default search action
Jan Seedorf
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [i5]Jan Seedorf, Yang Richard Yang, Kevin J. Ma, Jon Peterson, Jingxuan Jensen Zhang:
Content Delivery Network Interconnection (CDNI) Footprint and Capabilities Advertisement Using Application-Layer Traffic Optimization (ALTO). RFC 9241: 1-42 (2022) - 2021
- [c30]Sebastian Paul, Felix Schick, Jan Seedorf:
TPM-Based Post-Quantum Cryptography: A Case Study on Quantum-Resistant and Mutually Authenticated TLS for IoT Environments. ARES 2021: 3:1-3:10 - 2020
- [i4]Jan Seedorf, Mayutan Arumaithurai, Atsushi Tagami, K. K. Ramakrishnan, Nicola Blefari-Melazzi:
Research Directions for Using Information-Centric Networking (ICN) in Disaster Scenarios. RFC 8884: 1-17 (2020)
2010 – 2019
- 2018
- [j7]Xutao Zhou, Diego R. López, Vijay K. Gurbani, Jan Seedorf, Alexey Melnikov, Kenny Paterson, Avri Doria, Laurent Ciavaglia, Lisandro Zambenedetti Granville, Vincent Roca, Marie-José Montpetit, Ari Keränen, Carsten Bormann, Marco Carugi, Gyu Myoung Lee, Okan Geray:
Standards News. IEEE Commun. Stand. Mag. 2(1): 12-18 (2018) - [c29]Jan Seedorf, Saverio Niccolini, Rolf Winter, Martin Stiemerling, Ettore Ferranti:
Assessing the benefit of ALTO-guidance for P2P live-streaming user experience in heterogeneous environments (Poster). CCNC 2018: 1-2 - 2017
- [c28]Yingdi Yu, Alexander Afanasyev, Jan Seedorf, Zhiyi Zhang, Lixia Zhang:
NDN DeLorean: an authentication system for data archives in named data networking. ICN 2017: 11-21 - [c27]Navdeep Uniyal, Dirk Kutscher, Jan Seedorf, Jeremias Blendin, David Hausheer:
Adaptive ICN multipath forwarding for hybrid access. NetSys 2017: 1-8 - [e1]Thomas C. Schmidt, Jan Seedorf:
Proceedings of the 4th ACM Conference on Information-Centric Networking, ICN 2017, Berlin, Germany, September 26-28, 2017. ACM 2017, ISBN 978-1-4503-5122-5 [contents] - 2016
- [c26]Jan Seedorf, Dirk Kutscher, Bilal Shaukat Gill:
Decentralised Interest Counter Aggregation for ICN in Disaster Scenarios. GLOBECOM Workshops 2016: 1-6 - [i3]Jan Seedorf, Jon Peterson, Stefano Previdi, Ray van Brandenburg, Kevin J. Ma:
Content Delivery Network Interconnection (CDNI) Request Routing: Footprint and Capabilities Semantics. RFC 8008: 1-31 (2016) - 2015
- [c25]Jan Seedorf, Atsushi Tagami, Mayutan Arumaithurai, Yuki Koizumi, Nicola Blefari-Melazzi, Dirk Kutscher, Kohei Sugiyama, Toru Hasegawa, Tohru Asami, K. K. Ramakrishnan, Tomohiko Yagyu, Ioannis Psaras:
The Benefit of Information Centric Networking for Enabling Communications in Disaster Scenarios. GLOBECOM Workshops 2015: 1-7 - [c24]Benjamin Schiller, Thorsten Strufe, Dirk Kohlweyer, Jan Seedorf:
Growing a Web of Trust. LCN 2015: 100-108 - 2014
- [c23]Jan Seedorf, Bilal Gill, Dirk Kutscher, Benjamin Schiller, Dirk Kohlweyer:
Demo overview: fully decentralised authentication scheme for ICN in disaster scenarios. ICN 2014: 191-192 - [c22]Jan Seedorf, Dirk Kutscher, Fabian Schneider:
Decentralised binding of self-certifying names to real-world identities for assessment of third-party messages in fragmented mobile networks. INFOCOM Workshops 2014: 416-421 - 2013
- [b1]Jan Seedorf:
Security for Decentralised Service Location - Exemplified with Real-Time Communication Session Establishment. University of Passau, 2013 - [j6]Mischa Schmidt, Jan Seedorf, Stefano Napolitano, Rosario Giuseppe Garroppo, Andrea Cavaliere, Thilo Ewald, Armin Jahanpanah, Zbigniew Kopertowski, Marcin Pilarski, Pawel Grochocki:
Experiences with large-scale operational trials of ALTO-enhanced P2P filesharing in an intra-ISP scenario. Peer-to-Peer Netw. Appl. 6(2): 134-154 (2013) - [c21]Mayutan Arumaithurai, Jan Seedorf, Giovanni Paragliola, Marcin Pilarski, Saverio Niccolini:
Evaluation of ALTO-enhanced request routing for CDN interconnection. ICC 2013: 3519-3524 - [c20]Markus Vahlenkamp, Fabian Schneider, Dirk Kutscher, Jan Seedorf:
Enabling ICN in IP networks using SDN. ICNP 2013: 1-2 - [c19]Mayutan Arumaithurai, Jan Seedorf, Maurizio Dusi, Edo Monticelli, Renato Lo Cigno:
Quality-of-Experience Driven Acceleration of Thin Client Connections. NCA 2013: 203-210 - [c18]Markus Vahlenkamp, Fabian Schneider, Dirk Kutscher, Jan Seedorf:
Enabling Information Centric Networking in IP Networks Using SDN. SDN4FNS 2013: 1-6 - 2012
- [j5]Rosario Giuseppe Garroppo, Stefano Giordano, Stella Spagna, Saverio Niccolini, Jan Seedorf:
Topology control strategies on P2P live video streaming service with peer churning. Comput. Commun. 35(6): 759-770 (2012) - [c17]Valentin Burger, Frank Lehrieder, Tobias Hoßfeld, Jan Seedorf:
Who profits from peer-to-peer file-sharing? Traffic optimization potential in BitTorrent swarms. ITC 2012: 1-8 - [c16]Jens-Matthias Bohli, Wenting Li, Jan Seedorf:
Assisting Server for Secure Multi-Party Computation. WISTP 2012: 144-159 - 2011
- [j4]Robert Birke, Emilio Leonardi, Marco Mellia, Arpad Bakay, Tivadar Szemethy, Csaba Király, Renato Lo Cigno, Fabien Mathieu, Luca Muscariello, Saverio Niccolini, Jan Seedorf, Giuseppe Tropea:
Architecture of a network-aware P2P-TV application: the NAPA-WINE approach. IEEE Commun. Mag. 49(6): 154-163 (2011) - [c15]Brian Trammell, Jan Seedorf, Giuseppe Bianchi:
An architectural solution for data exchange in cooperative network security research. BADGERS@EuroSys 2011: 103-104 - [i2]Jan Seedorf, Saverio Niccolini, Eric Chen, Hendrik Scholz:
Session PEERing for Multimedia INTerconnect (SPEERMINT) Security Threats and Suggested Countermeasures. RFC 6404: 1-22 (2011) - 2010
- [j3]Christoph Sorge, Saverio Niccolini, Jan Seedorf:
The Legal Ramifications of Call-Filtering Solutions. IEEE Secur. Priv. 8(2): 45-50 (2010) - [c14]Jan Seedorf, Saverio Niccolini, Martin Stiemerling, Ettore Ferranti, Rolf Winter:
Quantifying Operational Cost-Savings through ALTO-Guidance for P2P Live Streaming. ETM 2010: 14-26 - [c13]Rosario Giuseppe Garroppo, Stefano Giordano, Stella Spagna, Saverio Niccolini, Jan Seedorf:
Design and evaluation of an optimized overlay topology for a single operator video streaming service. AVSTP2P@MM 2010: 49-54 - [c12]Luca Abeni, Arpad Bakay, Marco Biazzini, Robert Birke, Emilio Leonardi, Renato Lo Cigno, Csaba Király, Marco Mellia, Saverio Niccolini, Jan Seedorf, Tivadar Szemethy, Giuseppe Tropea:
Network Friendly P2P-TV: The Napa-Wine Approach. Peer-to-Peer Computing 2010: 1-2
2000 – 2009
- 2009
- [j2]Jan Seedorf, Kristian Beckers, Felipe Huici:
Single-message denial-of-service attacks against voice-over-internet protocol terminals. Int. J. Electron. Secur. Digit. Forensics 2(1): 29-34 (2009) - [c11]Jan Seedorf, Nico d'Heureuse, Saverio Niccolini, Marco Cornolti:
Detecting Trustworthy Real-Time Communications Using a Web-of-Trust. GLOBECOM 2009: 1-8 - [c10]Christoph Sorge, Jan Seedorf:
A Provider-Level Reputation System for Assessing the Quality of SPIT Mitigation Algorithms. ICC 2009: 1-6 - [c9]Jan Seedorf:
Security Issues for P2P-Based Voice- and Video-Streaming Applications. iNetSeC 2009: 95-110 - [c8]Nico d'Heureuse, Jan Seedorf, Saverio Niccolini:
A policy framework for personalized and role-based SPIT prevention. IPTComm 2009: 12 - [c7]Jan Seedorf, Sebastian Kiesel, Martin Stiemerling:
Traffic Localization for P2P-Applications: The ALTO Approach. Peer-to-Peer Computing 2009: 171-177 - [i1]Jan Seedorf, Eric William Burger:
Application-Layer Traffic Optimization (ALTO) Problem Statement. RFC 5693: 1-14 (2009) - 2008
- [c6]Jan Seedorf, Frank Ruwolt, Martin Stiemerling, Saverio Niccolini:
Evaluating P2PSIP under Attack: An Emulative Study. GLOBECOM 2008: 2190-2195 - [c5]Nico d'Heureuse, Jan Seedorf, Saverio Niccolini, Thilo Ewald:
Protecting SIP-Based Networks and Services from Unwanted Communications. GLOBECOM 2008: 5662-5666 - [c4]Jan Seedorf:
Lawful Interception in P2P-Based VoIP Systems. IPTComm 2008: 217-235 - [c3]Jan Seedorf, Nico d'Heureuse, Saverio Niccolini, Thilo Ewald:
VoIP SEAL: A Research Prototype for Protecting Voice-over-IP Networks and Users. Sicherheit 2008: 557-561 - [c2]Jan Seedorf, Christian Muus:
Availability for DHT-Based Overlay Networks with Unidirectional Routing. WISTP 2008: 78-91 - 2006
- [j1]Jan Seedorf:
Security challenges for peer-to-peer SIP. IEEE Netw. 20(5): 38-45 (2006) - 2004
- [c1]Heiko Fangmeier, Michel Messerschmidt, Fabian Müller, Jan Seedorf:
Risiken der Nichterkennung von Malware in komprimierter Form. DIMVA 2004: 201-211
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint