouver, bc, canada, july 31 - aug. 3, 2017, 2017, pp. 1–10.
[56] S. Escher and T. Strufe, “Robustness analysis of a passive printer identification scheme for halftone images,” in 2017 IEEE international conference on image processing, ICIP 2017, beijing, china, september 17-20, 2017, 2017, pp. 4357–4361.
[57] B. Matthiesen et al., “Secure and energy-efficient interconnects for board-to-board communication,” in 17th IEEE international conference on ubiquitous wireless broadband, ICUWB 2017, salamanca, spain, september 12-15, 2017, 2017, pp. 1–7.
[58] S. Roos, M. Byrenheid, C. Deusser, and T. Strufe, “BD-CAT: balanced dynamic content addressing in trees,” in 2017 IEEE conference on computer communications, INFOCOM 2017, atlanta, ga, usa, may 1-4, 2017, 2017, pp. 1–9.
[59] H. Salah, M. Alfatafta, S. SayedAhmed, and T. Strufe, “CoMon++: Preventing cache pollution in NDN efficiently and effectively,” in 42nd IEEE conference on local computer networks, LCN 2017, singapore, october 9-12, 2017, 2017, pp. 43–51.
[60] D. L. Quoc, R. Chen, P. Bhatotia, C. Fetzer, V. Hilt, and T. Strufe, “StreamApprox: Approximate computing for stream analytics,” in Proceedings of the 18th ACM/IFIP/USENIX middleware conference, las vegas, nv, usa, december 11 - 15, 2017, 2017, pp. 185–197.
[61] J. Reubold, A. Boubekki, T. Strufe, and U. Brefeld, “Infinite mixtures of markov chains,” in New frontiers in mining complex patterns - 6th international workshop, NFMCP 2017, held in conjunction with ECML-PKDD 2017, skopje, macedonia, september 18-22, 2017, revised selected papers, 2017, vol. 10785, pp. 167–181.
[62] D. L. Quoc, M. Beck, P. Bhatotia, R. Chen, C. Fetzer, and T. Strufe, “PrivApprox: Privacy-preserving stream analytics,” in 2017 USENIX annual technical conference, USENIX ATC 2017, santa clara, ca, usa, july 12-14, 2017, 2017, pp. 659–672.
[63] S. Roos, M. Byrenheid, C. Deusser, and T. Strufe, “Balanced dynamic content addressing in trees,” CoRR, vol. abs/1701.03522, 2017.
[64] D. L. Quoc, M. Beck, P. Bhatotia, R. Chen, C. Fetzer, and T. Strufe, “Privacy preserving stream analytics: The marriage of randomized response and approximate computing,” CoRR, vol. abs/1701.05403, 2017.
[65] A. Senier, M. Beck, and T. Strufe, “PrettyCat: Adaptive guarantee-controlled software partitioning of security protocols,” CoRR, vol. abs/1706.04759, 2017.
[66] D. L. Quoc, R. Chen, P. Bhatotia, C. Fetzer, V. Hilt, and T. Strufe, “Approximate stream analytics in apache flink and apache spark streaming,” CoRR, vol. abs/1709.02946, 2017.
[67] J. Blackburn, E. D. Cristofaro, M. Sirivianos, and T. Strufe, “Cybersafety in modern online social networks (dagstuhl reports 17372),” Dagstuhl Reports, vol. 7, no. 9, pp. 47–61, 2017.
[68] B. Schiller, C. Deusser, J. Castrillón, and T. Strufe, “Compile- and run-time approaches for the selection of efficient data structures for dynamic graph analysis,” Appl. Netw. Sci., vol. 1, p. 9, 2016.
[69] X. Fu, A. Passarella, D. Quercia, A. Sala, and T. Strufe, “Online social networks,” Comput. Commun., vol. 73, pp. 163–166, 2016.
[70] S. Roos and T. Strufe, “Dealing with dead ends: Efficient routing in darknets,” ACM Trans. Model. Perform. Evaluation Comput. Syst., vol. 1, no. 1, pp. 4:1–4:30, 2016.
[71] S. Roos, M. Beck, and T. Strufe, “Anonymous addresses for efficient and resilient routing in F2F overlays,” in 35th annual IEEE international conference on computer communications, INFOCOM 2016, san francisco, ca, usa, april 10-14, 2016, 2016, pp. 1–9.
[72] H. Salah and T. Strufe, “Evaluating and mitigating a collusive version of the interest flooding attack in NDN,” in IEEE symposium on computers and communication, ISCC 2016, messina, italy, june 27-30, 2016, 2016, pp. 938–945.
[73] S. Jager, B. Schiller, T. Strufe, and K. Hamacher, “StreAM- t_g : Algorithms for analyzing coarse grained RNA dynamics based on markov models of connectivity-graphs,” in Algorithms in bioinformatics - 16th international workshop, WABI 2016, aarhus, denmark, august 22-24, 2016. Proceedings, 2016, vol. 9838, pp. 197–209.
[74] G. Nguyen, S. Roos, B. Schiller, and T. Strufe, “SWAP: protecting pull-based P2P video streaming systems from inference attacks,” in 17th IEEE international symposium on A world of wireless, mobile and multimedia networks, wowmom 2016, coimbra, portugal, june 21-24, 2016, 2016, pp. 1–9.
[75] S. Roos, M. Beck, and T. Strufe, “VOUTE-virtual overlays using tree embeddings,” CoRR, vol. abs/1601.06119, 2016.
[76] P. Gebelein, T. Paul, T. Strufe, and W. Effelsberg, “Interdisziplinäre forschung zwischen informatikern und soziologen,” PIK Prax. Informationsverarbeitung Kommun., vol. 38, nos. 1-2, pp. 83–87, 2015.
[77] B. Schiller, S. Jager, K. Hamacher, and T. Strufe, “StreaM - A stream-based algorithm for counting motifs in dynamic graphs,” in Algorithms for computational biology - second international conference, alcob 2015, mexico city, mexico, august 4-5, 2015, proceedings, 2015, vol. 9199, pp. 53–67.
[78] H. Salah and T. Strufe, “CoMon: An architecture for coordinated caching and cache-aware routing in CCN,” in 12th annual IEEE consumer communications and networking conference, CCNC 2015, las vegas, nv, usa, january 9-12, 2015, 2015, pp. 663–670.
[79] T. Paul, D. Puscher, S. Wilk, and T. Strufe, “Systematic, large-scale analysis on the feasibility of media prefetching in online social networks,” in 12th annual IEEE consumer communications and networking conference, CCNC 2015, las vegas, nv, usa, january 9-12, 2015, 2015, pp. 755–760.
[80] A. Schulz, B. Schmidt, and T. Strufe, “Small-scale incident detection based on microposts,” in Proceedings of the 26th ACM conference on hypertext & social media, HT 2015, guzelyurt, trnc, cyprus, september 1-4, 2015, 2015, pp. 3–12.
[81] I. Heimbach, B. Schiller, T. Strufe, and O. Hinz, “Content virality on online social networks: Empirical evidence from twitter, facebook, and google+ on german news websites,” in Proceedings of the 26th ACM conference on hypertext & social media, HT 2015, guzelyurt, trnc, cyprus, september 1-4, 2015, 2015, pp. 39–47.
[82] H. Salah, J. Wulfheide, and T. Strufe, “Lightweight coordinated defence against interest flooding attacks in NDN,” in 2015 IEEE conference on computer communications workshops, INFOCOM workshops, hong kong, china, april 26 - may 1, 2015, 2015, pp. 103–104.
[83] S. Roos and T. Strufe, “On the impossibility of efficient self-stabilization in virtual overlays with churn,” in 2015 IEEE conference on computer communications, INFOCOM 2015, kowloon, hong kong, april 26 - may 1, 2015, 2015, pp. 298–306.
[84] S. Roos, G. T. Nguyen, and T. Strufe, “Integrating churn into the formal analysis of routing algorithms,” in 2015 international conference and workshops on networked systems, netsys 2015, cottbus, germany, march 9-12, 2015, 2015, pp. 1–5.
[85] S. Roos, F. Platzer, J. Heller, and T. Strufe, “Inferring obfuscated values in freenet,” in 2015 international conference and workshops on networked systems, netsys 2015, cottbus, germany, march 9-12, 2015, 2015, pp. 1–8.
[86] H. Salah, J. Wulfheide, and T. Strufe, “Coordination supports security: A new defence mechanism against interest flooding in NDN,” in 40th IEEE conference on local computer networks, LCN 2015, clearwater beach, fl, usa, october 26-29, 2015, 2015, pp. 73–81.
[87] B. Schiller, T. Strufe, D. Kohlweyer, and J. Seedorf, “Growing a web of trust,” in 40th IEEE conference on local computer networks, LCN 2015, clearwater beach, fl, usa, october 26-29, 2015, 2015, pp. 100–108.
[88] G. Nguyen, S. Roos, T. Strufe, and M. Fischer, “RBCS: A resilient backbone construction scheme for hybrid peer-to-peer streaming,” in 40th IEEE conference on local computer networks, LCN 2015, clearwater beach, fl, usa, october 26-29, 2015, 2015, pp. 261–269.
[89] B. Schiller, J. Castrillón, and T. Strufe, “Efficient data structures for dynamic graph analysis,” in 11th international conference on signal-image technology & internet-based systems, SITIS 2015, bangkok, thailand, november 23-27, 2015, 2015, pp. 497–504.
[90] T. Paul, D. Puscher, and T. Strufe, “The user behavior in facebook and its development from 2009 until 2014,” CoRR, vol. abs/1505.04943, 2015.
[91] T. Paul, D. Puscher, and T. Strufe, “Private date exposure in facebook and the impact of comprehensible audience selection controls,” CoRR, vol. abs/1505.06178, 2015.
[92] T. Paul, A. Famulari, and T. Strufe, “A survey on decentralized online social networks,” Comput. Networks, vol. 75, pp. 437–452, 2014.
[93] D. Germanus, S. Roos, T. Strufe, and N. Suri, “Mitigating eclipse attacks in peer-to-peer networks,” in IEEE conference on communications and network security, CNS 2014, san francisco, ca, usa, october 29-31, 2014, 2014, pp. 400–408.
[94] T. Paul, M. Hornung, and T. Strufe, “Distributed discovery of user handles with privacy,” in IEEE global communications conference, GLOBECOM 2014, austin, tx, usa, december 8-12, 2014, 2014, pp. 2947–2953.
[95] F. Armknecht, M. Hauptmann, S. Roos, and T. Strufe, “An additional protection layer for confidential osns posts,” in IEEE international conference on communications, ICC 2014, sydney, australia, june 10-14, 2014, 2014, pp. 3746–3752.
[96] H. Salah, B. Schiller, and T. Strufe, “CoMon: A system architecture for improving caching in CCN,” in 2014 proceedings IEEE INFOCOM workshops, toronto, on, canada, april 27 - may 2, 2014, 2014, pp. 213–214.
[97] H. Salah, S. Roos, and T. Strufe, “Characterizing graph-theoretic properties of a large-scale DHT: measurements vs. Simulations,” in IEEE symposium on computers and communications, ISCC 2014, funchal, madeira, portugal, june 23-26, 2014, 2014, pp. 1–7.
[98] S. Roos, L. Wang, T. Strufe, and J. Kangasharju, “Enhancing compact routing in CCN with prefix embedding and topology-aware hashing,” in Proceedings of the 9th ACM workshop on mobility in the evolving internet architecture, mobiarch 2014, maui, hi, usa, september 11, 2014, 2014, pp. 49–54.
[99] H. Salah, S. Roos, and T. Strufe, “Diversity entails improvement: A new neighbour selection scheme for kademlia-type systems,” in 14th IEEE international conference on peer-to-peer computing, P2P 2014, london, united kingdom, september 9-11, 2014, proceedings, 2014, pp. 1–10.
[100] B. Schiller, G. Nguyen, and T. Strufe, “Resilient tree-based live streaming for mobile scenarios,” in 2014 IEEE international conference on pervasive computing and communication workshops, percom 2014 workshops, budapest, hungary, march 24-28, 2014, 2014, pp. 160–162.
[101] S. Roos, B. Schiller, S. Hacker, and T. Strufe, “Measuring freenet in the wild: Censorship-resilience under observation,” in Privacy enhancing technologies - 14th international symposium, PETS 2014, amsterdam, the netherlands, july 16-18, 2014. Proceedings, 2014, vol. 8555, pp. 263–282.
[102] T. Grube, B. Schiller, and T. Strufe, “Monotone sampling of networks,” in Proceedings of the 2nd international workshop on dynamic networks and knowledge discovery, dynak 2014, co-located with the european conference on machine learning and principles and practice of knowledge discovery in databases (ECML PKDD 2014), nancy, france, september 15, 2014, 2014, vol. 1229.
[103] S. Biedermann, N. P. Karvelas, S. Katzenbeisser, T. Strufe, and A. Peter, “ProofBook: An online social network based on proof-of-work and friend-propagation,” in SOFSEM 2014: Theory and practice of computer science - 40th international conference on current trends in theory and practice of computer science, nový smokovec, slovakia, january 26-29, 2014, proceedings, 2014, vol. 8327, pp. 114–125.
[104] P. Welzel, S. Roos, A. Höfer, and T. Strufe, “DarknetSim: A simulation framework for social overlays,” in Proceedings of the 17th communications & networking symposium, part of the 2014 spring simulation multiconference, springsim ’14, tampa, fl, usa, april 13-16, 2014, 2014, p. 2.
[105] G. Nguyen, M. Fischer, and T. Strufe, “On the resilience of pull-based P2P streaming systems against dos attacks,” in Stabilization, safety, and security of distributed systems - 16th international symposium, SSS 2014, paderborn, germany, september 28 - october 1, 2014. Proceedings, 2014, vol. 8756, pp. 33–47.
[106] M. Schmachtenberg, T. Strufe, and H. Paulheim, “Enhancing a location-based recommendation system by enrichment with structured data from the web,” in 4th international conference on web intelligence, mining and semantics (WIMS 14), WIMS ’14, thessaloniki, greece, june 2-4, 2014, 2014, pp. 17:1–17:12.
[107] S. Roos and T. Strufe, “NextBestOnce: Achieving polylog routing despite non-greedy embeddings,” CoRR, vol. abs/1401.2165, 2014.
[108] H. Salah, S. Roos, and T. Strufe, “A lightweight approach for improving the lookup performance in kademlia-type systems,” CoRR, vol. abs/1408.3079, 2014.
[109] E. Blass, A. Kurmus, R. Molva, and T. Strufe, “PSP: private and secure payment with RFID,” Comput. Commun., vol. 36, no. 4, pp. 468–480, 2013.
[110] D. Carra, P. Michiardi, H. Salah, and T. Strufe, “On the impact of incentives in eMule {analysis and measurements of a popular file-sharing application},” IEEE J. Sel. Areas Commun., vol. 31, nos. 9-Supplement, pp. 94–104, 2013.
[111] D. Carra, T. Strufe, G. Dán, and M. Karnstedt, “Topic 7: Peer-to-peer computing - (introduction),” in Euro-par 2013 parallel processing - 19th international conference, aachen, germany, august 26-30, 2013. Proceedings, 2013, vol. 8097, p. 353.
[112] S. Schulz and T. Strufe, “D2 deleting diaspora: Practical attacks for profile discovery and deletion,” in Proceedings of IEEE international conference on communications, ICC 2013, budapest, hungary, june 9-13, 2013, 2013, pp. 2042–2046.
[113] H. Salah and T. Strufe, “Capturing connectivity graphs of a large-scale P2P overlay network,” in 33rd international conference on distributed computing systems workshops (ICDCS 2013 workshops), philadelphia, pa, usa, 8-11 july, 2013, 2013, pp. 172–177.
[114] S. Roos and T. Strufe, “A contribution to analyzing and enhancing darknet routing,” in Proceedings of the IEEE INFOCOM 2013, turin, italy, april 14-19, 2013, 2013, pp. 615–619.
[115] A. Höfer, S. Roos, and T. Strufe, “Greedy embedding, routing and content addressing for darknets,” in 2013 conference on networked systems, netsys 2013, stuttgart, germany, march 11-15, 2013, 2013, pp. 43–50.
[116] D. Hoang et al., “Processing and visualizing traffic pollution data in hanoi city from a wireless sensor network,” in 38th annual IEEE conference on local computer networks, sydney, australia, october 21-24, 2013 - workshop proceedings, 2013, pp. 48–55.
[117] D. Hoang et al., “A smart data forwarding method based on adaptive levels in wireless sensor networks,” in 38th annual IEEE conference on local computer networks, sydney, australia, october 21-24, 2013 - workshop proceedings, 2013, pp. 100–103.
[118] B. Schiller, G. Nguyen, and T. Strufe, “Resilient tree-based live streaming in reality,” in 13th IEEE international conference on peer-to-peer computing, IEEE P2P 2013, trento, italy, september 9-11, 2013, proceedings, 2013, pp. 1–2.
[119] B. Schiller and T. Strufe, “GTNA 2.0 - a framework for rapid prototyping and evaluation of routing algorithms,” in 2013 summer simulation multiconference, summersim ’13, toronto, canada - july 07 - 10, 2013, 2013, p. 23.
[120] G. Nguyen, M. Fischer, and T. Strufe, “OSSim: A generic simulation framework for overlay streaming,” in 2013 summer simulation multiconference, summersim ’13, toronto, canada - july 07 - 10, 2013, 2013, p. 30.
[121] B. Schiller and T. Strufe, “Dynamic network analyzer building a framework for the graph-theoretic analysis of dynamic networks,” in 2013 summer simulation multiconference, summersim ’13, toronto, canada - july 07 - 10, 2013, 2013, p. 49.
[122] K. Panitzek and T. Strufe, “A formal model for peer-to-peer systems,” in Benchmarking peer-to-peer systems - understanding quality of service in large-scale distributed systems, vol. 7847, W. Effelsberg, R. Steinmetz, and T. Strufe, Eds. Springer, 2013, pp. 15–18.
[123] W. Effelsberg and T. Strufe, “Summary and conclusion,” in Benchmarking peer-to-peer systems - understanding quality of service in large-scale distributed systems, vol. 7847, W. Effelsberg, R. Steinmetz, and T. Strufe, Eds. Springer, 2013, pp. 195–197.
[124] W. Effelsberg, R. Steinmetz, and T. Strufe, Eds., Benchmarking peer-to-peer systems - understanding quality of service in large-scale distributed systems, vol. 7847. Springer, 2013.
[125] S. Roos, H. Salah, and T. Strufe, “Comprehending kademlia routing - A theoretical framework for the hop count distribution,” CoRR, vol. abs/1307.7000, 2013.
[126] F. Armknecht, M. Hauptmann, S. Roos, and T. Strufe, “Protecting public OSN posts from unintended access,” CoRR, vol. abs/1309.3647, 2013.
[127] S. Buchegger, J. Crowcroft, B. Krishnamurthy, and T. Strufe, “Decentralized systems for privacy preservation (dagstuhl seminar 13062),” Dagstuhl Reports, vol. 3, no. 2, pp. 22–44, 2013.
[128] T. Lauinger, N. Laoutaris, P. Rodriguez, T. Strufe, E. Biersack, and E. Kirda, “Privacy risks in named data networking: What is the cost of performance?” Comput. Commun. Rev., vol. 42, no. 5, pp. 54–57, 2012.
[129] M. Önen and T. Strufe, “Special section on security and social networking,” Comput. Commun., vol. 35, no. 1, p. 47, 2012.
[130] K. Panitzek, M. Ikram, M. Mühlhäuser, and T. Strufe, “Smooth resilient service provision in large heterogeneous networks,” PIK Prax. Informationsverarbeitung Kommun., vol. 35, no. 3, pp. 167–173, 2012.
[131] P. E. Guerrero et al., “A metropolitan-scale testbed for heterogeneous wireless sensor networks to support CO2 reduction,” in Green communication and networking - second international conference, greenets 2012, gandia, spain, october 25-26, 2012, revised selected papers, 2012, vol. 113, pp. 112–120.
[132] I. Schweizer, M. Wagner, D. Bradler, M. Mühlhäuser, and T. Strufe, “KTC - robust and adaptive wireless ad-hoc topology control,” in 21st international conference on computer communications and networks, ICCCN 2012, munich, germany, july 30 - august 2, 2012, 2012, pp. 1–9.
[133] S. Roos and T. Strufe, “Provable polylog routing for darknets,” in 32nd international conference on distributed computing systems workshops (ICDCS 2012 workshops), macau, china, june 18-21, 2012, 2012, pp. 140–146.
[134] T. Paul, M. Stopczynski, D. Puscher, M. Volkamer, and T. Strufe, “C4PS - helping facebookers manage their privacy settings,” in Social informatics - 4th international conference, socinfo 2012, lausanne, switzerland, december 5-7, 2012. Proceedings, 2012, vol. 7710, pp. 188–201.
[135] T. Paul, M. Stopczynski, D. Puscher, M. Volkamer, and T. Strufe, “C4PS: colors for privacy settings,” in Proceedings of the 21st world wide web conference, WWW 2012, lyon, france, april 16-20, 2012 (companion volume), 2012, pp. 585–586.
[136] S. M. Thampi, A. Y. Zomaya, T. Strufe, J. M. A. Calero, and T. Thomas, Eds., Recent trends in computer networks and distributed systems security - international conference, SNDS 2012, trivandrum, india, october 11-12, 2012. Proceedings, vol. 335. Springer, 2012.
[137] F. Günther, M. Manulis, and T. Strufe, “Cryptographic treatment of private user profiles,” in Financial cryptography and data security - FC 2011 workshops, RLCPS and WECSR 2011, rodney bay, st. Lucia, february 28 - march 4, 2011, revised selected papers, 2011, vol. 7126, pp. 40–54.
[138] I. Schweizer, N. Fleischhacker, M. Mühlhäuser, and T. Strufe, “SDF - solar-aware distributed flow in wireless sensor networks,” in IEEE 36th conference on local computer networks, LCN 2011, bonn, germany, october 4-7, 2011, 2011, pp. 382–390.
[139] F. Armknecht and T. Strufe, “An efficient distributed privacy-preserving recommendation system,” in The 10th IFIP annual mediterranean ad hoc networking workshop, med-hoc-net 2011, favignana island, sicily, italy, 12-15 june, 2011, 2011, pp. 65–70.
[140] B. Berjani and T. Strufe, “A recommendation system for spots in location-based online social networks,” in Proceedings of the 4th workshop on social network systems, salzburg, austria, april 10, 2011, 2011, p. 4.
[141] B. Schiller, S. Roos, A. Höfer, and T. Strufe, “Attack resistant network embeddings for darknets,” in 30th IEEE symposium on reliable distributed systems workshops, SRDS workshops 2011, madrid, spain, october 4-7, 2011, 2011, pp. 90–95.
[142] F. Günther, M. Manulis, and T. Strufe, “Key management in distributed online social networks,” in 12th IEEE international symposium on a world of wireless, mobile and multimedia networks, WOWMOM 2011, lucca, italy, 20-24 june, 2011, 2011, pp. 1–7.
[143] T. Paul, D. Puscher, and T. Strufe, “Improving the usability of privacy settings in facebook,” CoRR, vol. abs/1109.6046, 2011.
[144] F. Günther, M. Manulis, and T. Strufe, “Cryptographic treatment of private user profiles,” IACR Cryptol. ePrint Arch., vol. 2011, p. 64, 2011.
[145] M. Rossberg, G. Schaefer, and T. Strufe, “Distributed automatic configuration of complex ipsec-infrastructures,” J. Netw. Syst. Manag., vol. 18, no. 3, pp. 300–326, 2010.
[146] L. Krumov, I. Schweizer, D. Bradler, and T. Strufe, “Leveraging network motifs for the adaptation of structured peer-to-peer-networks,” in Proceedings of the global communications conference, 2010. GLOBECOM 2010, 6-10 december 2010, miami, florida, USA, 2010, pp. 1–5.
[147] K. Pussep, O. Abboud, F. Gerlach, R. Steinmetz, and T. Strufe, “Adaptive server allocation for peer-assisted video-on-demand,” in 24th IEEE international symposium on parallel and distributed processing, IPDPS 2010, atlanta, georgia, usa, 19-23 april 2010 - workshop proceedings, 2010, pp. 1–8.
[148] D. Schreiber, O. Abboud, S. Kovacevic, A. Höfer, and T. Strufe, “Social IPTV: a survey on chances and user-acceptance,” in LWA 2010 - lernen, wissen & adaptivität, workshop proceedings, kassel, 4.-6. Oktober 2010, 2010, pp. 337–340.
[149] T. Strufe, “Profile popularity in a business-oriented online social network,” in Proceedings of the 3rd workshop on social network systems, paris, france, april 13, 2010, 2010, p. 2.
[150] L. Krumov, A. Andreeva, and T. Strufe, “Resilient peer-to-peer live-streaming using motifs,” in 11th IEEE international symposium on a world of wireless, mobile and multimedia networks, WOWMOM 2010, montreal, qc, canada, 14-17 june, 2010, 2010, pp. 1–8.
[151] M. Karnstedt, T. Hennessy, J. Chan, P. Basuchowdhuri, C. Hayes, and T. Strufe, “Churn in social networks,” in Handbook of social network technologies and applications, B. Furht, Ed. Springer, 2010, pp. 185–220.
[152] A. Datta, S. Buchegger, L. Vu, T. Strufe, and K. Rzadca, “Decentralized online social networks,” in Handbook of social network technologies and applications, B. Furht, Ed. Springer, 2010, pp. 349–378.
[153] L. A. Cutillo, M. Manulis, and T. Strufe, “Security and privacy in online social networks,” in Handbook of social network technologies and applications, B. Furht, Ed. Springer, 2010, pp. 497–522.
[154] T. Strufe, “Profile popularity in a business-oriented online social network,” CoRR, vol. abs/1003.0466, 2010.
[155] L. A. Cutillo, R. Molva, and T. Strufe, “Safebook: A privacy-preserving online social network leveraging on real-life trust,” IEEE Commun. Mag., vol. 47, no. 12, pp. 94–101, 2009.
[156] M. Brinkmeier, M. Fischer, S. Grau, G. Schäfer, and T. Strufe, “Methods for improving resilience in communication networks and P2P overlays,” PIK Prax. Informationsverarbeitung Kommun., vol. 32, no. 1, pp. 64–78, 2009.
[157] M. Brinkmeier, G. Schäfer, and T. Strufe, “Optimally dos resistant P2P topologies for live multimedia streaming,” IEEE Trans. Parallel Distributed Syst., vol. 20, no. 6, pp. 831–844, 2009.
[158] L. A. Cutillo, R. Molva, and T. Strufe, “Leveraging social links for trust and privacy in networks,” in INetSec 2009 - open research problems in network security - IFIP WG 11.4 international workshop, zurich, switzerland, april 23-24, 2009, revised selected papers, 2009, vol. 309, pp. 27–36.
[159] L. A. Cutillo, R. Molva, and T. Strufe, “On the security and feasibility of safebook: A distributed privacy-preserving online social network,” in Privacy and identity management for life - 5th IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/primelife international summer school, nice, france, september 7-11, 2009, revised selected papers, 2009, vol. 320, pp. 86–101.
[160] L. A. Cutillo, R. Molva, and T. Strufe, “Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network,” in 10th IEEE international symposium on a world of wireless, mobile and multimedia networks, WOWMOM 2009, kos island, greece, 15-19 june, 2009, 2009, pp. 1–6.
[161] E. Blass, A. Kurmus, R. Molva, and T. Strufe, “PSP: private and secure payment with RFID,” in Proceedings of the 2009 ACM workshop on privacy in the electronic society, WPES 2009, chicago, illinois, usa, november 9, 2009, 2009, pp. 51–60.
[162] L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda, “All your contacts are belong to us: Automated identity theft attacks on social networks,” in Proceedings of the 18th international conference on world wide web, WWW 2009, madrid, spain, april 20-24, 2009, 2009, pp. 551–560.
[163] E. Blass, A. Kurmus, R. Molva, and T. Strufe, “PSP: private and secure payment with RFID,” IACR Cryptol. ePrint Arch., vol. 2009, p. 181, 2009.
[164] M. Fischer, G. Schaefer, R. K. Schmidt, and T. Strufe, “A key management solution for overlay-live-streaming,” in 4th international ICST conference on security and privacy in communication networks, SECURECOMM 2008, istanbul, turkey, september 22-25, 2008.
[165] T. Strufe, “Ein peer-to-peer-basierter ansatz für die live-Übertragung multimedialer datenströme,” PhD thesis, Technische Universität Ilmenau, Germany, 2007.
[166] T. Strufe, J. Wildhagen, and G. Schäfer, “Towards the construction of attack resistant and efficient overlay streaming topologies,” Electron. Notes Theor. Comput. Sci., vol. 179, pp. 111–121, 2007.
[167] J. Wildhagen, T. Strufe, and G. Schäfer, “Netzwerkeffizienz stabiler overlay-streaming-topologien (network efficiency of stable overlay streaming topologies),” it Inf. Technol., vol. 49, no. 5, pp. 304–311, 2007.
[168] T. Strufe, J. Wildhagen, and G. Schäfer, “Netzwerkeffizienz stabiler overlay-streaming-topologien,” in Kommunikation in verteilten systemen (kivs), 15. Fachtagung kommunikation in verteilten systemen, kivs 2007, bern, schweiz, 26. Februar - 2. März 2007, 2007, pp. 3–14.
[169] M. Rossberg, G. Schaefer, and T. Strufe, “Using recurring costs for reputation management in peer-to-peer streaming systems,” in Third international conference on security and privacy in communication networks and the workshops, securecomm 2007, nice, france, 17-21 september, 2007, 2007, pp. 283–292.
Publications
[1] M. Aguilar-Igartua et al., “INRISCO: incident monitoRing in smart communities,” IEEE Access, vol. 8, pp. 72435–72460, 2020.
[2] D. D. Sánchez, A. M. López, F. A. Mendoza, P. A. Cabarcos, and R. S. Sherratt, “TLS/PKI challenges and certificate pinning techniques for iot and M2M secure communications,” IEEE Commun. Surv. Tutorials, vol. 21, no. 4, pp. 3502–3531, 2019.
[3] P. A. Cabarcos, C. Krupitzer, and C. Becker, “A survey on adaptive authentication,” ACM Comput. Surv., vol. 52, no. 4, pp. 80:1–80:30, 2019.
[4] D. D. Sánchez, A. M. López, F. A. Mendoza, and P. A. Cabarcos, “DNS/DANE collision-based distributed and dynamic authentication for microservices in iot,” Sensors, vol. 19, no. 15, p. 3292, 2019.
[5] S. Seiler-Hwang, P. A. Cabarcos, A. Marı́n, F. Almenáres, D. D. Sánchez, and C. Becker, “"I don’t see why I would ever want to use it": Analyzing the usability of popular smartphone password managers,” in Proceedings of the 2019 ACM SIGSAC conference on computer and communications security, CCS 2019, london, uk, november 11-15, 2019, 2019, pp. 1937–1953.
[6] K. Becker, P. A. Cabarcos, T. Habrich, and C. Becker, “Poster: Towards a framework for assessing vulnerabilities of brainwave authentication systems,” in Proceedings of the 2019 ACM SIGSAC conference on computer and communications security, CCS 2019, london, uk, november 11-15, 2019, 2019, pp. 2577–2579.
[7] M. F. Hinarejos, F. Almenárez, P. A. Cabarcos, J. L. Ferrer-Gomila, and A. M. López, “RiskLaine: A probabilistic approach for assessing risk in certificate-based security,” IEEE Trans. Inf. Forensics Secur., vol. 13, no. 8, pp. 1975–1988, 2018.
[8] P. A. Cabarcos, F. Almenárez, D. D. Sánchez, and A. Marı́n, “FRiCS: A framework for risk-driven cloud selection,” in Proceedings of the 2nd international workshop on multimedia privacy and security, mps@CCS 2018, toronto, on, canada, october 15, 2018, 2018, pp. 18–26.
[9] D. D. Sánchez, A. M. López, F. A. Mendoza, and P. A. Cabarcos, “DNS-based dynamic authentication for microservices in iot,” in 12th international conference on ubiquitous computing and ambient intelligence, ucami 2018, punta cana, dominican republic, december 4-7, 2018, 2018, vol. 2, p. 1233.
[10] F. A. Mendoza, L. Alonso, A. M. López, D. D. Sánchez, and P. A. Cabarcos, “Assessment of fitness tracker security: A case of study,” in 12th international conference on ubiquitous computing and ambient intelligence, ucami 2018, punta cana, dominican republic, december 4-7, 2018, 2018, vol. 2, p. 1235.
[11] E. Rubio-Drosdov, D. D. Sánchez, F. A. Mendoza, P. A. Cabarcos, and A. Marı́n, “Seamless human-device interaction in the internet of things,” IEEE Trans. Consumer Electron., vol. 63, no. 4, pp. 490–498, 2017.
[12] R. Sánchez-Guerrero, F. A. Mendoza, D. D. Sánchez, P. A. Cabarcos, and A. M. López, “Collaborative eHealth meets security: Privacy-enhancing patient profile management,” IEEE J. Biomed. Health Informatics, vol. 21, no. 6, pp. 1741–1749, 2017.
[13] P. A. Cabarcos and C. Krupitzer, “On the design of distributed adaptive authentication systems,” in Thirteenth symposium on usable privacy and security, SOUPS 2017, santa clara, ca, usa, july 12-14, 2017, 2017.
[14] O. A. Khaled, A. Marı́n, F. Almenáres, P. Arias, and D. D. Sánchez, “Analysis of secure TCP/IP profile in 61850 based substation automation system for smart grids,” Int. J. Distributed Sens. Networks, vol. 12, no. 4, pp. 5793183:1–5793183:11, 2016.
[15] P. A. Cabarcos, A. M. López, D. Palacios, F. Almenárez, and D. D. Sánchez, “Comparing password management software: Toward usable and secure enterprise authentication,” IT Prof., vol. 18, no. 5, pp. 34–40, 2016.
[16] D. D. Sánchez, R. S. Sherratt, F. Almenárez, P. Arias, and A. Marı́n, “Secure store and forward proxy for dynamic iot applications over M2M networks,” IEEE Trans. Consumer Electron., vol. 62, no. 4, pp. 389–397, 2016.
[17] D. D. Sánchez, R. Sánchez-Guerrero, P. Arias, F. Almenárez, and A. Marı́n, “A distributed transcoding and content protection system - enabling pay per quality using the cloud,” Telecommun. Syst., vol. 61, no. 1, pp. 59–76, 2016.
[18] D. D. Sánchez, R. S. Sherratt, P. Arias, F. Almenáres, and A. M. López, “Proxy re-encryption schemes for iot and crowd sensing,” in IEEE international conference on consumer electronics, ICCE 2016, las vegas, nv, usa, january 7-11, 2016, 2016, pp. 15–16.
[19] D. D. Sánchez, R. S. Sherratt, F. Almenáres, P. Arias, and A. M. López, “Distributed access control and privacy for the internet of me,” in IEEE international conference on consumer electronics, ICCE 2016, las vegas, nv, usa, january 7-11, 2016, 2016, pp. 17–18.
[20] A. M. López, F. A. Mendoza, P. A. Cabarcos, and D. D. Sánchez, “Wi-fi direct: Lessons learned,” in 2016 mediterranean ad hoc networking workshop, med-hoc-net 2016, vilanova i la geltru, spain, june 20-22, 2016, 2016, pp. 1–8.
[21] P. A. Cabarcos, F. Almenárez, R. Trapero, D. D. Sánchez, and A. M. López, “Blended identity: Pervasive idm for continuous authentication,” IEEE Secur. Priv., vol. 13, no. 3, pp. 32–39, 2015.
[22] D. D. Sánchez, P. A. Cabarcos, F. Almenárez, and A. M. López, “P2P-based data layer for mobile media cloud,” in IEEE international conference on consumer electronics, ICCE 2015, las vegas, nv, usa, january 9-12, 2015, 2015, pp. 160–161.
[23] E. Rubio-Drosdov, D. D. Sánchez, P. A. Cabarcos, F. Almenárez, and A. Marı́n, “Towards a seamless human interaction in iot,” in International symposium on consumer electronics, ISCE 2015, madrid, spain, june 24-26, 2015, 2015, pp. 1–2.
[24] D. D. Sánchez, R. S. Sherratt, P. Arias, F. Almenárez, and A. Marı́n, “Enabling actor model for crowd sensing and iot,” in International symposium on consumer electronics, ISCE 2015, madrid, spain, june 24-26, 2015, 2015, pp. 1–2.
[25] D. D. Sánchez, F. Almenárez, A. Marı́n, R. Sánchez-Guerrero, and P. Arias, “Media gateway: Bringing privacy to private multimedia cloud connections,” Telecommun. Syst., vol. 55, no. 2, pp. 315–330, 2014.
[26] P. A. Cabarcos, F. Almenárez, F. G. Mármol, and A. Marı́n, “To federate or not to federate: A reputation-based mechanism to dynamize cooperation in identity management,” Wirel. Pers. Commun., vol. 75, no. 3, pp. 1769–1786, 2014.
[27] D. D. Sánchez, P. A. Cabarcos, R. Sánchez-Guerrero, F. Almenárez, and A. M. López, “Elastic participatory sensing systems enabling cooperative meta sensors with consumer devices,” in IEEE international conference on consumer electronics, ICCE 2014, las vegas, nv, usa, january 10-13, 2014, 2014, pp. 402–403.
[28] F. Almenáres, P. Arias, A. Marı́n, D. D. Sánchez, and R. Sánchez-Guerrero, “Overhead of using secure wireless communications in mobile computing,” IEEE Trans. Consumer Electron., vol. 59, no. 2, 2013.
[29] D. D. Sánchez, A. M. López, F. Almenáres, R. Sánchez-Guerrero, and P. Arias, “Flexible computing for personal electronic devices,” in IEEE international conference on consumer electronics, ICCE 2013, las vegas, nv, usa, january 11-14, 2013, 2013, pp. 212–213.
[30] F. Almenáres, P. Arias, A. M. López, D. D. Sánchez, and R. Sánchez-Guerrero, “How costly are secure transactions on handheld devices?” in IEEE international conference on consumer electronics, ICCE 2013, las vegas, nv, usa, january 11-14, 2013, 2013, pp. 218–219.
[31] P. A. Cabarcos, F. A. Mendoza, A. M. López, D. D. Sánchez, and R. Sánchez-Guerrero, “A metric-based approach to assess risk for "on cloud" federated identity management,” J. Netw. Syst. Manag., vol. 20, no. 4, pp. 513–533, 2012.
[32] R. Sánchez-Guerrero, F. Almenárez, D. D. Sánchez, A. Marı́n, P. Arias, and F. Sanvido, “An event driven hybrid identity management approach to privacy enhanced e-health,” Sensors, vol. 12, no. 5, pp. 6129–6154, 2012.
[33] R. Sánchez-Guerrero, F. Almenáres, P. Arias, D. D. Sánchez, and A. Marı́n, “Enhancing privacy and dynamic federation in idm for consumer cloud computing,” IEEE Trans. Consumer Electron., vol. 58, no. 1, pp. 95–103, 2012.
[34] P. A. Cabarcos, F. A. Mendoza, R. Sánchez-Guerrero, A. M. López, and D. D. Sánchez, “SuSSo: Seamless and ubiquitous single sign-on for cloud service continuity across devices,” IEEE Trans. Consumer Electron., vol. 58, no. 4, pp. 1425–1433, 2012.
[35] D. D. Sánchez, R. Sánchez-Guerrero, A. M. López, F. Almenáres, and P. Arias, “A H.264 SVC distributed content protection system with flexible key stream generation,” in IEEE second international conference on consumer electronics - berlin, icce-berlin 2012, berlin, germany, september 3-5, 2012, 2012, pp. 66–70.
[36] A. M. López, D. D. Sánchez, F. A. Mendoza, P. A. Cabarcos, R. Sánchez-Guerrero, and F. Sanvido, “Private cloud and media privacy in social networks,” in IEEE second international conference on consumer electronics - berlin, icce-berlin 2012, berlin, germany, september 3-5, 2012, 2012, pp. 277–281.
[37] R. Sánchez-Guerrero, P. A. Cabarcos, F. A. Mendoza, and D. D. Sánchez, “Trust-aware federated idm in consumer cloud computing,” in IEEE international conference on consumer electronics, ICCE 2012, las vegas, nv, usa, january 13-16, 2012, 2012, pp. 53–54.
[38] P. A. Cabarcos, F. Almenáres, R. Sánchez-Guerrero, A. Marı́n, and D. D. Sánchez, “Multi-device single sign-on for cloud service continuity,” in IEEE international conference on consumer electronics, ICCE 2012, las vegas, nv, usa, january 13-16, 2012, 2012, pp. 644–645.
[39] F. Sanvido, D. D. Sánchez, R. Sánchez-Guerrero, F. Almenáres, and P. Arias, “Privacy enhanced cloud services home aggregator,” in IEEE international conference on consumer electronics, ICCE 2012, las vegas, nv, usa, january 13-16, 2012, 2012, pp. 646–647.
[40] D. D. Sánchez, A. M. López, F. Almenárez, R. Sánchez-Guerrero, and P. Arias, “A distributed transcoding system for mobile video delivery,” in 5th joint IFIP wireless and mobile networking conference, WMNC 2012, bratislava, slovakia, september 19-21, 2012, 2012, pp. 10–16.
[41] R. Sánchez-Guerrero, F. Almenárez, D. D. Sánchez, P. Arias, and A. Marı́n, “A model for dimensioning a secure event-driven health care system,” in 5th joint IFIP wireless and mobile networking conference, WMNC 2012, bratislava, slovakia, september 19-21, 2012, 2012, pp. 30–37.
[42] P. A. Cabarcos, R. Sánchez-Guerrero, F. A. Mendoza, D. D. Sánchez, and A. M. López, “FamTV: An architecture for presence-aware personalized television,” IEEE Trans. Consumer Electron., vol. 57, no. 1, pp. 6–13, 2011.
[43] F. Almenárez, P. Arias, D. D. Sánchez, A. Marı́n, and R. Sánchez-Guerrero, “FedTV: Personal networks federation for idm in mobile DTV,” IEEE Trans. Consumer Electron., vol. 57, no. 2, pp. 499–506, 2011.
[44] D. D. Sánchez, F. Almenárez, A. Marı́n, D. Proserpio, and P. A. Cabarcos, “Media cloud: An open cloud computing middleware for content management,” IEEE Trans. Consumer Electron., vol. 57, no. 2, pp. 970–978, 2011.
[45] R. Sánchez-Guerrero, D. D. Sánchez, F. Almenárez, P. Arias, D. Proserpio, and A. Marı́n, “Introducing identity management in wimax to enable secure and personalized services,” in 4th joint IFIP wireless and mobile networking conference, WMNC 2011, toulouse, france, 26-28 october, 2011, 2011, pp. 1–5.
[46] D. D. Sánchez, F. Almenárez, A. Marı́n, P. A. Cabarcos, R. Sánchez-Guerrero, and F. Sanvido, “A privacy aware media gateway for connecting private multimedia clouds to limited devices,” in 4th joint IFIP wireless and mobile networking conference, WMNC 2011, toulouse, france, 26-28 october, 2011, 2011, pp. 1–8.
[47] P. A. Cabarcos, “Risk assessment for better identity management in pervasive environments,” in Ninth annual IEEE international conference on pervasive computing and communications, percom 2011, 21-25 march 2011, seattle, wa, usa, workshop proceedings, 2011, pp. 389–390.
[48] D. Proserpio et al., “Introducing infocards in NGN to enable user-centric identity management,” in Proceedings of the global communications conference, 2010. GLOBECOM 2010, 6-10 december 2010, miami, florida, USA, 2010, pp. 1–5.
[49] F. Almenárez, P. Arias, A. Marı́n, and D. D. Sánchez, “Towards dynamic trust establishment for identity federation,” in Proceedings of the 2009 euro american conference on telematics and information systems: New opportunities to increase digital citizenship, EATIS 2009, prague, czech republic, june 3-5, 2009, 2009, p. 25.
[50] P. A. Cabarcos, F. A. Mendoza, A. M. López, and D. D. Sánchez, “Enabling SAML for dynamic identity federation management,” in Wireless and mobile networking - second IFIP WG 6.8 joint conference, WMNC 2009, gdansk, poland, september 9-11, 2009. Proceedings, 2009, vol. 308, pp. 173–184.
Publications
[1] A. Robles-González, J. Parra-Arnau, and J. Forné, “A linddun-based framework for privacy threat analysis on identification and authentication processes,” Comput. Secur., vol. 94, p. 101755, 2020.
[2] A. Rodrı́guez-Hoyos, J. Estrada-Jiménez, D. Rebollo-Monedero, A. M. Mezher, J. Parra-Arnau, and J. Forné, “The fast maximum distance to average vector (F-MDAV): an algorithm for k-anonymous microaggregation in big data,” Eng. Appl. Artif. Intell., vol. 90, p. 103531, 2020.
[3] J. Parra-Arnau, J. Domingo-Ferrer, and J. Soria-Comas, “Differentially private data publishing via cross-moment microaggregation,” Inf. Fusion, vol. 53, pp. 269–288, 2020.
[4] J. Estrada-Jiménez, J. Parra-Arnau, A. Rodrı́guez-Hoyos, and J. Forné, “On the regulation of personal data distribution in online advertising platforms,” Eng. Appl. Artif. Intell., vol. 82, pp. 13–29, 2019.
[5] C. Gil and J. Parra-Arnau, “An adversarial-risk-analysis approach to counterterrorist online surveillance,” Sensors, vol. 19, no. 3, p. 480, 2019.
[6] J. Parra-Arnau and C. Castelluccia, “On the cost-effectiveness of mass surveillance,” IEEE Access, vol. 6, pp. 46538–46557, 2018.
[7] A. Rodrı́guez-Hoyos, J. Estrada-Jiménez, D. Rebollo-Monedero, J. Parra-Arnau, and J. Forné, “Does k-anonymous microaggregation affect machine-learned macrotrends?” IEEE Access, vol. 6, pp. 28258–28277, 2018.
[8] J. Parra-Arnau, “Optimized, direct sale of privacy in personal data marketplaces,” Inf. Sci., vol. 424, pp. 354–384, 2018.
[9] J. P. Achara, J. Parra-Arnau, and C. Castelluccia, “Fine-grained control over tracking to support the ad-based web economy,” ACM Trans. Internet Techn., vol. 18, no. 4, pp. 51:1–51:25, 2018.
[10] F. Rodrigo-Ginés, J. Parra-Arnau, W. Meng, and Y. Wang, “PrivacySearch: An end-user and query generalization tool for privacy enhancement in web search,” in Network and system security - 12th international conference, NSS 2018, hong kong, china, august 27-29, 2018, proceedings, 2018, vol. 11058, pp. 304–318.
[11] J. Estrada-Jiménez, J. Parra-Arnau, A. Rodrı́guez-Hoyos, and J. Forné, “Online advertising: Analysis of privacy threats and protection approaches,” Comput. Commun., vol. 100, pp. 32–51, 2017.
[12] J. Parra-Arnau, “Pay-per-tracking: A collaborative masking model for web browsing,” Inf. Sci., vol. 385, pp. 96–124, 2017.
[13] J. Parra-Arnau, F. G. Mármol, D. Rebollo-Monedero, and J. Forné, “Shall I post this now? Optimized, delay-based privacy protection in social networks,” Knowl. Inf. Syst., vol. 52, no. 1, pp. 113–145, 2017.
[14] J. Parra-Arnau, J. P. Achara, and C. Castelluccia, “MyAdChoices: Bringing transparency and control to online advertising,” ACM Trans. Web, vol. 11, no. 1, pp. 7:1–7:47, 2017.
[15] J. Parra-Arnau, “Optimized, direct sale of privacy in personal-data marketplaces,” CoRR, vol. abs/1701.00740, 2017.
[16] J. P. Achara, J. Parra-Arnau, and C. Castelluccia, “MyTrackingChoices: Pacifying the ad-block war by enforcing user privacy preferences,” CoRR, vol. abs/1604.04495, 2016.
[17] J. Parra-Arnau, J. P. Achara, and C. Castelluccia, “MyAdChoices: Bringing transparency and control to online advertising,” CoRR, vol. abs/1602.02046, 2016.
[18] S. Puglisi, J. Parra-Arnau, J. Forné, and D. Rebollo-Monedero, “On content-based recommendation and user privacy in social-tagging systems,” CoRR, vol. abs/1605.06538, 2016.
[19] S. Puglisi, J. Parra-Arnau, J. Forné, and D. Rebollo-Monedero, “On content-based recommendation and user privacy in social-tagging systems,” Comput. Stand. Interfaces, vol. 41, pp. 17–27, 2015.
[20] A. Rodriguez-Carrion et al., “Entropy-based privacy against profiling of user mobility,” Entropy, vol. 17, no. 6, pp. 3913–3946, 2015.
[21] J. Parra-Arnau, D. Rebollo-Monedero, and J. Forné, “Privacy-enhancing technologies and metrics in personalized information systems,” in Advanced research in data privacy, vol. 567, G. Navarro-Arribas and V. Torra, Eds. Springer, 2015, pp. 423–442.
[22] D. Rebollo-Monedero, J. Parra-Arnau, J. Forné, and C. Dı́az, “Optimizing the design parameters of threshold pool mixes for anonymity and delay,” Comput. Networks, vol. 67, pp. 180–200, 2014.
[23] J. Parra-Arnau, D. Rebollo-Monedero, and J. Forné, “Optimal forgery and suppression of ratings for privacy enhancement in recommendation systems,” Entropy, vol. 16, no. 3, pp. 1586–1631, 2014.
[24] J. Parra-Arnau, D. Rebollo-Monedero, and J. Forné, “Measuring the privacy of user profiles in personalized information systems,” Future Gener. Comput. Syst., vol. 33, pp. 53–63, 2014.
[25] J. Estrada-Jiménez, A. F. Rodrı́guez, J. Parra-Arnau, and J. Forné, “Evaluation of a query-obfuscation mechanism for the privacy protection of user profiles,” Netw. Protoc. Algorithms, vol. 6, no. 2, pp. 55–92, 2014.
[26] D. Rebollo-Monedero et al., “On collaborative anonymous communications in lossy networks,” Secur. Commun. Networks, vol. 7, no. 12, pp. 2761–2777, 2014.
[27] J. Parra-Arnau, A. Perego, E. Ferrari, J. Forné, and D. Rebollo-Monedero, “Privacy-preserving enhanced collaborative tagging,” IEEE Trans. Knowl. Data Eng., vol. 26, no. 1, pp. 180–193, 2014.
[28] J. Parra-Arnau, F. G. Mármol, D. Rebollo-Monedero, and J. Forné, “Smart deferral of messages for privacy protection in online social networks,” CoRR, vol. abs/1401.5731, 2014.
[29] C. T. Barba et al., “A collaborative protocol for anonymous reporting in vehicular ad hoc networks,” Comput. Stand. Interfaces, vol. 36, no. 1, pp. 188–197, 2013.
[30] D. Rebollo-Monedero, J. Parra-Arnau, C. Dı́az, and J. Forné, “On the measurement of privacy as an attacker’s estimation error,” Int. J. Inf. Sec., vol. 12, no. 2, pp. 129–149, 2013.
[31] D. Rebollo-Monedero, J. Forné, E. Pallarès, and J. Parra-Arnau, “A modification of the lloyd algorithm for k-anonymous quantization,” Inf. Sci., vol. 222, pp. 185–202, 2013.
[32] J. Parra-Arnau, D. Rebollo-Monedero, and J. Forné, “Optimal forgery and suppression of ratings for privacy enhancement in recommendation systems,” CoRR, vol. abs/1302.2501, 2013.
[33] J. Parra-Arnau, D. Rebollo-Monedero, J. Forné, J. L. Muñoz, and O. Esparza, “Optimal tag suppression for privacy protection in the semantic web,” Data Knowl. Eng., vols. 81-82, pp. 46–66, 2012.
[34] J. Parra-Arnau, D. Rebollo-Monedero, and J. Forné, “A privacy-protecting architecture for collaborative filtering via forgery and suppression of ratings,” in Data privacy management and autonomous spontaneus security - 6th international workshop, DPM 2011, and 4th international workshop, SETOP 2011, leuven, belgium, september 15-16, 2011, revised selected papers, 2011, vol. 7122, pp. 42–57.
[35] D. Rebollo-Monedero, J. Parra-Arnau, and J. Forné, “An information-theoretic privacy criterion for query forgery in information retrieval,” in Security technology - international conference, sectech 2011, held as part of the future generation information technology conference, FGIT 2011, in conjunction with GDC 2011, jeju island, korea, december 8-10, 2011. Proceedings, 2011, vol. 259, pp. 146–154.
[36] D. Rebollo-Monedero, J. Parra-Arnau, C. Dı́az, and J. Forné, “On the measurement of privacy as an attacker’s estimation error,” CoRR, vol. abs/1111.3567, 2011.
[37] D. Rebollo-Monedero, J. Parra-Arnau, and J. Forné, “An information-theoretic privacy criterion for query forgery in information retrieval,” CoRR, vol. abs/1111.4045, 2011.
[38] J. Parra-Arnau, D. Rebollo-Monedero, and J. Forné, “A privacy-preserving architecture for the semantic web based on tag suppression,” in Trust, privacy and security in digital business, 7th international conference, trustbus 2010, bilbao, spain, august 30-31, 2010. Proceedings, 2010, vol. 6264, pp. 58–68.
[39] J. L. Muñoz, O. Esparza, C. Gañán, and J. Parra-Arnau, “PKIX certificate status in hybrid manets,” in Information security theory and practice. Smart devices, pervasive systems, and ubiquitous networks, third IFIP WG 11.2 international workshop, WISTP 2009, brussels, belgium, september 1-4, 2009, proceedings, 2009, vol. 5746, pp. 153–166.