All your contacts are belong to us: automated identity theft attacks on social networks L Bilge, T Strufe, D Balzarotti, E Kirda Proceedings of the 18th international conference on World wide web, 551-560, 2009 | 802 | 2009 |
Safebook: A privacy-preserving online social network leveraging on real-life trust LA Cutillo, R Molva, T Strufe IEEE Communications Magazine 47 (12), 94-101, 2009 | 652 | 2009 |
A recommendation system for spots in location-based online social networks B Berjani, T Strufe Proceedings of the 4th workshop on social network systems, 1-6, 2011 | 219 | 2011 |
Decentralized online social networks A Datta, S Buchegger, LH Vu, T Strufe, K Rzadca Handbook of social network technologies and applications, 349-378, 2010 | 192 | 2010 |
Privacy preserving social networking through decentralization LA Cutillo, R Molva, T Strufe 2009 Sixth International Conference on Wireless On-Demand Network Systems …, 2009 | 179 | 2009 |
Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network LA Cutillo, R Molva, T Strufe 2009 IEEE International Symposium on a World of Wireless, Mobile and …, 2009 | 105 | 2009 |
Privacy risks in named data networking: What is the cost of performance? T Lauinger, N Laoutaris, P Rodriguez, T Strufe, E Biersack, E Kirda ACM SIGCOMM Computer Communication Review 42 (5), 54-57, 2012 | 91 | 2012 |
A survey on decentralized online social networks T Paul, A Famulari, T Strufe Computer Networks 75, 437-452, 2014 | 83 | 2014 |
{PrivApprox}:{Privacy-Preserving} Stream Analytics M Beck, P Bhatotia, R Chen, C Fetzer, T Strufe 2017 USENIX Annual Technical Conference (USENIX ATC 17), 659-672, 2017 | 72* | 2017 |
Streamapprox: Approximate computing for stream analytics DL Quoc, R Chen, P Bhatotia, C Fetzer, V Hilt, T Strufe Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference, 185-197, 2017 | 70* | 2017 |
Content virality on online social networks: Empirical evidence from Twitter, Facebook, and Google+ on German news websites I Heimbach, B Schiller, T Strufe, O Hinz Proceedings of the 26th ACM Conference on Hypertext & Social Media, 39-47, 2015 | 56 | 2015 |
Optimally dos resistant p2p topologies for live multimedia streaming M Brinkmeier, G Schäfer, T Strufe IEEE Transactions on Parallel and Distributed Systems 20 (6), 831-844, 2009 | 56 | 2009 |
Security and privacy in online social networks LA Cutillo, M Manulis, T Strufe Handbook of social network technologies and applications, 497-522, 2010 | 54 | 2010 |
ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized–Decentralized Divide for Stronger Privacy W Beskorovajnov, F Dörre, G Hartung, A Koch, J Müller-Quade, T Strufe Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021 | 48 | 2021 |
Coordination supports security: A new defence mechanism against interest flooding in NDN H Salah, J Wulfheide, T Strufe 2015 IEEE 40th conference on local computer networks (LCN), 73-81, 2015 | 48 | 2015 |
Privacy implications of ubiquitous caching in named data networking architectures T Lauinger, N Laoutaris, P Rodriguez, T Strufe, E Biersack, E Kirda Acm Sigcomm 42 (5), 54-57, 2012 | 47 | 2012 |
Improving the usability of privacy settings in facebook T Paul, D Puscher, T Strufe arXiv preprint arXiv:1109.6046, 2011 | 45 | 2011 |
Churn in social networks M Karnstedt, T Hennessy, J Chan, P Basuchowdhuri, C Hayes, T Strufe Handbook of social network technologies and applications, 185-220, 2010 | 45 | 2010 |
Tactile internet: With human-in-the-Loop FHP Fitzek, SC Li, S Speidel, T Strufe, M Simsek, M Reisslein Academic Press, 2021 | 44 | 2021 |
Anonymous addresses for efficient and resilient routing in f2f overlays S Roos, M Beck, T Strufe IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016 | 44 | 2016 |