Publications

[Extracted from DiVA, the publication database at KTH.]

Rzadca, K.; Datta, A.; Kreitz, G.; Buchegger, S. (2015):
Game-theoretic mechanisms to increase data availability in decentralized storage systems.
ACM Transactions on Autonomous and Adaptive Systems 10: [Details]
Bodriagov, O.; Kreitz, G.; Buchegger, S. (2014):
Access Control in Decentralized Online Social Networks - Applying a Policy-Hiding Cryptographic Scheme and Evaluating Its Performance.
[Conference paper] 12th IEEE International Conference on Pervasive Computing and Communication (PERCOM), MAR 24-28, 2014, Budapest, HUNGARY; 622-628 [Details]
Setty, V.; Kreitz, G.; Urdaneta, G.; Vitenberg, R.; Van Steen, M. (2014):
Maximizing the number of satisfied subscribers in pub/sub systems under capacity constraints.
[Conference paper] 33rd IEEE Conference on Computer Communications, IEEE INFOCOM 2014, 27 April 2014 through 2 May 2014, Toronto, ON; Proceedings - IEEE INFOCOM 2580-2588 [Details]
Greschbach, B.; Kreitz, G.; Buchegger, S. (2014):
User Search with Knowledge Thresholds in Decentralized Online Social Networks.
[Conference paper] 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, JUN 17-21, 2013, Nijmegen, NETHERLANDS; PRIVACY AND IDENTITY MANAGEMENT FOR EMERGING SERVICES AND TECHNOLOGIES 188-202 [Details]
Yanggratoke, R.; Kreitz, G.; Goldmann, M.; Stadler, R.; Fodor, V. (2013):
On the performance of the Spotify backend.
Journal of Network and Systems Management : [Details]
Setty, V.; Kreitz, G.; Vitenberg, R.; Van Steen, M.; Urdaneta, G.; Gimåker, S. (2013):
The hidden pub/sub of spotify (Industry Article).
[Conference paper] 7th ACM International Conference on Distributed Event-Based Systems, DEBS 2013; Arlington, TX; United States; 29 June 2013 through 3 July 2013; DEBS 2013 - Proceedings of the 7th ACM International Conference on Distributed Event-Based Systems 231-240 [Details]
Greschbach, B.; Kreitz, G.; Buchegger, S. (2013):
User Search with Knowledge Threshold in Decentralized Online Social Networks.
[Conference paper] 8th International IFIP Summer School on Privacy and Identity Management for Emerging Services and Technologies; Proceedings of the 8th International IFIP Summer School on Privacy and Identity Management for Emerging Services and Technologies [Details]
Zhang, B.; Kreitz, G.; Isaksson, M.; Ubillos, J.; Urdaneta, G.; Pouwelse, J.; Epema, D. (2013):
Understanding user behavior in Spotify.
[Conference paper] 32nd IEEE Conference on Computer Communications, IEEE INFOCOM 2013; Turin, Italy, 14-19 April 2013; 2013 Proceedings - IEEE INFOCOM 220-224 [Details]
Kreitz, G. (2013):
Flow stealing - A well-timed redirection attack.
Journal of Computer Security 21: 371-391 [Details]
Yanggratoke, R.; Kreitz, G.; Goldmann, M.; Stadler, R. (2012):
Predicting response times for the Spotify backend.
Report [Details]
Greschbach, B.; Kreitz, G.; Buchegger, S. (2012):
The devil is in the metadata - New privacy challenges in decentralised online social networks.
[Conference paper] 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012; Lugano; 19 March 2012 through 23 March 2012; 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012 333-339 [Details]
Yanggratoke, R.; Kreitz, G.; Goldmann, M.; Stadler, R. (2012):
Predicting response times for the Spotify backend.
[Conference paper] 2012 8th International Conference on Network and Service Management, CNSM 2012; Las Vegas, NV; 22 October 2012 through 26 October 2012; Proceedings of the 2012 8th International Conference on Network and Service Management, CNSM 2012 117-125 [Details]
Kreitz, G.; Bodriagov, O.; Greschbach, B.; Rodríguez-Cano, G.; Buchegger, S. (2012):
Passwords in Peer-to-Peer.
[Conference paper] IEEE 12th International Conference on Peer-to-Peer Computing, P2P 2012; Tarragona;3 September 2012 through 5 September 2012; Peer-to-Peer Computing (P2P), 2012 IEEE 12th International Conference on 167-178 [Details]
Kreitz, G.; Dam, M.; Wikström, D. (2012):
Practical Private Information Aggregation in Large Networks.
[Conference paper] 15th Nordic Conference on Secure IT Systems, NordSec 2010;Espoo;27 October 2010 through 29 October 2010; Information Security Technology For Applications 89-103 [Details]
Enström, E.; Kreitz, G.; Niemelä, F.; Söderman, P.; Kann, V. (2011):
Five Years with Kattis – Using an Automated Assessment System in Teaching.
[Conference paper] 41st ASEE/IEEE Frontiers in Education Conference. Rapid City, South Dakota, USA. October 12 - 15 2011; 2011 Frontiers in Education Conference (FIE) [Details]
Goldmann, M.; Kreitz, G. (2011):
Measurements on the Spotify Peer-Assisted Music-on-Demand Streaming System.
[Conference paper] 11th IEEE International Conference on Peer-to-Peer Computing, P2P'11. Kyoto. 31 August 2011 - 2 September 2011; 11th IEEE International Conference on Peer-to-Peer Computing, P2P'11 206-211 [Details]
Kreitz, G. (2011):
A Zero-One Law for Secure Multi-party Computation with Ternary Outputs.
[Conference paper] 8th Theory of Cryptography Conference, TCC 2011; Providence, RI; 28 March 2011 through 30 March 2011; Theory Of Cryptography 382-399 [Details]
Kreitz, G. (2011):
Aspects of Secure and Efficient Streaming and Collaboration.
Doctoral thesis, comprehensive summary [Details]
Kreitz, G. (2011):
Timing is Everything - the Importance of History Detection.
[Conference paper] 16th European Symposium on Research in Computer Security, ESORICS 2011; Leuven; 12 September 2011 through 14 September 2011; Computer Security – ESORICS 2011 117-132 [Details]
Jónsson, K.; Kreitz, G.; Uddin, M. (2011):
Secure Multi-Party Sorting and Applications.
[Conference paper] ACNS 2011. Applied Cryptography and Network Security. Nerja (Malaga), Spain. June 7-10 2011; [Details]
Enström, E.; Kreitz, G.; Niemelä, F.; Kann, V. (2010):
Testdriven utbildning — strukturerad formativ examination.
[Conference paper] NU2010, Dialog för lärande. Stockholm, Swe. 13 - 15 oktober 2010; [Details]
Kreitz, G.; Niemelä, F. (2010):
Spotify – Large Scale, Low Latency, P2P Music-on-Demand Streaming.
[Conference paper] Peer-to-Peer Computing 1-10 [Details]
Austrin, P.; Kreitz, G. (2008):
Lower bounds for Subset Cover based Broadcast Encryption.
[Conference paper] 1st International Conference on Cryptology in Africa; PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2008   343-356 [Details]
Ehn, A.; Niemelä, F.; Kreitz, G.; Strigeus, L.; Hult, M. (2007):
Peer-to-Peer-strömmning av medieinnehåll.
Patent [Details]
Johansson, M.; Kreitz, G.; Lindholm, F. (2006):
Stateful subset cover.
[Conference paper] 4th International Conference on Applied Cryptography and Network Security Singapore, SINGAPORE, JUN 06-09, 2006; APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS 178-193 [Details]
Lindholm, F.; Kreitz, G. (2004):
Key distribution in systems for selective access to information.
Patent [Details]
Jimenez, R.; Kreitz, G.; Knutsson, B.; Isaksson, M.; Haridi, S. ():
Integrating Smartphones in Spotify's Peer-Assisted Music Streaming Service.
Manuscript (preprint) [Details]