Publications
[Extracted from DiVA,
the publication database at KTH.]
- Rzadca, K.; Datta, A.; Kreitz, G.; Buchegger, S. (2015):
- Game-theoretic mechanisms to increase data availability in decentralized storage systems.
- ACM Transactions on Autonomous and Adaptive Systems 10: [Details]
- Bodriagov, O.; Kreitz, G.; Buchegger, S. (2014):
- Access Control in Decentralized Online Social Networks - Applying a Policy-Hiding Cryptographic Scheme and Evaluating Its Performance.
- [Conference paper] 12th IEEE International Conference on Pervasive Computing and Communication (PERCOM), MAR 24-28, 2014, Budapest, HUNGARY; 622-628 [Details]
- Setty, V.; Kreitz, G.; Urdaneta, G.; Vitenberg, R.; Van Steen, M. (2014):
- Maximizing the number of satisfied subscribers in pub/sub systems under capacity constraints.
- [Conference paper] 33rd IEEE Conference on Computer Communications, IEEE INFOCOM 2014, 27 April 2014 through 2 May 2014, Toronto, ON; Proceedings - IEEE INFOCOM 2580-2588 [Details]
- Greschbach, B.; Kreitz, G.; Buchegger, S. (2014):
- User Search with Knowledge Thresholds in Decentralized Online Social Networks.
- [Conference paper] 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, JUN 17-21, 2013, Nijmegen, NETHERLANDS; PRIVACY AND IDENTITY MANAGEMENT FOR EMERGING SERVICES AND TECHNOLOGIES 188-202 [Details]
- Yanggratoke, R.; Kreitz, G.; Goldmann, M.; Stadler, R.; Fodor, V. (2013):
- On the performance of the Spotify backend.
- Journal of Network and Systems Management : [Details]
- Setty, V.; Kreitz, G.; Vitenberg, R.; Van Steen, M.; Urdaneta, G.; Gimåker, S. (2013):
- The hidden pub/sub of spotify (Industry Article).
- [Conference paper] 7th ACM International Conference on Distributed Event-Based Systems, DEBS 2013; Arlington, TX; United States; 29 June 2013 through 3 July 2013; DEBS 2013 - Proceedings of the 7th ACM International Conference on Distributed Event-Based Systems 231-240 [Details]
- Greschbach, B.; Kreitz, G.; Buchegger, S. (2013):
- User Search with Knowledge Threshold in Decentralized Online Social Networks.
- [Conference paper] 8th International IFIP Summer School on Privacy and Identity Management for Emerging Services and Technologies; Proceedings of the 8th International IFIP Summer School on Privacy and Identity Management for Emerging Services and Technologies [Details]
- Zhang, B.; Kreitz, G.; Isaksson, M.; Ubillos, J.; Urdaneta, G.; Pouwelse, J.; Epema, D. (2013):
- Understanding user behavior in Spotify.
- [Conference paper] 32nd IEEE Conference on Computer Communications, IEEE INFOCOM 2013; Turin, Italy, 14-19 April 2013; 2013 Proceedings - IEEE INFOCOM 220-224 [Details]
- Kreitz, G. (2013):
- Flow stealing - A well-timed redirection attack.
- Journal of Computer Security 21: 371-391 [Details]
- Yanggratoke, R.; Kreitz, G.; Goldmann, M.; Stadler, R. (2012):
- Predicting response times for the Spotify backend.
- Report [Details]
- Greschbach, B.; Kreitz, G.; Buchegger, S. (2012):
- The devil is in the metadata - New privacy challenges in decentralised online social networks.
- [Conference paper] 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012; Lugano; 19 March 2012 through 23 March 2012; 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012 333-339 [Details]
- Yanggratoke, R.; Kreitz, G.; Goldmann, M.; Stadler, R. (2012):
- Predicting response times for the Spotify backend.
- [Conference paper] 2012 8th International Conference on Network and Service Management, CNSM 2012; Las Vegas, NV; 22 October 2012 through 26 October 2012; Proceedings of the 2012 8th International Conference on Network and Service Management, CNSM 2012 117-125 [Details]
- Kreitz, G.; Bodriagov, O.; Greschbach, B.; Rodríguez-Cano, G.; Buchegger, S. (2012):
- Passwords in Peer-to-Peer.
- [Conference paper] IEEE 12th International Conference on Peer-to-Peer Computing, P2P 2012; Tarragona;3 September 2012 through 5 September 2012; Peer-to-Peer Computing (P2P), 2012 IEEE 12th International Conference on 167-178 [Details]
- Kreitz, G.; Dam, M.; Wikström, D. (2012):
- Practical Private Information Aggregation in Large Networks.
- [Conference paper] 15th Nordic Conference on Secure IT Systems, NordSec 2010;Espoo;27 October 2010 through 29 October 2010; Information Security Technology For Applications 89-103 [Details]
- Enström, E.; Kreitz, G.; Niemelä, F.; Söderman, P.; Kann, V. (2011):
- Five Years with Kattis – Using an Automated Assessment System in Teaching.
- [Conference paper] 41st ASEE/IEEE Frontiers in Education Conference. Rapid City, South Dakota, USA. October 12 - 15 2011; 2011 Frontiers in Education Conference (FIE) [Details]
- Goldmann, M.; Kreitz, G. (2011):
- Measurements on the Spotify Peer-Assisted Music-on-Demand Streaming System.
- [Conference paper] 11th IEEE International Conference on Peer-to-Peer Computing, P2P'11. Kyoto. 31 August 2011 - 2 September 2011; 11th IEEE International Conference on Peer-to-Peer Computing, P2P'11 206-211 [Details]
- Kreitz, G. (2011):
- A Zero-One Law for Secure Multi-party Computation with Ternary Outputs.
- [Conference paper] 8th Theory of Cryptography Conference, TCC 2011; Providence, RI; 28 March 2011 through 30 March 2011; Theory Of Cryptography 382-399 [Details]
- Kreitz, G. (2011):
- Aspects of Secure and Efficient Streaming and Collaboration.
- Doctoral thesis, comprehensive summary [Details]
- Kreitz, G. (2011):
- Timing is Everything - the Importance of History Detection.
- [Conference paper] 16th European Symposium on Research in Computer Security, ESORICS 2011; Leuven; 12 September 2011 through 14 September 2011; Computer Security – ESORICS 2011 117-132 [Details]
- Jónsson, K.; Kreitz, G.; Uddin, M. (2011):
- Secure Multi-Party Sorting and Applications.
- [Conference paper] ACNS 2011. Applied Cryptography and Network Security. Nerja (Malaga), Spain. June 7-10 2011; [Details]
- Enström, E.; Kreitz, G.; Niemelä, F.; Kann, V. (2010):
- Testdriven utbildning — strukturerad formativ examination.
- [Conference paper] NU2010, Dialog för lärande. Stockholm, Swe. 13 - 15 oktober 2010; [Details]
- Kreitz, G.; Niemelä, F. (2010):
- Spotify – Large Scale, Low Latency, P2P Music-on-Demand Streaming.
- [Conference paper] Peer-to-Peer Computing 1-10 [Details]
- Austrin, P.; Kreitz, G. (2008):
- Lower bounds for Subset Cover based Broadcast Encryption.
- [Conference paper] 1st International Conference on Cryptology in Africa; PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2008 343-356 [Details]
- Ehn, A.; Niemelä, F.; Kreitz, G.; Strigeus, L.; Hult, M. (2007):
- Peer-to-Peer-strömmning av medieinnehåll.
- Patent [Details]
- Johansson, M.; Kreitz, G.; Lindholm, F. (2006):
- Stateful subset cover.
- [Conference paper] 4th International Conference on Applied Cryptography and Network Security Singapore, SINGAPORE, JUN 06-09, 2006; APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS 178-193 [Details]
- Lindholm, F.; Kreitz, G. (2004):
- Key distribution in systems for selective access to information.
- Patent [Details]
- Jimenez, R.; Kreitz, G.; Knutsson, B.; Isaksson, M.; Haridi, S. ():
- Integrating Smartphones in Spotify's Peer-Assisted Music Streaming Service.
- Manuscript (preprint) [Details]