default search action
BibTeX records: Jan Seedorf
@article{DBLP:journals/rfc/rfc9241, author = {Jan Seedorf and Yang Richard Yang and Kevin J. Ma and Jon Peterson and Jingxuan Jensen Zhang}, title = {Content Delivery Network Interconnection {(CDNI)} Footprint and Capabilities Advertisement Using Application-Layer Traffic Optimization {(ALTO)}}, journal = {{RFC}}, volume = {9241}, pages = {1--42}, year = {2022}, url = {https://doi.org/10.17487/RFC9241}, doi = {10.17487/RFC9241}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc9241.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/PaulSS21, author = {Sebastian Paul and Felix Schick and Jan Seedorf}, editor = {Delphine Reinhardt and Tilo M{\"{u}}ller}, title = {TPM-Based Post-Quantum Cryptography: {A} Case Study on Quantum-Resistant and Mutually Authenticated {TLS} for IoT Environments}, booktitle = {{ARES} 2021: The 16th International Conference on Availability, Reliability and Security, Vienna, Austria, August 17-20, 2021}, pages = {3:1--3:10}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3465481.3465747}, doi = {10.1145/3465481.3465747}, timestamp = {Tue, 17 Aug 2021 14:54:34 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/PaulSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc8884, author = {Jan Seedorf and Mayutan Arumaithurai and Atsushi Tagami and K. K. Ramakrishnan and Nicola Blefari{-}Melazzi}, title = {Research Directions for Using Information-Centric Networking {(ICN)} in Disaster Scenarios}, journal = {{RFC}}, volume = {8884}, pages = {1--17}, year = {2020}, url = {https://doi.org/10.17487/RFC8884}, doi = {10.17487/RFC8884}, timestamp = {Thu, 10 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc8884.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csm/ZhouLGSMPDCGRMK18, author = {Xutao Zhou and Diego R. L{\'{o}}pez and Vijay K. Gurbani and Jan Seedorf and Alexey Melnikov and Kenny Paterson and Avri Doria and Laurent Ciavaglia and Lisandro Zambenedetti Granville and Vincent Roca and Marie{-}Jos{\'{e}} Montpetit and Ari Ker{\"{a}}nen and Carsten Bormann and Marco Carugi and Gyu Myoung Lee and Okan Geray}, title = {Standards News}, journal = {{IEEE} Commun. Stand. Mag.}, volume = {2}, number = {1}, pages = {12--18}, year = {2018}, url = {https://doi.org/10.1109/MCOMSTD.2018.8334913}, doi = {10.1109/MCOMSTD.2018.8334913}, timestamp = {Tue, 27 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csm/ZhouLGSMPDCGRMK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/SeedorfNWSF18, author = {Jan Seedorf and Saverio Niccolini and Rolf Winter and Martin Stiemerling and Ettore Ferranti}, title = {Assessing the benefit of ALTO-guidance for {P2P} live-streaming user experience in heterogeneous environments (Poster)}, booktitle = {15th {IEEE} Annual Consumer Communications {\&} Networking Conference, {CCNC} 2018, Las Vegas, NV, USA, January 12-15, 2018}, pages = {1--2}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CCNC.2018.8319296}, doi = {10.1109/CCNC.2018.8319296}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/ccnc/SeedorfNWSF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acmicn/YuASZ017, author = {Yingdi Yu and Alexander Afanasyev and Jan Seedorf and Zhiyi Zhang and Lixia Zhang}, editor = {Thomas C. Schmidt and Jan Seedorf}, title = {{NDN} DeLorean: an authentication system for data archives in named data networking}, booktitle = {Proceedings of the 4th {ACM} Conference on Information-Centric Networking, {ICN} 2017, Berlin, Germany, September 26-28, 2017}, pages = {11--21}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3125719.3125724}, doi = {10.1145/3125719.3125724}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acmicn/YuASZ017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kivs/UniyalKSBH17, author = {Navdeep Uniyal and Dirk Kutscher and Jan Seedorf and Jeremias Blendin and David Hausheer}, title = {Adaptive {ICN} multipath forwarding for hybrid access}, booktitle = {2017 International Conference on Networked Systems, NetSys 2017, G{\"{o}}ttingen, Germany, March 13-16, 2017}, pages = {1--8}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/NetSys.2017.7903944}, doi = {10.1109/NETSYS.2017.7903944}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/kivs/UniyalKSBH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acmicn/2017, editor = {Thomas C. Schmidt and Jan Seedorf}, title = {Proceedings of the 4th {ACM} Conference on Information-Centric Networking, {ICN} 2017, Berlin, Germany, September 26-28, 2017}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3125719}, doi = {10.1145/3125719}, isbn = {978-1-4503-5122-5}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acmicn/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/SeedorfKG16, author = {Jan Seedorf and Dirk Kutscher and Bilal Shaukat Gill}, title = {Decentralised Interest Counter Aggregation for {ICN} in Disaster Scenarios}, booktitle = {2016 {IEEE} Globecom Workshops, Washington, DC, USA, December 4-8, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/GLOCOMW.2016.7848869}, doi = {10.1109/GLOCOMW.2016.7848869}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/SeedorfKG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc8008, author = {Jan Seedorf and Jon Peterson and Stefano Previdi and Ray van Brandenburg and Kevin J. Ma}, title = {Content Delivery Network Interconnection {(CDNI)} Request Routing: Footprint and Capabilities Semantics}, journal = {{RFC}}, volume = {8008}, pages = {1--31}, year = {2016}, url = {https://doi.org/10.17487/RFC8008}, doi = {10.17487/RFC8008}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc8008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/SeedorfTAKBKSHA15, author = {Jan Seedorf and Atsushi Tagami and Mayutan Arumaithurai and Yuki Koizumi and Nicola Blefari{-}Melazzi and Dirk Kutscher and Kohei Sugiyama and Toru Hasegawa and Tohru Asami and K. K. Ramakrishnan and Tomohiko Yagyu and Ioannis Psaras}, title = {The Benefit of Information Centric Networking for Enabling Communications in Disaster Scenarios}, booktitle = {2015 {IEEE} Globecom Workshops, San Diego, CA, USA, December 6-10, 2015}, pages = {1--7}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/GLOCOMW.2015.7414086}, doi = {10.1109/GLOCOMW.2015.7414086}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/SeedorfTAKBKSHA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/SchillerSKS15, author = {Benjamin Schiller and Thorsten Strufe and Dirk Kohlweyer and Jan Seedorf}, editor = {Salil S. Kanhere and Jens T{\"{o}}lle and Soumaya Cherkaoui}, title = {Growing a Web of Trust}, booktitle = {40th {IEEE} Conference on Local Computer Networks, {LCN} 2015, Clearwater Beach, FL, USA, October 26-29, 2015}, pages = {100--108}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/LCN.2015.7366288}, doi = {10.1109/LCN.2015.7366288}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/SchillerSKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acmicn/SeedorfGKSK14, author = {Jan Seedorf and Bilal Gill and Dirk Kutscher and Benjamin Schiller and Dirk Kohlweyer}, editor = {Giovanna Carofiglio and Luca Muscariello and Lixia Zhang and Dirk Kutscher}, title = {Demo overview: fully decentralised authentication scheme for {ICN} in disaster scenarios}, booktitle = {1st International Conference on Information-Centric Networking, ICN'14, Paris, France, September 24-26, 2014}, pages = {191--192}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660129.2660130}, doi = {10.1145/2660129.2660130}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acmicn/SeedorfGKSK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/SeedorfKS14, author = {Jan Seedorf and Dirk Kutscher and Fabian Schneider}, title = {Decentralised binding of self-certifying names to real-world identities for assessment of third-party messages in fragmented mobile networks}, booktitle = {2014 Proceedings {IEEE} {INFOCOM} Workshops, Toronto, ON, Canada, April 27 - May 2, 2014}, pages = {416--421}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/INFCOMW.2014.6849268}, doi = {10.1109/INFCOMW.2014.6849268}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/SeedorfKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Seedorf13, author = {Jan Seedorf}, title = {Security for Decentralised Service Location - Exemplified with Real-Time Communication Session Establishment}, school = {University of Passau}, year = {2013}, url = {http://www.opus-bayern.de/uni-passau/volltexte/2013/2714/}, urn = {urn:nbn:de:bvb:739-opus-27147}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Seedorf13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/SchmidtSNGCEJKPG13, author = {Mischa Schmidt and Jan Seedorf and Stefano Napolitano and Rosario Giuseppe Garroppo and Andrea Cavaliere and Thilo Ewald and Armin Jahanpanah and Zbigniew Kopertowski and Marcin Pilarski and Pawel Grochocki}, title = {Experiences with large-scale operational trials of ALTO-enhanced {P2P} filesharing in an intra-ISP scenario}, journal = {Peer-to-Peer Netw. Appl.}, volume = {6}, number = {2}, pages = {134--154}, year = {2013}, url = {https://doi.org/10.1007/s12083-012-0133-y}, doi = {10.1007/S12083-012-0133-Y}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/SchmidtSNGCEJKPG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ArumaithuraiSPPN13, author = {Mayutan Arumaithurai and Jan Seedorf and Giovanni Paragliola and Marcin Pilarski and Saverio Niccolini}, title = {Evaluation of ALTO-enhanced request routing for {CDN} interconnection}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2013, Budapest, Hungary, June 9-13, 2013}, pages = {3519--3524}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICC.2013.6655096}, doi = {10.1109/ICC.2013.6655096}, timestamp = {Fri, 06 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/ArumaithuraiSPPN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/VahlenkampSKS13, author = {Markus Vahlenkamp and Fabian Schneider and Dirk Kutscher and Jan Seedorf}, title = {Enabling {ICN} in {IP} networks using {SDN}}, booktitle = {2013 21st {IEEE} International Conference on Network Protocols, {ICNP} 2013, G{\"{o}}ttingen, Germany, October 7-10, 2013}, pages = {1--2}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ICNP.2013.6733634}, doi = {10.1109/ICNP.2013.6733634}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icnp/VahlenkampSKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nca/ArumaithuraiSDMC13, author = {Mayutan Arumaithurai and Jan Seedorf and Maurizio Dusi and Edo Monticelli and Renato Lo Cigno}, title = {Quality-of-Experience Driven Acceleration of Thin Client Connections}, booktitle = {2013 {IEEE} 12th International Symposium on Network Computing and Applications, Cambridge, MA, USA, August 22-24, 2013}, pages = {203--210}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/NCA.2013.26}, doi = {10.1109/NCA.2013.26}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nca/ArumaithuraiSDMC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdn4fns/VahlenkampSKS13, author = {Markus Vahlenkamp and Fabian Schneider and Dirk Kutscher and Jan Seedorf}, title = {Enabling Information Centric Networking in {IP} Networks Using {SDN}}, booktitle = {{IEEE} {SDN} for Future Networks and Services, {SDN4FNS} 2013, Trento, Italy, November 11-13, 2013}, pages = {1--6}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/SDN4FNS.2013.6702539}, doi = {10.1109/SDN4FNS.2013.6702539}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdn4fns/VahlenkampSKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/GarroppoGSNS12, author = {Rosario Giuseppe Garroppo and Stefano Giordano and Stella Spagna and Saverio Niccolini and Jan Seedorf}, title = {Topology control strategies on {P2P} live video streaming service with peer churning}, journal = {Comput. Commun.}, volume = {35}, number = {6}, pages = {759--770}, year = {2012}, url = {https://doi.org/10.1016/j.comcom.2012.01.002}, doi = {10.1016/J.COMCOM.2012.01.002}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/GarroppoGSNS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/teletraffic/BurgerLHS12, author = {Valentin Burger and Frank Lehrieder and Tobias Ho{\ss}feld and Jan Seedorf}, title = {Who profits from peer-to-peer file-sharing? Traffic optimization potential in BitTorrent swarms}, booktitle = {24th International Teletraffic Congress, {ITC} 2012, Krak{\'{o}}w, Poland, September 4-7, 2012}, pages = {1--8}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6331828/}, timestamp = {Sat, 12 Nov 2022 12:58:29 +0100}, biburl = {https://dblp.org/rec/conf/teletraffic/BurgerLHS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/BohliLS12, author = {Jens{-}Matthias Bohli and Wenting Li and Jan Seedorf}, editor = {Ioannis G. Askoxylakis and Henrich Christopher P{\"{o}}hls and Joachim Posegga}, title = {Assisting Server for Secure Multi-Party Computation}, booktitle = {Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7322}, pages = {144--159}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30955-7\_13}, doi = {10.1007/978-3-642-30955-7\_13}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/wistp/BohliLS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/BirkeLMBSKCMMNST11, author = {Robert Birke and Emilio Leonardi and Marco Mellia and Arpad Bakay and Tivadar Szemethy and Csaba Kir{\'{a}}ly and Renato Lo Cigno and Fabien Mathieu and Luca Muscariello and Saverio Niccolini and Jan Seedorf and Giuseppe Tropea}, title = {Architecture of a network-aware {P2P-TV} application: the {NAPA-WINE} approach}, journal = {{IEEE} Commun. Mag.}, volume = {49}, number = {6}, pages = {154--163}, year = {2011}, url = {https://doi.org/10.1109/MCOM.2011.5784001}, doi = {10.1109/MCOM.2011.5784001}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/BirkeLMBSKCMMNST11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/badgers/TrammellS011, author = {Brian Trammell and Jan Seedorf and Giuseppe Bianchi}, editor = {Engin Kirda and Thorsten Holz}, title = {An architectural solution for data exchange in cooperative network security research}, booktitle = {Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS@EuroSys 2011, Salzburg, Austria, April 10, 2011}, pages = {103--104}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1978672.1978685}, doi = {10.1145/1978672.1978685}, timestamp = {Tue, 06 Nov 2018 16:59:30 +0100}, biburl = {https://dblp.org/rec/conf/badgers/TrammellS011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc6404, author = {Jan Seedorf and Saverio Niccolini and Eric Chen and Hendrik Scholz}, title = {Session PEERing for Multimedia INTerconnect {(SPEERMINT)} Security Threats and Suggested Countermeasures}, journal = {{RFC}}, volume = {6404}, pages = {1--22}, year = {2011}, url = {https://doi.org/10.17487/RFC6404}, doi = {10.17487/RFC6404}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc6404.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/SorgeNS10, author = {Christoph Sorge and Saverio Niccolini and Jan Seedorf}, title = {The Legal Ramifications of Call-Filtering Solutions}, journal = {{IEEE} Secur. Priv.}, volume = {8}, number = {2}, pages = {45--50}, year = {2010}, url = {https://doi.org/10.1109/MSP.2010.54}, doi = {10.1109/MSP.2010.54}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/SorgeNS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/etm/SeedorfNSFW10, author = {Jan Seedorf and Saverio Niccolini and Martin Stiemerling and Ettore Ferranti and Rolf Winter}, editor = {Burkhard Stiller and Tobias Ho{\ss}feld and George D. Stamoulis}, title = {Quantifying Operational Cost-Savings through ALTO-Guidance for {P2P} Live Streaming}, booktitle = {Incentives, Overlays, and Economic Traffic Control, Third International Workshop, {ETM} 2010, Amsterdam, The Netherlands, September 6, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6236}, pages = {14--26}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15485-0\_3}, doi = {10.1007/978-3-642-15485-0\_3}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/etm/SeedorfNSFW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/GarroppoGSNS10, author = {Rosario Giuseppe Garroppo and Stefano Giordano and Stella Spagna and Saverio Niccolini and Jan Seedorf}, editor = {Gabriella Olmo and Christian Timmerer and Pascal Frossard and Keith Mitchell}, title = {Design and evaluation of an optimized overlay topology for a single operator video streaming service}, booktitle = {Proceedings of the 2010 {ACM} workshop on Advanced video streaming techniques for peer-to-peer networks and social networking, AVSTP2P@MM 2010, Firenze, Italy, October 29, 2010}, pages = {49--54}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1877891.1877903}, doi = {10.1145/1877891.1877903}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mm/GarroppoGSNS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/p2p/AbeniBBBLCKMNSST10, author = {Luca Abeni and Arpad Bakay and Marco Biazzini and Robert Birke and Emilio Leonardi and Renato Lo Cigno and Csaba Kir{\'{a}}ly and Marco Mellia and Saverio Niccolini and Jan Seedorf and Tivadar Szemethy and Giuseppe Tropea}, title = {Network Friendly {P2P-TV:} The Napa-Wine Approach}, booktitle = {{IEEE} Tenth International Conference on Peer-to-Peer Computing, {P2P} 2010, Delft, The Netherlands, 25-27 August 2010}, pages = {1--2}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/P2P.2010.5569983}, doi = {10.1109/P2P.2010.5569983}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/p2p/AbeniBBBLCKMNSST10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/SeedorfBH09, author = {Jan Seedorf and Kristian Beckers and Felipe Huici}, title = {Single-message denial-of-service attacks against voice-over-internet protocol terminals}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {2}, number = {1}, pages = {29--34}, year = {2009}, url = {https://doi.org/10.1504/IJESDF.2009.023873}, doi = {10.1504/IJESDF.2009.023873}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/SeedorfBH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/SeedorfdNC09, author = {Jan Seedorf and Nico d'Heureuse and Saverio Niccolini and Marco Cornolti}, title = {Detecting Trustworthy Real-Time Communications Using a Web-of-Trust}, booktitle = {Proceedings of the Global Communications Conference, 2009. {GLOBECOM} 2009, Honolulu, Hawaii, USA, 30 November - 4 December 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/GLOCOM.2009.5425529}, doi = {10.1109/GLOCOM.2009.5425529}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/SeedorfdNC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/SorgeS09, author = {Christoph Sorge and Jan Seedorf}, title = {A Provider-Level Reputation System for Assessing the Quality of {SPIT} Mitigation Algorithms}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2009, Dresden, Germany, 14-18 June 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICC.2009.5198660}, doi = {10.1109/ICC.2009.5198660}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/SorgeS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-4/Seedorf09, author = {Jan Seedorf}, editor = {Jan Camenisch and Dogan Kesdogan}, title = {Security Issues for P2P-Based Voice- and Video-Streaming Applications}, booktitle = {iNetSec 2009 - Open Research Problems in Network Security - {IFIP} {WG} 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {309}, pages = {95--110}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05437-2\_10}, doi = {10.1007/978-3-642-05437-2\_10}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-4/Seedorf09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptcomm/dHeureuseSN09, author = {Nico d'Heureuse and Jan Seedorf and Saverio Niccolini}, editor = {Mustaque Ahamad and Dorgham Sisalem and Eric Chen and Charles Consel}, title = {A policy framework for personalized and role-based {SPIT} prevention}, booktitle = {Principles, Systems and Applications of {IP} Telecommunications. Third International Conference, IPTComm 2009, Atlanta, Georgia, USA, July 7-8, 2009. Proceedings}, pages = {12}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1595637.1595653}, doi = {10.1145/1595637.1595653}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptcomm/dHeureuseSN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/p2p/SeedorfKS09, author = {Jan Seedorf and Sebastian Kiesel and Martin Stiemerling}, editor = {Henning Schulzrinne and Karl Aberer and Anwitaman Datta}, title = {Traffic Localization for P2P-Applications: The {ALTO} Approach}, booktitle = {Proceedings {P2P} 2009, Ninth International Conference on Peer-to-Peer Computing, 9-11 September 2009, Seattle, Washington, {USA}}, pages = {171--177}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/P2P.2009.5284511}, doi = {10.1109/P2P.2009.5284511}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/p2p/SeedorfKS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc5693, author = {Jan Seedorf and Eric William Burger}, title = {Application-Layer Traffic Optimization {(ALTO)} Problem Statement}, journal = {{RFC}}, volume = {5693}, pages = {1--14}, year = {2009}, url = {https://doi.org/10.17487/RFC5693}, doi = {10.17487/RFC5693}, timestamp = {Tue, 24 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc5693.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/SeedorfRSN08, author = {Jan Seedorf and Frank Ruwolt and Martin Stiemerling and Saverio Niccolini}, title = {Evaluating {P2PSIP} under Attack: An Emulative Study}, booktitle = {Proceedings of the Global Communications Conference, 2008. {GLOBECOM} 2008, New Orleans, LA, USA, 30 November - 4 December 2008}, pages = {2190--2195}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/GLOCOM.2008.ECP.422}, doi = {10.1109/GLOCOM.2008.ECP.422}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/SeedorfRSN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/dHeureuseSNE08, author = {Nico d'Heureuse and Jan Seedorf and Saverio Niccolini and Thilo Ewald}, title = {Protecting SIP-Based Networks and Services from Unwanted Communications}, booktitle = {Proceedings of the Global Communications Conference, 2008. {GLOBECOM} 2008, New Orleans, LA, USA, 30 November - 4 December 2008}, pages = {5662--5666}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/GLOCOM.2008.ECP.1084}, doi = {10.1109/GLOCOM.2008.ECP.1084}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/dHeureuseSNE08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptcomm/Seedorf08, author = {Jan Seedorf}, editor = {Henning Schulzrinne and Radu State and Saverio Niccolini}, title = {Lawful Interception in P2P-Based VoIP Systems}, booktitle = {Principles, Systems and Applications of {IP} Telecommunications. Services and Security for Next Generation Networks, Second International Conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5310}, pages = {217--235}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89054-6\_11}, doi = {10.1007/978-3-540-89054-6\_11}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iptcomm/Seedorf08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/SeedorfdNE08, author = {Jan Seedorf and Nico d'Heureuse and Saverio Niccolini and Thilo Ewald}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {VoIP {SEAL:} {A} Research Prototype for Protecting Voice-over-IP Networks and Users}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {557--561}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21509}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/SeedorfdNE08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/SeedorfM08, author = {Jan Seedorf and Christian Muus}, editor = {Jose Antonio Onieva and Damien Sauveron and Serge Chaumette and Dieter Gollmann and Constantinos Markantonakis}, title = {Availability for DHT-Based Overlay Networks with Unidirectional Routing}, booktitle = {Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, Second {IFIP} {WG} 11.2 International Workshop, {WISTP} 2008, Seville, Spain, May 13-16, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5019}, pages = {78--91}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79966-5\_6}, doi = {10.1007/978-3-540-79966-5\_6}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/wistp/SeedorfM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/Seedorf06, author = {Jan Seedorf}, title = {Security challenges for peer-to-peer {SIP}}, journal = {{IEEE} Netw.}, volume = {20}, number = {5}, pages = {38--45}, year = {2006}, url = {https://doi.org/10.1109/MNET.2006.1705882}, doi = {10.1109/MNET.2006.1705882}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/Seedorf06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/FangmeierMMS04, author = {Heiko Fangmeier and Michel Messerschmidt and Fabian M{\"{u}}ller and Jan Seedorf}, editor = {Ulrich Flegel and Michael Meier}, title = {Risiken der Nichterkennung von Malware in komprimierter Form}, booktitle = {Detection of Intrusions and Malware {\&} Vulnerability Assessment, {GI} {SIG} {SIDAR} Workshop, {DIMVA} 2004, Dortmund, Germany, July 6.7, 2004, Proceedings}, series = {{LNI}}, volume = {{P-46}}, pages = {201--211}, publisher = {{GI}}, year = {2004}, url = {https://dl.gi.de/handle/20.500.12116/29202}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/FangmeierMMS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.