Bösch, Christoph
331  Ergebnisse:
Personensuche X
?
1

Defining Privacy:

, In: Studies in Neuroscience, Psychology and Behavioral Economics; Digital Phenotyping and Mobile Sensing,
Kargl, Frank ; Erb, Benjamin ; Bösch, Christoph - p. 461-463 , 2022
 
?
2

Mitigation lost in translation : leveraging threat infor..:

, In: Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing,
Al-Momani, Ala'a ; Bösch, Christoph ; Wuyts, Kim... - p. 1236-1247 , 2022
 
?
3

Privacy in Mobile Sensing:

, In: Studies in Neuroscience, Psychology and Behavioral Economics; Digital Phenotyping and Mobile Sensing,
 
?
5

A Comparative Security Analysis of the German Federal Posta..:

, In: DG.O2021: The 22nd Annual International Conference on Digital Government Research,
 
?
6

Land of the lost: privacy patterns' forgotten properties ..:

, In: Proceedings of the 36th Annual ACM Symposium on Applied Computing,
Al-Momani, Ala'a ; Wuyts, Kim ; Sion, Laurens... - p. 1217-1225 , 2021
 
?
8

SwapCT: Swap Confidential Transactions for Privacy-Preservi..:

Engelmann, Felix ; Müller, Lukas ; Peter, Andreas..
Proceedings on Privacy Enhancing Technologies.  2021 (2021)  4 - p. 270-290 , 2021
 
?
9

Confidential Token-Based License Management:

, In: Proceedings of the 2021 Workshop on Additive Manufacturing (3D Printing) Security,
 
?
10

Ride and Hide: A Study on the Privacy of Ride Hailing Servi..:

, In: 2019 IEEE Vehicular Networking Conference (VNC),
 
?
11

Privacy in Mobile Sensing:

, In: Studies in Neuroscience, Psychology and Behavioral Economics; Digital Phenotyping and Mobile Sensing,
 
?
12

Coloured Ring Confidential Transactions:

, In: Lecture Notes in Computer Science; Data Privacy Management, Cryptocurrencies and Blockchain Technology,
 
?
13

Publicly Verifiable Static Proofs of Storage: A Novel Schem..:

, In: Information and Communications Security; Lecture Notes in Computer Science,
Kopp, Henning ; Kargl, Frank ; Bösch, Christoph - p. 459-477 , 2018
 
?
14

Secure Code Execution: A Generic PUF-Driven System Architec..:

, In: Developments in Language Theory; Lecture Notes in Computer Science,
 
?
15

uMine: A Blockchain Based on Human Miners:

, In: Information and Communications Security; Lecture Notes in Computer Science,
 
1-15